10
Beyond Anti- Virus by Dan Keller 1987- Fred Cohen- Computer Scientist there is no algorithm that can perfectly detect all possible computer viruses”

Beyond Anti-Virus by Dan Keller 1987- Fred Cohen- Computer Scientist “there is no algorithm that can perfectly detect all possible computer viruses”

Embed Size (px)

Citation preview

Page 1: Beyond Anti-Virus by Dan Keller 1987- Fred Cohen- Computer Scientist “there is no algorithm that can perfectly detect all possible computer viruses”

Beyond Anti-Virusby Dan Keller

1987- Fred Cohen- Computer Scientist

“there is no algorithm that can perfectly detect all possible computer viruses”

Page 2: Beyond Anti-Virus by Dan Keller 1987- Fred Cohen- Computer Scientist “there is no algorithm that can perfectly detect all possible computer viruses”

What is Anti-Virus (AV) Software?

• Anti-virus software is used to prevent, detect, and remove malicious software

• Some examples of malicious software detected by modern AV:• BHO’s (Browser Helper Objects)

• Browser hijackers

• Ransomware

• Keyloggers

• Backdoors

• Rootkits

• Trojan Horses

• Worms

• Adware

• Spyware

Page 3: Beyond Anti-Virus by Dan Keller 1987- Fred Cohen- Computer Scientist “there is no algorithm that can perfectly detect all possible computer viruses”

StatisticsAV-TEST- The Independent IT-Security Institute

1994 - 28,613 unique malware samples in their database

1999 - 98,428

2005 - 333,425

2007 - 5,490,960 new unique malware samples only for that year!

2015 – approx. 144,000,000 new malware variants

Page 4: Beyond Anti-Virus by Dan Keller 1987- Fred Cohen- Computer Scientist “there is no algorithm that can perfectly detect all possible computer viruses”

Lastline Labs Study (May ‘13- May ’14) Hundreds of thousands of malware samples VS. 47 AV vendors

• Results…• Day 0 – only 51% of AV scanners detected new malware samples

• 2 weeks – Detection rates bumped up to 61%

• 1 Year – 10% of AV scanners still did not detect some malware

• The 1- percentile of malware least likely to be detected was undetected by the majority of AV scanners for months, and in some cases…never detected

___________________________________________________________

**Its estimated that AV only catches around 45% of cyber attacks (Semantec VP- Brian Dye). He said antivirus “is dead” (May 2014).

Page 5: Beyond Anti-Virus by Dan Keller 1987- Fred Cohen- Computer Scientist “there is no algorithm that can perfectly detect all possible computer viruses”

Now that you’re depressed…where do we go from here?

• Anti-Virus methods of detection

• Signature-based detection: When identifying viruses and other malware, the antivirus engine compares the contents of a file to its database of known malware signatures.

• Heuristic-based detection: This is generally used together with signature-based detection. It detects malware based on characteristics typically used in known malware code

• Behavioural-based detection: Instead of characteristics hardcoded in the malware code itself, it is based on the behavioral fingerprint of the malware at run-time. This technique is able to detect malware only after they have starting doing their malicious actions.

Page 6: Beyond Anti-Virus by Dan Keller 1987- Fred Cohen- Computer Scientist “there is no algorithm that can perfectly detect all possible computer viruses”

…Cont’d

• Sandbox detection: It’s a behavioral-based detection technique and instead of detecting the behavioral fingerprint at run time, it executes the programs in a virtual environment, logging what actions the program performs. Depending on the actions logged, the antivirus engine can determine if the program is malicious. If not, the program is executed in the real environment. This technique has shown to be very effective, but given its heaviness and slowness, it is rarely used in end-user antivirus solutions.

Page 7: Beyond Anti-Virus by Dan Keller 1987- Fred Cohen- Computer Scientist “there is no algorithm that can perfectly detect all possible computer viruses”

…Cont’d

• Data mining techniques: The latest approach applied in malware detection. Data mining and machine learning algorithms are used to try to classify the behavior of a file as either malicious or benign, given a series of file features, that are extracted from the file itself

Page 8: Beyond Anti-Virus by Dan Keller 1987- Fred Cohen- Computer Scientist “there is no algorithm that can perfectly detect all possible computer viruses”

Other approaches

• Unified Threat Management- Firewalls, gateway AV, content filtering, load balancing, data leak prevention all rolled up into one system

• Push your info to the cloud and let them deal with it

• Go back to paper

• Go off grid and live in the mountains

Page 9: Beyond Anti-Virus by Dan Keller 1987- Fred Cohen- Computer Scientist “there is no algorithm that can perfectly detect all possible computer viruses”

Drawbacks

• Lots of False positives creating ‘the boy who cried wolf.’• Also the false positives can end up deleting or paralyzing existing

files that are clean

• Some more advances systems (Sandboxing) can slow down performance

• Tough to get out of contracts with existing vendors

Page 10: Beyond Anti-Virus by Dan Keller 1987- Fred Cohen- Computer Scientist “there is no algorithm that can perfectly detect all possible computer viruses”

Conclusion• Anti-virus is not dead. Its just a standard from which we

build upon.

• Anti-virus software is now being bundled up with other security software to form a more comprehensive system. And it’s essentially getting outsourced to other companies to help monitor your system is real-time.