Antivirus Technology

Similar documents
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.

An Introduction to Virus Scanners

CERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES

Anti-Virus. Anti-Virus Scanning Overview. This chapter contains the following sections:

Airtel PC Secure Trouble Shooting Guide

Trend Micro. Apex One as a Service / Apex One. Best Practice Guide for Malware Protection. 1 Best Practice Guide Apex One as a Service / Apex Central

Barracuda Advanced Threat Protection. Bringing a New Layer of Security for . White Paper

Retrospective Testing - How Good Heuristics Really Work

Intruders. significant issue for networked systems is hostile or unwanted access either via network or local can identify classes of intruders:

NetDefend Firewall UTM Services

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Kaspersky Internet Security - Top 10 Internet Security Software in With Best Antivirus, Firewall,

Lecture 12 Malware Defenses. Stephen Checkoway University of Illinois at Chicago CS 487 Fall 2017 Slides based on Bailey s ECE 422

Viruses and Malicious Code: A Community Defense Perspective

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

Test Strategies & Common Mistakes International Antivirus Testing Workshop 2007

BUFFERZONE Advanced Endpoint Security

GFI product comparison: GFI MailEssentials vs. Barracuda Spam Firewall

GFI product comparison: GFI MailEssentials vs Symantec Mail Security for Microsoft Exchange 7.5

The WildList is Dead, Long Live the WildList!

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Malware Outbreak

Zillya Internet Security User Guide

Comodo Antivirus Software Version 2.2

Typical Installation Guide. Installation Guide. Typical installation only. Standard version 2.5

GFI product comparison: GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange

PineApp Mail Secure SOLUTION OVERVIEW. David Feldman, CEO

Symantec vs. Trend Micro Comparative Aug. 2009

Report on ESET NOD 32 Antivirus

Proactive Protection Against New and Emerging Threats. Solution Brief

Comodo Antivirus Software Version 2.1

IBM Express Managed Security Services for Security. Anti-Virus Administrator s Guide. Version 5.31

Real protection against real threats

Cyber security tips and self-assessment for business

Small Office Security 2. Mail Anti-Virus

Single Product Review. escan Internet Security 11. Language: English September 2010 Last revision: 13 nd October

TestBraindump. Latest test braindump, braindump actual test

A Review Paper on Network Security Attacks and Defences

Symantec Client Security. Integrated protection for network and remote clients.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

escan Security Network From MicroWorld Technologies Anti-Virus & Content Security

BOLSTERING DETECTION ABILITIES KENT KNUDSEN JUNE 23, 2016

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.

Dataprise Managed Anti-Spam Console

What s New in Version 3.5 Table of Contents

Beyond Testing: What Really Matters. Andreas Marx CEO, AV-TEST GmbH

Full file at

Advanced Threat Control

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

CounterACT Check Point Threat Prevention Module

Internet Security Mail Anti-Virus

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Intrusion Prevention Signature Failures Symantec Endpoint Protection

Dr.Web KATANA. Kills Active Threats And New Attacks

Discount Bitdefender Security for SharePoint website for free software ]

Exam : Title : symantec small Business security. Version : DEMO

GFI product comparison: GFI MailEssentials vs. McAfee Security for Servers

SIMATIC. Process Control System PCS 7 Symantec Endpoint Protection 11.0 Configuration. Using virus scanners 1. Configuration 2. Commissioning Manual

Bitdefender GravityZone. Supreme protection against active threats for the SMB market

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.

Operating Systems. Engr. Abdul-Rahman Mahmood MS, PMP, MCP, QMR(ISO9001:2000) alphapeeler.sf.net/pubkeys/pkey.htm

Free antivirus software download

Ryan KS office thesee

ENTERPRISE ENDPOINT PROTECTION BUYER S GUIDE

Contradictions in Improving Speed of Virus Scanning

Trend Micro OfficeScan XG

Advanced Threat Defense Certification Testing Report. Trend Micro Incorporated Trend Micro Deep Discovery Inspector

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

Malware, , Database Security

Gladiator Incident Alert

Comodo Antivirus Software Version 2.0

etrust Antivirus Release 7.1

Protection Against Malware. Alan German Ottawa PC Users Group

INSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic

Virus Analysis. Introduction to Malware. Common Forms of Malware

FIREWALL PROTECTION AND WHY DOES MY BUSINESS NEED IT?

RANSOMWARE PROTECTION. A Best Practices Approach to Securing Your Enterprise

Technical Brochure F-SECURE THREAT SHIELD

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL

Comodo Client - Security for Linux Software Version 2.2

Fundamentals of Information Systems Security Lesson 8 Mitigation of Risk and Threats to Networks from Attacks and Malicious Code

Endpoint Protection : Last line of defense?

Malware Analysis and Antivirus Technologies: Antivirus Engine Basics

BUFFERZONE Advanced Endpoint Security

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

A Guide to Closing All Potential VDI Security Gaps

SentinelOne Technical Brief

Analysis on computer network viruses and preventive measures

How to Identify Advanced Persistent, Targeted Malware Threats with Multidimensional Analysis

Antivirus: Proactively detects and disables more known and even unknown new malware threats than any other security product.

Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat

Quick Heal AntiVirus Pro. Tough on malware, light on your PC.

PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

WHY ANTIVIRUS WILL NEVER DIE ADVANCED DETECTION FOR DUMMIES EDDY WILLEMS SECURITY EVANGELIST

Make IR Effective with Risk Evaluation and Reporting

No Time for Zero-Day Solutions John Muir, Managing Partner

Cyber Security. Our part of the journey

Artificial Intelligence Methods invirus Detection & Recognition

Discovering Hidden Threats

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

Transcription:

Antivirus Technology CSH6 Chapter 41 Antivirus Technology Chey Cobb & Allysa Myers 1 Copyright 2015 M. E. Kabay. All rights reserved.

Topics AV Terminology AV Issues History of Viral Changes Antivirus Basics Scanning Methodologies Content Filtering Deployment Policies & Strategies 2 Copyright 2015 M. E. Kabay. All rights reserved.

AV Terminology 1 virus, 2 viruses don t use viri or virii AV = antivirus; AVP = antivirus product AVPD = AVP developer Prevalence statistics In the wild THOUSANDS (3405 in Nov 2014) Joe Wells WildList In the zoo > 1M for Windows ICSA Labs Anti-Virus Product Developers (AVPD) Consortium * Coordinates scientific work of AVPDs http://www.wildlist.org http://tinyurl.com/3yhfcsn * http://www.icsalabs.com/technology-program/anti-virus 3 Copyright 2015 M. E. Kabay. All rights reserved.

AV Issues New viruses appear frequently Out-of-date scanners cannot stop new viruses or variants Although heuristic scanners help a lot AV products often misconfigured Don t scan right file types Some are not enabled for auto-update critically important! Resistance to AV Upper management don t like them Constant demands for upgrades, costs of subscriptions Paradox of success: if it works, no evidence of need 4 Copyright 2015 M. E. Kabay. All rights reserved.

History of Viral Changes (1) Early viruses were not much of a problem Simple code, functions Spread via floppy disks slow Very few in existence Fewer in the wild Early AV products often focused on specific viruses Became impossible to maintain systems Moved to signature-based and heuristic scanning (see later) 5 Copyright 2015 M. E. Kabay. All rights reserved.

History of Viral Changes (2) ~1995 MS-Office introduced Visual Basic Script (VBS) Allowed sophisticated macro programming Auto-execution was vigorously opposed by security experts (including MK) Potentially converted office documents into programs and that s what happened Majority of today s viruses are VB macros Easy to spread through infected documents and Web sites Instant messaging (IM) & peer-to-peer (P2P) networks also exploited to spread malware 6 Copyright 2015 M. E. Kabay. All rights reserved.

Antivirus Basics Introduction Virus detection inexact Still see false positives (Virus!!! but not) & false negatives (A-OK but not) CPU & I/O load can become noticeable Topics Early Days of AV Scanners Validity of Scanners Scanner Internals AV Engines & DBs 7 Copyright 2015 M. E. Kabay. All rights reserved.

Early Days of AV Scanners AV makers disagreed on how to name viruses No central facility for counting unique viruses AV vendors used wildly different virus-counts in their advertising Users confused / frustrated by conflicting information Charlatans marketed ineffective products None of early scanners could catch all known viruses 8 Copyright 2015 M. E. Kabay. All rights reserved.

Validity of Scanners NCSA* started AVPD Consortium 1991 Established testing criteria Created the zoo AVPs shared viruses Raised standards for required detection levels every quarter Dr Richard Ford established testing standards AVPs disagreed on strategies Look only for new viruses? Look for all known viruses? Joe Wells founded WildList in 1993 Cooperative effort to list & name all known viruses Distinguish between those found on user systems & those found only in laboratories *NCSA = National Computer Security Association M. E. Kabay was Director of Education from 1991 to 1999 NCSA ICSA TruSecure CyberTrust Verizon Business Security 9 Copyright 2015 M. E. Kabay. All rights reserved.

Scanner Internals Fundamental problem was that Windows and Mac OS lacked security kernel Every process runs as if it has root privilege AVPs compensate for this design decision Functions include Specific detection looking for infections by known viruses Generic detection looking for variants of known viruses Heuristics finding unknown viruses by spotting suspicious behavior or code/file structures Intrusion prevention monitoring knownsuspicious systems changes and behaviors to prevent unknown infections 10 Copyright 2015 M. E. Kabay. All rights reserved.

AV Engines & DBs Engine is the expert system that looks for malicious software Signature database (DB) includes Fingerprints of known viruses Rules for heuristic scanners Code sequences characteristic of specific viruses Must update both signatures and engines Used to recommend monthly, then weekly updates Now (2009) essential to allow at least daily updates or hourly or minute-by-minute Enable automatic updates update whenever necessary by communicating with servers Software looks for change in checksum indicates change 11 Copyright 2015 M. E. Kabay. All rights reserved.

Updating: LiveUpdate 12 Copyright 2015 M. E. Kabay. All rights reserved.

Scanning Methodologies When to scan? Ideally, on every file open ( on access scan ) Continuous monitoring of new files May be performance issues on old systems but not today Functions of scanning (see next slides) Detection Generic Detection Heuristics Intrusion Detection & Prevention 13 Copyright 2015 M. E. Kabay. All rights reserved.

Scanning 14 Copyright 2015 M. E. Kabay. All rights reserved.

Specific Detection Look for characteristic signature strings Most scanners use selective screening Look for virus code in general areas of programs Saves time but risks false negatives Power of the test The higher the success rate in spotting viruses (the lower the false-negative rate), The higher the frequency of false positives (falsely claiming that uninfected files are viruses) Generally offer disinfection routines Fix Quarantine Delete 15 Copyright 2015 M. E. Kabay. All rights reserved.

Generic Detection Many malware authors & distributors are trying to make money Therefore use open-source code Malware widely distributed and updated by criminals Therefore modern AVPs scan for common properties Widely-known viruses, Trojans In early days of file-infectors, concern about potential damage of cleaning infected programs But today s malware typically installs discrete files and registry entries Easier to fix without danger 16 Copyright 2015 M. E. Kabay. All rights reserved.

Heuristics Rule-based expert systems Static heuristic scanners Identify most likely places where viruses reside Look for known styles of viral code Examines programmatic logic of suspect regions Assign probabilistic score based on many clues from structure Dynamic heuristic scanners Similar methods to spot potential problem-code Emulate execution of the code Virtual environment = sandbox Identify harmful actions Remove virus Widespread distribution & use of heuristic scanners have led to rapid discovery of new viruses 17 Copyright 2015 M. E. Kabay. All rights reserved. Heuristic from Greek heuriskein to find

Static 18 Copyright 2015 M. E. Kabay. All rights reserved.

Example: NAV 19 Copyright 2015 M. E. Kabay. All rights reserved.

NAV Auto-Protect 20 Copyright 2015 M. E. Kabay. All rights reserved.

NAV Heuristics 21 Copyright 2015 M. E. Kabay. All rights reserved.

NAV E-mail Options 22 Copyright 2015 M. E. Kabay. All rights reserved.

NAV Anti-Worm Measures 23 Copyright 2015 M. E. Kabay. All rights reserved.

NAV LiveUpdate Settings 24 Copyright 2015 M. E. Kabay. All rights reserved.

NAV Alert Settings 25 Copyright 2015 M. E. Kabay. All rights reserved.

Immune Systems Ideal: spot infection, fix infection, heal system Use network access to additional resources as required Monitor behavior of connected workstations Send suspect files to central server Install suspect code on testbenches Analyze virus, generate signature Send out to all connected computers (push vs pull) Don t bother people unless necessary 26 Copyright 2015 M. E. Kabay. All rights reserved.

Intrusion Detection & Prevention 1 st line of defense: spot incoming virus Particularly effective by scanning incoming e-mail Also helpful to scan outgoing e-mail But some polymorphic viruses encrypt their code defeat scanners Some AVPs use CRCs to spot changes in programs All changed programs will have a CRC different from that recorded originally Investigate changed programs further Special emphasis on spotting abnormal behavior 27 Copyright 2015 M. E. Kabay. All rights reserved.

Content Filtering Early years no viruses from documents Then macro viruses became prevalent No viruses from e-mail Then e-mail enabled worms appeared No viruses from unopened e-mail So viruses written that activate when preview pane shows content HTML code being used for harmful purposes Content filtering scans for suspect code and attachments prevents receipt by users 28 Copyright 2015 M. E. Kabay. All rights reserved.

How Content Filters Work Scan all incoming data on specific ports Compare traffic using rules and strings Can forbid all or types of attachments Interact with AVPs Send suspect files to AVP But all of this requires stated policies 29 Copyright 2015 M. E. Kabay. All rights reserved.

Efficiency and Efficacy Operations run on mail server can see performance issues Scanning all incoming & outgoing e-mail raises privacy issues if policies not established to remove expectation of privacy May have to limit size of e-mail attachments Problems with quarantine may pile up false positive e-mail, frustrate users & administrators Need to establish response procedures for e-mail abuse Consider not only technical issues Also include legal & HR departments 30 Copyright 2015 M. E. Kabay. All rights reserved.

AV Deployment Desktop systems Must prevent users from disabling scanners Use reasonable fullsystem scan freq Schedule off-hours only Definitely require scan-on-open Include removable devices (flash drives, DVDs, CDs) Can set passwords on configuration of AVP Must maintain up-to-date coverage of ALL connected systems in network Push updates from server to desktops Servers focus on downloads, high traffic 31 Copyright 2015 M. E. Kabay. All rights reserved.

Policies & Strategies Detail user responsibilities End-user AV awareness important Specify specific tasks for different roles Monitor compliance Ensure upper management compliance / support Incident Response Team and emergency plan Analyze every virus infection Requires report from every infected workstation Identify holes in current procedures & policies Keep records spot trends, trouble spots 32 Copyright 2015 M. E. Kabay. All rights reserved.

Now go and study 33 Copyright 2015 M. E. Kabay. All rights reserved.