Advanced Thrad analysis System - PowerPoint PPT Presentation

About This Presentation
Title:

Advanced Thrad analysis System

Description:

Scan Files Online using Comodo File Verdict Service that runs tens of different methods to analyze a file and display the detailed results in seconds – PowerPoint PPT presentation

Number of Views:9

less

Transcript and Presenter's Notes

Title: Advanced Thrad analysis System


1
Introduction to Comodo Valkyrie
  • Valkyrie is an online document decision framework
    that tests obscure records with a scope of static
    and behavioral checks so as to distinguish those
    that are pernicious. Since Valkyrie breaks down
    the whole run-time conduct of a record, it is
    more successful at identifying zero-day dangers
    missed by the mark based identification
    frameworks of exemplary antivirus items.
  • The Valkyrie support enables clients to transfer
    new documents for examination and to see check
    brings about a scope of dashboards and reports.
    Clients additionally have the choice to forward
    records Comodo Labs for top to bottom, human
    master checks. The Comodo Unknown File Hunter
    apparatus enables clients to locally check whole
    systems for obscure documents at that point
    transfer them to Valkyrie for investigation.
  • Read More https//valkyrie.comodo.com/?af10110

2
(No Transcript)
3
Features
  • No installation required, just upload files for
    analysis
  • Automated and human expert analysis (optional) of
    submitted files
  • Comprehensive reporting and dashboards
  • Overview of the Technologies
  • Valkyrie investigation frameworks comprise of
    numerous systems to guarantee every last record
    submitted is broke down altogether before giving
    the decision. Keeping in mind the end goal to do
    that Valkyrie sends two sorts of advances -
    Automatic investigation and Human Expert
    examination. The methods utilized for programmed
    investigation incorporate Static Analysis,
    Dynamic Analysis, Valkyrie Plugins and Embedded
    Detectors, Signature Based Detection, Trusted
    Vendor and Certificate Validation, Reputation
    System and Big Data VirusScope Analysis System.

4
Static Analysis
  • This strategy includes extraction and examination
    of different twofold highlights and static
    behavioral derivations of an executable, for
    example, API headers, alluded DLLs, PE areas and
    all the more such assets. Any deviation from the
    normal outcomes are recorded in the static
    investigation comes about and the decision given
    as needs be.
  • Dynamic Analysis
  • The dynamic examination method incorporate
    concentrate the run time conduct of a record to
    recognize malware designs that can't be
    distinguished through static investigation.

5
Valkyrie Plugins and Embedded Detectors
  • Valkyrie modules uses the distinctive malware
    examination strategies created by different
    groups and instructive foundations and sent by
    them on their frameworks as RESTful Web Services.
    Valkyrie incorporates these outcomes additionally
    to register a last general decision.
  • Inserted finders in Valkyrie utilizes new
    strategies for malware location created by Comodo
    AV lab to process a general last decision of a
    document.
  • Signature Based Detection
  • Valkyrie utilizes diverse mark based discovery
    sources with a specific end goal to distinguish a
    given example in any case. Mark based
    identification just checks SHA1 hash of documents
    from signature sources to decide whether there is
    any match in database.

6
Trusted Vendor and Certificate Validation
  • Valkyrie checks seller subtle elements of a
    document with Trusted Vendor database that are
    consistently refreshed. In the event that the
    merchant is whitelisted, at that point
    authentication approval is done to guarantee that
    endorsement chain is legitimate and not
    repudiated or lapsed.
  • Reputation System
  • Notoriety information of documents that are
    gathered from a great many endpoints through
    Comodo system and items are assessed on a major
    information stage and changed over to knowledge
    frame to be utilized by Valkyrie.

7
Big Data VirusScope Analysis System
  • VirusScope, a piece of Comodo Security items, is
    a dynamic application analyzer framework that
    distinguishes vindictive conduct of a record,
    squares and inverts those activities when
    essential. The distinguished malware are
    accounted for to Comodo servers and this
    information is additionally utilized by Valkyrie.
  • Human Expert Analysis
  • Valkyrie framework incorporates accommodation of
    documents by clients for manual examination.
    Comodo master examination, which comprises of the
    most modern investigation of a record and gives a
    definitive decision of the document.
Write a Comment
User Comments (0)
About PowerShow.com