280 likes | 291 Views
Learn about the importance of staying current with signature-based anti-malware updates to enhance protection against malware threats. Explore various methods, trends, and considerations for keeping your systems up-to-date.
E N D
Hitting the ‘Up-To-Date’ Bull’s eye VB2009 – Steven Ginn
Overview Signature based anti-malware requires updates to stay ahead More and more updates are released every day Need to provide technology for users to identify their “up-to-date” status Defining and tracking “Up-to-Date”
Signature Based Protection Recognizes malware based on an identity Content is pattern matched against signatures New Malware = New Signatures needed Background
The ‘Up-to-Date’ Bull’s eye The point where a product has the latest and greatest definitions What is it?
The ‘Up-To-Date’ Bull’s Eye Staying current maximizes protection Important to know when to update Why should we care?
Hitting a moving target? Malware is more and more pervasive Constantly being created Anti-malware vendors react with new updates to keep up User’s need to constantly update to keep up
Identifying Trends Monitors Anti-malware products and online material Records any update available Used to Find the bull’s eye OESIS Monitor
Trends and Observations Number of updates per day has increased Number of vendors and Signature formats has increased Update frequency by day of the week varies
Average Number of Updates by day For the average vendor
Average Updates per day by year For selected vendors
Average Updates per day by year For selected vendors
Caveats to Data Data for 2009 was scaled New Vendors introduced midyear New Definition Formats introduced mid-year The “fine-print”
Finding the Bull’s Eye Anti-malware vendors have tools to tell user’s whether or not they are up to date Each make sense under different scenarios Communication tools
Blacklist date Every Update is stamped with an expiration Projected to last until next target delivery Allows client software to make educated guess about where the up-to-date mark will be next “Use by tomorrow”
Blacklist date Pros Cons Bad for critical outbreaks May expire prematurely Best Educated Guess • Easy to answer “Am I Up to date?”
Brute-Force Update Just go get the latest always No need to care if up to date or not Best when you assume that you aren’t already up to date Throwing Blind
Brute-Force Update Pros Cons Resource intensive May interrupt user’s workflow • Never miss, if frequent enough
Push Mechanism Open a line between user and a central server When update available, push it to end user Always connected?
Push Mechanism Pros Cons Not good in heterogeneous environments Requires constant contact • Minimizes outside communication • Simpler to stay up to date
Third Party enforcement Monitors Update releases by vendors Provides reference point of latest definitions OESIS Monitor
Third Party enforcement Pros Cons May not catch everything • Supports heterogeneous deployments • Reacts quickly • Reference point updates are often smaller than signature updates • Best of Brute-force and push mechanisms
Cloud-Scanning Signatures live in the cloud Content is assessed by reputation and scanned when necessary on external sites Get rid of the definitions
Cloud-Scanning Pros Cons Must always be connected Security concerns with sending data out • Improved detection • Faster identification • Fewer systems to update
What next? Signature based detection isn’t scaling What good is providing signatures if user’s can’t keep up with them? Try to improve alternatives to become proactive, not reactive Continue the uphill battle, or go around?