How good of an idea is it to create a "good virus" to defend against viruses and cyberattacks?

ablake

To combat DDoS attacks, the Japanese government is apparently working on a "virus" that can trace back to an attacking resource, then disable it. I can't help but wonder how good of an idea it is to install a "good" piece of malware (or should I call it posiware?) as a preventative measure? What do you think about the concept, is it a good or bad idea?

Topic: Security
Answer this Question

Answers

2 total
AppDevGuy
Vote Up (19)

I don't like the idea of software, even presumably acting with good intentions, running on my machines without my approval.  Sure, I assume that it is meant to be installed by knowledgeable, most likely government users, but if it can react to external threats and "infect" the threat source autonomously, it seems like just a matter of time before it is essentially invited to infect a "black hat" machine through an attack, and the bad guys get access to the code to modify and use for their own purposes.  I also have concerns about the effect on memory and processor cycles, and bandwidth consumption, which seems inevitable with this type of software.   Nothing is free, so I would also expect to see memory drain if this is constantly running on machines to provide active defense against attacks.  All in all, I lean towards thinking this concept of a "good virus" is probably a bad idea.

jimlynch
Vote Up (15)

Sounds a bit like Spy Versus Spy to me. Heh. Where does it end? And could the Japanase idea complicate things and make an even bigger mess at some point?

But then again, I could be wrong in being skeptical about it. Sometimes fresh ideas and approaches can generate unexpected progress on problems like this. So perhaps it's a good idea to follow what the Japanese are doing and then see what comes of it?

At the very least I give them credit for being creative.

Ask a question

Join Now or Sign In to ask a question.
Security researchers have recently found a vulnerability that could be used to hijack Android apps and devices, but an older issue that can have the same effect remains a significant threat nearly two years after its discovery, according to security firm Bromium.
Malicious hackers are using remote access tools to break into retail point-of-sale systems and plant malware on them, the Department of Homeland Security warned.
A new program that encrypts files to extort money from users highlights that attackers don't need advanced programming skills to create dangerous and effective ransomware threats, especially when strong encryption technology is freely available.
Privacy campaign group Europe-v-Facebook is inviting Facebook users outside the U.S. and Canada to join a lawsuit against the company, which it alleges violates privacy laws.
The team at Mitro Labs, the developer of a password manager, is joining Twitter, and its software is being released under a free and open source license, Mitro said Thursday.
The latest release of a Microsoft security tool that's designed to stop exploits lets administrators control when third-party plugins are launched, a long favored route for attackers.
Some of those seeking to scrub their histories from the Web under Europe's "right to be forgotten" rule are being economical with the truth when making their requests, Google said Thursday.
Most USB devices have a fundamental security weakness that can be exploited to infect computers with malware in a way that cannot easily be prevented or detected, security researchers found.
A U.S. district court judge has ruled against Microsoft in the company's effort to oppose a U.S. government search warrant for emails stored in Ireland.
Hackers attacked the infrastructure of Tor, the anonymizing service, earlier this month in an incident that may have compromised a number of hidden services, according to an announcement posted today by the Tor Project's director, Roger Dingledine.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+