12.07.2015 Views

Antivirus Myths and Facts - Commtouch

Antivirus Myths and Facts - Commtouch

Antivirus Myths and Facts - Commtouch

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Antivirus</strong> <strong>Myths</strong> <strong>and</strong> <strong>Facts</strong>\Myth: <strong>Antivirus</strong> software can only detect specific, known viruses1 0 1 0 0 0 1 0 0 1 1 1 1 0 0 1 01 0 0 1 1 1 1 0 0 1 1 0 1 0 0 0 11 1 0 0 1 1 0 1 0 0 0 1 0 0 1 1 01 0 0 1 1 1 1 0 VIRUS 11 0 1 0 0 0 1 0 0 1 1 1 1 0 0 1 01 1 0 0 1 1 0 1 0 0 0 1 0 0 1 1 11 0 1 0 0 0 1 0 0 1 1 1 1 0 0 1 01 0 1 0 0 0 1 0 0 1 1 1 1 0 0 1 01 1 0 0 1 1 0 1 0 0 0 1 0 0 1 1 0Fact: In the very early days of antivirus technology – around thelate ‘80s to early ‘90s – antivirus solutions were designed to detectknown malware. This solution was sufficient due to the length ofattacks, which could last weeks or months; the relatively few numberof viruses; the slow propagation of viruses, mostly via infected files<strong>and</strong> floppy disks (the Web as we know it today was not yet born).The world today is very different, with attacks lasting hours or minutes,tens of thous<strong>and</strong>s of new variants every day <strong>and</strong> widespread access tothe Web. These factors mean millions of users can be exposed to viruses in an instant. To deal with thisthreat, most antivirus engines today use a variety of approaches <strong>and</strong> technologies to detect malware,especially as-yet-unseen malware. The technologies used by antivirus solutions can be roughly categorizedinto two types: reactive <strong>and</strong> proactive.The more basic, reactive, approach to malware detection consists of using a hash or fingerprint of aninfected file. Detection is almost always exact, meaning it is an almost sure way to detect a malicioussample. It can provide an exact match between a malware or malwarefamily <strong>and</strong> its antivirus signature, which simplifies the malware cleanupprocess in the case of infection. However, due to the huge volume ofmalware prevalent today, exclusive use of signature-based detection isno longer feasible. Since every type of malware needs its ownsignature, definition file updates end up being too large, resulting inineffective use of available resources. In addition, creation ofsignatures can often take too much time to be effective.A more advanced, proactive, approach to virus detection is commonlyreferred to as heuristics. Heuristics can include a combination oftechniques such as computer instruction emulation, detection of codebehavior, rules, malicious links, etc. In essence it is behavior-basedtechnology. As part of these methods <strong>and</strong> rules, a heuristic engineMost antivirusproducts today usea combination ofreactive <strong>and</strong>proactivetechnologiesassigns scores to information <strong>and</strong> behavior found in the file. If a score exceeds a certain level, the engineindicates that malware has been detected. The advantage of this technology is that it is by nature proactive,<strong>and</strong> in most cases does not require a definition file update. Heuristic detection, however, is not exact,meaning that the chance for a false positive (incorrect identification as malware) is greater than withsignatures.To ensure the most accurate virus detection, most antivirus products today use a combination of reactive <strong>and</strong>proactive technologies – signature/fingerprint/hash approaches <strong>and</strong> heuristics – in order to take advantageof each one’s strengths <strong>and</strong> minimize weaknesses. There is, however, a general trend towards increased useof heuristics, due to their capability of early detection as well as their speed.Testing the proactive capabilities of an antivirus is best done with the most recent virus sets. Some testingorganizations actually disable the signature update capabilities of an antivirus in order to evaluate itsdetection of these newer viruses (one week old) for which it has not yet downloaded signatures.Page| 3blog.commtouch.comwww.commtouch.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!