{"id":15627,"date":"2015-10-13T17:40:27","date_gmt":"2015-10-13T17:40:27","guid":{"rendered":"https:\/\/researchweb8.wpengine.com\/ugaresearch\/?p=15627"},"modified":"2015-12-07T16:56:33","modified_gmt":"2015-12-07T16:56:33","slug":"safe-and-secure","status":"publish","type":"post","link":"https:\/\/research.uga.edu\/news\/safe-and-secure\/","title":{"rendered":"Safe and secure"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text]An anti-malware program developed by researchers at UGA is helping to keep campus computers safe, and it may also prove useful for other institutions that want to protect sensitive information from cybercriminals.<\/p>\n<p>Roberto Perdisci, an assistant professor of computer science at UGA, and his students call their program AMICO, which means \u201cfriend\u201d in Italian, a subtle reference to Perdisci\u2019s Italian roots. AMICO works by automatically analyzing the origin of every executable file downloaded on the UGA computer network in real time to determine if it might be dangerous.<\/p>\n<p>\u201cAMICO is unique because it doesn\u2019t actually look at the contents of the downloaded files,\u201d Perdisci said. \u201cOther malware programs scan files to see if they contain computer code that might be malicious, but our program looks at patterns associated with a file\u2019s origin site and determines whether it is dangerous based on data we have collected about that site in the past.\u201d<\/p>\n<p>The AMICO software also automatically creates an anonymous tag for machines that download potentially harmful files, and it does not store any personal information about individual users.<\/p>\n<p>\u201cAMICO does not need to know who downloaded the file, it only knows if there is a potential threat to a computer on our network,\u201d Perdisci said. \u201cIf a threat is detected, this information is passed to UGA\u2019s Information Security team.\u201d<\/p>\n<p>UGA\u2019s Office of Information Security has used AMICO alongside other commercially available security programs for more than two years, and it has provided them with an extra layer of security for all users across campus.<\/p>\n<p>\u201cWe have about 100,000 devices on our campus, and AMICO is able to catch problems that our other tools are missing,\u201d said Christopher Workman, associate director of information security at UGA. \u201cIt\u2019s been invaluable and we absolutely love it.\u201d<\/p>\n<p>The annual cost of cybercrime and economic espionage is more than $445 billion worldwide, according to estimates from the Center for Strategic and International Studies, a Washington-based think tank.<\/p>\n<p>The AMICO project, which stands for Accurate Malware Identification by Classification of live network traffic Observations, has been funded by the National Science Foundation, and it is the result of a long-standing collaboration between Perdisci and Kang Li, a professor of computer science at UGA.<\/p>\n<p>AMICO is completely open source, so large communities of programmers and security experts are able to comment on and improve the program through online collaborations.<\/p>\n<p>Perdisci and Li also recently received funding from the U.S. Department of Homeland Security to transition the AMICO system to market and to further its adoption beyond UGA. To that effect, the UGA Research Foundation has filed a patent application on AMICO and desires to partner with companies toward the commercial exploitation of this important asset.<\/p>\n<p>\u201cWe want to build a large community of developers and users that can improve what we\u2019ve done so far to make our software ready to deploy to other institutions,\u201d Perdisci said. \u201cWe\u2019ve already seen tremendous success on UGA\u2019s network, so I know there is value for AMICO outside of our local campus as well.\u201d[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;16057&#8243; img_size=&#8221;medium&#8221; style=&#8221;vc_box_circle_2&#8243;][\/vc_column][vc_column width=&#8221;2\/3&#8243; css=&#8221;.vc_custom_1445614754502{padding-top: 45px !important;}&#8221;][vc_separator color=&#8221;custom&#8221; align=&#8221;align_left&#8221; accent_color=&#8221;#bf1f24&#8243;][vc_column_text]<\/p>\n<h6 class=\"p1\">Roberto Perdisci is an assistant professor of computer science in UGA\u2019s Franklin College of Arts and Sciences.<\/h6>\n<p>[\/vc_column_text][vc_separator color=&#8221;custom&#8221; align=&#8221;align_left&#8221; accent_color=&#8221;#bf1f24&#8243;][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Computer program protects campus<\/p>\n","protected":false},"author":13,"featured_media":15607,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[224],"tags":[281],"post_medium":[],"publications":[],"authors":[],"photographers":[],"video_credit":[],"takeaways":[],"class_list":["post-15627","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","tag-innovation-gateway","entry"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/research.uga.edu\/news\/wp-json\/wp\/v2\/posts\/15627","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/research.uga.edu\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/research.uga.edu\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/research.uga.edu\/news\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/research.uga.edu\/news\/wp-json\/wp\/v2\/comments?post=15627"}],"version-history":[{"count":0,"href":"https:\/\/research.uga.edu\/news\/wp-json\/wp\/v2\/posts\/15627\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/research.uga.edu\/news\/wp-json\/wp\/v2\/media\/15607"}],"wp:attachment":[{"href":"https:\/\/research.uga.edu\/news\/wp-json\/wp\/v2\/media?parent=15627"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/research.uga.edu\/news\/wp-json\/wp\/v2\/categories?post=15627"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/research.uga.edu\/news\/wp-json\/wp\/v2\/tags?post=15627"},{"taxonomy":"post_medium","embeddable":true,"href":"https:\/\/research.uga.edu\/news\/wp-json\/wp\/v2\/post_medium?post=15627"},{"taxonomy":"publications","embeddable":true,"href":"https:\/\/research.uga.edu\/news\/wp-json\/wp\/v2\/publications?post=15627"},{"taxonomy":"authors","embeddable":true,"href":"https:\/\/research.uga.edu\/news\/wp-json\/wp\/v2\/authors?post=15627"},{"taxonomy":"photographers","embeddable":true,"href":"https:\/\/research.uga.edu\/news\/wp-json\/wp\/v2\/photographers?post=15627"},{"taxonomy":"video_credit","embeddable":true,"href":"https:\/\/research.uga.edu\/news\/wp-json\/wp\/v2\/video_credit?post=15627"},{"taxonomy":"takeaways","embeddable":true,"href":"https:\/\/research.uga.edu\/news\/wp-json\/wp\/v2\/takeaways?post=15627"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}