Every once in a while, I see some new security development that really sets
me on edge. The latest one is courtesy of DERA (Defense Evaluation and Research
Agency), an agency of the MoD (Ministry of Defense) in Britain. Like many agencies
that deal with computer security, they periodically come out with some new idea or product that solves a popular problem.
In this case, DERA has come up with a way to combat email borne viruses. Realizing
that you will not always be able to intercept and stop a virus as it makes itss
way into the network, you can try to prevent it from “germinating” and spreading
to other systems. This is a good idea, having defense in depth. If you don’t
catch incoming viruses at least you will be less likely to propagate them to
other systems. Unfortunately, the method suggested by DERA is extremely simplistic
and will no doubt annoy users to no end.
DERA’s idea is that when you send out an email you will receive a message asking
you if you really want to send it. Thus, viruses that generate emails to spread
themselves will be stopped because the user will realize they have not intended to
send a message, and they will not click “OK.”
This appeals to many people because of its apparent simplicity and potential
effectiveness. Unfortunately, there are several severe problems with it. The
first will be the annoyance that will slowly become unbearable, like Chinese
water torture, of having to wait for a message and then click on “OK” whenever you send an email. Instead of quickly typing out an email and hitting send you
will need to wait until the server sends a response so you can click the approval button. Depending on how heavily loaded the server is, this may take a while.
The second problem is that writing a virus with the ability to respond to this
message will not be terribly difficult. As this software becomes more popular,
virus writers will compensate for it by automatically replying to the messages.
Of these two problems, I suspect the user interface will be the major downfall.
Security measures almost never work if they are intrusive, because users will
first try to circumvent them, and then they will loudly complain if they cannot.
Also, these systems only work if the client uses the company mail servers. If
someone has Outlook set up to use Hotmail as well, for example, the virus may
successfully spread through that account.
There are also much better ways to deal with this solution that will not be
as “in your face.” For example, you could have the mail server either hold all
email for several seconds or minutes before sending it and apply either rate
limits on the amount of mail a user can send out, or if the user sends too many
messages that are identical or nearly identical, have it flag them and raise
an alarm. This is made easier by the fact that most viruses send
themselves out as attachments, making them easier to spot. Hooking into your
authentication system is another option. If a user is not logged in, but their
machine is trying to send out email, this is an obviously suspicious activity.
More intelligent approaches such as these, while harder to implement, are probably
going to be more effective as they will not annoy users to the same degree.
Of course, this all ignores many of the simple steps you can take to block
the spread of these viruses. Simply blocking .vbs extensions at the mail server
(both incoming and outgoing) will very quickly reduce your risk exposure by
a significant degree. Firewalling outgoing connections to port 25 (SMTP, the
mail transfer protocol) and forcing users to use the company’s mail servers
will at least ensure that their outgoing messages must pass through your filters,
and you will have a log of them. For most UNIX systems, there are a number of
free log monitoring utilities you can use to alert you if a user suddenly starts
to send out a lot of email.
Remember, security doesn’t have to reduce usability.
http://www.securityportal.com/articles/removewsh20010214.html
http://www.zdnet.co.uk/news/2001/16/ns-22417.html
http://www.theregister.co.uk/content/8/18478.html
Ethics and Artificial Intelligence: Driving Greater Equality
FEATURE | By James Maguire,
December 16, 2020
AI vs. Machine Learning vs. Deep Learning
FEATURE | By Cynthia Harvey,
December 11, 2020
Huawei’s AI Update: Things Are Moving Faster Than We Think
FEATURE | By Rob Enderle,
December 04, 2020
Keeping Machine Learning Algorithms Honest in the ‘Ethics-First’ Era
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 18, 2020
Key Trends in Chatbots and RPA
FEATURE | By Guest Author,
November 10, 2020
FEATURE | By Samuel Greengard,
November 05, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 02, 2020
How Intel’s Work With Autonomous Cars Could Redefine General Purpose AI
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 29, 2020
Dell Technologies World: Weaving Together Human And Machine Interaction For AI And Robotics
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 23, 2020
The Super Moderator, or How IBM Project Debater Could Save Social Media
FEATURE | By Rob Enderle,
October 16, 2020
FEATURE | By Cynthia Harvey,
October 07, 2020
ARTIFICIAL INTELLIGENCE | By Guest Author,
October 05, 2020
CIOs Discuss the Promise of AI and Data Science
FEATURE | By Guest Author,
September 25, 2020
Microsoft Is Building An AI Product That Could Predict The Future
FEATURE | By Rob Enderle,
September 25, 2020
Top 10 Machine Learning Companies 2021
FEATURE | By Cynthia Harvey,
September 22, 2020
NVIDIA and ARM: Massively Changing The AI Landscape
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
September 18, 2020
Continuous Intelligence: Expert Discussion [Video and Podcast]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 14, 2020
Artificial Intelligence: Governance and Ethics [Video]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 13, 2020
IBM Watson At The US Open: Showcasing The Power Of A Mature Enterprise-Class AI
FEATURE | By Rob Enderle,
September 11, 2020
Artificial Intelligence: Perception vs. Reality
FEATURE | By James Maguire,
September 09, 2020
Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.
Advertise with TechnologyAdvice on Datamation and our other data and technology-focused platforms.
Advertise with Us
Property of TechnologyAdvice.
© 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this
site are from companies from which TechnologyAdvice receives
compensation. This compensation may impact how and where products
appear on this site including, for example, the order in which
they appear. TechnologyAdvice does not include all companies
or all types of products available in the marketplace.