Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
NASA

Journal Journal: The end of the Space Age

Today, I saw that the space age is really over. I was driving through Nassau Bay, on the opposite side of Nasa Road One from the Johnson Space Center, and saw they were gone: a dozen or so office buildings that housed the space program contractors since the very beginning. Although NASA gets almost exclusive credit, much of the space age happened here: Martin Marietta, Lockheed, Rockwell Rocketdyne, a score or more other contractors who were the backbone of America's push into space. Humans go

Comment Clarification. to atomic and culture (Score 1) 327

The filter I propose isn't based on "submitted userid == any valid userid" but "submitted userid (is X% similar to) any valid userid". X would be a tunable value. In spam email filters, this usually works out to "if incoming email (is less than 20% similar to) previously accepted emails" or some such. It turns out that spam emails, even if containing dictionary words, still don't resemble human communications when bayesian statistics are applied to it.
Since the attacker doesn't know what userids are valid, the chance of any guessed userid being more than a few percentage points similar to a valid userid is vanishingly small.
Try it - pick a thousand "valid userids" out of the dictionary. Now pick a thousand more, omitting variations like "library - librarian". How many attempts will have more than a few characters in (almost) the same position and (almost) the same order as the "valid userids"?
The reason to use the userid list is because it is invisible to the attacker. The only result the attacker sees is suddenly one of the bots is blocked from the target host. No reason why, and no indication which of the last 20 or 100 or so userid attempts were "way off" and thus contributed to the decision to block.
A valid login attempt with a typo in the userid will be right in all but 1 or 2 characters nearly all the time. The bruteforce attacker will be wrong by more than 1 or 2 characters nearly all the time. Statistically, that's significant.
Since the block doesn't happen because of a single match or failure to match the list, the attacker learns nothing. The attacker doesn't even know the bayesian testing is occurring, thus the attacker would have no knowledge of which its attempted userids was valid or close to valid. It doesn't matter even if the attacker knows this filter is in place. Blocking the entire botnet will be a function:
Block = (v/b)*p
Where v == count of valid userids
b == count of hosts in the botnet,
p == average number of attempts required to guess a password.
B == point at which entire botnet is blocked.
With strong 8 character userids and passwords, the botnet would require billions of hosts in order to breech the system before being blocked.

Comment Re:Total miss. (Score 1) 327

I wasn't talking about the product to use to do it, but a detection approach that isn't present in any product I know of.
I described how to detect a specific kind of behavior that would be unique to the attack and the attacker, and to which attackers can not mount a meaningful countermeasure. Implementing the filter requires statistical analysis of not just incoming data, but also resident data (the userid list).

Comment Apply bayesian spam filtering? (Score 2, Interesting) 327

Would a bayesian filter work on this? The filter would match bad userids against the set of valid ones; bad userids that do not resemble any valid id by more than X% will score a demerit against the host that submitted the bad ID. Enough bad ids will probably identify an attacking bot, which can then be blocked. This is a slow defense, but the attack itself is slow and will probably statistically require far more attempts than a bayesian filter requires to identify the attacker.
Since the attacker doesn't know the set of valid userids on the target system, it's hard to see how this could be countered. Spam authors know how normal email looks, but still can't defeat bayesian spam filters.
User Journal

Journal Journal: My latest conspiracy theory

This one'll never get the attention it deserves. What's it got? It has: gubmint involvement; Loch Ness monster; the oppression inherent in the system; etc.
What brought this revelation to me was the Bloop. To digress a little, the bloop was a noise heard in 1997 that seems biological in origin, but was heard over a range of 3000 miles. No one knows what caused it.
Fads and fashions come and go. When I was kid, ES

Comment Re:Why not publish the source online? (Score 1) 83

No it isn't. Enterprise was used for ALT (Approach and Landing Tests) in 1980's, pre-first launch. Technically, it has 'flown', but not as part of a launch vehicle or into space. It was 'drop tested'.
Flight software testing only requires the computers and related avionics; currently, some of that is in Bldg 9 at JSC (I think - it's been years since I was there). Flight software testing is done in a variety of ways, including running it in the astronaut training simulators on emulated and actual flight hardware. One of the early flights, STS 2 or 3 IIRC, was delayed a coupla days cuz a bug in flight software. It had occurred in the simulator as well, but nowhere else. Flight crews didn't yet trust the realism of the GNC configuration in the simulator, so the simulator was considered the cause of the bug.
The SMS became a part of the testing process for flight software after that.
Again, this is personal comment only, does not reflect, and I am not authorized to speak for my employer or NASA.

Slashdot Top Deals

What is wanted is not the will to believe, but the will to find out, which is the exact opposite. -- Bertrand Russell, "Skeptical Essays", 1928

Working...