09.02.2015 Views

Platinum Product Test Report Kaspersky Lab Anti ... - West Coast Labs

Platinum Product Test Report Kaspersky Lab Anti ... - West Coast Labs

Platinum Product Test Report Kaspersky Lab Anti ... - West Coast Labs

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Kaspersky</strong> <strong>Lab</strong> <strong>Product</strong> Performance<br />

Validation <strong>Test</strong>ing & Certification<br />

Malware <strong>Test</strong> Suites<br />

<strong>West</strong> <strong>Coast</strong> <strong>Lab</strong>s puts considerable effort into ensuring the relevance of samples<br />

used in testing.<br />

There are three key components to this process. The company’s research facilities<br />

continuously monitor the malware attacks and intercept attempts to attack the<br />

corporate network of a global company with thousands of users spread over 4<br />

continents.<br />

WCL also has the advantage of an international system of honeypots, machines<br />

based in many countries on most continents that sit on open networks waiting to be<br />

attacked. When attacks occur the malware is intercepted and reported back to a<br />

central repository, where it is de-duped, checked for corruption and validity, stored<br />

and can then be used as a sample for testing products.<br />

In the Real Time <strong>Test</strong>ing System, which forms one component of the Checkmark<br />

<strong>Platinum</strong> <strong>Product</strong> Award, the malware is sent through the test network almost<br />

immediately and is subsequently considered to be eligible for inclusion in other test<br />

collections.<br />

Another method of collection and validation is through honeyclients. Located in<br />

Europe, Asia and the USA, these are systems designed to trawl the Internet to<br />

discover “drive-by downloads” (where malware is downloaded in the background<br />

unknown to the user who is looking at an otherwise perfectly acceptable web site),<br />

and to download files by visiting these websites and capturing the output. Again, this<br />

malware is sent through the Real Time system almost immediately and is eligible for<br />

inclusion in other collections.<br />

Page 33 of 40

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!