Software Tests Cyber Security Systems

Wednesday, July 21, 2010 @ 02:07 PM gHale

Sometimes all you need is a little opening in the door and you can burst through.
When it comes to security it is no different. While systems are tougher to crack these days, they are not infallible.
“When you work in cyber security, everything has to be just right,” said Prof. Christopher Lynch, chair of Clarkson University’s Division of Mathematics and Computer Science. “One little thing might be off, and that’s the hole the intruder needs to come through and get everything.”
Along those lines, Lynch is developing software programs that will test cyber security systems for flaws before they become operational.
Lynch works in a mathematical realm called automated reasoning, teaching machines to think. In his current project, Lynch wants to teach machines to scan cyber security systems for glitches. People could do the job, but not as well, he said.
“A machine works better because the job requires speed, keeping track of many things at one time, plus the work is tedious,” Lynch said. “A human might not consider all the alternatives, and they would make mistakes.”
The project is capturing some attention as the National Science Foundation decided to fund $1.2 million for the project, which involves Clarkson and four other research centers: The University at Albany-SUNY, the University of New Mexico, the University of Illinois, and the Naval Research Laboratory.
The project is so complex it requires the input of specialists at five research centers. “We have different expertise,” said Lynch, a professor of computer science. “I know automated reasoning. My colleague at the Naval Research Center is an expert in cryptographic protocols (instructions written in code). One of us alone cannot do this.”
For many cyber security means using passwords and keeping them secret.
In Lynch’s world, hackers steal information and disable computer systems with barrages of junk. It’s a world where computers talk to each other, creating openings through which hackers can intercept information or substitute their own. Sometimes hackers dart in and out undetected. “From the point of view of the criminal, the best thing is to get in and out without anybody knowing about it; to make things look normal when they’re not,” Lynch said.
Lynch’s research comes as hackers have developed the capability to damage global commerce, penetrate national security networks, disrupt the electric grid, and derail pretty much anything that depends on computers.

Leave a Reply

You must be logged in to post a comment.