Panel Introduction: Life After Antivirus – What Does the Future Hold? Martin Fréchette Sr. Principal Engineer Symantec Research Labs – Advanced Concepts.

Slides:



Advertisements
Similar presentations
©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Mary Ann Fitzsimmons Regional.
Advertisements

The Threat Landscape Jan Threat Report 2.
Chapter 1 We’ve Got Problems…. Four Horsemen  … of the electronic apocalypse  Spam --- unsolicited bulk o Over 70% of traffic  Bugs ---
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Chris Berninger, Sr. Solutions.
Security for Today’s Threat Landscape Kat Pelak 1.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
David Flournoy Bit9 Mid-Atlantic Regional Manager
© GMV, 2011 FROM SKIMMING TO THE LOGICAL FRAUD, THE NEWCOMING ATM RISK IT & Security Forum - Bucharest Bucharest, 11/10/2011 Reference: GMV-DESCOR-PR-0048.
 Malicious or unsolicited mail sent to a mailbox without the option to unsubscribe  Often used as a catch-all of any undesired or questionable mail.
Novel Information Attacks From “Carpet Bombings” to “Smart Bombs”
FIT5037 Advanced Network Security --- Modern Computing and Security --- Lecture 1.
Free Software Alternatives: Avast! Anti-virus
Kaspersky Lab: The Best of Both Worlds Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / 2 nd InfoCom Security Conference.
Geographic Information Business and Interoperability: The Future of GIS Andrew U. Frank Geoinfo TU Vienna overheads available.
Department Of Computer Engineering
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Barracuda Spam & Virus Firewall. Introduction to the Barracuda Spam & Virus Firewall Complete server protection –Spam Blocking (95+ percent) Extremely.
Towards Extending the Antivirus Capability to Scan Network Traffic Mohammed I. Al-Saleh Jordan University of Science and Technology.
Beyond Anti-Virus by Dan Keller Fred Cohen- Computer Scientist “there is no algorithm that can perfectly detect all possible computer viruses”
CAS: A FRAMEWORK OF ONLINE DETECTING ADVANCE MALWARE FAMILIES FOR CLOUD-BASED SECURITY From: First IEEE International Conference on Communications in China:
11 The Ghost In The Browser Analysis of Web-based Malware Reporter: 林佳宜 Advisor: Chun-Ying Huang /3/29.
Protect Your Desktops from Malware and Unauthorized Software.
Reducing Risk Through Incremental Malware Detection Prevx November 2007.
Separate your corporate environment from unknown threats of the WEB. Define trusted WEB policy. Enforce the use of WEB browsers. Automatically distribute.
Highlights: Protection Performance New features Agenda.
EAACK—A Secure Intrusion-Detection System for MANETs
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Malicious Attacks By Katya, Grace, Lachlan, Sairus and Eric!
ANTIVIRUS SOFTWARE.  Antivirus software is the most widespread mechanism for defending individual hosts against threats associated with malicious software,
Retrospective Testing - How Good Heuristics Really Work Andreas Marx AV-Test.org University of Magdeburg GEGA IT-Solutions GbR.
Interception and Analysis Framework for Win32 Scripts (not for public release) Tim Hollebeek, Ph.D.
The Changing World of Endpoint Protection
Security Innovation & Startup. OPEN THREAT EXCHANGE (OTX): THE HISTORY AND FUTURE OF OPEN THREAT INTELLIGENCE COMMUNITY ALIENVAULT OTX.
Chapter 5: Implementing Intrusion Prevention
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Sky Advanced Threat Prevention
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
11 Shades of Grey: On the effectiveness of reputation- based “blacklists” Reporter: 林佳宜 /8/16.
What’s new in SEP Presenter’s Name Here Presenter’s Title Here.
©2015 HEAT Software. All rights reserved. Proprietary & Confidential. Ransomware: How to Avoid Extortion Matthew Walker – VP Northern Europe.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Computer viruses are programs written by people and they are programed specially to damage the data on our computer by corrupting programs, deleting files,
Cybersecurity Test Review Introduction to Digital Technology.
Antivirus Software Troy Behmer. Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What.
©2015 Check Point Software Technologies Ltd. 1 Website Watering Holes Endpoints are at risk in numerous ways, especially when social engineering is applied.
Heat-seeking Honeypots: Design and Experience John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy and Martin Abadi WWW 2011 Presented by Elias P.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
In an increasingly competitive industry is certified by a recognized provider as Microsoft exam will dramatically improve your chances busy. Microsoft.
Some Great Open Source Intrusion Detection Systems (IDSs)
©2014 Check Point Software Technologies Ltd Security Report “Critical Security Trends and What You Need to Know Today” Nick Hampson Security Engineering.
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
The Changing World of Endpoint Protection
A Virtual Tour of SophosLabs Building next-generation protection
Exchange Online Advanced Threat Protection
Techniques, Tools, and Research Issues
Defeat Tomorrow’s Threats Today
Active Cyber Security, OnDemand
Exchange Online Advanced Threat Protection
بهترین راهکار را انتخاب کنید...
Information Protection
Marcial Quinones-Cardona
Security Trends and Threats Affecting Innovations in Technology
Introduction to Symantec Security Service
Hosted Security.
Information Protection
OPIsrael And The Value Of Next Generation SOCs
Presentation transcript:

Panel Introduction: Life After Antivirus – What Does the Future Hold? Martin Fréchette Sr. Principal Engineer Symantec Research Labs – Advanced Concepts

2 The Evolving Threat Landscape Attackers have shifted away –from mass distribution of a small number of threats –to micro distribution of millions of distinct threats How? Their servers generate a new malware strain every few minutes/hours –Each victim potentially gets attacked by a different strain! –Called “server-side polymorphism” How big is the problem? –We now know of over 1.8M distinct malware strains –We’re collecting 10,000s of new strains per day Further, our sensor data shows us that we’ve passed an inflection point… –The amount of malware released now exceeds the amount of goodware! –From Nov 7 th to Nov 14 th, roughly 54,600 new EXEs were downloaded by (participating) consumer users –Of these, roughly 65% of all files were malicious! time # of apps good apps malware

Coping with the Malware Flood The current blacklist model is decreasingly effective at coping with millions of distinct threats –Vendors are generating up to 20,000+ new fingerprints per day! –Furthermore, many strains of older malware may also go permanently undetected! Why? Because if only 3 people in the world have a threat, there’s little chance a security vendor has discovered it and written a signature for it –A few years ago, a single classic signature could protect 10,000s of users –Today a single classic signature typically protects < 20 users The result is that the industry –is flooding its customers with 100s of thousands of signatures every month, –yet our efficacy was arguably better a decade ago with 1/100 th the signatures! Conclusion: The classic fingerprinting approach needs to be augmented/replaced.

4 A New Approach Symantec’s top security architects believe –a hybrid whitelisting and reputation-based antivirus approach –will become the only effective means of –securing enterprise & consumer endpoints In the long-run, these schemes will largely replace traditional blacklist AV technologies –Traditional fingerprinting AV will become a part of the supporting cast

The New Approach to Antivirus Software applications have a “long-tail” distribution. Prevalence 1 user 100M users Most popular file Least popular file e.g., the 10 th most popular app is used by 1M users e.g., the 4,999,125 th most popular app is used by 2 users Legitimate apps span the spectrum, with the most popular apps occupying the head of the curve. On the other hand, most malicious software occupies the long tail… Traditional blacklisting works best for mass-distributed malware where a single sig covers thousands of users. x x x x x However the advent of personalized malware has made it difficult for AV vendors to discover and protect against the majority of today’s threats. x x x x Legend x Traditional Blacklisting Symantec proposes using a whitelist to identify the most popular legitimate applications. Over time we can expand the whitelist to cover lower-prevalence software as well. w w w w w w w w w w Whitelisting So how can whitelisting and reputation-based detection help? But how about the long tail of good and malicious apps? We propose using a novel new reputation system (like systems used by amazon.com) to automatically derive the reputation of long- tail apps based on the wisdom of our 100M strong crowd of users. r Reputation system r r r r r r r r r r r r r r r r r r r rrr r rr r r r r r rr r rrr The Idea Rather than just blocking software found on the blacklist, we will shift to a hybrid model employing whitelisting, reputation, and blacklisting.

ReputationWhitelistingBlacklisting The New Approach to Antivirus Here’s another way of thinking about the problem: Prevalent malware Prevalent goodware The long tail