Security Response A False Positive Prevention Framework for Non-Heuristic Anti-Virus Signatures
نویسنده
چکیده
False positives, the erroneous detection of clean files, have been referred to as the Achilles heel of the anti-virus industry. Some believe the problem false positives represent is growing. This belief is likely underpinned by the growth in anti-virus signatures, due to the exponential growth in malicious code over the past 2 years, and the corresponding impact this invariably has on false positives. False positives can have a serious impact on users (system downtime, data loss) and on the anti-virus vendor responsible (damage to brand). This research attempts to identify the root cause of false positives from non-heuristic anti-virus signatures. Nonheuristic signatures are characterised as being re-active and written in response to a known threat. These signatures are also referred to as fingerprints or pattern files. Non-heuristic technology itself is the most pervasive technology used by anti-virus vendors since the industry’s inception over 20 years ago. Using the available literature and root cause data from a secondary data source at Symantec, in tandem with qualitative data from interviews, the research looks at developing a framework for preventing false positives from non-heuristic signatures. A case study was used to investigate and collect data. The context of this study is specific to Symantec. To determine the root causes data will be leveraged from a key system in Symantec called the False Positive Logging System (FPLS). Other qualitative data will be solicited through semi-structured interviews with domain experts within Symantec’s Security Technology and Response (STAR) organisation. This study shows that legacy solutions to address false positives at Symantec were traditionally aimed at the ‘detection’ of false positives. However solutions based around the ‘prevention’ of false positives are more efficient. These solutions trigger far earlier in the signature generation lifecycle. Most importantly defect prevention directly targets the leading cause of false positives as identified by this study. A defect prevention approach is also supported by previous work and standards such as the Defect Prevention Process (DPP) and the Capability Maturity Model Integration (CMMI). In essence the research proposes structural change of signature generation processes at Symantec. A False Positive Prevention Framework for Non-Heuristic Anti-Virus Signatures Page 3 Security Response
منابع مشابه
Risk of Hepatitis C Virus transmission Following Upper Gastrointestinal Endoscopy
Background: Hepatitis C virus infection (HCV) is a main health problem in our country. It is thought that the transmission of hepatitis C virus (HCV) through the endoscopic procedures is a rare event. The aim of this study was to evaluate the risk of conventional disinfection in the transmission of HCV. Materials and methods: A prospective study, comprising 456 consecutive upper gastrointestin...
متن کاملAutomatic Extraction of Computer Virus
One way that anti-virus programs identify the presence of a virus in an executable le, a boot record, or memory is by using short identiiers called signatures, which consist of sequences of bytes in the machine code of the virus. A good signature is one that is found in every object infected by the virus, but is unlikely to be found if the virus is not present; i.e. the likelihood of both false...
متن کاملToward an Evidence-based Design for Reactive Security Policies and Mechanisms
As malware, exploits, and cyber-attacks advance over time, so does the mitigation techniques available to the user. However, while attackers often abandon one form of exploitation in favor of a more lucrative one, mitigation techniques are rarely abandoned. Mitigations are rarely retired or disabled since proving they have outlived their usefulness is often impossible. As a result, performance ...
متن کاملTrapping and Tracking Hackers: Collective security for survival in the Internet age
Problems arise because these tools are too often expected to provide broader coverage than their designs permit. The limitations of "prevention" tools are that (1) there is typically a large gap in time between the identification of the vulnerability and the availability of the solution, and (2) partial and faulty deployment resulting in gaps in coverage. Tools for response to individual attack...
متن کاملAn Architecture for Generating Semantic Aware Signatures
Identifying new intrusion exploits and developing effective detection signatures for them is essential for protecting computer networks. We present Nemean, a system for automatic generation of intrusion signatures from honeynet packet traces. Our architecture is distinguished by its emphasis on a modular design framework that encourages independent development and modification of system compone...
متن کامل