CIOREVIEW >> Security >>

Fraudulent Monetary Transactions to End with Gyrus

By CIOReview | Thursday, February 27, 2014

ATLANTA: Researchers at Georgia Tech have come up with a new security system named Gyrus against fraudulent monetary transactions. Currently under the wraps, the solution is said to immediately block unauthorized commands during transfers.

Traditional security systems have largely focused on attack detection. But accurately identifying the latest attacks has proven to be a never-ending cycle. The paper presented by the team—Yeongjin Jang, Simon P Chung, Bryan D Payne and Wenke Lee, proposes a way to break this cycle by ensuring that a system’s behavior matches the user’s intent. They claim that Gyrus will scale better than traditional security systems.

Gyrus takes measures to prevent malware from sending spam emails and instant messages. It gets hold of richer semantics including both user actions and text contents to make the system send only user-intended network traffic.

"Gyrus is a transparent layer on top of the window of an application. If Gyrus detects that user-intended data has tampered with, it will block the traffic and also notify the user," explained Lee, Director of the Georgia Tech Information Security Centre.

The available protection programs can recognize the user's intent to send email, transfer money or engage in other transactions but cannot validate the particulars such as email contents or amount of money.

The team behind Gyrus observed that for most text-based applications, the user's intent would be visible on screen as text and the user would make modifications and confirm that their input is correct. The makers of Gyrus call it 'What You See Is What You Send' (WYSIWYS) policy.

"The idea of defining correct behavior of an application by capturing user intent is not entirely new, but previous attempts in this space used an overly simplistic model of the user's behaviour," said Yeongjin Jang, PhD student at Georgia Tech.

The present design can be adapted to work in a cloud computing model where the remote host is an instance in an IaaS cloud. Gyrus is expected to fill a significant gap, enabling security policies that consider user intent in shaping the authenticity of network traffic.

Check Out Review Of CIOReview : CrunchbaseGlassdoor

Check This Out : CIOReview OverviewMuckrack