Upload
others
View
0
Download
0
Embed Size (px)
Citation preview
PROCESS INSPECTOR TECHNICAL BRIEF
Process InspectorTechnical Brief
Overview In the current cybersecurity landscape, threat actors are always probing and constantly switching tactics, making companies susceptible to malware incidents and outbreaks, business disruption and data breaches. Bitdefender GravityZone Endpoint Security Platform defends your endpoints from the full range of sophisticated cyber-attacks with high effi cacy, low end-user impact and low administrative overhead. It consists of multiple layers of defense that erect obstacles for the bad guys to make sure they keep stumbling. Each layer is designed to stop specifi c types of threats, tools, or techniques, covering multiple stages of the attacks.
Bitdefender Process Inspector is part of GravityZone Endpoint Security platform. It is a behavior anomaly detection technology that provides protection against never-before-seen threats in on-execution stage.
Detection Stage Technology Type Threat Coverage
On-Execution Behavior Anomaly detection Obfuscated malware, Targeted attacks, Custom malware, Script-based attacks, Exploits, Delayed Malware, Memory Attacks, Process Injection, Privilege escalation, Fileless attacks (e.g. misuse of PowerShell), Ransomware
Understanding the importance of Bitdefender Process Inspector technology
With over 390,000 new malicious programs discovered every day, the need to protect your environment from zero-day and emerging threats is the ‘New Normal’ for today’s security teams. Process Inspector is an on-execution protection layer that augments comprehensive pre-execution detection technologies in GravityZone Endpoint Security platform. It drastically reduces the risk of a new or emerging threat compromising a system. It operates on a ‘zero-trust’ model and monitors processes running in the OS using fi lters in user mode and kernel model. It looks for behavior specifi c to malware and assigns a score for each process based on its action and context. This is important because each process individually may not indicate malicious intent but a collective analysis provides more insight. When the overall score for a process reaches a given threshold, the process is reported as harmful and appropriate remediation action is taken, including the rollback of changes made by the malicious process on the endpoint.
Multi-Stage Detection Techniques: 1. Machine Learning 2. Hyper Detect 3. Sandbox Analyzer 4. Memory Protection 5. Process Inspector
10,000,000
9,000,000
8,000,000
7,000,000
6,000,000
5,000,000
4,000,000
3,000,000
2,000,000
1,000,000
0
Last update: 09-05-2017 8:29 Copyright © AV-TEST GmbH, www.av-test.org
Sept
16
Oct 1
6
Nov
16
Dec
16
Jan
17
Fen
17
Mar
17
Apr 1
7
May
17
Jun
17
Jul 1
7
Aug
17
PROCESS INSPECTOR TECHNICAL BRIEF
BD-N
GZ-
Dec.
05.2
017-
Tk#:
Bitd
efen
der-2
017-
Tech
nica
lBrie
f-Pro
cess
Insp
ecto
r-cre
a210
3-A4
-en_
EN-2
Bitdefender is a global security technology company that provides cutting edge end-to-end cyber security solutions and advanced threat protection to more than 500 million users in more than 150 countries. Since 2001, Bitdefender has consistently produced award-winning business and consumer security technology, and is a provider of choice in both hybrid infrastructure security and endpoint protection. Through R&D, alliances and partnerships, Bitdefender is trusted to be ahead and deliver robust security you can rely on. More information is available at http://www.bitdefender.com.
All Rights Reserved. © 2017 Bitdefender. All trademarks, trade names, and products referenced herein are property of their respective owners. FOR MORE INFORMATION VISIT: bitdefender.com/business
Zero trust,Always monitor
running processes
Maintain process Leger based on
behavior
Convict when process reaches given threshold
Process termination
Revert changes made by malicious
process
Features • Behavioral anomaly tracking: Active applications and processes are continuously monitored
Some examples: Copying or moving fi les in System or Windows folders or disk locations with limited access ,Executing or injecting code in another process’s space to run with higher privileges, Running fi les that have been created with information stored in the binary fi le, Self-replication, Creating an auto-start entry in the registry, accessing or executing illegal operations on registry locations that require elevated privileges, Dropping and registering drivers, Misuse of PowerShell - e.g. identify if powershell.exe is launched with several specifi c arguments, Ransomware specifi c detection- e.g. Removing backup fi les / shadow copies, Generating encryption keys and more
• Automatic Action: Automatically scores running processes and acts when a threat is detected • Rollback/clean up: Maintains an audit trail of changes made by the process on the endpoint. When a threat is detected, it automatically kills
the process and rolls back the malicious changes made by the process. • Process Exclusion: Ability to exclude processes from monitoring • Feedback loop with Bitdefender Global Protective Network (GPN): Threats detected by Process Inspector are instantly reported to
Bitdefender’s security cloud, the Bitdefender Global Protective Network (GPN), ensuring even systems on the other side of the globe will detect it.
Benefi ts• Detect advanced attacks early and prevent breaches, reduce incident response costs and efforts • Reduce threat hunting burden• Process Inspector greatly increases detection rate of evasive or new malware, including fi leless attacks, by enabling monitoring of a process
for its entire lifetime, and relying on actual behavior characteristics instead of signatures or binary or code fi ngerprints• Protection against obfuscated malware, targeted attacks, custom malware, script-based attacks, exploits, delayed malware, memory
attacks, process injection, privilege escalation, fi leless attacks (e.g. misuse of PowerShell), ransomware• Automatic rollback of malicious changes on the system gives security teams peace of mind • It is designed to work out of the box with little or no confi guration and doesn’t require enabling or writing complex rules • Intelligent performance optimization for application and process monitoring ensures low system impact• Insight gathered from Process Inspector detections is used to enhance machine learning models responsible for pre-execution detection • It is part of a single, integrated endpoint security agent and central managem ent platform, greatly reducing administrative burden.
Customers don’t need to deploy a mixture of endpoint security solutions