Home
Add Document
Sign In
Create An Account
Antivirus Techniques and IBM's Digital Immune System
Antivirus Techniques and IBM's Digital Immune System The Antivirus Problem 5 5 Definition 1: Virus " A computer program that spreads or is spreade...
Author:
Allen Moore
45 downloads
2 Views
138KB Size
Report
Download PDF
Recommend Documents
Emotional Freedom Techniques for Healthy Immune System
Techniques for Immune Function Analysis
RHEUMATOLOGIC AND IMMUNE SYSTEM DISEASES
The immune system and cancer
Lecture Outline. Immune System Function. Immune System Basics. Immune System General Functions
IMMUNE (LYMPHOID) SYSTEM
Immune System Test Paper
7.6 The immune system
Immune System: An Overview
Increased Immune System Effectiveness
Adaptive immune system response
THE INVERTEBRATE IMMUNE SYSTEM
Artificial Immune System and Its Applications
Activation of the immune system and inflammation
EXERCISE INDUCED ENDOCANNABINOID AND IMMUNE SYSTEM ALTERATIONS
Chapter 2. The Immune System and immunotoxicity
EXERCISE, STRESS AND IMMUNE SYSTEM FUNCTIONAL RESPONSES
Human Body. Immune. System and Germs
10 IMMUNE SYSTEM AND HAEMATOLOGY Epidemiological studies
Immune System surveillance: Seek and destroy mission
Summary Infectious Disease The Immune System. The Immune System and Disease. Name Class Date
Diversity in the Immune System
Ch 24: The Immune System
How the immune system works
Antivirus Techniques and IBM's Digital Immune System
The Antivirus Problem 5
5
Definition 1: Virus "
A computer program that spreads or is spreaded over computer systems.
"
It invokes unwanted operations or compromise security on the infected system.
Definition 2: The Antivirus Problem "
Distinguish between virus-free and virus-infected programs or systems.
"
Stop any mal-functioning caused by the infection
"
Remove the viral codes, and, if possible, restore the programs or systems back into normal state.
1
Goal of Antivirus Systems 5
Reliably detect and distinguish viral codes from non-viral codes.
5
Block abnormal behaviors caused by the virus.
5
Remove virus from the protected system.
5
Restore or maintain the usefulness of the protected system.
Virus Hiding Techniques Compressed
5 5
Virus stored in compressed form.
Stealth
5 5
Virus intercept system interrupts to fool antivirus softwares, thus avoid being detected.
Polymorphic
5 5
Virus encrypt itself using different encryption keys each time it spreads.
2
Antivirus Categorizations Order of Play:
5
Play First
5 "
Behavior blocking
"
Integrity checking
"
Access control
Play Second
5 "
Scanning methods
"
Virtual machine analysis
Time of Play:
5
On-Access
5 "
Virus are checked automatically upon program execution or data access.
On-Demand
5 "
Virus are checked upon user's request.
Technique 1: Scanners Good Points
5 5
Very few false alarms
5
‘Play second’ (some can also partially "Play first")
5
Can be very fast
5
Can usually disinfect infected files
Bad Points
5 5
Need updating
5
May have problems with polymorphic viruses
3
Technique 2: Integrity Checkers Good Points
5 5
Shouldn’t need updating
Bad Points
5 5
"Play first" (and not very well)
5
Cannot find viruses, only changes
5
Many false alarms, and some false negative
5
Ineffective against macro viruses
Technique 3: Behavior Blockers Good Points
5 5
Shouldn’t need updating
Bad Points
5 5
Many false alarms, and some false negative
5
Needs very high level of technical support
5
Ineffective against macro viruses
5
No disinfection capability
4
Technique 4: Heuristics Good Points
5 5
No updates needed
5
Detect unknown or even polymorphic viruses
Bad Points
5 5
Tendency for false alarms
5
May miss a number of viruses
Technique 5: Virtual Machine Good Points
5 5
Catch also Trojan horses or Worms
5
Complete virus behavioral analysis
5
No updates required
Bad Points
5 5
Resource demanding
5
Not practical for high-level language (C, Fortran, Delphi, etc.) written viruses
5
Technique 6: Access Control Good Points
5 5
Limits possible virus entry points
5
No updates required
Bad Points
5 5
No virus discrimination
5
Ineffective against viruses spread via email and the Internet
5
No disinfection capability
The Digital Immune System Innate Immune System
5
5
Detection
Adaptive Immune System
5
5
Prescription
Dissemination
5 5
Cure (hopefully)
6
The Innate Immune System 5
Reside on each client machine
5
Traditional Scanners
5
Heuristics for file infectors
5
Neural networks for boot infectors
5
Disinfect whenever sure and possible
5
Forward difficult ones to the Adaptive Immune System
The Adaptive Immune System 5
Centralized Virtual Machines
5
Behavioral Analysis
5
Decoy and Replication
5
Autosequencing 5
Determine viral portion and their location
Automatic signature extraction
5 5
Extract reliable signature for detection and disinfection
7
Delivery and Dissemination Hierachical Active Network
5 5
Distribute prescription efficiently
5
Reduce average load
Administrator System to control and audit virus/prescription transmission
5
5
5
Quarantine: address epidemics, reduce peak load
5
Encryption: maintain security and safety
Automation: decrease overload possibility
Virus Epidemics Nature
8
Conclusion Antivirus: theoretically a loser
5 5
Exist no algorithm that can detect all viruses
5
Exist virus which is undetectable
Practical solutions:
5 5
Fastly evolving
5
New tools / systems to fight new threats, such as integration of torjan horse, worms, and viruses
5
Intersection with IDS when computer programs become "smarter" and more powerful
9
Suggest Documents
Emotional Freedom Techniques for Healthy Immune System
Read more
Techniques for Immune Function Analysis
Read more
RHEUMATOLOGIC AND IMMUNE SYSTEM DISEASES
Read more
The immune system and cancer
Read more
Lecture Outline. Immune System Function. Immune System Basics. Immune System General Functions
Read more
IMMUNE (LYMPHOID) SYSTEM
Read more
Immune System Test Paper
Read more
7.6 The immune system
Read more
Immune System: An Overview
Read more
Increased Immune System Effectiveness
Read more
Adaptive immune system response
Read more
THE INVERTEBRATE IMMUNE SYSTEM
Read more
Artificial Immune System and Its Applications
Read more
Activation of the immune system and inflammation
Read more
EXERCISE INDUCED ENDOCANNABINOID AND IMMUNE SYSTEM ALTERATIONS
Read more
Chapter 2. The Immune System and immunotoxicity
Read more
EXERCISE, STRESS AND IMMUNE SYSTEM FUNCTIONAL RESPONSES
Read more
Human Body. Immune. System and Germs
Read more
10 IMMUNE SYSTEM AND HAEMATOLOGY Epidemiological studies
Read more
Immune System surveillance: Seek and destroy mission
Read more
Summary Infectious Disease The Immune System. The Immune System and Disease. Name Class Date
Read more
Diversity in the Immune System
Read more
Ch 24: The Immune System
Read more
How the immune system works
Read more
×
Report "Antivirus Techniques and IBM's Digital Immune System"
Your name
Email
Reason
-Select Reason-
Pornographic
Defamatory
Illegal/Unlawful
Spam
Other Terms Of Service Violation
File a copyright complaint
Description
×
Sign In
Email
Password
Remember me
Forgot password?
Sign In
Login with Google
Login with Facebook