Ala Crescent
Director, Special Projects
Image Source: N/A
Intent: To create an effective piece of security software.
Development Thread: N/A
Manufacturer: Kiribian Systems Armory
Model: N/A
Affiliation: Open Market (Private Market for Mithril Keys)
Modularity: Yes, software can be modified.
Production: Mass-Production (Limited Production for Mithril Keys)
Material: Memristor, Software
Special Features: N/A
Strengths:
+When connected to the cloud (data centers), Mithril protected machines are highly resilient against brute force attacks.
+Opposing slicers and programs will find increasing difficulty in slicing Mithril protected systems as their tactics are logged and specific countermeasures are developed. Innovation is required on their part to counter this increasing resistance.
+Compatible with preexisting operating systems, so it can be immediately deployed without any special modifications necessary for the host machine.
Weaknesses:
-Vulnerable to zero-day attacks when disconnected from the cloud as the host machine has to rely exclusively on its stored profiles without updates to the cloud.
-In offline mode, more local processing power from the host machine is used compensate, possibly causing a degradation in other processes.
-Mithril can be considered intrusive as it logs individual's habits and biometrics for developing and maintaining profiles for scans.
Description:
Mithril is a suite of security software designed to protect civilian and military systems (including droids) against various forms of malicious software - malware - and network intrusions. It was developed as a direct response to the proliferation of slicers and cyber attacks becoming a common fixture of modern warfare.
The whole suite is built around a cloud-based service to limit performance impact on the user’s end, and to increase malware/intrusion detection rates for quarantine and removal. A lightweight client on the host machine exists primarily to datamine files and user inputs to create a series of profiles that serves as a baseline for uncompromised systems. Some preliminary analysis is done by the client itself, but most of the work is offloaded to data centers consisting of memristor-based neural networks to complete deep analysis in a secure sandbox environment. Upon completion, the data centers then issue copies of the profiles to the client for real time scanning for irregularities. Backups are maintained at the data centers.
The client also handles firewalls and optional backups of files, settings, and operating systems on local or external storage.
Something special about Mithril is its ability to log individual user habits to create account-based profiles. So it can detect when, say, a slicer gains physical access to a terminal who begins using the machine or network in a way that conflicts with normal usage for a particular account and/or for that point of access. It not only monitors functions but the way that they’re carried out by each individual, creating a highly detailed digital fingerprint of sorts.The terminal would then lock, and an alert would be issued across the network. This is a huge development, as users have traditionally been the weakest point of security. This feature stops just hostile agents from using an unlocked terminal for unrestricted access to the machine/network, or forcing an assigned user to work under duress.
As new threats are discovered and logged by machines using Mithril (or by direct inputs by Mithril maintainers themselves) a database is maintained and shared with individual machines to decrease their security vulnerabilities in real time. This feature is highly effective against low-level slicers using automated scripts and programs (“script kiddies”), especially as these methods become logged for future reference.
Aside from these general, automated functions, users can initiate deep scanning and quarantine/removal operations on their own. These targeted scans are very good for locating well-hidden malware like rootkits, using sophisticated schemes to avoid detection like metamorphic code.
External recovery media can be created for use on infected machines where the operating system has been completely compromised and unresponsive to installed anti-malware software. (If possible, the recovery media is best used whilst the system is placed in safe mode.) A special limited Mithril “Key” module is offered a highly portable security solution, which is a small tablet-sized, high-performance memristor-based computer with a direct biocomm uplink to server farms. Ideal for small but important operations that lack traditional support infrastructure.
Primary Sources
Real World Inspiration
Wikipedia (Wikimedia Foundation, 2017), s.v “Antivirus software” accessed January 20, 2017, https://en.wikipedia.org/wiki/Antivirus_software.
“Cloud Computing,” accessed January 20, 2017, https://www.wikiwand.com/en/Cloud_computing.
Wikipedia (Wikimedia Foundation, 2017), s.v “Microsoft azure” accessed January 20, 2017, https://en.wikipedia.org/wiki/Microsoft_Azure.
“Immunet AntiVirus,” 2017, accessed January 20, 2017, http://www.immunet.com/index#howitworks.
“Antivirus Might Catch More Malicious Code Using Neural Networks,” November 4, 2015, accessed January 20, 2017, https://www.technologyreview.com/s/542971/antivirus-that-mimics-the-brain-could-catch-more-malware/.
“Machine Learning Anti-Virus Turns Traditional Approach on Its Head,” Artificial Intelligence, June 7, 2016, accessed January 20, 2017, https://sparkcognition.com/2016/06/sparkblog-machine-learning-anti-virus-traditional-approach/.
Intent: To create an effective piece of security software.
Development Thread: N/A
Manufacturer: Kiribian Systems Armory
Model: N/A
Affiliation: Open Market (Private Market for Mithril Keys)
Modularity: Yes, software can be modified.
Production: Mass-Production (Limited Production for Mithril Keys)
Material: Memristor, Software
Special Features: N/A
Strengths:
+When connected to the cloud (data centers), Mithril protected machines are highly resilient against brute force attacks.
+Opposing slicers and programs will find increasing difficulty in slicing Mithril protected systems as their tactics are logged and specific countermeasures are developed. Innovation is required on their part to counter this increasing resistance.
+Compatible with preexisting operating systems, so it can be immediately deployed without any special modifications necessary for the host machine.
Weaknesses:
-Vulnerable to zero-day attacks when disconnected from the cloud as the host machine has to rely exclusively on its stored profiles without updates to the cloud.
-In offline mode, more local processing power from the host machine is used compensate, possibly causing a degradation in other processes.
-Mithril can be considered intrusive as it logs individual's habits and biometrics for developing and maintaining profiles for scans.
Description:
Mithril is a suite of security software designed to protect civilian and military systems (including droids) against various forms of malicious software - malware - and network intrusions. It was developed as a direct response to the proliferation of slicers and cyber attacks becoming a common fixture of modern warfare.
The whole suite is built around a cloud-based service to limit performance impact on the user’s end, and to increase malware/intrusion detection rates for quarantine and removal. A lightweight client on the host machine exists primarily to datamine files and user inputs to create a series of profiles that serves as a baseline for uncompromised systems. Some preliminary analysis is done by the client itself, but most of the work is offloaded to data centers consisting of memristor-based neural networks to complete deep analysis in a secure sandbox environment. Upon completion, the data centers then issue copies of the profiles to the client for real time scanning for irregularities. Backups are maintained at the data centers.
The client also handles firewalls and optional backups of files, settings, and operating systems on local or external storage.
Something special about Mithril is its ability to log individual user habits to create account-based profiles. So it can detect when, say, a slicer gains physical access to a terminal who begins using the machine or network in a way that conflicts with normal usage for a particular account and/or for that point of access. It not only monitors functions but the way that they’re carried out by each individual, creating a highly detailed digital fingerprint of sorts.The terminal would then lock, and an alert would be issued across the network. This is a huge development, as users have traditionally been the weakest point of security. This feature stops just hostile agents from using an unlocked terminal for unrestricted access to the machine/network, or forcing an assigned user to work under duress.
As new threats are discovered and logged by machines using Mithril (or by direct inputs by Mithril maintainers themselves) a database is maintained and shared with individual machines to decrease their security vulnerabilities in real time. This feature is highly effective against low-level slicers using automated scripts and programs (“script kiddies”), especially as these methods become logged for future reference.
Aside from these general, automated functions, users can initiate deep scanning and quarantine/removal operations on their own. These targeted scans are very good for locating well-hidden malware like rootkits, using sophisticated schemes to avoid detection like metamorphic code.
External recovery media can be created for use on infected machines where the operating system has been completely compromised and unresponsive to installed anti-malware software. (If possible, the recovery media is best used whilst the system is placed in safe mode.) A special limited Mithril “Key” module is offered a highly portable security solution, which is a small tablet-sized, high-performance memristor-based computer with a direct biocomm uplink to server farms. Ideal for small but important operations that lack traditional support infrastructure.
Primary Sources
Real World Inspiration
Wikipedia (Wikimedia Foundation, 2017), s.v “Antivirus software” accessed January 20, 2017, https://en.wikipedia.org/wiki/Antivirus_software.
“Cloud Computing,” accessed January 20, 2017, https://www.wikiwand.com/en/Cloud_computing.
Wikipedia (Wikimedia Foundation, 2017), s.v “Microsoft azure” accessed January 20, 2017, https://en.wikipedia.org/wiki/Microsoft_Azure.
“Immunet AntiVirus,” 2017, accessed January 20, 2017, http://www.immunet.com/index#howitworks.
“Antivirus Might Catch More Malicious Code Using Neural Networks,” November 4, 2015, accessed January 20, 2017, https://www.technologyreview.com/s/542971/antivirus-that-mimics-the-brain-could-catch-more-malware/.
“Machine Learning Anti-Virus Turns Traditional Approach on Its Head,” Artificial Intelligence, June 7, 2016, accessed January 20, 2017, https://sparkcognition.com/2016/06/sparkblog-machine-learning-anti-virus-traditional-approach/.