高频交易系统允许华尔街股票交易员在微秒内完成交易,占据先机。 然而cPacket Networks创始人、前IBM研究员Rony Kay声称,高频交易系统容易成为黑客的攻击目标,他们能在股票公司网络监控技术无法检测到情况下将交易延迟几微秒,微妙的操控交易,从而在几秒种内将数百万美元轻松收入囊中。

 

High-frequency trading networks, which complete stock market transactions in microseconds, are vulnerable to manipulation by hackers who can inject tiny amounts of latency into them. By doing so, they can subtly change the course of trading and pocket profits of millions of dollars in just a few seconds, says Rony Kay, a former IBM research fellow and founder of cPacket Networks, a Silicon Valley firm that develops chips and technologies for network monitoring and traffic analysis.

Kay, an Israeli-born computer scientist and one-time Intel engineering manager, says the root of the problem is the increasing speed of networks; as they get faster and faster, our ability to actually understand events taking place within them isn't keeping up. Network monitoring technology can detect perturbations in network traffic happening in milliseconds, but when changes occur in microseconds, they're not visible, he says.

cPacket has developed a proof of concept showing that these side-channel attacks can be used to create tiny delays in the transmission of market data and trades. By manipulating specific trading activities by several microseconds, an attacker could gain unfair trading advantage. And because the operation occurs outside the range of monitoring technology, it would remain invisible. "We believe that such techniques pose a substantial risk of creating unfair trading, if used by the wrong people," Kay says.

(A side-channel attacker looks at indirect information related to the computer -- the electromagnetic emanations from screens or keyboards, for example -- to determine what is going on in the machine. )

Latency threatens other applications as well
The lack of visibility into high-speed networks is of concern to more than the financial community. Managing traffic on today's 10Gbps and faster networks is becoming difficult, resulting in degradations of performance, particularly to virtualized systems. "It's difficult to take corrective actions when you can't really see what's taking place," Kay says. "If you cannot measure network latency, you cannot control it and cannot improve it."

In a PDF whitepaper on latency, Kay wrote, "Traditionally, applications that have latency requirements include: VoIP and interactive video conferencing, network gaming, high-performance computing, cloud computing, and automatic algorithmic trading. For example, one-way latency for VoIP telephony should generally not exceed 150 milliseconds (0.15 seconds) to enable good conversation quality, while interactive games typically require latencies between 100 and 1,000 milliseconds. However, the requirements for automated algorithmic trading are much more strict. A few extra milliseconds, or even a few extra microseconds, can enable trades to execute ahead of the competition, thereby increasing profits."

Indeed, latency, even at the very highest speeds, is so concerning that researchers at MIT recommended any organization dealing in complicated time-sensitive global interactions should take a hard look at where they locate their data centers.

The MIT researchers even suggested that financial firms could gain some advantage by taking advantage of limitations posed by the speed of light. For example, it typically takes about 50 milliseconds to send a message from New York to London. Placing a server between the two could cut the speed of communication in half, they said, which may be enough time to take advantage of some momentary pricing discrepancy. Trading on that discrepancy is known as arbitrage, and it's becoming increasingly common.

Lessons of the "flash crash"
The vulnerability of markets in which high-frequency trading is common became all too evident last May, when exchanges experienced a "flash crash" that drove the Dow Jones down about 600 points in just five minutes. The incident was not the result of deliberate manipulation, but it shows just how dependant the financial world is on technology it doesn't really understand.

"Financial institutions and exchanges with [high-frequency trading] are spending millions to improve latency by microseconds and at the same time can't measure the data at that resolution in real time. It's disturbing," Kay says.

A side-channel attack on a high-frequency trading network is analogous to a denial-of-service attack. In a typical DoS attack, bots flood a target website with enormous numbers of hits, often causing a crash. A side-channel attack would be infinitely more subtle, but it would still function by adding extraneous packets to a legitimate data stream. Those extra packets slow the data just enough to give someone else a chance to move first in the market.

Kay says he does not know if anyone has yet launched a side-channel attack against a high-frequency trading network -- but it worries him. And it worries me. Financial markets are supposed to be a level playing field. They're not, of course. Small players, like the millions of us who invest for our 401(k)s and other retirement accounts, are at an immense disadvantage even when everything is kosher. But the proliferation of high-frequency trading widens the gap even more. If someone can really take advantage of a weakness in those networks, we're all really in trouble. And that's just another reason why more -- not less -- regulation is required in the financial markets.

I welcome your comments, tips, and suggestions. Post them here so that all our readers can share them, or reach me at bill.snyder@sbcglobal.net. Follow me on Twitter at BSnyderSF.

This article, "Hackers find a new way to cheat on Wall Street -- to everyone's peril," was originally published by InfoWorld.com. Read more of Bill Snyder's Tech's Bottom Line blog and follow the latest technology business developments at InfoWorld.com.

转载于:https://www.cnblogs.com/mengheyun/archive/2011/01/07/1962835.html

黑客发现了欺骗华尔街的新方法相关推荐

  1. iOS新方法systemFontOfSize: weight:

    今天写项目时发现一个调整字体的新方法systemFontOfSize: weight: 这个方法是iOS8.2之后出来的,但是iOS8.0的机器也能运行这个方法,只不过是苹果在8.2时将这个方法变为了 ...

  2. 【无脑刷显卡bios发现的新方法和遇到的新问题】

    A卡刷BIOS更轻松[无脑刷显卡bios发现的新方法和遇到的新问题] 最近偶然看到别人刷显卡BIOS的视频,发现和我之前记录的刷写方法相比轻松很多.仔细观察后发现,我们使用的刷写工具和操作过程很不同, ...

  3. 谷歌和GitHub 联手提出新方法,提振软件供应链安全

     聚焦源代码安全,网罗国内外最新资讯! 编译:代码卫士团队 专栏·供应链安全 数字化时代,软件无处不在.软件如同社会中的"虚拟人",已经成为支撑社会正常运转的最基本元素之一,软件的 ...

  4. 恶意软件逃避反病毒引擎的几个新方法

    本文讲的是恶意软件逃避反病毒引擎的几个新方法,火眼研究人员发现的几种恶意软件样本使用了一些耐人寻味的技术,能够更长久地维持对反病毒引擎的隐身状态. 火眼公司刚刚发布了一个新的威胁分析专题,名为&quo ...

  5. 何恺明的GN之后,权重标准化新方法能超越GN、BN吗? | 技术头条

    点击上方↑↑↑蓝字关注我们~ 「2019 Python开发者日」,购票请扫码咨询 ↑↑↑ 作者 | Siyuan Qiao.Huiyu Wang.Chenxi Liu.Wei Shen.Alan Yu ...

  6. 行人检测与重识别!华中科技大、微软深入挖掘,新方法实现新SOTA

    点击上方↑↑↑"视学算法"关注我 来源:公众号 机器之心 授权 如何将目标检测和重识别融合进一个框架,帮助解决多目标跟踪任务?华中科技大学和微软亚洲研究院的研究者找出了这一方向的痛 ...

  7. 中国科学家Cell重要评述文章: 宏基因组学成为病毒分类新方法

    比起其他的地球生命体,人类对病毒的了解可谓"冰山一角".宏基因组学作为新型研究工具,拓宽了人类对病毒多样性的认识.本期文献分享的是发表于<CELL>的题为"U ...

  8. 不用在读长和准确性之间做选择题,PacBio发表新方法

    不用在读长和准确性之间做选择题,PacBio发表新方法 来源: 2019/8/19 16:21:56      点击:125 从一开始,研究人员似乎就面临着艰难的选择.一边是Illumina产生的短序 ...

  9. 弹性板计算和板带划分计算_计算双面太阳能板背面太阳辐射的新方法

    图片来源: Nextracker 土耳其中东技术大学(METU)和古穆萨内大学(Gumushane University)的研究人员,开发出一种计算双面太阳能组件背面太阳辐射的新方法.在最近发表在&l ...

最新文章

  1. 为了让16岁的儿子从轮椅上站起来,这位机器人工程师父亲打造了一套外骨骼装置...
  2. 一直被喷不实用的超算 在深度学习时代会改变吗?
  3. java标签多行_利用Arcade表达式显示多行标签
  4. ML之回归预测:利用13种机器学习算法对Boston(波士顿房价)数据集【13+1,506】进行回归预测(房价预测)来比较各模型性能
  5. 查看MySQL表占用空间大小
  6. [转] C#异步操作
  7. 安利一款编辑神器——Markdown
  8. git reset, git checkout, git revert 区别 (译)
  9. MySQL性能优化的参数简介
  10. 深入理解Spring Redis的使用 (九)、通过Redis 实现 分布式锁 的 BUG,以及和数据库加锁的性能测试...
  11. 32位jdk_详解在Linux系统中安装JDK
  12. 自然语言领域中图神经网络模型(GNN)应用现状(论文)
  13. 赵栋 201771010137 《面向对象程序设计(java)》第二周学习总结
  14. TransE算法详解
  15. vb.net中的换行
  16. wechat微信小程序 :对应的服务器证书无效
  17. Arduino与Proteus仿真实例-HC-SRF04超声波测距仿真
  18. 2015 年最热门的国人开发开源软件 TOP 50
  19. 台式计算机耳机有杂音怎么办,耳机有杂音,小编教你电脑耳机有杂音怎么办
  20. 关于微软AD的LDAP的一篇好文章

热门文章

  1. MATLAB中各种对话框的设置
  2. 生产者跟消费者问题(C++实现)
  3. 华南理工大学网络教育计算机答案,计算机电路基础·随堂练习2019春华南理工大学网络教育答案.doc...
  4. 第二十一讲 特征值和特征向量
  5. 可降阶的高阶微分方程
  6. vue----常用实例方法--$mount(),$destroy(),$watch(),$forceUpdate()
  7. ERROR 2002 (HY000): Can't connect to local MySQL server through socket '/tmp/mysql.sock' (2)
  8. 存储引擎:MySQL系列之七
  9. android蓝牙打印机
  10. MyEclipse9.0正式版汉化