On the 31st of May, Uptrennd will stop its services and merge into Trodl.com. More information can be found here: https://www.uptrennd.com/post-detail/the-evolution-of-uptrennd-trodl~ODkxMzMw
My Comments on Malware Quarantine when I was a young student

Quarantine is a place to isolate an object to prevent the infection of harmful substances. We can see when a person who is suffering from influenza is brought into an isolated place because influenza is known as a virus that could easily spread and infects other people. Not only people, animals and plants also brought into quarantine if it could spread diseases, other stuffs also applies. The word quarantine was originally Italian “quaranta” meaning forty (40). History claims during the 13th century in Europe and Asia there was The Black Death academic that causes over 450 millions death cause by a bacteria back then contained in black rats. Ships with the passengers coming to the mainland waited for 40 days before it can enter to see whether symptoms occurs. Those without the symptoms after 40 days may pass. This is the eighth assignment from my Masters Advanced Network Security Course which has never been published anywhere and I, as the author and copyright holder, license this assignment customized CC-BY-SA where anyone can share, copy, republish, and sell on condition to state my name as the author and notify that the original and open version available here.


preview not available
In computer and information system the quarantine is used to isolate harmful data that could spread and infect other PCs for example worms, virus, and packets containing attack patterns. An example of a quarantine that is common in public is on the anti virus (AV) software. When an (AV) detected a file infected by a computer virus it will put it into quarantine, functionally no users and other programs may access the infected file (isolated).
preview not available
On a computer network the quarantine server is usually attached on a mirror port of layer 2 switch, or functions as a DHCP server, or both. An IPS can prevent attacks from outside but it cannot manage on the inside when a PC is infected by a worm or virus, and so a quarantine is mostly use to protect from the inside. Even thought there are AV software, but in this situation it is assumed that it's not perfect (there maybe PC not equipped with AV, out of date AV, etc). The quarantine on the network act as a gate it first scan the PC of vulnerability, updates on the AV, and presence of the virus (depends on the quarantine). The PC will be granted access to the network if for example it has no vulnerability, updated OS, AV, application, etc, and no presence of worms and virus (tries to delete them if detected). On DHCP method it might not give IP address to the client if the condition above is not met, another method it adds to the block list of ACL on switches and routers or not included on the accept list. The quarantine is used to strengthen authentication and traffic control, investigate whether OS, AV, and its applications is up to date, and check for the presence of worms and virus.
preview not available
To me the network quarantine system is very new. Personally I would prefer a quarantine system that would only delete the worms and virus along the way when communicating on the network. If acts like a strict security guard I will be strictly to always update my applications to the latest before I may use the network which seems very troubling if I have urgent cases. On the other hand this system is a great additional solution to tighten network security, especially in cases in protecting very important data.

Mirrors


COMMENT

21

preview not available Kong .
04 Feb

I know a bit about how Virus and Antivirus works, but you have shed more light on how quarantine of affected files to aid removal or end the danger of deadly computer viruses.

COMMUNITY DETAILS

Computers

6912

Subscriber

1

Online

Engage with all topics about Computers!

RELATED COMMUNITIES

Bitcoin Cash

29897 subscribers

Litecoin

28819 subscribers

Cryptocurrency Mining

28132 subscribers

Trading & TA

25349 subscribers

Zcash

20123 subscribers

Uptrennd Optimization

16973 subscribers

© 2021 UpTrennd.com