SlideShare une entreprise Scribd logo
1  sur  57
Télécharger pour lire hors ligne
Introduction
                          Heuristic scanning theory
       Case Study: Modern heuristic scanner features
                                           Summary
                                   Further reading...




                    Artificial Intelligence Methods in
                     Virus Detection & Recognition
                           Introduction to heuristic scanning


                                     Wojciech Podg´rski
                                                  o
                                        http://podgorski.wordpress.com




                                         October 16, 2008



Wojciech Podg´rski http://podgorski.wordpress.com
             o                                            Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                            Heuristic scanning theory
         Case Study: Modern heuristic scanner features
                                             Summary
                                     Further reading...


Presentation outline
  1   Introduction
         Fundamentals of malware
         Metaheuristics in Virus Detection & Recognition
  2   Heuristic scanning theory
         Lacks in specific detection
         Heuristic scanning conception
         Recognizing potential threat
         Coping with anti-heuristic mechanisms
         Towards accuracy improvement
  3   Case Study: Modern heuristic scanner features
         Panda’s Technology Evolution
         Genetic Heuristic Engine - Nereus
  4   Summary
  5   Further reading...
  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                          Heuristic scanning theory
                                                        Fundamentals of malware
       Case Study: Modern heuristic scanner features
                                                        Metaheuristics in Virus Detection & Recognition
                                           Summary
                                   Further reading...




Malware
Malware (malicious software) is software designed to infiltrate or
damage a computer system without the owner’s informed consent.
                                                               Source: http://en.wikipedia.org/wiki/Malware




Wojciech Podg´rski http://podgorski.wordpress.com
             o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                            Heuristic scanning theory
                                                          Fundamentals of malware
         Case Study: Modern heuristic scanner features
                                                          Metaheuristics in Virus Detection & Recognition
                                             Summary
                                     Further reading...


Malware types
  We can distinguish quite few malicious software types. It is important to
  be aware that nevertheless all of them have similar purpose, each one
  behave differently.
         Viruses
         Worms
         Wabbits
         Trojan horses
         Exploits/Backdoors
         Spyware/Scumware/Stealware/Parasiteware/Adware
         Rootkits
         Keyloggers/Dialers
         Hoaxes
  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                            Heuristic scanning theory
                                                          Fundamentals of malware
         Case Study: Modern heuristic scanner features
                                                          Metaheuristics in Virus Detection & Recognition
                                             Summary
                                     Further reading...


Malware = Viruses



  Due to different behaviour, each malware group uses alternative
  ways of being undetected. This forces anti-virus software
  producers to develop numerous solutions and countermeasures for
  computer protection.

  This presentation focuses on methods used especially for virus
  detection, not necessarily effective against other types of
  malicious software.




  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                            Heuristic scanning theory
                                                          Fundamentals of malware
         Case Study: Modern heuristic scanner features
                                                          Metaheuristics in Virus Detection & Recognition
                                             Summary
                                     Further reading...


Infection strategies

  To better understand how viruses are detected and recognized, it is
  essential to divide them by their infection ways.
         Nonresident viruses The simplest form of viruses which
         don’t stay in memory, but infect founded executable file and
         search for another to replicate.
         Resident viruses More complex and efficient type of viruses
         which stay in memory and hide their presence from other
         processes. Kind of TSR apps.
                 Fast infectors Type which is designed to infect as many files as
                 possible.
                 Slow infectors Using stealth and encryption techniques to stay
                 undetected outlast.


  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                            Heuristic scanning theory
                                                          Fundamentals of malware
         Case Study: Modern heuristic scanner features
                                                          Metaheuristics in Virus Detection & Recognition
                                             Summary
                                     Further reading...


Infection strategies

  To better understand how viruses are detected and recognized, it is
  essential to divide them by their infection ways.
         Nonresident viruses The simplest form of viruses which
         don’t stay in memory, but infect founded executable file and
         search for another to replicate.
         Resident viruses More complex and efficient type of viruses
         which stay in memory and hide their presence from other
         processes. Kind of TSR apps.
                 Fast infectors Type which is designed to infect as many files as
                 possible.
                 Slow infectors Using stealth and encryption techniques to stay
                 undetected outlast.


  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                            Heuristic scanning theory
                                                          Fundamentals of malware
         Case Study: Modern heuristic scanner features
                                                          Metaheuristics in Virus Detection & Recognition
                                             Summary
                                     Further reading...


Infection strategies

  To better understand how viruses are detected and recognized, it is
  essential to divide them by their infection ways.
         Nonresident viruses The simplest form of viruses which
         don’t stay in memory, but infect founded executable file and
         search for another to replicate.
         Resident viruses More complex and efficient type of viruses
         which stay in memory and hide their presence from other
         processes. Kind of TSR apps.
                 Fast infectors Type which is designed to infect as many files as
                 possible.
                 Slow infectors Using stealth and encryption techniques to stay
                 undetected outlast.


  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                            Heuristic scanning theory
                                                          Fundamentals of malware
         Case Study: Modern heuristic scanner features
                                                          Metaheuristics in Virus Detection & Recognition
                                             Summary
                                     Further reading...


Infection strategies

  To better understand how viruses are detected and recognized, it is
  essential to divide them by their infection ways.
         Nonresident viruses The simplest form of viruses which
         don’t stay in memory, but infect founded executable file and
         search for another to replicate.
         Resident viruses More complex and efficient type of viruses
         which stay in memory and hide their presence from other
         processes. Kind of TSR apps.
                 Fast infectors Type which is designed to infect as many files as
                 possible.
                 Slow infectors Using stealth and encryption techniques to stay
                 undetected outlast.


  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                          Heuristic scanning theory
                                                        Fundamentals of malware
       Case Study: Modern heuristic scanner features
                                                        Metaheuristics in Virus Detection & Recognition
                                           Summary
                                   Further reading...




Metaheuristic
Metaheuristic is a heuristic method for solving a very general class of
computational problems by combining user-given black-box procedures
in a hopefully efficient way. Metaheuristics are generally applied to
problems for which there is no satisfactory problem-specific algorithm
or heuristic.
                                                          Source: http://en.wikipedia.org/wiki/Metaheuristic



Heuristic
Heuristic is a method to help solve a problem, commonly an informal
method. It is particularly used to rapidly come to a solution that is
reasonably close to the best possible answer, or ’optimal solution’...
                                                               Source: http://en.wikipedia.org/wiki/Heuristic




Wojciech Podg´rski http://podgorski.wordpress.com
             o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                            Heuristic scanning theory
                                                          Fundamentals of malware
         Case Study: Modern heuristic scanner features
                                                          Metaheuristics in Virus Detection & Recognition
                                             Summary
                                     Further reading...


General metaheuristics

  It is important to remember that metaheuristics are only ’ideas’ to
  solve a problem not a specific way to do that. List below shows
  main metaheuristics used for virus detection and recognition:
         Pattern matching
         Automatic learning
         Environment emulation
         Neural networks
         Data mining
         Bayes networks
         Hidden Markov models
  and other...

  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                            Heuristic scanning theory
                                                          Fundamentals of malware
         Case Study: Modern heuristic scanner features
                                                          Metaheuristics in Virus Detection & Recognition
                                             Summary
                                     Further reading...


General metaheuristics

  It is important to remember that metaheuristics are only ’ideas’ to
  solve a problem not a specific way to do that. List below shows
  main metaheuristics used for virus detection and recognition:
         Pattern matching
         Automatic learning
         Environment emulation
         Neural networks
         Data mining
         Bayes networks
         Hidden Markov models
  and other...

  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                            Heuristic scanning theory
                                                          Fundamentals of malware
         Case Study: Modern heuristic scanner features
                                                          Metaheuristics in Virus Detection & Recognition
                                             Summary
                                     Further reading...


General metaheuristics

  It is important to remember that metaheuristics are only ’ideas’ to
  solve a problem not a specific way to do that. List below shows
  main metaheuristics used for virus detection and recognition:
         Pattern matching
         Automatic learning
         Environment emulation
         Neural networks
         Data mining
         Bayes networks
         Hidden Markov models
  and other...

  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                            Heuristic scanning theory
                                                          Fundamentals of malware
         Case Study: Modern heuristic scanner features
                                                          Metaheuristics in Virus Detection & Recognition
                                             Summary
                                     Further reading...


General metaheuristics

  It is important to remember that metaheuristics are only ’ideas’ to
  solve a problem not a specific way to do that. List below shows
  main metaheuristics used for virus detection and recognition:
         Pattern matching
         Automatic learning
         Environment emulation
         Neural networks
         Data mining
         Bayes networks
         Hidden Markov models
  and other...

  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                            Heuristic scanning theory
                                                          Fundamentals of malware
         Case Study: Modern heuristic scanner features
                                                          Metaheuristics in Virus Detection & Recognition
                                             Summary
                                     Further reading...


General metaheuristics

  It is important to remember that metaheuristics are only ’ideas’ to
  solve a problem not a specific way to do that. List below shows
  main metaheuristics used for virus detection and recognition:
         Pattern matching
         Automatic learning
         Environment emulation
         Neural networks
         Data mining
         Bayes networks
         Hidden Markov models
  and other...

  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                            Heuristic scanning theory
                                                          Fundamentals of malware
         Case Study: Modern heuristic scanner features
                                                          Metaheuristics in Virus Detection & Recognition
                                             Summary
                                     Further reading...


General metaheuristics

  It is important to remember that metaheuristics are only ’ideas’ to
  solve a problem not a specific way to do that. List below shows
  main metaheuristics used for virus detection and recognition:
         Pattern matching
         Automatic learning
         Environment emulation
         Neural networks
         Data mining
         Bayes networks
         Hidden Markov models
  and other...

  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                            Heuristic scanning theory
                                                          Fundamentals of malware
         Case Study: Modern heuristic scanner features
                                                          Metaheuristics in Virus Detection & Recognition
                                             Summary
                                     Further reading...


General metaheuristics

  It is important to remember that metaheuristics are only ’ideas’ to
  solve a problem not a specific way to do that. List below shows
  main metaheuristics used for virus detection and recognition:
         Pattern matching
         Automatic learning
         Environment emulation
         Neural networks
         Data mining
         Bayes networks
         Hidden Markov models
  and other...

  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                            Heuristic scanning theory
                                                          Fundamentals of malware
         Case Study: Modern heuristic scanner features
                                                          Metaheuristics in Virus Detection & Recognition
                                             Summary
                                     Further reading...


General metaheuristics

  It is important to remember that metaheuristics are only ’ideas’ to
  solve a problem not a specific way to do that. List below shows
  main metaheuristics used for virus detection and recognition:
         Pattern matching
         Automatic learning
         Environment emulation
         Neural networks
         Data mining
         Bayes networks
         Hidden Markov models
  and other...

  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                            Heuristic scanning theory
                                                          Fundamentals of malware
         Case Study: Modern heuristic scanner features
                                                          Metaheuristics in Virus Detection & Recognition
                                             Summary
                                     Further reading...


Concrete heuristics

  Specific heuristics practically used in virus detection and
  recognition, are naturally inherited from metaheuristics.
  And so, for example concrete method for virus detection using
  neural networks can be implementation of SOM (Self Organizing
  Map).


      Neural Networks (metaheuristic) → SOM (heuristic)


  The most popular, and one of most efficient heuristic used by
  anti-virus software is technique called Heuristic Scanning.


  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Lacks in specific detection I

  Great deal of modern viruses are only slightly changed versions of
  few conceptions developed years ago. Specific detection methods
  like signature scanning became very efficient ways of detecting
  known threats. Finding specific signature in code allows scanner to
  recognize every virus which signature has been stored in built-in
  database.


       BB ?2 B9 10 01 81 37 ?2 81 77 02 ?2 83 C3 04 E2 F2

                                                     FireFly virus signature(hexadecimal)



  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction      Lacks in specific detection
                            Heuristic scanning theory       Heuristic scanning conception
         Case Study: Modern heuristic scanner features      Recognizing potential threat
                                             Summary        Coping with anti-heuristic mechanisms
                                     Further reading...     Towards accuracy improvement


Lacks in specific detection II


  Problem occurs when virus source is changed by a programmer or
  mutation engine. Signature is being malformed due to even minor
  changes. Virus may behave in an exactly same way but is
  undetectable due to new, unique signature.


      BB ?2 B9 10 01 81 37 ?2 81 A1 D3 ?2 01 C3 04 E2 F2

                                                          Malformed signature(hexadecimal)




  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                            Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Heuristic scanning conception I




  Q:    How to recognize a virus without any knowledge about its
  internal structure?




  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Heuristic scanning conception I




  Q:    How to recognize a virus without any knowledge about its
  internal structure?

  A:      By examining its behaviour and characteristics.




  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Heuristic scanning conception II


  Heuristic scanning in its basic form is implementation of three
  metaheuristics:

     1   Pattern matching
     2   Automatic learning
     3   Environment emulation

  Of course modern solutions provide more functionalities but
  principle stays the same.



  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Heuristic scanning conception II


  Heuristic scanning in its basic form is implementation of three
  metaheuristics:

     1   Pattern matching
     2   Automatic learning
     3   Environment emulation

  Of course modern solutions provide more functionalities but
  principle stays the same.



  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Heuristic scanning conception II


  Heuristic scanning in its basic form is implementation of three
  metaheuristics:

     1   Pattern matching
     2   Automatic learning
     3   Environment emulation

  Of course modern solutions provide more functionalities but
  principle stays the same.



  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Heuristic scanning conception II


  Heuristic scanning in its basic form is implementation of three
  metaheuristics:

     1   Pattern matching
     2   Automatic learning
     3   Environment emulation

  Of course modern solutions provide more functionalities but
  principle stays the same.



  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Heuristic scanning conception III

  The basic idea of heuristic scanning is to examine assembly
  language instruction sequences(step-by-step) and qualify them by
  their potential harmfulness. If there are sequences behaving
  suspiciously, program can be qualified as a virus. The phenomenon
  of this method is that it actually detects threats that aren’t yet
  known!




  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Recognizing potential threat I


  In real anti-virus software, heuristic scanning is implemented to recognize
  threats by following built-in rules, e.g. if program tries to format hard
  drive its behaviour is highly suspicious but it can be only simple disk
  utility. Singular suspicion is never a reason to trigger the alarm. But
  if the same program also tries to stay resident and contains routine to
  search for executables, it is highly probable that it’s a real virus. AV
  software very often classifies sequences by their behaviour granting them
  a flag. Every flag has its weight, if total values for one program
  exceeds a predefined threshold, scanner regards it as virus.




  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Heuristic Scanning as artificial neuron




                   Figure: Single-layer classifier with threshold                    From [1]




  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Recognizing potential threat II




                          Figure: TbScan 6.02 heuristic flags                  From [3]




     For instance Jerusalem/PLO virus would raise FRLMUZ flags.



  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction      Lacks in specific detection
                            Heuristic scanning theory       Heuristic scanning conception
         Case Study: Modern heuristic scanner features      Recognizing potential threat
                                             Summary        Coping with anti-heuristic mechanisms
                                     Further reading...     Towards accuracy improvement


Malware evolves
  After presenting specific scanning to AV software, malware authors were
  obligated to introduce new techniques of being undetected. Beside of
  polymorphism and mutation engines viruses started to use various
  stealth techniques which basically hooked interrupts and took control
  over them. This allowed them to be invisible for traditional scanner.
  Moreover, most of them started using real-time encryption which made
  them look like totally harmless program.




            Figure: Virus evolution chain                 [Source http://searchsecurity.techtarget.com]



  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                            Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Pattern matching is not enough

  Mixing stealth techniques with encryption and anti-heuristic sequences
  (code obfuscated by meaningless instructions) allowed viruses to be
  unseen even by signature and heuristic scanning combined together.
  It was obvious that new solution was needed. The idea came from VM
  conceptions. Why not to create artificial runtime environment to let
  the virus do its job?
  Such approach found implementation in environment emulation
  engines, which became standard AV software weapon.




  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Virtual reality



  The idea of environment emulation is simple. Anti-virus program
  provides a virtual machine with independent operating system
  and allows virus to perform its routines. Behaviour and
  characteristics are being continuously examined, while virus is
  not aware that is working on a fake system.
  This leads to decryption routines and revealment of its true
  nature. Also stealth techniques are useless because whole VM is
  monitored by AV software.




  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


False positives & automatic learning


  HS as a heuristic method is only reasonably close to the best
  possible answer. In this case we can imagine that heuristic
  scanning will blame innocent programs for being potential threats.
  Such behaviour is called false positive
  We must be aware that program is right when rising alarm,
  because scanned app posses suspicious sequences, we can’t blame
  scanner for failure. So what can be done to avoid false positives?




  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


False positives & automatic learning


  HS as a heuristic method is only reasonably close to the best
  possible answer. In this case we can imagine that heuristic
  scanning will blame innocent programs for being potential threats.
  Such behaviour is called false positive
  We must be aware that program is right when rising alarm,
  because scanned app posses suspicious sequences, we can’t blame
  scanner for failure. So what can be done to avoid false positives?


                                    A:       Automatic learning!




  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Avoiding false positives & improving accuracy I


  Some applications, especially non-commercial ones, can raise false
  positive, because of their suspicious routines. e.g. UnHash v1.0
  through its encryption functionalities (used for finding hash
  collisions) almost every time is qualified as virus. What we can do
  to prevent it, is to:
     1   Let Monitor learn
         Teach AV monitor to recognize programs causing false
         positives. (requires advanced user)




  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Avoiding false positives & improving accuracy I


  Some applications, especially non-commercial ones, can raise false
  positive, because of their suspicious routines. e.g. UnHash v1.0
  through its encryption functionalities (used for finding hash
  collisions) almost every time is qualified as virus. What we can do
  to prevent it, is to:
     1   Let Monitor learn
         Teach AV monitor to recognize programs causing false
         positives. (requires advanced user)




  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Avoiding false positives & improving accuracy II

     2   Set proper scanning depth
         Configure Monitor with suitable heuristic scanning depth by
         manipulating threshold computed from flag weights.
     3   Assume that machine is not infected
         Some AV software can scan through computer knowing it’s
         clean and learn which programs are false positives.
     4   Combine scanning techniques
         Combine multiple scanning techniques to exclude potential
         false positives.
     5   Perform scan as often as possible
         Knowing what’s going on is essential...


  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Avoiding false positives & improving accuracy II

     2   Set proper scanning depth
         Configure Monitor with suitable heuristic scanning depth by
         manipulating threshold computed from flag weights.
     3   Assume that machine is not infected
         Some AV software can scan through computer knowing it’s
         clean and learn which programs are false positives.
     4   Combine scanning techniques
         Combine multiple scanning techniques to exclude potential
         false positives.
     5   Perform scan as often as possible
         Knowing what’s going on is essential...


  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Avoiding false positives & improving accuracy II

     2   Set proper scanning depth
         Configure Monitor with suitable heuristic scanning depth by
         manipulating threshold computed from flag weights.
     3   Assume that machine is not infected
         Some AV software can scan through computer knowing it’s
         clean and learn which programs are false positives.
     4   Combine scanning techniques
         Combine multiple scanning techniques to exclude potential
         false positives.
     5   Perform scan as often as possible
         Knowing what’s going on is essential...


  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Avoiding false positives & improving accuracy II

     2   Set proper scanning depth
         Configure Monitor with suitable heuristic scanning depth by
         manipulating threshold computed from flag weights.
     3   Assume that machine is not infected
         Some AV software can scan through computer knowing it’s
         clean and learn which programs are false positives.
     4   Combine scanning techniques
         Combine multiple scanning techniques to exclude potential
         false positives.
     5   Perform scan as often as possible
         Knowing what’s going on is essential...


  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Avoiding false positives & improving accuracy II

     2   Set proper scanning depth
         Configure Monitor with suitable heuristic scanning depth by
         manipulating threshold computed from flag weights.
     3   Assume that machine is not infected
         Some AV software can scan through computer knowing it’s
         clean and learn which programs are false positives.
     4   Combine scanning techniques
         Combine multiple scanning techniques to exclude potential
         false positives.
     5   Perform scan as often as possible
         Knowing what’s going on is essential...


  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                          Heuristic scanning theory
                                                        Panda’s Technology Evolution
       Case Study: Modern heuristic scanner features
                                                        Genetic Heuristic Engine - Nereus
                                           Summary
                                   Further reading...




                      Presenting Panda Security solutions




Wojciech Podg´rski http://podgorski.wordpress.com
             o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                          Heuristic scanning theory
                                                        Panda’s Technology Evolution
       Case Study: Modern heuristic scanner features
                                                        Genetic Heuristic Engine - Nereus
                                           Summary
                                   Further reading...




Modern Panda Security solutions belong to the third generation
AV software.
       First Generation: Antivirus
       From 1990’s, signature scanning including polymorphic virus
       recognition. Primitive heuristics.
       Second Generation: Antimalware
       From 2000, integrated firewall, anti-malware engine.
       Third Generation: Proactive Technologies
       From 2004, TruPrevent R , genetic and rootkit heuristics,
       behavioral analysis and blocking, uncloaking techniques,
       generic unpacking



Wojciech Podg´rski http://podgorski.wordpress.com
             o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                          Heuristic scanning theory
                                                        Panda’s Technology Evolution
       Case Study: Modern heuristic scanner features
                                                        Genetic Heuristic Engine - Nereus
                                           Summary
                                   Further reading...




Modern Panda Security solutions belong to the third generation
AV software.
       First Generation: Antivirus
       From 1990’s, signature scanning including polymorphic virus
       recognition. Primitive heuristics.
       Second Generation: Antimalware
       From 2000, integrated firewall, anti-malware engine.
       Third Generation: Proactive Technologies
       From 2004, TruPrevent R , genetic and rootkit heuristics,
       behavioral analysis and blocking, uncloaking techniques,
       generic unpacking



Wojciech Podg´rski http://podgorski.wordpress.com
             o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                          Heuristic scanning theory
                                                        Panda’s Technology Evolution
       Case Study: Modern heuristic scanner features
                                                        Genetic Heuristic Engine - Nereus
                                           Summary
                                   Further reading...




Modern Panda Security solutions belong to the third generation
AV software.
       First Generation: Antivirus
       From 1990’s, signature scanning including polymorphic virus
       recognition. Primitive heuristics.
       Second Generation: Antimalware
       From 2000, integrated firewall, anti-malware engine.
       Third Generation: Proactive Technologies
       From 2004, TruPrevent R , genetic and rootkit heuristics,
       behavioral analysis and blocking, uncloaking techniques,
       generic unpacking



Wojciech Podg´rski http://podgorski.wordpress.com
             o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                          Heuristic scanning theory
                                                        Panda’s Technology Evolution
       Case Study: Modern heuristic scanner features
                                                        Genetic Heuristic Engine - Nereus
                                           Summary
                                   Further reading...




Modern Panda Security solutions belong to the third generation
AV software.
       First Generation: Antivirus
       From 1990’s, signature scanning including polymorphic virus
       recognition. Primitive heuristics.
       Second Generation: Antimalware
       From 2000, integrated firewall, anti-malware engine.
       Third Generation: Proactive Technologies
       From 2004, TruPrevent R , genetic and rootkit heuristics,
       behavioral analysis and blocking, uncloaking techniques,
       generic unpacking



Wojciech Podg´rski http://podgorski.wordpress.com
             o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                          Heuristic scanning theory
                                                        Panda’s Technology Evolution
       Case Study: Modern heuristic scanner features
                                                        Genetic Heuristic Engine - Nereus
                                           Summary
                                   Further reading...




Modern Panda Security solutions belong to the third generation
AV software.
       First Generation: Antivirus
       From 1990’s, signature scanning including polymorphic virus
       recognition. Primitive heuristics.
       Second Generation: Antimalware
       From 2000, integrated firewall, anti-malware engine.
       Third Generation: Proactive Technologies
       From 2004, TruPrevent R , genetic and rootkit heuristics,
       behavioral analysis and blocking, uncloaking techniques,
       generic unpacking



Wojciech Podg´rski http://podgorski.wordpress.com
             o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                          Heuristic scanning theory
                                                        Panda’s Technology Evolution
       Case Study: Modern heuristic scanner features
                                                        Genetic Heuristic Engine - Nereus
                                           Summary
                                   Further reading...




Genetic Heuristic Engine, codename: Nereus was initially released in
2005. The innovation connected with Nereus rely on idea inspired by the
field of genetics and its usefulness to understand how organisms are
individually identified and associated to other organisms. Features:
       More than few hundred characteristics of each file that is scanned
       Complex malware recognition (type determination)
       Rootkit heuristics (time based analysis)
       Generic packer detectors and generic unpacking algorithms
       New threat automatic notification
       Automatic creation of detection and disinfection signatures for
       samples previously analyzed by processing and classification module



Wojciech Podg´rski http://podgorski.wordpress.com
             o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                          Heuristic scanning theory
                                                        Panda’s Technology Evolution
       Case Study: Modern heuristic scanner features
                                                        Genetic Heuristic Engine - Nereus
                                           Summary
                                   Further reading...




                Figure: Panda’s integrated endpoint security                       From [6]




Wojciech Podg´rski http://podgorski.wordpress.com
             o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                          Heuristic scanning theory
       Case Study: Modern heuristic scanner features
                                           Summary
                                   Further reading...



Heuristic scanning is the most popular heuristic method for virus
detection and recognition. Basically it is inherited from combination of
pattern matching, automatic learning and environment emulation
metaheuristics. As a heuristic method it’s not 100% effective. So why do
we apply HS?

Pros
       Can detect ’future’ threats
       User is less dependent on product update
       Improves conventional scanning results
Cons
       False positives
       Making decision after alarm requires knowledge


Wojciech Podg´rski http://podgorski.wordpress.com
             o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                          Heuristic scanning theory
       Case Study: Modern heuristic scanner features
                                           Summary
                                   Further reading...




      Peter Szor
      The Art of Computer Virus Research and Defense
      Addison-Wesley Professional, 1st edition, February 2005

      Tomasz Andel, Krzysztof Zawadzki
      Techniki pisania wirus´w oraz antywirus´w
                            o                o
      Inynieria bezpiecze´stwa system´w sieciowych i internetowych, PWr
                         n           o
      Wroclaw 2008

      Frans Veldman
      Heuristic Anti-Virus Technology
      http://mirror.sweon.net/madchat/vxdevl/vdat/epheurs1.htm




Wojciech Podg´rski http://podgorski.wordpress.com
             o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                          Heuristic scanning theory
       Case Study: Modern heuristic scanner features
                                           Summary
                                   Further reading...




      Richard Zwienenberg
      Heuristic Scanners: Artificial Intelligence?
      http://mirror.sweon.net/madchat/vxdevl/vdat/epheurs2.htm

                ´
      edited by Eric Filiol
      Journal in Computer Virology
      Springer Paris, Volume 1-4
      http://www.springerlink.com/content/119769

      Panda Research
      From Traditional Antivirus to Collective Intelligence
      August 2007
      http://research.pandasecurity.com/




Wojciech Podg´rski http://podgorski.wordpress.com
             o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                          Heuristic scanning theory
       Case Study: Modern heuristic scanner features
                                           Summary
                                   Further reading...




      Various online knowledge repositories
      For starters it’s good to search wikipedia...
      VX Heavens http://vx.netlux.org/lib
      Breaking Business and Technology News https://silicon.com/
      IEEE http://ieeexplore.ieee.org/
      Zines: Phalcon/Skism: 40HEX, VLAD, VBB: Viruses Bits & Bytes,
      Immortal Riot: Insane Reality, NuKe: NuKe IntoJournal, Dark Angel
      VirGuide
      AND OTHER...




Wojciech Podg´rski http://podgorski.wordpress.com
             o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                          Heuristic scanning theory
       Case Study: Modern heuristic scanner features
                                           Summary
                                   Further reading...




Why?...


                                   Questions ?
                                                                                           What if?...




Wojciech Podg´rski http://podgorski.wordpress.com
             o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                          Heuristic scanning theory
       Case Study: Modern heuristic scanner features
                                           Summary
                                   Further reading...




                              THANK YOU



Wojciech Podg´rski http://podgorski.wordpress.com
             o                                          Artificial Intelligence Methods inVirus Detection & Recognition

Contenu connexe

Tendances

Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039Editor IJARCET
 
Anti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewskiAnti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewskiStonesoft
 
Enhancing Intrusion Detection System with Proximity Information
Enhancing Intrusion Detection System with Proximity InformationEnhancing Intrusion Detection System with Proximity Information
Enhancing Intrusion Detection System with Proximity InformationZhenyun Zhuang
 
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLSA SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLSIJNSA Journal
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection TechniquesEditor IJMTER
 
Cryptovirology: Virus Approach
Cryptovirology: Virus ApproachCryptovirology: Virus Approach
Cryptovirology: Virus ApproachIJNSA Journal
 
Malware classification using Machine Learning
Malware classification using Machine LearningMalware classification using Machine Learning
Malware classification using Machine LearningJapneet Singh
 
Malware Detection Using Machine Learning Techniques
Malware Detection Using Machine Learning TechniquesMalware Detection Using Machine Learning Techniques
Malware Detection Using Machine Learning TechniquesArshadRaja786
 
Malware Dectection Using Machine learning
Malware Dectection Using Machine learningMalware Dectection Using Machine learning
Malware Dectection Using Machine learningShubham Dubey
 
Malware classification and detection
Malware classification and detectionMalware classification and detection
Malware classification and detectionChong-Kuan Chen
 
Signature based virus detection and protection system
Signature based virus detection and protection systemSignature based virus detection and protection system
Signature based virus detection and protection systemMd. Hasan Basri (Angel)
 
website vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paperwebsite vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paperBhagyashri Chalakh
 
Malware Classification Using Structured Control Flow
Malware Classification Using Structured Control FlowMalware Classification Using Structured Control Flow
Malware Classification Using Structured Control FlowSilvio Cesare
 
MITRE ATT&CK framework
MITRE ATT&CK frameworkMITRE ATT&CK framework
MITRE ATT&CK frameworkBhushan Gurav
 
Novel Malware Clustering System Based on Kernel Data Structure
Novel Malware Clustering System Based on Kernel Data StructureNovel Malware Clustering System Based on Kernel Data Structure
Novel Malware Clustering System Based on Kernel Data Structureiosrjce
 
A trust system based on multi level virus detection
A trust system based on multi level virus detectionA trust system based on multi level virus detection
A trust system based on multi level virus detectionUltraUploader
 
A malware detection method for health sensor data based on machine learning
A malware detection method for health sensor data based on machine learningA malware detection method for health sensor data based on machine learning
A malware detection method for health sensor data based on machine learningjaigera
 

Tendances (19)

Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039
 
Anti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewskiAnti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewski
 
Enhancing Intrusion Detection System with Proximity Information
Enhancing Intrusion Detection System with Proximity InformationEnhancing Intrusion Detection System with Proximity Information
Enhancing Intrusion Detection System with Proximity Information
 
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLSA SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
 
Cryptovirology: Virus Approach
Cryptovirology: Virus ApproachCryptovirology: Virus Approach
Cryptovirology: Virus Approach
 
Malware classification using Machine Learning
Malware classification using Machine LearningMalware classification using Machine Learning
Malware classification using Machine Learning
 
Malware Detection Using Machine Learning Techniques
Malware Detection Using Machine Learning TechniquesMalware Detection Using Machine Learning Techniques
Malware Detection Using Machine Learning Techniques
 
57 slide presentation
57 slide presentation57 slide presentation
57 slide presentation
 
Antivirus
AntivirusAntivirus
Antivirus
 
Malware Dectection Using Machine learning
Malware Dectection Using Machine learningMalware Dectection Using Machine learning
Malware Dectection Using Machine learning
 
Malware classification and detection
Malware classification and detectionMalware classification and detection
Malware classification and detection
 
Signature based virus detection and protection system
Signature based virus detection and protection systemSignature based virus detection and protection system
Signature based virus detection and protection system
 
website vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paperwebsite vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paper
 
Malware Classification Using Structured Control Flow
Malware Classification Using Structured Control FlowMalware Classification Using Structured Control Flow
Malware Classification Using Structured Control Flow
 
MITRE ATT&CK framework
MITRE ATT&CK frameworkMITRE ATT&CK framework
MITRE ATT&CK framework
 
Novel Malware Clustering System Based on Kernel Data Structure
Novel Malware Clustering System Based on Kernel Data StructureNovel Malware Clustering System Based on Kernel Data Structure
Novel Malware Clustering System Based on Kernel Data Structure
 
A trust system based on multi level virus detection
A trust system based on multi level virus detectionA trust system based on multi level virus detection
A trust system based on multi level virus detection
 
A malware detection method for health sensor data based on machine learning
A malware detection method for health sensor data based on machine learningA malware detection method for health sensor data based on machine learning
A malware detection method for health sensor data based on machine learning
 

En vedette

Classification of Malware based on Data Mining Approach
Classification of Malware based on Data Mining ApproachClassification of Malware based on Data Mining Approach
Classification of Malware based on Data Mining Approachijsrd.com
 
Malicious Client Detection Using Machine Learning
Malicious Client Detection Using Machine LearningMalicious Client Detection Using Machine Learning
Malicious Client Detection Using Machine Learningsecurityxploded
 
AI approach to malware similarity analysis: Maping the malware genome with a...
AI approach to malware similarity analysis: Maping the  malware genome with a...AI approach to malware similarity analysis: Maping the  malware genome with a...
AI approach to malware similarity analysis: Maping the malware genome with a...Priyanka Aash
 
Detection of Malware Downloads via Graph Mining (AsiaCCS '16)
Detection of Malware Downloads via Graph Mining (AsiaCCS '16)Detection of Malware Downloads via Graph Mining (AsiaCCS '16)
Detection of Malware Downloads via Graph Mining (AsiaCCS '16)Marco Balduzzi
 
Understand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day ThreatsUnderstand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day ThreatsRahul Mohandas
 
Malware Analysis and Defeating using Virtual Machines
Malware Analysis and Defeating using Virtual MachinesMalware Analysis and Defeating using Virtual Machines
Malware Analysis and Defeating using Virtual Machinesintertelinvestigations
 
Malware detection software using a support vector machine as a classifier
Malware detection software using a support vector machine as a classifierMalware detection software using a support vector machine as a classifier
Malware detection software using a support vector machine as a classifierNicole Bili?
 
Ensembled Based Categorization and Adaptive Learning Model for Malware Detection
Ensembled Based Categorization and Adaptive Learning Model for Malware DetectionEnsembled Based Categorization and Adaptive Learning Model for Malware Detection
Ensembled Based Categorization and Adaptive Learning Model for Malware DetectionMuhammad Najmi Ahmad Zabidi
 
B-Sides Seattle 2012 Offensive Defense
B-Sides Seattle 2012 Offensive DefenseB-Sides Seattle 2012 Offensive Defense
B-Sides Seattle 2012 Offensive DefenseStephan Chenette
 
Malware Detection - A Machine Learning Perspective
Malware Detection - A Machine Learning PerspectiveMalware Detection - A Machine Learning Perspective
Malware Detection - A Machine Learning PerspectiveChong-Kuan Chen
 
Telecom Fraud Detection - Naive Bayes Classification
Telecom Fraud Detection - Naive Bayes ClassificationTelecom Fraud Detection - Naive Bayes Classification
Telecom Fraud Detection - Naive Bayes ClassificationMaruthi Nataraj K
 

En vedette (14)

Download It
Download ItDownload It
Download It
 
Classification of Malware based on Data Mining Approach
Classification of Malware based on Data Mining ApproachClassification of Malware based on Data Mining Approach
Classification of Malware based on Data Mining Approach
 
Malicious Client Detection Using Machine Learning
Malicious Client Detection Using Machine LearningMalicious Client Detection Using Machine Learning
Malicious Client Detection Using Machine Learning
 
AI approach to malware similarity analysis: Maping the malware genome with a...
AI approach to malware similarity analysis: Maping the  malware genome with a...AI approach to malware similarity analysis: Maping the  malware genome with a...
AI approach to malware similarity analysis: Maping the malware genome with a...
 
Detection of Malware Downloads via Graph Mining (AsiaCCS '16)
Detection of Malware Downloads via Graph Mining (AsiaCCS '16)Detection of Malware Downloads via Graph Mining (AsiaCCS '16)
Detection of Malware Downloads via Graph Mining (AsiaCCS '16)
 
Understand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day ThreatsUnderstand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day Threats
 
Malware Analysis and Defeating using Virtual Machines
Malware Analysis and Defeating using Virtual MachinesMalware Analysis and Defeating using Virtual Machines
Malware Analysis and Defeating using Virtual Machines
 
Malware detection software using a support vector machine as a classifier
Malware detection software using a support vector machine as a classifierMalware detection software using a support vector machine as a classifier
Malware detection software using a support vector machine as a classifier
 
Ensembled Based Categorization and Adaptive Learning Model for Malware Detection
Ensembled Based Categorization and Adaptive Learning Model for Malware DetectionEnsembled Based Categorization and Adaptive Learning Model for Malware Detection
Ensembled Based Categorization and Adaptive Learning Model for Malware Detection
 
B-Sides Seattle 2012 Offensive Defense
B-Sides Seattle 2012 Offensive DefenseB-Sides Seattle 2012 Offensive Defense
B-Sides Seattle 2012 Offensive Defense
 
Malware Detection - A Machine Learning Perspective
Malware Detection - A Machine Learning PerspectiveMalware Detection - A Machine Learning Perspective
Malware Detection - A Machine Learning Perspective
 
Malware Detection using Machine Learning
Malware Detection using Machine Learning	Malware Detection using Machine Learning
Malware Detection using Machine Learning
 
Malware
MalwareMalware
Malware
 
Telecom Fraud Detection - Naive Bayes Classification
Telecom Fraud Detection - Naive Bayes ClassificationTelecom Fraud Detection - Naive Bayes Classification
Telecom Fraud Detection - Naive Bayes Classification
 

Similaire à Artificial Intelligence Methods in Virus Detection & Recognition - Introduction to heuristic scanning

Basic survey on malware analysis, tools and techniques
Basic survey on malware analysis, tools and techniquesBasic survey on malware analysis, tools and techniques
Basic survey on malware analysis, tools and techniquesijcsa
 
Cyber Security Threats Unveilded
Cyber Security Threats UnveildedCyber Security Threats Unveilded
Cyber Security Threats UnveildedElewayte
 
Malware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptxMalware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptxAlamgir Hossain
 
Automated malware invariant generation
Automated malware invariant generationAutomated malware invariant generation
Automated malware invariant generationUltraUploader
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1NihanthReddyBalaiahg
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer supportbozzerapide
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer supportbozzerapide
 
ethicalhacking-140929012151-phpapp02.pdf
ethicalhacking-140929012151-phpapp02.pdfethicalhacking-140929012151-phpapp02.pdf
ethicalhacking-140929012151-phpapp02.pdf722820106121SARANS
 
Utilization Data Mining to Detect Spyware
Utilization Data Mining to Detect Spyware Utilization Data Mining to Detect Spyware
Utilization Data Mining to Detect Spyware IOSR Journals
 
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...cyberprosocial
 
Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039Editor IJARCET
 
CHAPTER 1 MALWARE ANALYSIS PRIMER.ppt
CHAPTER 1 MALWARE ANALYSIS PRIMER.pptCHAPTER 1 MALWARE ANALYSIS PRIMER.ppt
CHAPTER 1 MALWARE ANALYSIS PRIMER.pptManjuAppukuttan2
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSA FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSIJNSA Journal
 
Malware Analysis
Malware AnalysisMalware Analysis
Malware Analysisfaris707
 
Hancitor malware recognition using swarm intelligent technique
Hancitor malware recognition using swarm intelligent techniqueHancitor malware recognition using swarm intelligent technique
Hancitor malware recognition using swarm intelligent techniqueCSITiaesprime
 
How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUSSatyam Sangal
 

Similaire à Artificial Intelligence Methods in Virus Detection & Recognition - Introduction to heuristic scanning (20)

Basic survey on malware analysis, tools and techniques
Basic survey on malware analysis, tools and techniquesBasic survey on malware analysis, tools and techniques
Basic survey on malware analysis, tools and techniques
 
Cyber Security Threats Unveilded
Cyber Security Threats UnveildedCyber Security Threats Unveilded
Cyber Security Threats Unveilded
 
Malware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptxMalware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptx
 
Automated malware invariant generation
Automated malware invariant generationAutomated malware invariant generation
Automated malware invariant generation
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1
 
savi technical ppt.pptx
savi technical ppt.pptxsavi technical ppt.pptx
savi technical ppt.pptx
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer support
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer support
 
ethicalhacking-140929012151-phpapp02.pdf
ethicalhacking-140929012151-phpapp02.pdfethicalhacking-140929012151-phpapp02.pdf
ethicalhacking-140929012151-phpapp02.pdf
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
A0430104
A0430104A0430104
A0430104
 
Utilization Data Mining to Detect Spyware
Utilization Data Mining to Detect Spyware Utilization Data Mining to Detect Spyware
Utilization Data Mining to Detect Spyware
 
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
 
Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039
 
CHAPTER 1 MALWARE ANALYSIS PRIMER.ppt
CHAPTER 1 MALWARE ANALYSIS PRIMER.pptCHAPTER 1 MALWARE ANALYSIS PRIMER.ppt
CHAPTER 1 MALWARE ANALYSIS PRIMER.ppt
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSA FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
 
Malware Analysis
Malware AnalysisMalware Analysis
Malware Analysis
 
Hancitor malware recognition using swarm intelligent technique
Hancitor malware recognition using swarm intelligent techniqueHancitor malware recognition using swarm intelligent technique
Hancitor malware recognition using swarm intelligent technique
 
How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUS
 

Plus de Wojciech Podgórski

[PL] Złożone przetwarzanie zdarzeń w SZSBD StreamBase
[PL] Złożone przetwarzanie zdarzeń w SZSBD StreamBase[PL] Złożone przetwarzanie zdarzeń w SZSBD StreamBase
[PL] Złożone przetwarzanie zdarzeń w SZSBD StreamBaseWojciech Podgórski
 
[PL] Krótkozasięgowe systemy telemetryczne i identyfikacyjne
[PL] Krótkozasięgowe systemy telemetryczne i identyfikacyjne[PL] Krótkozasięgowe systemy telemetryczne i identyfikacyjne
[PL] Krótkozasięgowe systemy telemetryczne i identyfikacyjneWojciech Podgórski
 
[PL] Mechanizmy bezpieczeństwa w sieciach z rodziny 802.11x
[PL] Mechanizmy bezpieczeństwa w sieciach z rodziny 802.11x[PL] Mechanizmy bezpieczeństwa w sieciach z rodziny 802.11x
[PL] Mechanizmy bezpieczeństwa w sieciach z rodziny 802.11xWojciech Podgórski
 
Rola projektowania architektonicznego w inżynierii oprogramowania zorientowan...
Rola projektowania architektonicznego w inżynierii oprogramowania zorientowan...Rola projektowania architektonicznego w inżynierii oprogramowania zorientowan...
Rola projektowania architektonicznego w inżynierii oprogramowania zorientowan...Wojciech Podgórski
 
Metryki obiektowe i ich interpretacja
Metryki obiektowe i ich interpretacjaMetryki obiektowe i ich interpretacja
Metryki obiektowe i ich interpretacjaWojciech Podgórski
 
[PL] XPrince: balance between agility and discipline
[PL] XPrince: balance between agility and discipline[PL] XPrince: balance between agility and discipline
[PL] XPrince: balance between agility and disciplineWojciech Podgórski
 
eXtensible Markup Language APIs in Java 1.6 - Simple and efficient XML parsin...
eXtensible Markup Language APIs in Java 1.6 - Simple and efficient XML parsin...eXtensible Markup Language APIs in Java 1.6 - Simple and efficient XML parsin...
eXtensible Markup Language APIs in Java 1.6 - Simple and efficient XML parsin...Wojciech Podgórski
 

Plus de Wojciech Podgórski (7)

[PL] Złożone przetwarzanie zdarzeń w SZSBD StreamBase
[PL] Złożone przetwarzanie zdarzeń w SZSBD StreamBase[PL] Złożone przetwarzanie zdarzeń w SZSBD StreamBase
[PL] Złożone przetwarzanie zdarzeń w SZSBD StreamBase
 
[PL] Krótkozasięgowe systemy telemetryczne i identyfikacyjne
[PL] Krótkozasięgowe systemy telemetryczne i identyfikacyjne[PL] Krótkozasięgowe systemy telemetryczne i identyfikacyjne
[PL] Krótkozasięgowe systemy telemetryczne i identyfikacyjne
 
[PL] Mechanizmy bezpieczeństwa w sieciach z rodziny 802.11x
[PL] Mechanizmy bezpieczeństwa w sieciach z rodziny 802.11x[PL] Mechanizmy bezpieczeństwa w sieciach z rodziny 802.11x
[PL] Mechanizmy bezpieczeństwa w sieciach z rodziny 802.11x
 
Rola projektowania architektonicznego w inżynierii oprogramowania zorientowan...
Rola projektowania architektonicznego w inżynierii oprogramowania zorientowan...Rola projektowania architektonicznego w inżynierii oprogramowania zorientowan...
Rola projektowania architektonicznego w inżynierii oprogramowania zorientowan...
 
Metryki obiektowe i ich interpretacja
Metryki obiektowe i ich interpretacjaMetryki obiektowe i ich interpretacja
Metryki obiektowe i ich interpretacja
 
[PL] XPrince: balance between agility and discipline
[PL] XPrince: balance between agility and discipline[PL] XPrince: balance between agility and discipline
[PL] XPrince: balance between agility and discipline
 
eXtensible Markup Language APIs in Java 1.6 - Simple and efficient XML parsin...
eXtensible Markup Language APIs in Java 1.6 - Simple and efficient XML parsin...eXtensible Markup Language APIs in Java 1.6 - Simple and efficient XML parsin...
eXtensible Markup Language APIs in Java 1.6 - Simple and efficient XML parsin...
 

Dernier

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Dernier (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

Artificial Intelligence Methods in Virus Detection & Recognition - Introduction to heuristic scanning

  • 1. Introduction Heuristic scanning theory Case Study: Modern heuristic scanner features Summary Further reading... Artificial Intelligence Methods in Virus Detection & Recognition Introduction to heuristic scanning Wojciech Podg´rski o http://podgorski.wordpress.com October 16, 2008 Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 2. Introduction Heuristic scanning theory Case Study: Modern heuristic scanner features Summary Further reading... Presentation outline 1 Introduction Fundamentals of malware Metaheuristics in Virus Detection & Recognition 2 Heuristic scanning theory Lacks in specific detection Heuristic scanning conception Recognizing potential threat Coping with anti-heuristic mechanisms Towards accuracy improvement 3 Case Study: Modern heuristic scanner features Panda’s Technology Evolution Genetic Heuristic Engine - Nereus 4 Summary 5 Further reading... Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 3. Introduction Heuristic scanning theory Fundamentals of malware Case Study: Modern heuristic scanner features Metaheuristics in Virus Detection & Recognition Summary Further reading... Malware Malware (malicious software) is software designed to infiltrate or damage a computer system without the owner’s informed consent. Source: http://en.wikipedia.org/wiki/Malware Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 4. Introduction Heuristic scanning theory Fundamentals of malware Case Study: Modern heuristic scanner features Metaheuristics in Virus Detection & Recognition Summary Further reading... Malware types We can distinguish quite few malicious software types. It is important to be aware that nevertheless all of them have similar purpose, each one behave differently. Viruses Worms Wabbits Trojan horses Exploits/Backdoors Spyware/Scumware/Stealware/Parasiteware/Adware Rootkits Keyloggers/Dialers Hoaxes Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 5. Introduction Heuristic scanning theory Fundamentals of malware Case Study: Modern heuristic scanner features Metaheuristics in Virus Detection & Recognition Summary Further reading... Malware = Viruses Due to different behaviour, each malware group uses alternative ways of being undetected. This forces anti-virus software producers to develop numerous solutions and countermeasures for computer protection. This presentation focuses on methods used especially for virus detection, not necessarily effective against other types of malicious software. Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 6. Introduction Heuristic scanning theory Fundamentals of malware Case Study: Modern heuristic scanner features Metaheuristics in Virus Detection & Recognition Summary Further reading... Infection strategies To better understand how viruses are detected and recognized, it is essential to divide them by their infection ways. Nonresident viruses The simplest form of viruses which don’t stay in memory, but infect founded executable file and search for another to replicate. Resident viruses More complex and efficient type of viruses which stay in memory and hide their presence from other processes. Kind of TSR apps. Fast infectors Type which is designed to infect as many files as possible. Slow infectors Using stealth and encryption techniques to stay undetected outlast. Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 7. Introduction Heuristic scanning theory Fundamentals of malware Case Study: Modern heuristic scanner features Metaheuristics in Virus Detection & Recognition Summary Further reading... Infection strategies To better understand how viruses are detected and recognized, it is essential to divide them by their infection ways. Nonresident viruses The simplest form of viruses which don’t stay in memory, but infect founded executable file and search for another to replicate. Resident viruses More complex and efficient type of viruses which stay in memory and hide their presence from other processes. Kind of TSR apps. Fast infectors Type which is designed to infect as many files as possible. Slow infectors Using stealth and encryption techniques to stay undetected outlast. Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 8. Introduction Heuristic scanning theory Fundamentals of malware Case Study: Modern heuristic scanner features Metaheuristics in Virus Detection & Recognition Summary Further reading... Infection strategies To better understand how viruses are detected and recognized, it is essential to divide them by their infection ways. Nonresident viruses The simplest form of viruses which don’t stay in memory, but infect founded executable file and search for another to replicate. Resident viruses More complex and efficient type of viruses which stay in memory and hide their presence from other processes. Kind of TSR apps. Fast infectors Type which is designed to infect as many files as possible. Slow infectors Using stealth and encryption techniques to stay undetected outlast. Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 9. Introduction Heuristic scanning theory Fundamentals of malware Case Study: Modern heuristic scanner features Metaheuristics in Virus Detection & Recognition Summary Further reading... Infection strategies To better understand how viruses are detected and recognized, it is essential to divide them by their infection ways. Nonresident viruses The simplest form of viruses which don’t stay in memory, but infect founded executable file and search for another to replicate. Resident viruses More complex and efficient type of viruses which stay in memory and hide their presence from other processes. Kind of TSR apps. Fast infectors Type which is designed to infect as many files as possible. Slow infectors Using stealth and encryption techniques to stay undetected outlast. Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 10. Introduction Heuristic scanning theory Fundamentals of malware Case Study: Modern heuristic scanner features Metaheuristics in Virus Detection & Recognition Summary Further reading... Metaheuristic Metaheuristic is a heuristic method for solving a very general class of computational problems by combining user-given black-box procedures in a hopefully efficient way. Metaheuristics are generally applied to problems for which there is no satisfactory problem-specific algorithm or heuristic. Source: http://en.wikipedia.org/wiki/Metaheuristic Heuristic Heuristic is a method to help solve a problem, commonly an informal method. It is particularly used to rapidly come to a solution that is reasonably close to the best possible answer, or ’optimal solution’... Source: http://en.wikipedia.org/wiki/Heuristic Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 11. Introduction Heuristic scanning theory Fundamentals of malware Case Study: Modern heuristic scanner features Metaheuristics in Virus Detection & Recognition Summary Further reading... General metaheuristics It is important to remember that metaheuristics are only ’ideas’ to solve a problem not a specific way to do that. List below shows main metaheuristics used for virus detection and recognition: Pattern matching Automatic learning Environment emulation Neural networks Data mining Bayes networks Hidden Markov models and other... Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 12. Introduction Heuristic scanning theory Fundamentals of malware Case Study: Modern heuristic scanner features Metaheuristics in Virus Detection & Recognition Summary Further reading... General metaheuristics It is important to remember that metaheuristics are only ’ideas’ to solve a problem not a specific way to do that. List below shows main metaheuristics used for virus detection and recognition: Pattern matching Automatic learning Environment emulation Neural networks Data mining Bayes networks Hidden Markov models and other... Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 13. Introduction Heuristic scanning theory Fundamentals of malware Case Study: Modern heuristic scanner features Metaheuristics in Virus Detection & Recognition Summary Further reading... General metaheuristics It is important to remember that metaheuristics are only ’ideas’ to solve a problem not a specific way to do that. List below shows main metaheuristics used for virus detection and recognition: Pattern matching Automatic learning Environment emulation Neural networks Data mining Bayes networks Hidden Markov models and other... Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 14. Introduction Heuristic scanning theory Fundamentals of malware Case Study: Modern heuristic scanner features Metaheuristics in Virus Detection & Recognition Summary Further reading... General metaheuristics It is important to remember that metaheuristics are only ’ideas’ to solve a problem not a specific way to do that. List below shows main metaheuristics used for virus detection and recognition: Pattern matching Automatic learning Environment emulation Neural networks Data mining Bayes networks Hidden Markov models and other... Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 15. Introduction Heuristic scanning theory Fundamentals of malware Case Study: Modern heuristic scanner features Metaheuristics in Virus Detection & Recognition Summary Further reading... General metaheuristics It is important to remember that metaheuristics are only ’ideas’ to solve a problem not a specific way to do that. List below shows main metaheuristics used for virus detection and recognition: Pattern matching Automatic learning Environment emulation Neural networks Data mining Bayes networks Hidden Markov models and other... Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 16. Introduction Heuristic scanning theory Fundamentals of malware Case Study: Modern heuristic scanner features Metaheuristics in Virus Detection & Recognition Summary Further reading... General metaheuristics It is important to remember that metaheuristics are only ’ideas’ to solve a problem not a specific way to do that. List below shows main metaheuristics used for virus detection and recognition: Pattern matching Automatic learning Environment emulation Neural networks Data mining Bayes networks Hidden Markov models and other... Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 17. Introduction Heuristic scanning theory Fundamentals of malware Case Study: Modern heuristic scanner features Metaheuristics in Virus Detection & Recognition Summary Further reading... General metaheuristics It is important to remember that metaheuristics are only ’ideas’ to solve a problem not a specific way to do that. List below shows main metaheuristics used for virus detection and recognition: Pattern matching Automatic learning Environment emulation Neural networks Data mining Bayes networks Hidden Markov models and other... Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 18. Introduction Heuristic scanning theory Fundamentals of malware Case Study: Modern heuristic scanner features Metaheuristics in Virus Detection & Recognition Summary Further reading... General metaheuristics It is important to remember that metaheuristics are only ’ideas’ to solve a problem not a specific way to do that. List below shows main metaheuristics used for virus detection and recognition: Pattern matching Automatic learning Environment emulation Neural networks Data mining Bayes networks Hidden Markov models and other... Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 19. Introduction Heuristic scanning theory Fundamentals of malware Case Study: Modern heuristic scanner features Metaheuristics in Virus Detection & Recognition Summary Further reading... Concrete heuristics Specific heuristics practically used in virus detection and recognition, are naturally inherited from metaheuristics. And so, for example concrete method for virus detection using neural networks can be implementation of SOM (Self Organizing Map). Neural Networks (metaheuristic) → SOM (heuristic) The most popular, and one of most efficient heuristic used by anti-virus software is technique called Heuristic Scanning. Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 20. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Lacks in specific detection I Great deal of modern viruses are only slightly changed versions of few conceptions developed years ago. Specific detection methods like signature scanning became very efficient ways of detecting known threats. Finding specific signature in code allows scanner to recognize every virus which signature has been stored in built-in database. BB ?2 B9 10 01 81 37 ?2 81 77 02 ?2 83 C3 04 E2 F2 FireFly virus signature(hexadecimal) Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 21. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Lacks in specific detection II Problem occurs when virus source is changed by a programmer or mutation engine. Signature is being malformed due to even minor changes. Virus may behave in an exactly same way but is undetectable due to new, unique signature. BB ?2 B9 10 01 81 37 ?2 81 A1 D3 ?2 01 C3 04 E2 F2 Malformed signature(hexadecimal) Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 22. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Heuristic scanning conception I Q: How to recognize a virus without any knowledge about its internal structure? Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 23. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Heuristic scanning conception I Q: How to recognize a virus without any knowledge about its internal structure? A: By examining its behaviour and characteristics. Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 24. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Heuristic scanning conception II Heuristic scanning in its basic form is implementation of three metaheuristics: 1 Pattern matching 2 Automatic learning 3 Environment emulation Of course modern solutions provide more functionalities but principle stays the same. Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 25. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Heuristic scanning conception II Heuristic scanning in its basic form is implementation of three metaheuristics: 1 Pattern matching 2 Automatic learning 3 Environment emulation Of course modern solutions provide more functionalities but principle stays the same. Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 26. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Heuristic scanning conception II Heuristic scanning in its basic form is implementation of three metaheuristics: 1 Pattern matching 2 Automatic learning 3 Environment emulation Of course modern solutions provide more functionalities but principle stays the same. Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 27. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Heuristic scanning conception II Heuristic scanning in its basic form is implementation of three metaheuristics: 1 Pattern matching 2 Automatic learning 3 Environment emulation Of course modern solutions provide more functionalities but principle stays the same. Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 28. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Heuristic scanning conception III The basic idea of heuristic scanning is to examine assembly language instruction sequences(step-by-step) and qualify them by their potential harmfulness. If there are sequences behaving suspiciously, program can be qualified as a virus. The phenomenon of this method is that it actually detects threats that aren’t yet known! Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 29. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Recognizing potential threat I In real anti-virus software, heuristic scanning is implemented to recognize threats by following built-in rules, e.g. if program tries to format hard drive its behaviour is highly suspicious but it can be only simple disk utility. Singular suspicion is never a reason to trigger the alarm. But if the same program also tries to stay resident and contains routine to search for executables, it is highly probable that it’s a real virus. AV software very often classifies sequences by their behaviour granting them a flag. Every flag has its weight, if total values for one program exceeds a predefined threshold, scanner regards it as virus. Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 30. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Heuristic Scanning as artificial neuron Figure: Single-layer classifier with threshold From [1] Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 31. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Recognizing potential threat II Figure: TbScan 6.02 heuristic flags From [3] For instance Jerusalem/PLO virus would raise FRLMUZ flags. Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 32. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Malware evolves After presenting specific scanning to AV software, malware authors were obligated to introduce new techniques of being undetected. Beside of polymorphism and mutation engines viruses started to use various stealth techniques which basically hooked interrupts and took control over them. This allowed them to be invisible for traditional scanner. Moreover, most of them started using real-time encryption which made them look like totally harmless program. Figure: Virus evolution chain [Source http://searchsecurity.techtarget.com] Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 33. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Pattern matching is not enough Mixing stealth techniques with encryption and anti-heuristic sequences (code obfuscated by meaningless instructions) allowed viruses to be unseen even by signature and heuristic scanning combined together. It was obvious that new solution was needed. The idea came from VM conceptions. Why not to create artificial runtime environment to let the virus do its job? Such approach found implementation in environment emulation engines, which became standard AV software weapon. Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 34. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Virtual reality The idea of environment emulation is simple. Anti-virus program provides a virtual machine with independent operating system and allows virus to perform its routines. Behaviour and characteristics are being continuously examined, while virus is not aware that is working on a fake system. This leads to decryption routines and revealment of its true nature. Also stealth techniques are useless because whole VM is monitored by AV software. Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 35. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement False positives & automatic learning HS as a heuristic method is only reasonably close to the best possible answer. In this case we can imagine that heuristic scanning will blame innocent programs for being potential threats. Such behaviour is called false positive We must be aware that program is right when rising alarm, because scanned app posses suspicious sequences, we can’t blame scanner for failure. So what can be done to avoid false positives? Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 36. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement False positives & automatic learning HS as a heuristic method is only reasonably close to the best possible answer. In this case we can imagine that heuristic scanning will blame innocent programs for being potential threats. Such behaviour is called false positive We must be aware that program is right when rising alarm, because scanned app posses suspicious sequences, we can’t blame scanner for failure. So what can be done to avoid false positives? A: Automatic learning! Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 37. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Avoiding false positives & improving accuracy I Some applications, especially non-commercial ones, can raise false positive, because of their suspicious routines. e.g. UnHash v1.0 through its encryption functionalities (used for finding hash collisions) almost every time is qualified as virus. What we can do to prevent it, is to: 1 Let Monitor learn Teach AV monitor to recognize programs causing false positives. (requires advanced user) Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 38. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Avoiding false positives & improving accuracy I Some applications, especially non-commercial ones, can raise false positive, because of their suspicious routines. e.g. UnHash v1.0 through its encryption functionalities (used for finding hash collisions) almost every time is qualified as virus. What we can do to prevent it, is to: 1 Let Monitor learn Teach AV monitor to recognize programs causing false positives. (requires advanced user) Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 39. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Avoiding false positives & improving accuracy II 2 Set proper scanning depth Configure Monitor with suitable heuristic scanning depth by manipulating threshold computed from flag weights. 3 Assume that machine is not infected Some AV software can scan through computer knowing it’s clean and learn which programs are false positives. 4 Combine scanning techniques Combine multiple scanning techniques to exclude potential false positives. 5 Perform scan as often as possible Knowing what’s going on is essential... Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 40. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Avoiding false positives & improving accuracy II 2 Set proper scanning depth Configure Monitor with suitable heuristic scanning depth by manipulating threshold computed from flag weights. 3 Assume that machine is not infected Some AV software can scan through computer knowing it’s clean and learn which programs are false positives. 4 Combine scanning techniques Combine multiple scanning techniques to exclude potential false positives. 5 Perform scan as often as possible Knowing what’s going on is essential... Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 41. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Avoiding false positives & improving accuracy II 2 Set proper scanning depth Configure Monitor with suitable heuristic scanning depth by manipulating threshold computed from flag weights. 3 Assume that machine is not infected Some AV software can scan through computer knowing it’s clean and learn which programs are false positives. 4 Combine scanning techniques Combine multiple scanning techniques to exclude potential false positives. 5 Perform scan as often as possible Knowing what’s going on is essential... Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 42. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Avoiding false positives & improving accuracy II 2 Set proper scanning depth Configure Monitor with suitable heuristic scanning depth by manipulating threshold computed from flag weights. 3 Assume that machine is not infected Some AV software can scan through computer knowing it’s clean and learn which programs are false positives. 4 Combine scanning techniques Combine multiple scanning techniques to exclude potential false positives. 5 Perform scan as often as possible Knowing what’s going on is essential... Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 43. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Avoiding false positives & improving accuracy II 2 Set proper scanning depth Configure Monitor with suitable heuristic scanning depth by manipulating threshold computed from flag weights. 3 Assume that machine is not infected Some AV software can scan through computer knowing it’s clean and learn which programs are false positives. 4 Combine scanning techniques Combine multiple scanning techniques to exclude potential false positives. 5 Perform scan as often as possible Knowing what’s going on is essential... Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 44. Introduction Heuristic scanning theory Panda’s Technology Evolution Case Study: Modern heuristic scanner features Genetic Heuristic Engine - Nereus Summary Further reading... Presenting Panda Security solutions Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 45. Introduction Heuristic scanning theory Panda’s Technology Evolution Case Study: Modern heuristic scanner features Genetic Heuristic Engine - Nereus Summary Further reading... Modern Panda Security solutions belong to the third generation AV software. First Generation: Antivirus From 1990’s, signature scanning including polymorphic virus recognition. Primitive heuristics. Second Generation: Antimalware From 2000, integrated firewall, anti-malware engine. Third Generation: Proactive Technologies From 2004, TruPrevent R , genetic and rootkit heuristics, behavioral analysis and blocking, uncloaking techniques, generic unpacking Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 46. Introduction Heuristic scanning theory Panda’s Technology Evolution Case Study: Modern heuristic scanner features Genetic Heuristic Engine - Nereus Summary Further reading... Modern Panda Security solutions belong to the third generation AV software. First Generation: Antivirus From 1990’s, signature scanning including polymorphic virus recognition. Primitive heuristics. Second Generation: Antimalware From 2000, integrated firewall, anti-malware engine. Third Generation: Proactive Technologies From 2004, TruPrevent R , genetic and rootkit heuristics, behavioral analysis and blocking, uncloaking techniques, generic unpacking Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 47. Introduction Heuristic scanning theory Panda’s Technology Evolution Case Study: Modern heuristic scanner features Genetic Heuristic Engine - Nereus Summary Further reading... Modern Panda Security solutions belong to the third generation AV software. First Generation: Antivirus From 1990’s, signature scanning including polymorphic virus recognition. Primitive heuristics. Second Generation: Antimalware From 2000, integrated firewall, anti-malware engine. Third Generation: Proactive Technologies From 2004, TruPrevent R , genetic and rootkit heuristics, behavioral analysis and blocking, uncloaking techniques, generic unpacking Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 48. Introduction Heuristic scanning theory Panda’s Technology Evolution Case Study: Modern heuristic scanner features Genetic Heuristic Engine - Nereus Summary Further reading... Modern Panda Security solutions belong to the third generation AV software. First Generation: Antivirus From 1990’s, signature scanning including polymorphic virus recognition. Primitive heuristics. Second Generation: Antimalware From 2000, integrated firewall, anti-malware engine. Third Generation: Proactive Technologies From 2004, TruPrevent R , genetic and rootkit heuristics, behavioral analysis and blocking, uncloaking techniques, generic unpacking Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 49. Introduction Heuristic scanning theory Panda’s Technology Evolution Case Study: Modern heuristic scanner features Genetic Heuristic Engine - Nereus Summary Further reading... Modern Panda Security solutions belong to the third generation AV software. First Generation: Antivirus From 1990’s, signature scanning including polymorphic virus recognition. Primitive heuristics. Second Generation: Antimalware From 2000, integrated firewall, anti-malware engine. Third Generation: Proactive Technologies From 2004, TruPrevent R , genetic and rootkit heuristics, behavioral analysis and blocking, uncloaking techniques, generic unpacking Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 50. Introduction Heuristic scanning theory Panda’s Technology Evolution Case Study: Modern heuristic scanner features Genetic Heuristic Engine - Nereus Summary Further reading... Genetic Heuristic Engine, codename: Nereus was initially released in 2005. The innovation connected with Nereus rely on idea inspired by the field of genetics and its usefulness to understand how organisms are individually identified and associated to other organisms. Features: More than few hundred characteristics of each file that is scanned Complex malware recognition (type determination) Rootkit heuristics (time based analysis) Generic packer detectors and generic unpacking algorithms New threat automatic notification Automatic creation of detection and disinfection signatures for samples previously analyzed by processing and classification module Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 51. Introduction Heuristic scanning theory Panda’s Technology Evolution Case Study: Modern heuristic scanner features Genetic Heuristic Engine - Nereus Summary Further reading... Figure: Panda’s integrated endpoint security From [6] Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 52. Introduction Heuristic scanning theory Case Study: Modern heuristic scanner features Summary Further reading... Heuristic scanning is the most popular heuristic method for virus detection and recognition. Basically it is inherited from combination of pattern matching, automatic learning and environment emulation metaheuristics. As a heuristic method it’s not 100% effective. So why do we apply HS? Pros Can detect ’future’ threats User is less dependent on product update Improves conventional scanning results Cons False positives Making decision after alarm requires knowledge Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 53. Introduction Heuristic scanning theory Case Study: Modern heuristic scanner features Summary Further reading... Peter Szor The Art of Computer Virus Research and Defense Addison-Wesley Professional, 1st edition, February 2005 Tomasz Andel, Krzysztof Zawadzki Techniki pisania wirus´w oraz antywirus´w o o Inynieria bezpiecze´stwa system´w sieciowych i internetowych, PWr n o Wroclaw 2008 Frans Veldman Heuristic Anti-Virus Technology http://mirror.sweon.net/madchat/vxdevl/vdat/epheurs1.htm Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 54. Introduction Heuristic scanning theory Case Study: Modern heuristic scanner features Summary Further reading... Richard Zwienenberg Heuristic Scanners: Artificial Intelligence? http://mirror.sweon.net/madchat/vxdevl/vdat/epheurs2.htm ´ edited by Eric Filiol Journal in Computer Virology Springer Paris, Volume 1-4 http://www.springerlink.com/content/119769 Panda Research From Traditional Antivirus to Collective Intelligence August 2007 http://research.pandasecurity.com/ Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 55. Introduction Heuristic scanning theory Case Study: Modern heuristic scanner features Summary Further reading... Various online knowledge repositories For starters it’s good to search wikipedia... VX Heavens http://vx.netlux.org/lib Breaking Business and Technology News https://silicon.com/ IEEE http://ieeexplore.ieee.org/ Zines: Phalcon/Skism: 40HEX, VLAD, VBB: Viruses Bits & Bytes, Immortal Riot: Insane Reality, NuKe: NuKe IntoJournal, Dark Angel VirGuide AND OTHER... Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 56. Introduction Heuristic scanning theory Case Study: Modern heuristic scanner features Summary Further reading... Why?... Questions ? What if?... Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 57. Introduction Heuristic scanning theory Case Study: Modern heuristic scanner features Summary Further reading... THANK YOU Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition