Client-Server collaborative scanning Dumitru Codreanu R&D, BitDefender.

Slides:



Advertisements
Similar presentations
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Advertisements

Day anti-virus anti-virus 1 detecting a malicious file malware, detection, hiding, removing.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 10 04/18/2011 Security and Privacy in Cloud Computing.
Nasca Internet Networking and Security viruses.
Virus Encyption CS 450 Joshua Bostic. topics Encryption as a deterent to virus scans. History of polymorphic viruses. Use of encryption by viruses.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Chapter 9 Security Malware Defenses. Malware Can be used for a form of blackmail. Example: Encrypts files on victim disk, then displays message.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
No.24 Prerawat Denvutivorkarn M.2/2. Definition: "antivirus" is protective software designed to defend your computer against malicious software. Malicious.
Botnets Uses, Prevention, and Examples. Background Robot Network Programs communicating over a network to complete a task Adapted new meaning in the security.
Desktop Security: Worms and Viruses Brian Arkills, C&C NDC-Sysmgt.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
By, Anish Shanmugasundaram Yashwanth Sainath Jammi.
Network and Internet Security SYSTEM SECURITY. Virus Countermeasures Antivirus approach ◦Ideal solution: Prevention ◦Not allowing the virus to infect.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Lesson 8 DATA EXCHANGE. Transmission Modes Type 1 - Simplex  Simplex transmission: sends data in one direction only. A radio broadcast is a good example.
Computer Viruses Preetha Annamalai Niranjan Potnis.
APT29 HAMMERTOSS Jayakrishnan M.
Hacker Zombie Computer Reflectors Target.
BY ANDREA ALMEIDA T.E COMP DON BOSCO COLLEGE OF ENGINEERING.
Staying Safe Online Keep your Information Secure.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Structure Classifications &
Cloud-based Antivirus Project Proposal By Yuli Deng, Guofu Xiong.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Dealing with Malware By: Brandon Payne Image source: TechTips.com.
Mtivity Client Support System Quick start guide. Mtivity Client Support System We are very pleased to announce the launch of a new Client Support System.
By Liam Wright Manga comic group Japan SAFETY on your computer.
Sky Advanced Threat Prevention
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
The hidden part of TDSS Sergey (k1k) Golovanov, Malware Expert Global Research and Analysis Team Kaspersky Lab.
1 3 Computing System Fundamentals 3.7 Utility Software.
ANTIVIRUS ANTIVIRUS Author: Somnath G. Kavalase Junior Software developer at PBWebvsion PVT.LTD.
Information Systems Design and Development Security Precautions Computing Science.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
MICROSOFT AJAX CDN (CONTENT DELIVERY NETWORK) Make Your ASP.NET site faster to retrieve.
Computer Security Keeping you and your computer safe in the digital world.
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
Protecting Computers From Viruses and Similarly Programmed Threats Ryan Gray COSC 316.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
Botnets A collection of compromised machines
BUILD SECURE PRODUCTS AND SERVICES
V. A. Memos and K. E. Psannis*
Panda Cloud Antivirus Pedro Bustamante
Techniques, Tools, and Research Issues
Botnets A collection of compromised machines
Call AVG Antivirus Support | Fix Your PC
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
Presentation transcript:

Client-Server collaborative scanning Dumitru Codreanu R&D, BitDefender

Overview Server-Side scanning Client-server collaborative scanning Quick Scan

Server-Side Scanning What is server side scanning ? the server is doing the scanning In the most simple form, the client sends the whole file to the server, and the server scans the file with one or several engines. CloudAV does this ( only new executables)

Server-Side Scanning Benefits: Instant Updates Less or no traffic for updates More feedback from clients means: –more sample so that the AV Lab can do it’s job better –with additional information from clients, it is possible to track down virus origins, infection vectors and spreading speeds. Client part is small, and does not change often

Server Side Scanning Drawbacks The network traffic kills you Lag time Sending a hash first can reduce traffic to about 30%

Server-side scanning Goal : reduce traffic

Client-Server Collaborative Scanning Client does part of the scanning The other part is done by the server

Client-Server Collaborative Scanning Scanning engines and plug-ins signatures archive plug-ins unpacking plug-ins code emulation behavior analysis heuristics

Client-server collaborative scanning The engines hosted on the server requests –pieces of a file –checksums of pieces –other info ( size, file type, etc) Check-sums are preferred instead of full data, to save bandwidth

Client-server collaborative scanning Client Server Scanning process "ctfmon“ Send file Information Request CRC Offset 0x1A643 Size 0x9BE Request CRC Offset 0x4BFF Size 0x542 Send CRC Offset 0x1A643 Size 0x9BE Send CRC Offset 0x4BFF Size 0x542 Request CRC Offset 0x1234 Size 0x1275 Send CRC Offset 0x1234 Size 0x1275 Request CRC Offset 0x1234 Size 0x1275 Request CRC Offset 0xAB Size 0x3421 Request Data Offset 0x1234 Size 0x12 Send CRC Offset 0x1234 Size 0x1275 Send CRC Offset 0xAB Size 0x3421 Send Data Offset 0x1234 Size 0x12 Infected Trojan.Sidur.01A Example of engine requesting data from client

Several two-way data transfers are required before a verdict is given Requests and replies for multiple files are sent at once to minimize number of network packets sent.

Client-server collaborative scanning What can we use it for ? To scan all files ? –No way. Traffic will blow you away. To scan new files ? –That could work.

Client-server collaborative scanning In the end, it all comes down to

Client-server collaborative scanning –In case you don’t have an antivirus on your system and want to scan only new files, it can be cheaper in terms of overall traffic to use the server’s signature database instead of downloading it. –If you have signatures on your computer and want to use client-server scanning just to avoid signature updates, then you have to consider only the updates in your computations. Probably you won’t gain anything in the end in this scenario.

Quick Scan Scans only active threats Has a small client module Runs fast (under a minute or so) Uses little bandwidth Detects all (or almost all) types of viruses

Quick Scan Active threat Malicious code loaded in memory Performing its malicious action, or just waiting for something in the background

Client-server collaborative scanning

Quick scan To create new versions of viruses as well as make detection harder, virus writers often use: Packers Encryption Anti-emulation tricks Scanning in memory has the advantage that code is already unpacked and decrypted.

Quick Scan Proactive detection Heuristics Behavior analysis For polymorphic malware that is not detected with other engines, there might be specialized detection routines(z- mist, etap)

Quick Scan If a piece of malware detected by proactive methods (heuristics, behavior analysis) can be signed, it will be signed as soon as it gets in the AV lab. Why ? –Signature based detection runs faster than behavior analysis. –Some independent testers appreciate more if the Anti-Virus was able to actually identify the virus. So “Win32.Behaves.Like.FileInfector” is good, but identifying which file infector is even better.

Quick Scan As result, signature based detection becomes the main detection method after a while. signature database increases at tremendous rates. BitDefender had ≈1.2 million signatures in spring 2008, and has over 1.8 million now.

Quick Scan Signature types by size Static malware ≈ 89% 6 KBString searching 511 KBX-Raying 629 KBHashes 440 KBOBJ, P-Code 593 KBMacros 455 KBScripts KBStatic malware

Quick Scan Static malware Executable files that are malicious per-se Do not change/evolve over time Can be detected by using checksums at fixed offsets / fixed sizes Can be easily and uniquely identified Accounts for almost 90% of all malware!

Quick Scan To scan for malware in memory, we can loose archive plug-ins, unpacking plug-ins, and limit the emulator just for behavior analysis (no decryption necessary) Useful engines Signature engine, 90% of which are static Behavior analysis Heuristics Most of viruses detected at first with these methods, will soon fall into signature based detection.

Quick scan

Quick Scan Behavior analysis is expensive. It needs the emulator on the client. Ironically, since most viruses are signed anyway, behavior analysis is relevant only for viruses that cannot be signed. There are not so many such viruses out there.

Quick Scan Code emulation needs the entire file. Without code emulation on the client, we lose Behavior Analysis. Add some specialized routines to detect advanced viruses that are in the wild, to compensate for the loss of behavior analysis.

Quick Scan Reason for not detecting a malware Malware has not been signed yet by the AV vendor Fail to unpack ( new un-packer or very sophisticated one, who can pass through emulation) Fail to uncompress (possibly new archive type) Encrypted file and emulator failed to decrypt. All engine fail (highly sophisticated virus) Most viruses are not detected because they have not been signed yet, or because they used a tough packer.

Scanning the “Wild List” only with static signatures 91% is detected applied to files (non running code) 97% is detected when scanning running code

Quick Scan Engine Distribution among client-server ClientServer 1. heuristics 2. string search 3. specialized detection routines 4. module to execute server’s commands 5.module to compute hash of files for speed-up 6. Lightweight rootkit detection 1. static signatures (over 92% in size of all engines + signatures) 2. Database of clean files for speed-up

Quick Scan Thorough mode: Make heuristic detection more aggressive. Send entire file that are not already knows as clean and that trigger suspicion by heuristics. On the server side code emulation, behavior analysis and all other engines will be glad to test that file.

Quick Scan Very thorough mode Send all unknown files to the server. With the server’s database of known files and static virus detection, this will send about 20-30% of file size to the server. Not in our Quick Scan (we are being realistic)

Quick Scan Final result Client module less then 500 Kbytes Total network traffic in non-thorough mode (without any full uploads) around 300 bytes on average Detects almost all types of malware : spyware, trojans, keylogers etc… Scan time under a minute.

Quick Scan Bonus Lightweight root-kit detection. scans hot spots (inactive services, startup programs…) but with less detection rate

Quick Scan Limitations Targeted only at active threats Does not detect macros and scripts because it scans only running processes and loaded libraries Slightly lower detection rates, as a compromise for very low traffic No desinfection

Quick Scan Other applications Online banking Online shopping

Quick Scan will be available FREE

Any Questions ?

Thank you

Dumitru Codreanu R&D, BitDefender