本帖最后由 霄栋 于 2016-4-26 12:10 编辑
#4.Heuristics: Detecting tomorrow’s Threats Today
启发式:今日检测明日威胁
Ensuring a timely response to each new threat can become more than challenging. However, it is critical that the response should be prompt, as the new variants of malware are able to spread rapidly. A slow or delayed response could lead to a large pool of computers being compromised and the potential data loss or impact on the affected network infrastructure could be unquantifiable.
确保对每个新的威胁的及时响应更具挑战性。尽管如此,因为恶意软件的新变种能够迅速传播,及时的响应又是至关重要的。缓慢或延迟的响应可能导致大量的计算机被感染和潜在的数据损失,或对波及的网络基础设施造成难以估量的冲击。
The challenge is that regardless of how fast security vendors react, there is always a gap between the time a new threat is released into the wild and the time computers are “immunized” against that threat via a signature update. The gap between initial moments when a threat can affect systems until the fix is disseminated creates a window of opportunity for malicious actors. With more than half a million new malware samples emerging each month, chances are the window of opportunity is favor of the attacker.
挑战在于不管安全厂商的反应有多快,新病毒被释放至外界和计算机通过签名更新“免疫”这一威胁之间总存在时间差。威胁能够影响系统的最初时刻与补救措施被分发的时间差为攻击者创造了机会之窗。随着每月超过50万新型恶意软件样本的出现,机会之窗为攻击者提供了有利条件。
Conventional detection relies on signatures. Anti-malware signatures are code snippets extracted from malware samples and used by antimalware programs to perform pattern-matching. The problem with this method is that it takes time to produce the signature: antimalware vendors need to obtain a sample of the malware, develop a signature, and then push that signature to users – and this leads to the creation of the window mentioned above.
传统的检测依赖于签名。反恶意软件签名是从恶意软件样本中提取的、被反恶意软件用于执行模式匹配的代码片段。这种手段的问题是制作签名需要时间:反恶意软件需要收集恶意软件样本,开发签名,然后将签名推送给用户——这导致上述空窗的产生。
Heuristics are a form of proactive detection that closes the window during which computers are vulnerable. Rather than relying on signatures or binary or code fingerprints, heuristic detection relies on complex algorithms that specify actual patterns and behaviors, which may indicate that an application is malicious. This works because malicious programs inevitably attempt to perform actions in a context that legitimate applications do not. Examples of suspicious behavior would include attempting to drop files or disguise processes, or injecting or executing code in another process’s memory space. Because heuristic detection look for behavioral characteristics rather than relying on simple pattern-matching, they are able to detect and block new and emerging threats for which a signature or fingerprint has yet to be released.
启发式是在计算机易于攻击时关闭空窗的一种主动检测形式。启发式不依赖于签名、二进制文件或代码指纹,它依托于复杂的算法,能够识别表明某个应用是恶意程序的实际模式和行为。因为恶意程序不可避免地要执行一系列合法应用不会执行的动作,所以启发式检测能够奏效。可疑行为的例子可能包括企图释放文件或混淆进程,或注入其它进程内存空间并执行代码。因为启发式检测寻找行为特征而不是依赖于简单的模式匹配,它们能够在签名或指纹尚未被发布时检测和阻止新型威胁。
To protect computers, the majority of heuristic detection, including the Bitdefender B-HAVE heuristic engine, temporarily delay applications from starting while the code is executed in a virtual environment that is completely isolated – or sandboxed - from the real computer. If no suspicious behavior is observed, the computer is instructed to start the application normally. On the other hand, if suspicious behavior is observed, the program is blocked from executing. The entire process happens in fractions of a second and so has practically no impact on either the user experience or perceived performance. In order to be even more effective, Bitdefender uses application reputation, a form of white listing, for having more lightweight heuristics for applications that are known likely to be safe. Application reputation is kept intact for false positives with frequent updates from Bitdefender cloud.
为保护计算机,大多数启发式检测,包括Bitdefender B-HAVE启发式引擎,会暂时延迟应用启动,并将代码在完全与真实计算机隔离的虚拟环境或沙箱中执行。如果没有观察到可疑的行为,计算机被引导至正常启动应用。反之,如果观察到可疑的行为,程序将被阻止执行。整个过程发生在很短的时间内,因此几乎不会对用户体验或性能造成实际影响。为了进一步提高效率,Bitdefender使用了应用信誉——一种白名单,对已知很可能为安全的应用进行轻度启发式检测。应用信誉通过Bitdefender云端频繁更新保持完整性并降低误报。
While this approach certainly enhances security considerably, it nonetheless has a couple of shortcomings. Firstly, programs can only be run in the virtual environment for a short period as, obviously, it would not be acceptable to delay launch by any substantial amount of time. This means that malware can avoid detection simply by delaying performing any malicious actions. Secondly, a program that has already been checked (and is, therefore, trusted) could be exploited and either modified in-memory, while running, or used to launch a malware process with its own credentials.
尽管这种方法确实增强了安全性,但它也有一些缺点。首先,程序只能在虚拟环境中被执行很短的时间,显然,被长时间的延迟执行是无法被接受的。这意味着恶意软件可以简单地通过延迟表现所有可疑动作来规避检测。其次,一个已经被检查过(也因此被信任)的程序可能被利用,在运行时在内存中被修改,或被用来以其自身的凭据运行恶意进程。
To address these shortcomings, Bitdefender introduced Active Virus Control in 2010 (former name of Active Threat Control technology).
为了克服这些缺点,Bitdefender于2010年介绍了活跃病毒控制(活跃威胁控制技术的前身)。(注:指的是Bitdefender在2010年发布了AVC的白皮书,相关PDF已附在文末)
|