Title: Introduction to Antivirus Technology
1Introduction to Antivirus Technology
- Manfred Hung
- Security Consultant
2Agenda
- Security Climate Trends, Challenges Enterprise
Solutions - Security Lifecycle Best Practices
- Symantec Client Security
- Symantec Antivirus for SMTP Gateway
- Symantec Gateway Security
- Product Demo
3Worldwide Attack Trends
Analysis by Symantec Security Response using
data from Symantec, IDC ICSA 2002 estimated
Source CERT
4Less Knowledge Required to Attack
High
Low
1980
1985
1990
1995
2000
2005
5General Threat Evolution
Global Impact
Sector
Scope
Regional
Individual Orgs.
Individual PCs
Time
2000
2003
1990s
6Threat Evolution Malicious Code
Class III Human response impossible Automated
response unlikely Proactive blocking possible
Seconds
Class II Human response difficult/impossible Auto
mated response possible
Minutes
Contagion Timeframe
Hours
Class I Human response possible
Days
Weeks or months
Time
2000
Early 1990s
Mid 1990s
Late 1990s
2003
7Threat Evolution Day-zero Threats
- A day-zero threat exploits a previously unknown,
and therefore unprotected vulnerability.
Vulnerability-Threat Window
Time
Vulnerability identified
Threat Released
8Threat Evolution Day-zero Threats
- A day-zero threat exploits a previously unknown,
and therefore unprotected vulnerability.
Time
Threat released
Vulnerability identified
9Threat Impact on Emerging Targets
Targets
Threats
Major disruption to multiple networks
- Impact to
- Power
- Comm
- Hydro
- Chemical
- Other infra.
GlobalInternet Disruption
Major disruption of B2B services sector-level
impact
Short-term disruptionof individual networks
Disruption of inter-networked SCADA
Short-term/ localized Internet disruption
Disruptionof targeted infrastructures
Account theft/ corruption, DoS
Data theft/ corruption, DoS
10Vulnerabilities on the Rise New Vulnerabilities
per Week
Source Symantec
11How Quickly Do I Need to Respond?
Risk increases exponentially over time
Source Symantec
12Silo-Based Approach Who Secures What?
Network Services Routers Switches Gateways Firew
alls RAS ATM Firmware/ Software Upgrade/
Patches
Mid-Range Services Servers Application Upgrades/
Patches
Desktop Services Helpdesk Software
support Upgrades/ Patches
Mainframe Services Authorization Upgrades/ Patch
es Operations
- Security
- Services
- Policy
- Standards
- Development
- Maintenance
- Compliance
- Monitoring
- Response
- Recovery
Multiple Threats from one/manysources singly
orin parallel, against one or many silos
MalWare
WORM
Virus
Exploits
Social Engineering
13Total Attack Volume
Attacks per Company by Week(January 1, 2002
December 30, 2002)
- - - - - - - - - - - - - - - - - - - - - - - - -
-
Jan 7 Jan 21 Feb 4 Feb 18 Mar 4 Mar 18 Apr 1 Apr
15 Apr 29 May 13 May 27 Jun 10 Jun 24 Jul 8 Jul
22 Aug 5 Aug 19 Sep 2 Sep 16 Sep 30 Oct 14 Oct
28 Nov 11 Nov 25 Dec 9 Dec 23
50 45 40 35 30 25 20 15 10 5 0
Attacks per Company
Week
Source Symantec Internet Security Threat Report
14Enterprise Security Solution
15Symantec is Securing the Enterprise
ProactiveControl
16Answering the Challenges Securing Your
Enterprise
ProactiveControl
17Securing the Enterprise
- Alert Early Warning
- Awareness of new vulnerabilities and global
threats - Symantecs alerting services allow customers to
- Close the gap between awareness of security
issues and possible action - Understand the impact of the global environment
- Reduce TCO of security by preventing attacks or
avoiding damage
- Early Warning
- DeepSight
- Decoy Technology
- ManTrap
- Vulnerability
- Assessment
18Securing the Enterprise
- Integrated Solutions
- Client Security
- Gateway Security
- Best-of-breed products
- Host and Network
- Intrusion Detection
- Antivirus
- Filtering
- Firewall
- VPN
- Protection
- Multi-layered security at the Gateway, Server and
Client - Symantecs Protection solutions allow customers
to - Provide protection against blended threats
through layered, integrated solutions - Have significantly lower total cost of ownership
common install, management and update features
19Securing the Enterprise
- Respond
- Trusted timely content updates and 24/7 global
remediation support - Symantecs Response capabilities allow customers
to - Automatically update all Protection products with
latest threat content - Obtain immediate expertglobal support
- Recover quickly after an incident has occurred
Security Response (LiveUpdate) 7x24 customer
support Professional Services Disk Recovery
Respond
20Securing the Enterprise
- Manage
- Effectively identify critical vulnerabilities and
blended threats in real-time - Symantecs Management Solutions allow customers
to - Identify incidents accurately and timely
- Simplify management of protection products at all
points of the network - Implement a single point of control
- Reduce or eliminate monitoring burden, focusing
security staff on risk mitigation
- Policy Compliance
- Security Management
- Incident Manager
- Event Managers
- Managed Security Services
Manage
21Enterprise Antivirus Protection Solution
22The ChallengeGrowth and Evolution of Malware
Number of Known Viruses
Dramatic increase in the number and severity of
malware attacks
PDA Virus (Palm Liberty)
Mass Mailer Viruses (LoveLetter/Melissa)
Remote Control Trojan (NetBus)
Macro Viruses
Polymorphic Viruses (Tequila)
Source Symantec
23Symantec AntiVirus Technologies
- Same quality and timeliness of response
- Uses NAVEX architecture
- Leverages
- Central Quarantine
- Scan Deliver
- Digital Immune System
24Symantec Security Response Centers Follow the
Sun Rapid Response
Leiden, NL
Tokyo, JN
Santa Monica, USA
Sydney, AU
25Antivirus Information Resource
http//www.symantec.com http//www.sarc.com http/
/www.securityfocus.com
26Symantec Client Security Overview
27Introduction of Symantec Client Security
- Symantec Client Security integrates
- Antivirus
- Client Firewall
- Intrusion Detection
- Privacy Control
- Single Management Console
- Single Deployment mechanism
- Single Update mechanism
28Symantec Client Security
Better client protection and lower cost through
integration
- First integrated client security product for the
Enterprise - Industry leading technologies
- Antivirus
- Client Firewall
- Client-side Intrusion Detection
- Integrated installation
- Common Management console, with optional
integration intoSymantec Information Management - Rapid Response with timely definitions, rules,
signatures using common LiveUpdate deployment - Integrated Support
- Integrated Services
29Integrated Protection
The technologies talk to each other
For Example Firewall technology will initiate an
antivirus scan even when AV has been turned
off! Intrusion Detection technology will instruct
Firewall to block traffic from malicious sources
30Integrated Deployment
- Three pre-configured Integrated installations
- Fully managed
- Lightly managed
- Thin client
- Customizable deployment packages
- Modular components
- Flexible installation options
31Common Management Console
- Centralized Configuration Management
- High scalability - hundreds of thousands of nodes
- Hierarchical infrastructure
- Policy management with settings lockdown
- Group management including logical groupings
- Product deployment
- Event management
- Update management
32Integration with Symantec Security Management
System
- Centralized Alerting
- alerting threshold
- Centralized Logging
- Graphical Reporting
- customizable reports
- Cross-tier security technology management
- Available Q4 2002
33Symantec Client Security Client Protection
- Client platforms - Win98/ME, Win XP, WinNT/2000
- 64-bit client support Coming
- Win2K3 support Coming
- Silent or interactive integrated install
- Three pre-packaged installations
- Fully managed
- Lightly managed
- Thin Client
- Product migration
- Competitive Uninstaller
- Limited or full user interface with password
protection
34Symantec Client Security Firewall/IDS
Protection
- Inbound and outbound traffic scanning
- Integrates with antivirus scanning for integrated
protection - Intrusion Detection
- Integrates with firewall to automatically block
unauthorized intrusions - Internet Zone Control
- Additive VPN Support
- Nortel Contivity Client
- Cisco VPN Client
- Symantec VPN Client (RaptorMobile)
- CheckPoint VPN Client
- Content Filtering user defined
35Symantec Client Security - Antivirus Protection
- Common scan engine
- Multi platform, multi-tier and multi-lingual
support - Extensible does not require redeploy or reboot
- Unknown virus detection - Heuristics
- Incremental virus definitions small updates
- Push Technology fast deployment of cures
- Roaming
- Quarantine
- Digital Immune System automated response
- Email scanning for MS Exchange and Lotus
Notes/Domino
36Others Key Benefits
37Key Features
- Packager - Remote Deployment
- Multiple LU Server Provide Fail-over features
- Scanning Performance Improved
- Scan Phase/Snooze
- VD Update Improved
38Benefits
- Eases Management Effort
- Simplified security management
- Holistic view of security at client
- Better Protection at the client
- Multiple integrated security technologies
provides better protection against blended
threats - Better reporting results in an improved security
posture - Better response thru centralized updating and
distribution - Optimizes administrator resources
- Centralized installation, reporting, management
and updates - Eliminates cross-vendor interoperability issues
- Multiple technologies from a single vendor
- Reduced Total Cost of Ownership
39Response
40Digital Immune System Automated Response
41IntegratedResponse
Virus Definitions Firewall Updates Intrusion
Detection Signatures
- Integrated Response in a single update via our
world-class LiveUpdate technology - Provides the highest security posture available
- Rapid deployment in the face of a fast spreading
outbreak - Minimizes impact on network bandwidth
42Management Key Feature
- Laptop users
- Semi-managed Client for roaming users
- Power Status Schedule scanning
- Tamper Protection
- SSC Auto-Protection Notification
- Registry Key monitoring
- Auto-Protect Disable Notification
- Auto-Protect Re-enable
- Force password setting
- Quarantine Setting
43Symantec System Center
44Symantec System Center
45Integrated Firewall/IDS
46Symantec Client Firewall
47Symantec Client Firewall FW/IDS
48Symantec Client Firewall - Logging
49Symantec Client Firewall Administrator
50Symantec Antivirus For SMTP Gateway
51Solution Overview
- What is Symantec AntiVirus for SMTP Gateways?
- Comprehensive virus protection for Internet
Email, a.k.a. SMTP, Gateway - Reduces Spam and eliminates unwanted email
content, like attachments
52Solution Overview
Viruses, Worms, Trojan Horses, Spam, Unwanted
Content
SAV SMTP
Protected Customer
53Features Highlight
- This release focused on
- Security
- Management
- Performance
- Antispam
54Security
- Enhanced Malformed MIME handling
- Not unique, but critical
- Extensive DoS Prevention (Zip of Death)
- Outbreak Alerts
- Tamper Alerts
- Admin password encryption (through SSL)
- Multi-Level Administration Passwords
- Secure defaults failing closed
55Security - Why do they care?
- Provide confidence that the first line of
defense is not the first line of attack - Need the right tools to respond to todays
threats and vulnerabilities - Security awareness is growing and is gaining in
importance at all tiers - Expect no less from Symantec as the leader in
Internet Security
56Management
- Flexible and granular notifications about
viruses/content violations - System Alerting
- Triggered by events like failed LU, running
out of disk space etc. - The system tells Admin when something is wrong
- Relay Pause greater flexibility for handling
outbreak situations - LiveUpdate Scheduling greater flexibility
- Shareable Configuration Files configure once
and reuse on other servers
57Management - Why do they care?
- Ease of management is critical
- Need high-effectiveness, without
labor-intensiveness
58Performance
- Goal is to maintain or expand the lead over Trend
and Neta gained since v2.5 - Faster message processing (using in-memory
scanning) - Improved message and queue handling
59Performance - Why do they care?
- End-users dont accept delays lightly
- Throwing more hardware at the problem is not an
easy or desirable option - More servers? Larger servers?
- Rack-space? Downtime?
- To handle the same load on Win2K, Trend and Neta
would require either more and/or beefier servers
60Spam - What is it?
- Unsolicited (bulk) commercial email
- Usually can't unsubscribe from it
- Usually sent through compromised internet
resources (open relays) - Not only impacts mail server load and end-user
satisfaction also carries potential liability
61Spam a problem?!
62Antispam (Anti-relay)
- Antispam
- Block by domain, email address
- Support for MAPS Lists
- MAPS Mail Abuse Prevention System LLC
- Lists supported RBL, DUL, RSS, RBL
- First subscribe to MAPS, then activate
- Anti-relay
- External relay prevention
- Block by special character in recipient address
63Spam - Why do they care?
- Boss is getting tired of receiving it (so is
ours!) - Problem has become worse over last few months
- Concerns about liability i.e. unsolicited
offensive spam NOT being stopped
64The Management Console Web-based
65Symantec Web Security
66The ChallengeGrowth in Internet Web Sites
Exponential Increases in the number of websites
67The Advent of the Blended Threat
- Nimda worm (Fall of 2001) - propagated via
- SMTP (e-mail)
- HTTP (web browsing)
- Lesson
- HTTP is a viable, but often neglected infection
vector - Scan HTTP traffic for content, and other
malicious payloads (viruses/worms/trojans)
Source Symantec
68Content Security is about Filtering Out ALL
Harmful Data
Harmful Applications
Dangerous Malicious Code
Litigious Content
Non- Work-related content
69URL FilteringEmerging Gaps in Protection
1994 - 1999
- URL Lists relatively effective
- Limited to vendors ability to find and update
lists - Usually weak on non-English sites
2000 and beyond
- Nature of delivery changing
- URL redirection
- Cached pages
- URLs with multiple host IPs
- Unlisted anonymizers
- Future technologies
- URL Lists losing effectiveness
70Symantec's Filtering "Safety-Net"
- Combining list-based with heuristic analysis
- Analogous to today's anti-virus protection
- Technologies designed to detect both the Known
AND the New - Effective second layer of defense
- It understands most of our customer's languages
(14 in all!)
URL Lists (list-based)
DDR Analysis (heuristics)
71Dynamic Document Review (DDR)
- "Keyword Filtering" too broad
- Blocks all pages containing a single instance of
a word, ex. "breast" - DDR takes a heuristic approach
- Analyzes word context
- Only initial HTML file (26 kb) is retrieved and
analyzed first - Very rapid, in-memory process
72Why Customers Should Care Thin line between fun
and fatal content
Just a game?
73Using Filtering as a Proactive Anti-Virus
Measure
- Minimizing exposure to potentially lethal
executables, Trojans etc. - Preventing access to web-based email during
outbreaks, ex. Hotmail, Yahoo! Mail - Ensures that all web-based email attachments are
scanned for viruses/malicious code - Inhibit or track internal access to hacker tools
or hacker-related sites
74How Integrated Scanning Works
1st Level
2nd Level
Is request even allowed?
Is request truly clean?
If ok, display
Permissions
DDR
HTML
URL List
DDR on Search
or download
If ok, retrieve proceed
AV Scan
Binary
User surfs, sends request
If no, reject immediately
on client
75URL Filtering Response Team
- Dedicated to searching and categorizing
international websites - International reviewers use automated tools,
including DDR-based tools, to find and categorize
content - Dedicated RD for "safety-net" detection
technologies such as DDR
- Periodic review of URLs sent by customers
(filtering_at_symantec.com)
76Symantec Web SecurityDeployment
77Symantec Web Security Deployment Examples
78Symantec Web SecurityUser end
79Download infected object
80Download blocked object
81Download blocked object
82Download progress
83Product Demo
84(No Transcript)