Computer Crime Research Center


Computer security: hacker approach

Date: April 18, 2006

A startup is taking a unique approach to security analysis by using techniques similar to those employed by hackers to root out vulnerabilities in network devices.

MU Security’s MU-4000 Security Analyzer is a test lab appliance that launches a barrage of attacks on network infrastructure prior to deployment. The idea is to adopt ethical hacking techniques to proactively identify zero-day exploits and minimize damage to networks, said Ajit Sancheti, co-founder and CEO of MU Security, Sunnyvale, Calif.

“Our Security Analyzer is like a vulnerability torture test that allows you to attack network equipment using millions of attack vectors,” he said. “Then when things fail, we provide all the information you need to go back and fix it.”

MU Security has developed an engine that identifies structured communications and attempts to find weaknesses by mutating attacks and inserting invalid data. Companies that use this approach in network design, development and deployment will benefit, Sancheti said. “Using this process, your products will become inherently more secure,” he said.

The trend toward consolidating security features into unified threat management solutions is being fueled through outsourced development, which can contribute to vulnerabilities, Sancheti added.
Original article

Add comment  Email to a Friend

Copyright © 2001-2013 Computer Crime Research Center
CCRC logo