October 25, 2004
New I.B.M. Report Will Warn of Computer Security Threats
By JOHN MARKOFF
http://www.nytimes.com/2004/10/25/technology/25ibm.html?oref=login&pagewante
d=print&position=

I.B.M. plans to begin releasing on Monday a monthly report of threats to
computer networks in an effort to establish an indicator similar to the
federal government's Homeland Security Advisory System.

The report, to be named the Global Business Security Index, is intended to
give computing managers early warning of a range of computer vulnerabilities
like attacks by malicious hackers, automated softwares, viruses and worms,
as well as to gauge the impact of political upheavals and natural disasters.

The index will be generated from data gathered by 2,700 International
Business Machines information security employees and a global network of
about a half-million sensors - software programs and security hardware
distributed to its customers and its own networks in 34 countries. The
network of sensors routinely detects 100 million suspected or actual attacks
against I.B.M. customers each month.

The index will be released on I.B.M.'s Web site and will be part of a
broader service known as the I.B.M. Security Threats and Attack Trends, or
STAT, report, which the company offers customers at a cost of about $10,000
a year. That service is also produced by I.B.M.'s Security Intelligence
Services, a group that is part of its managed computing services unit and is
based on a corporate campus in Boulder, Colo.

I.B.M. is not the first to provide computer security managers with
intelligence data on network threats. Several such services of varying scope
are available commercially. Symantec, an independent security services and
software publisher, offers DeepSight Threat Management System, a sensor
network that takes information from 20,000 corporate customers and millions
of personal computer customers who use the company's antivirus software.

The service, which has been available for four years and costs about the
same as I.B.M.'s STAT report, generates a color-coded threat level and
displays a publicly available global map of incidents that have occurred
within the past day.

"We alert customers to trends," said Alfred Huger, Symantec's senior
director.

The I.B.M. service can also provide a first line of defense in an
increasingly networked world where attacks tend be both instantaneous and
huge, I.B.M. executives said.

"The security landscape today is totally different," said David Mackey, a
former army intelligence analyst who now directs the company's Security
Intelligence Services. "Customers want a holistic approach to security."

I.B.M. said Internet attacks directed at the networks the company monitors
rose 27 percent in September over July and August. The most prevalent
attacks currently come from computer worms - programs that are able to move
automatically from computer to computer within a network. Many of the worms
are targeted at a vulnerability in the Microsoft Windows operating system
that was first disclosed in April.

The I.B.M. security executives said they had also seen a 15 percent increase
in the past month in the percentage of network attacks against critical
infrastructure providers - computer network sites that government agencies
and companies use to provide essential services.

Although the overall increase is not major, attacks seeking vulnerabilities
in Web server software have increased the most, Mr. Mackey said.

But Michelle Petrovich, a spokeswoman for the Department of Homeland
Security, said, "We haven't seen any increase in activity that would
indicate any widespread cyberthreat. "

Such attacks in the past have frequently been a preliminary indicator of a
more concentrated strike against systems found to be vulnerable. But I.B.M.
executives said that they had no corroborating information that would
suggest that such a broad scale attack is being planned.

"A variety of attackers are using software tools to do reconnaissance
against government agencies," Mr. Mackey said. He said it was not possible
to learn the motives or whether there was a common attacker behind the
infiltration that I.B.M. found.

As part of its index announcement, I.B.M. made available a year's worth of
data on security trends that show distinct spikes in September of 2003 and
March of this year.

Those dates correspond to attacks by computer worms, I.B.M. executives said.

Industry analysts who track the computer security industry said reports like
those provided by I.B.M. and Symantec were useful to corporations attempting
to protect themselves from attacks over the Internet.

"An early-warning-type system would be a benefit to an organization," said
Allan Carey, a senior research analyst for International Data Corporation, a
research firm for the computer industry. "It would give them time to create
countermeasures."

At the same time, both industry analysts and the I.B.M. security
intelligence executives noted that the industry was trapped in a cycle of
disclosing network vulnerabilities and then racing to distribute patches
before the security holes were exploited.

The I.B.M. executives said the window that organizations had to prepare for
an attack was getting smaller. They said that the industry talked about
"Microsoft Tuesdays," a reference to the day of the week that the software
company, based in Redmond, Wash., tells its largest customers about newly
discovered vulnerabilities.

"There is a time gap that occurs, and generally the awareness of a hole is
made and all of a sudden it's a rush against time to fix the hole," said
Gregg Mastoras, a senior security analyst at Sophos, an antivirus and
antispam firm. "It's absolutely a vicious cycle and it's an issue for the
industry."

Both the I.B.M. executives and other security experts said that they were
seeing more sophisticated attacks and that the culture of the computer
underground was shifting from bored teenagers to criminals attempting to
steal information or money.

Mike Walter, a senior architect in I.B.M.'s Security Intelligence Service,
said "sophisticated attacks generally happen on weekends," when networks are
least guarded.



You are a subscribed member of the infowarrior list. Visit 
www.infowarrior.org for list information or to unsubscribe. This message 
may be redistributed freely in its entirety. Any and all copyrights 
appearing in list messages are maintained by their respective owners.

Reply via email to