Should I choose an open or closed source for the ICT environment?
How to avoid Trojan Horses, the malicious software, camouflaged as utility software or hidden in utility software code?
If I cannot see the source code. Somebody may hide malicious software in that code. But to get full benefit from the open source I must know something about programming.
This is a good question. Open source allows one to see the source code. And that gives freedom, flexibility, and customization for the data environment. That allows to make custom modifications for applications. But there is one problem. People should know about programming. They should know what they do in the system when they configure code. And that thing has limited the use of open source applications in the business environment.
And need to know the coding sometimes mentioned, as the reason for choosing closed code. The company should hire some coders, that don't fit their image or something like that. Sometimes the reason for choosing closed code is that the company has no time to test systems. And they want a complete and key-to-hand solution that works from the first day.
The problem is that the customer doesn't see the source code. And that makes it possible to hide so-called parasite programs in that code. The parasite program is sequenced in program code that steals information. And it's one subtype of the Trojan horse. In Trojan Horse, the malicious software is like a parasite in the utility program code. The utility program acts as a carrier.
Making that kind of software and controlling the code requires programming skills. But the new tools make the world easier to live in.
But the AI is the game-changer. The Open-source language model applications make it possible. That system can generate new and complicated code quickly and with low-level errors. The same systems can also make code checks to discover the parasite program from the source code. The program can cut spyware into pieces in the computer program. This kind of malware is hard to notice. And sometimes it's marked as "dead code".
Then the system will connect those code bites when the program is assembled. The problem with this kind of parasite program is that it might written using a different programming language than the program itself. When the utility program comes to the computer, it loads connector applications into memory. That collects those code bites together.
If the hacker wrote that malicious code using some other programming language. The connector separates the malicious code easily. Hackers can send those malicious program bites to targeted systems using different channels.
The attacker cuts that kind of stealth algorithm cut in as small bites as possible. There is some collector program that recognizes the code. Then that program connects the code bites and decodes those bites. In that case, the malicious software is masked as non-functional or "trash" code.
The antivirus cannot see it if those code bites are small and they involve minimum information. Also, programmers can cut critical lines that make it harder to detect malicious code. There is a possibility that a hacker cheats the antivirus by sending the program packages using different carrier programs on different days. But the success of that thing requires the ability to slip the collector-connector program in the system. There is the possibility that the malware writer uses multiple programming languages. And then there is a translator in some program code that connects that thing into entrirety.
The AI can notice those code bites from a very large program. It can be the next-generation tool for programming and malware detection. The AI also makes it possible to create customized software for users. And that means hackers in China and Russia can also benefit from that kind of thing.
Comments
Post a Comment