Linked by Thom Holwerda on Wed 10th Aug 2005 18:51 UTC, submitted by Not_Today
Privacy, Security, Encryption Microsoft unveiled details of its Strider HoneyMonkey research, a project that sniffs out sites hosting malicious code, and hands the information to other parts of the company for patching or legal action. The technical report (pdf) outlines the concept of cruising the Web with multiple automated Windows XP clients - some unpatched, some partially patched, some patched completely - to hunt for Web sites that exploit browser vulnerabilities.
Thread beginning with comment 16679
To view parent comment, click here.
To read all comments associated with this story, please click here.
RE[2]: Cool
by Bryan on Wed 10th Aug 2005 21:43 UTC in reply to "RE: Cool"
Member since:

Please keep your zealotry in your parents basement where it belongs. The article is discussing a legitimate academic report (which is even linked in the synopsis above). This project presents an interesting approach to finding malicious sites on the Internet. Rather than wait to hear of wide-spread infection, HoneyMonkey takes an active approach and seeks out the sites that are thought to be installing malware. This allows them to (a) confirm the threat and (b) get a "sample" machine which can be catalogued and analyzed for creating a fix. Furthermore, as the article pointed out, having these machines browse the net also prove that patching has a quantifiable effect on mitigating infection, which Microsoft can use as an indication of progress as well as a way to demonstrate to businesses the value of installing patches ASAP upon release. To say this is a stunt or a crutch for poor quality coding is naive.

Reply Parent Score: 5