Star Wars Roleplay: Chaos

Register a free account today to become a member! Once signed in, you'll be able to participate on this site by adding your own topics and posts, as well as connect with other members through your own private inbox!

Approved Tech Mithril Security Software

Status
Not open for further replies.

Ala Crescent

Director, Special Projects
Image Source: N/A
Intent: To create an effective piece of security software.
Development Thread: N/A
Manufacturer: Kiribian Systems Armory
Model: N/A
Affiliation: Open Market (Private Market for Mithril Keys)
Modularity: Yes, software can be modified.
Production: Mass-Production (Limited Production for Mithril Keys)
Material: Memristor, Software
Special Features: N/A
Strengths:
+When connected to the cloud (data centers), Mithril protected machines are highly resilient against brute force attacks.
+Opposing slicers and programs will find increasing difficulty in slicing Mithril protected systems as their tactics are logged and specific countermeasures are developed. Innovation is required on their part to counter this increasing resistance.
+Compatible with preexisting operating systems, so it can be immediately deployed without any special modifications necessary for the host machine.

Weaknesses:
-Vulnerable to zero-day attacks when disconnected from the cloud as the host machine has to rely exclusively on its stored profiles without updates to the cloud.
-In offline mode, more local processing power from the host machine is used compensate, possibly causing a degradation in other processes.
-Mithril can be considered intrusive as it logs individual's habits and biometrics for developing and maintaining profiles for scans.

Description:

Mithril is a suite of security software designed to protect civilian and military systems (including droids) against various forms of malicious software - malware - and network intrusions. It was developed as a direct response to the proliferation of slicers and cyber attacks becoming a common fixture of modern warfare.

The whole suite is built around a cloud-based service to limit performance impact on the user’s end, and to increase malware/intrusion detection rates for quarantine and removal. A lightweight client on the host machine exists primarily to datamine files and user inputs to create a series of profiles that serves as a baseline for uncompromised systems. Some preliminary analysis is done by the client itself, but most of the work is offloaded to data centers consisting of memristor-based neural networks to complete deep analysis in a secure sandbox environment. Upon completion, the data centers then issue copies of the profiles to the client for real time scanning for irregularities. Backups are maintained at the data centers.

The client also handles firewalls and optional backups of files, settings, and operating systems on local or external storage.

Something special about Mithril is its ability to log individual user habits to create account-based profiles. So it can detect when, say, a slicer gains physical access to a terminal who begins using the machine or network in a way that conflicts with normal usage for a particular account and/or for that point of access. It not only monitors functions but the way that they’re carried out by each individual, creating a highly detailed digital fingerprint of sorts.The terminal would then lock, and an alert would be issued across the network. This is a huge development, as users have traditionally been the weakest point of security. This feature stops just hostile agents from using an unlocked terminal for unrestricted access to the machine/network, or forcing an assigned user to work under duress.

As new threats are discovered and logged by machines using Mithril (or by direct inputs by Mithril maintainers themselves) a database is maintained and shared with individual machines to decrease their security vulnerabilities in real time. This feature is highly effective against low-level slicers using automated scripts and programs (“script kiddies”), especially as these methods become logged for future reference.

Aside from these general, automated functions, users can initiate deep scanning and quarantine/removal operations on their own. These targeted scans are very good for locating well-hidden malware like rootkits, using sophisticated schemes to avoid detection like metamorphic code.

External recovery media can be created for use on infected machines where the operating system has been completely compromised and unresponsive to installed anti-malware software. (If possible, the recovery media is best used whilst the system is placed in safe mode.) A special limited Mithril “Key” module is offered a highly portable security solution, which is a small tablet-sized, high-performance memristor-based computer with a direct biocomm uplink to server farms. Ideal for small but important operations that lack traditional support infrastructure.

Primary Sources

Real World Inspiration

Wikipedia (Wikimedia Foundation, 2017), s.v “Antivirus software” accessed January 20, 2017, https://en.wikipedia.org/wiki/Antivirus_software.

“Cloud Computing,” accessed January 20, 2017, https://www.wikiwand.com/en/Cloud_computing.

Wikipedia (Wikimedia Foundation, 2017), s.v “Microsoft azure” accessed January 20, 2017, https://en.wikipedia.org/wiki/Microsoft_Azure.

“Immunet AntiVirus,” 2017, accessed January 20, 2017, http://www.immunet.com/index#howitworks.


“Antivirus Might Catch More Malicious Code Using Neural Networks,” November 4, 2015, accessed January 20, 2017, https://www.technologyreview.com/s/542971/antivirus-that-mimics-the-brain-could-catch-more-malware/.

“Machine Learning Anti-Virus Turns Traditional Approach on Its Head,” Artificial Intelligence, June 7, 2016, accessed January 20, 2017, https://sparkcognition.com/2016/06/sparkblog-machine-learning-anti-virus-traditional-approach/.
 
RESEARCH REVIEW
-----
Star Wars Canon:
Pending initial review
------
Starwars Chaos:
Pending initial review
------
WITHOUT DEV THREADS
Pending initial review
------
WITH DEV THREADS
Pending Initial review
------
SUGGESTIONS
Pending Inital review
 
Hi [member="Ala Crescent"]! I will be reviewing this submission.

The primary issue I see with this is really just what the Mithril Keys are for? You mention them in the production and affiliation, however they aren't anywhere else. Can you please elaborate on this in the description or special features somewhere?
 

Ala Crescent

Director, Special Projects
[member="Jamie Pyne"] The Mithril Keys uses a form of secure quantum communication (bio-comm) to allow for continued access to data centers in environments where standard forms of long range communication (e.g. Hyperwave, Sub-Space) are either disrupted or non-existent. To sever the connection, the Mithril Key itself must be destroyed.
 
Status
Not open for further replies.

Users who are viewing this thread

Top Bottom