Two experts debate the effectiveness of a new security technology. Network behavior anomaly detection does not provide a true security solution against viruses and worms. With the growing sophistication, speed and damage potential of today’s virus and worm attacks, companies need a solution that actively defends their networks.The other side – Arbor Networks’ Paul MorvilleForum: Your thoughts and questions. The ingredients required to mount a meaningful defense against these new and virulent attacks include speed, accuracy and the ability to actively block attacks from spreading to other machines, systems and networks.Anomaly detection falls short in these areas and gives users a false sense of security. The approach has three main drawbacks: It is too slow to detect fast-spreading virus and worm attacks. Anomaly-detection vendors, by their own admission, permit attacks to affect a certain percentage of a network. This can translate into hundreds of machines being compromised before an attack is detected. In many cases, whole networks can be infected in a matter of minutes. Anomaly detection relies on network flow data, which is often reported at intervals of 15 to 45 minutes. With that kind of lag, an entire network can be brought down.It produces an enormous number of false positives. Anomalies can occur in a network at any time. Because anomaly detection is looking for an anomalous event rather than an attack, it is frequently plagued by time-consuming false positives. This can result in a “the boy that cried wolf” syndrome: When an actual attack is afoot, no one will respond because of all the previous false positives.It provides marginally effective mitigation techniques, if it provides any. With a high rate of false positives, it is perhaps a blessing that these products do not provide the option of a fully automated containment process. Because of their significant detection latency, anomaly detection response techniques are often geared toward containing widespread outbreaks through zone segmentation. This is equivalent to amputating an entire limb for an infection when a wound could have been treated earlier. A more appropriate response is to immediately and surgically contain the initial infection vector, before propagation can occur, preventing an outbreak in the first place.Most anomaly-detection products were built for network performance monitoring and diagnostics. They weren’t designed to protect the network from zero-day attacks, targeted attacks and worm storms. Anomaly detection systems are unable to mitigate slow, stealthy and sophisticated attacks. Hackers are using this method, essentially spreading an attack over a longer time, to fly under the radar of anomaly-detection engines and other security devices.Someday soon, anomaly-detection tools will be properly categorized as network-management and -monitoring devices rather than security solutions. To adequately protect your network, it is essential to have a real internal network-security solution that is fast and accurate, and can actively defend against new generations of virulent attacks that, sooner or later, will target your network.Arbel is president and CEO of CounterStorm. He can be reached at gil.arbel@counterstorm.com. Related content news analysis Western Digital keeps HDDs relevant with major capacity boost Western Digital and rival Seagate are finding new ways to pack data onto disk platters, keeping them relevant in the age of solid-state drives (SSD). By Andy Patrizio Dec 06, 2023 4 mins Enterprise Storage Data Center news analysis Global network outage report and internet health check Cisco subsidiary ThousandEyes, which tracks internet and cloud traffic, provides Network World with weekly updates on the performance of ISPs, cloud service providers, and UCaaS providers. By Ann Bednarz and Tim Greene Dec 06, 2023 286 mins Networking news analysis Cisco uncorks AI-based security assistant to streamline enterprise protection With Cisco AI Assistant for Security, enterprises can use natural language to discover policies and get rule recommendations, identify misconfigured policies, and simplify complex workflows. By Michael Cooney Dec 06, 2023 3 mins Firewalls Generative AI Network Security news Nvidia’s new chips for China to be compliant with US curbs: Jensen Huang Nvidia’s AI-focused H20 GPUs bypass US restrictions on China’s silicon access, including limits on-chip performance and density. By Anirban Ghoshal Dec 06, 2023 3 mins CPUs and Processors CPUs and Processors Technology Industry Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe