About
Subscribe
  • Home
  • /
  • Security
  • /
  • Open source tool Hones in on malicious activity

Open source tool Hones in on malicious activity

Alex Kayle
By Alex Kayle, Senior portals journalist
Johannesburg, 23 Apr 2012

Open source tool Hones in on malicious activity

Government Computer News reports.

The tool, called Hone, can trace every packet of every application, and by tracing malicious traffic to the application that originated from it, IT administrators can identify the source of a compromise more quickly.

This is according to Glenn Fink, senior research scientist at Pacific Northwest National Laboratory, who invented Hone.

Fink reveals the tool is available for the Linux operating system kernels 2.6.32 and later, with other versions in development for Windows 7 and XP, while a Mac OX version is in the pipeline, TechWorld states.

Fink claims Hone can identify relationships between programs and network activities. In addition, it can cyber attacks accurately, and could also be adapted to limit how processes can communicate to the network.

According to Fink, in the past, and system administrators spent much of their time searching for unusual patterns in communications between computer systems and the network, CIO Insight says.

“The problem is that once such a pattern is found, there's nothing to say which program is doing the communicating, so the administrators closely watch the system hoping to see the program work again and allowing them to get a better reading on the situation.”

Share