Protecting your mobile devices away from virus by a cloud-based approach Wei Wu.

Slides:



Advertisements
Similar presentations
Unified Communications Bill Palmer ADNET Technologies, Inc.
Advertisements

1 Effective, secure and reliable hosted security and continuity solution.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Chapter 22: Cloud Computing and Related Security Issues Guide to Computer Network Security.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
1 Trend Micro InterScan Web Security Suite ™ 2.5 戴 燊 Samson Tai 趨勢科技 台灣區技術行銷部 技術顧問.
Kaspersky Lab: The Best of Both Worlds Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / 2 nd InfoCom Security Conference.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Towards Extending the Antivirus Capability to Scan Network Traffic Mohammed I. Al-Saleh Jordan University of Science and Technology.
Plan Introduction What is Cloud Computing?
1. 2 Presentation outline » One antivirus engine is not enough » IT pain points » The product » Testimonials » Kudos » Conclusion.
Final Presentation 4/21/2010 By Guofu Xiong, Yuli Deng.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
Cloud Computing.
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
Authors:Jon Oberheide, Kaushik Veeraraghavan, Evan Cooke, Jason Flinn, Farnam Jahanian Electrical Engineering and Electrical Engineering and Computer Science.
Pre-Release Information Aug 17, 2009 Trend Micro Web Gateway Security InterScan Web Security Virtual Appliance v5 Advanced Reporting and Management v1.
ClamAV An Introduction PacNOG I Workshop June 21, 2005 Nadi, Fiji Hervey Allen.
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
Antivirus Software Troy Behmer. Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
CloudAV: N-Version Antivirus in the Network Cloud Jon Oberheide, Evan Cooke, Farnam Jahanian Electrical Engineering and Computer Science Department, University.
Agenda  What is Cloud Computing?  Milestone of Cloud Computing  Common Attributes of Cloud Computing  Cloud Service Layers  Cloud Implementation.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
Barracuda NG Firewall ™
Prof. Jong-Moon Chung’s Lecture Notes at Yonsei University
Unit 3 Virtualization.
BUILD SECURE PRODUCTS AND SERVICES
Trend Micro Consumer 2010 Easy. Fast. Smart.
Three steps to prevent Malware infection
Chapter 6: Securing the Cloud
Volume Licensing Readiness: Level 100
Avenues International Inc.
Organizations Are Embracing New Opportunities
CloudAV N-Version Antivirus in the Network Cloud
Barracuda Web Security Flex
Top 5 Open Source Firewall Software for Linux User
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Barracuda Web Filtering Service
Volume Licensing Readiness: Level 100
Global Tech Squad Bitdefender Toll Free No:
Hybrid Management and Security
Create, Manage RDSH Farms in Azure to Offer Any Windows App as a Service from Anywhere MINI-CASE STUDY “Our partnership with Microsoft has opened up new.
Computer Virus and Antivirus
Cloud-based Antivirus
ClamXav Antivirus Scanner: A Free Tool for Your Mac OS X
Chapter 21: Cloud Computing and Related Security Issues
Panda is the mostly used Anti-virus Panda is the top antivirus to protect your computer from injurious viruses. Panda Antivirus is the best antivirus.
Introduction to Cloud Computing
Chapter 22: Cloud Computing Technology and Security
Welcome To : Group 1 VC Presentation
Virtualization & Security real solutions
Call AVG Antivirus Support | Fix Your PC
 Security is a must today. If your device is not secure with updated antivirus then it is surely vulnerable to the attacks of dangerous viruses, spyware.
Mcafee updates Mcafee antivirus uses a database of known virus definitions to identify malware and other threats on your computer system. So it is important.
Overview Introduction VPS Understanding VPS Architecture
Check Point Connectra NGX R60
Cloud Security for Endpoints
Getting Started.
Getting Started.
Logicom Cloud Marketplace
Watchdog Anti malware is reliable application and a multi engine scanner, which can detect various malicious files, worms, malware and other online threats.
Welcome to Fix Antivirus Activation Error Support Service.
Securing Windows 7 Lesson 10.
Cloud Computing LegalRun Solutions Why It’s Right for You!
Basics of Cloud Computing
Hosted Security.
Mcafee.com/activate
Presentation transcript:

Protecting your mobile devices away from virus by a cloud-based approach Wei Wu

Cloud Computing Provision of computational resources on demand via a computer network Servers in data center provide high quality computation services

Resource poverty of mobile devices versus fixed devices The disparity between the resource constraints of mobile and fixed devices will remain and must be accounted for in the types of application selected for mobile cloud computing

Mobile Cloud Computing Users do not need to have highly technical hardware to use applications as complex computing operations are run within the cloud Offload the computer-intensive applications onto ubiquitous, unlimited computing resources in the cloud

Application and cloud infrastructure mapping Security defense deployment Computation intensive Real-time monitoring Energy consuming

What is Anti-virus engine? The engine, the core of any anti-virus product, is a software module that is purpose-built to find and remove malicious code. The anti-virus Engine provides Web and mail security Archiving and fax Networking security

Migrate the anti-virus deployment to the cloud Anti-virus engine running on the cloud instead of running on the mobile devices energy saving provide complex deployment: multiple anti-virus engines working together

Detection Rate of AV engines

Single AV engine is not enough There is no single anti-virus engine on the market that is always the fastest and most effective at identifying viruses, Trojans and other threats. Different Anti-Virus Scan Engine has different response time A layered scanning solution that combines multiple engines to greatly increase changes of having at least one of those virus engines updated on time

Cloud-Based Anti-virus Approach Malware detection on end hosts based on providing anti-virus as a cloud network service Enable identification of malicious and unwanted software 10 AV engine: Avast, AVG, BitDefender, ClamAV, F-Prot, F-Secure, Kaspersky, McAfee, Symantec, and Trend Micro 2 behavioral engines (Norman Sandbox and CWSandbox)

Cloud-Based AV Approach Two Key Changes Antivirus as a network service Multiple, heterogeneous detection engines in parallel Benefits better detection of malicious software enhanced forensics capabilities retrospective detection improved deployability and management 10 anti-virus engines and 2 behavioral detection engines

Anti-Virus Engine – ClamAV Clam AntiVirus is an open source anti-virus toolkit for UNIX, designed especially for e-mail scanning on mail gateways It provides a number of utilities including a flexible and scalable multi-threaded daemon, a command line scanner and advanced tool for automatic database updates The core of the package is an anti-virus engine available in a form of shared library

Deployment Architecture HTTP Antivirus Proxy a proxy with a ClamAV anti-virus scanner continuous, non-blocking downloads and smooth scanning of dynamic and password protected HTTP traffic HAVP anti-virus proxy has a parent and transparent proxy mode It can be used with squid or standalone Features HTTP Antivirus proxy Multiple scanner support at the same time Scans complete incoming traffic Smooth scanning of dynamic and password protected traffic Can used with squid or other proxy Parent proxy support Transparent proxy support Process change to defined user and group Use Clamav (GPL antivirus) Written in C++

Deployment Architecture HAVP anti-virus proxy performs the parent mode and the transparent proxy mode in separate deployments Squid: Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more; Provide Access Control List for filtering

What is going to be shown? After being successfully deployed, try this link http://www.eicar.org/download/eicar_com.zip

Conclusion The cloud-based anti-virus approach is making use of the powerful cloud, providing comprehensive defenses. Offloading the work to the cloud, the mobile devices will save more energy.

Thank you! Any Questions?

References A. Carroll and G. Heiser. An Analysis of Power Consumption in a Smartphone. In Proceedings of the 2010 USENIX Annual Technical Conference. 2010. Next Generation AntiVirus – Cloud AV http://golmuri.com/technology/security/next-generation-antivirus-cloud-av Configuring Squid & HAVP(ClamAV) in Ubuntu http://kokikode.wordpress.com/ J. Oberheide, K. Veeraraghavan, E. Cooke, J. Flinn, F. Jahanian, Virtualized In-Cloud Security Services for Mobile Devices. MobiVirt '08 Proceedings of the First Workshop on Virtualization in Mobile Computing ACM New York, NY, USA, 2008