25
BY - Nitish kumar 09010121

Antivirus Technqiues

Embed Size (px)

Citation preview

Page 1: Antivirus Technqiues

8/2/2019 Antivirus Technqiues

http://slidepdf.com/reader/full/antivirus-technqiues 1/25

BY-Nitish kumar09010121

Page 2: Antivirus Technqiues

8/2/2019 Antivirus Technqiues

http://slidepdf.com/reader/full/antivirus-technqiues 2/25

Since 1969…the world has seen many

improvements in communication, and recently soin security with respect to it.

Since the origin of internet, the first notablecomputer virus, „The Morris Worm‟ was reportedin 1988, creating significant damage to the

distributed communication medium. Subsequently, the number of cyber attacks hasincreased exponentially from 2003 till date.

Page 3: Antivirus Technqiues

8/2/2019 Antivirus Technqiues

http://slidepdf.com/reader/full/antivirus-technqiues 3/25

Page 4: Antivirus Technqiues

8/2/2019 Antivirus Technqiues

http://slidepdf.com/reader/full/antivirus-technqiues 4/25

Page 5: Antivirus Technqiues

8/2/2019 Antivirus Technqiues

http://slidepdf.com/reader/full/antivirus-technqiues 5/25

In recent times, computer viruses are being used inidentity theft to steal personal information such aspasswords and credit card information

Much of today‟s malware is fuelled by financiallymotivated cyber criminals trying to gain access tovaluable corporate, consumer and/or personal data.

Internet attacks have increased in volume and

sophistication such that organizations find itextremely difficult to detect and mitigate the rate andscale of such vulnerabilities

Page 6: Antivirus Technqiues

8/2/2019 Antivirus Technqiues

http://slidepdf.com/reader/full/antivirus-technqiues 6/25

Page 7: Antivirus Technqiues

8/2/2019 Antivirus Technqiues

http://slidepdf.com/reader/full/antivirus-technqiues 7/25

Present day computer systems need to have an up-to-date anti-virus tool running.

This antivirus tool should be capable in determining thetype of files (either malicious or good) in real timeenvironments.

To this effect such systems need some kind of predictivemechanism to be proactive in their detection anddefence.

 An example would be (“Reputation based systems”)which play a pivotal role in providing a predictivemechanism in order to establish the nature (good ormalicious) of the system files.

Page 8: Antivirus Technqiues

8/2/2019 Antivirus Technqiues

http://slidepdf.com/reader/full/antivirus-technqiues 8/25

According to statistics twenty five millionnew strains of malware have beendiscovered in the year 2009, at a rate ofone new strain per 0.79 seconds.

It is noteworthy to mention that UnitedStates Senate Security Operations Centre

gets around 13.9 million cyber attackseach day.

Page 9: Antivirus Technqiues

8/2/2019 Antivirus Technqiues

http://slidepdf.com/reader/full/antivirus-technqiues 9/25

VirusesWormsTrojansRootkits

Page 10: Antivirus Technqiues

8/2/2019 Antivirus Technqiues

http://slidepdf.com/reader/full/antivirus-technqiues 10/25

A virus is a piece of code that can copyitself and infect a computer. It is usuallycapable of causing irreparable damage to

system files. It typically spreads by attaching itself to

files (either data files or executable code).Virus spread requires the transmission of

the infected file from one system toanother.

Page 11: Antivirus Technqiues

8/2/2019 Antivirus Technqiues

http://slidepdf.com/reader/full/antivirus-technqiues 11/25

A worm does the same task of causingharm to files like a virus would aim to do,but without human assistance.

Worms are capable of autonomousmigration between systems through thenetwork without the assistance of external

software.Worms aggressively scan the network and

attack hosts.

Page 12: Antivirus Technqiues

8/2/2019 Antivirus Technqiues

http://slidepdf.com/reader/full/antivirus-technqiues 12/25

A Trojan horse gains access tounauthorized services of a computer. It isembedded in some other form of code orsoftware and it is non-replicating. Trojancode attempts to camouflage its presenceto avoid detection.

Once a Trojan horse has been installed,the attacker can remotely perform variousoperations.

Page 13: Antivirus Technqiues

8/2/2019 Antivirus Technqiues

http://slidepdf.com/reader/full/antivirus-technqiues 13/25

Rootkits gain administrative control oversystems. They usually hide the utilitysystems for root access at a later date.

These entry points are called trapdoors .

Page 14: Antivirus Technqiues

8/2/2019 Antivirus Technqiues

http://slidepdf.com/reader/full/antivirus-technqiues 14/25

All these malware attack the systems overthe web to exploit the businesses andbring down services.

When vulnerabilities in applications orservices are discovered and the patchesfor those vulnerabilities are not yet out,there may be attacks that exploit thesevulnerabilities.

These attacks are known as zero-day attacks.

Page 15: Antivirus Technqiues

8/2/2019 Antivirus Technqiues

http://slidepdf.com/reader/full/antivirus-technqiues 15/25

Any sound design of an Anti-Virus tool should:• Complement application white listing technology for an

effective defence-in-depth approach

• combine traditional signature-based protection withunique behavioural analysis.

• Prevent known and unknown malicious threats (zero-day exploits).

• Ensure comprehensive clean-up, including rootkit

removal and Provide fully automated operation,including new endpoint detection, signature updates,and easy-to-use web-based management console.

Page 16: Antivirus Technqiues

8/2/2019 Antivirus Technqiues

http://slidepdf.com/reader/full/antivirus-technqiues 16/25

Any anti-virus tool follows a set of steps to fulfil the aboveexpectations. We enumerate these steps in the following.

• Assess :

This is the first step. This step uses signature-based scanning to

identify viruses, worms, trojans, key loggers, hijackers, root kitsand other malicious software. Use behavioural analysis tools(including DNA Matching, Sandbox, and Exploit Detection) toassess suspicious code / applications.

• Remediate: 

Prevent known malware and suspicious code from executing,and remove it from all network assets.

Page 17: Antivirus Technqiues

8/2/2019 Antivirus Technqiues

http://slidepdf.com/reader/full/antivirus-technqiues 17/25

 

• Monitor :

Use customized triggers to generate alerts (deliveredvia e-mail, SNMP, SMS, Syslog and/or the operatingsystem‟s event log) based on network-wide events(such as a spreading infection). Use Risk LevelIndicator on web-based management console tounderstand overall network “health” and current

event/client status of all endpoints. Report : Usecomprehensive, customizable reporting facility to coverentire network status and any incidents.

Page 18: Antivirus Technqiues

8/2/2019 Antivirus Technqiues

http://slidepdf.com/reader/full/antivirus-technqiues 18/25

Signature-Based scanning works on pattern matching. A dictionary of known fingerprints is used and run across a set of

input. This dictionary typically contains a list of known badsignatures, such as malicious payloads or the file contents of a wormexecutable.

This database of signatures is the key to the strength of the detectionsystem. Commercial antivirus products are the most popular methods used

to detect worms. This is due to the popularity of their tools onWindows systems, making them numerous and widespread. Thevirus definition of an antivirus product contains a list of hexadecimal

strings that is compared against the payload of files scanned on thesystem or in files being transferred, such as through electronic mailor via file server.

The payloads of the files are compared against the virus definitionsand the matches are noted with an alert.

Page 19: Antivirus Technqiues

8/2/2019 Antivirus Technqiues

http://slidepdf.com/reader/full/antivirus-technqiues 19/25

Anomaly-based antivirus tools determinenormal behaviour.

Thus, any variation from the normal profile

would be considered suspicious(anomalous).

For example, normally a program, whenexecuted, does not create any files. Then,all of a sudden, the program moves a fileinto one of the operating system‟s folders. 

Page 20: Antivirus Technqiues

8/2/2019 Antivirus Technqiues

http://slidepdf.com/reader/full/antivirus-technqiues 20/25

Behavioural monitoring works on suspicion andheuristics .

In the suspicious behavioural monitoring, theantivirus tool does not try to identify known viruses

but monitors the behaviour of all programs. If a program tries to write data on an executable file

it flags the user. This approach, as against the signature based

approach was designed to take care of new brandviruses whose signatures do not exist in dictionaries.

Page 21: Antivirus Technqiues

8/2/2019 Antivirus Technqiues

http://slidepdf.com/reader/full/antivirus-technqiues 21/25

Some tools implement Hybrid techniquesto detect malware.

Anomaly-based and heuristics orsignature-based and behaviour are somecombinations used in Hybrid technology.

Page 22: Antivirus Technqiues

8/2/2019 Antivirus Technqiues

http://slidepdf.com/reader/full/antivirus-technqiues 22/25

Antivirus software uses file scanning,behavioural monitoring and hybrid

methods for malware detection.All valid files are stored in a hierarchy of

distributed co-operating servers.This iscalled a white list. Similarly,all known bad

files are stored in another similar hierarchyand is called as a black list.

Page 23: Antivirus Technqiues

8/2/2019 Antivirus Technqiues

http://slidepdf.com/reader/full/antivirus-technqiues 23/25

The biggest drawback to signature-baseddetection methods is that they arereactionary; they rarely can be used to

detect a new worm.The second drawback to signature-based

detection methods is that they don‟t scale

well to large operations.These includenetworks such as an enterprise or campusnetworks with thousand users.

Page 24: Antivirus Technqiues

8/2/2019 Antivirus Technqiues

http://slidepdf.com/reader/full/antivirus-technqiues 24/25

The next major difficulty in a successfuldeployment of signature-based methods isthat it is hard to keep up with variants of

worms and viruses.

Page 25: Antivirus Technqiues

8/2/2019 Antivirus Technqiues

http://slidepdf.com/reader/full/antivirus-technqiues 25/25

Thank you

for yourpatience