楼主: wjhstu-VxG
收起左侧

[原创] [科普]Symantec安全技术详解——STAR Technology

  [复制链接]
尘梦幽然
发表于 2012-5-8 19:35:48 | 显示全部楼层

RE:

wjcharles 发表于 2012-5-8 16:09
铁壳的技术介绍没有一个说得全的,不要只看最新的那个,有些部分比如人工智能就没有旧一点的介绍说得清楚 ...

SONAR3的内核变革了不少,大规模应用动态行为分析技术,所以我认为与防火墙联动这一说法不够可靠。
尘梦幽然
发表于 2012-5-8 19:37:22 | 显示全部楼层

RE:

wjhstu-VxG 发表于 2012-5-8 17:37
的确,这个不是正儿八经的技术文档,并不是100%严谨准确的,只是一个介绍罢了;应该会联动,否则相同的属 ...

似乎监控联网不需要防火墙就可以了吧?就为这个而要和防火墙联动编写、调用成本很高的。
尘梦幽然
发表于 2012-5-8 19:39:04 | 显示全部楼层

RE:

ZJUER 发表于 2012-5-8 18:29
你不承认也没办法,那个是Norton产品界面上的东西……

SONAR2到3变革非常大,SONAR3具备了真正的动态行为分析能力,出现较大规模的样本回滚现象,所以我不承认现在的SONAR4可以与防火墙联动
驭龙
发表于 2012-5-8 21:01:52 | 显示全部楼层
5234377 发表于 2012-5-8 19:33
SONAR2还主要是高启扫描的时代,现在都SONAR4了,从SONAR3开始才有真正大规模应用动态行为分析技术。今非 ...

我裸奔了,你自己慢慢学习吧,SONAR三代和四代的介绍,我不再回复

SONAR 4.0



With 2012 we are introducing SONAR Policy Enforcement – We now have the ability to convict a suspicious process based on a behavioral “profile.”  To create these profiles, an analyst looks at the 500+ attributes that SONAR tracks and make a series of associations For example, let’s say a particular process tried to access the system folder and tried to call home, but does not have any running UI. Also, it downloaded more than 15 files the previous day.  Any one of these things alone may not be “bad,” but taken as a whole, the behavioral profile is bad. The analyst will therefore make a rule that says if we see this string of behaviors, then we should stop the process from executing. Doing all of this is a big deal--we aren’t just looking at what the process does on your computer, we are also looking at its communication characteristics!



Sonar 4.0 also introduces protection against Non Process Threats (NPTs). As the name suggests, these threats are not active processes by themselves, but they inject themselves into legitimate active processes.  SONAR 4.0 technology is able to much more aggressively remove threats on pre-infected machines.

SONAR 3.0
This year we have some innovative changes that build upon the successful, effective, and efficient SONAR 2 behavioral security engine. For those who are not familiar with SONAR technology, here is a link to an article that describes it. With SONAR 2, we have a proven track record of being able to convict malware and secure Norton users from malware designed to evade most other security features. In the last nine months alone we prevented upward of 4.2 million infections out of about 140 million incidents that we analyzed for Norton users. Most of these incidents were never-before-seen malware and infection scenarios, thus truly providing "zero-day" protection! The effectiveness of our technology was repeatedly confirmed by external 3rd-party tests  and reviews (specifically behavioral security tests and reviews), where we performed at or near 100% detection rates. Behavioral security is a critical security solution, especially in this era of server-side polymorphic malware where each and every infection can have a unique piece of malware file (unique from the file fingerprint perspective) downloaded on the victim's machine. We are very excited about our next SONAR 3 release outperforming SONAR 2!


What's next?

We believe that security is a journey and not a destination.  Over the last year, we have taken note of a couple of interesting trends in the malware world, such as a surge in the misleading application threat category and targeted, sophisticated attacks like Hydraq. It was gratifying to see that SONAR 2 detected Hydraq without any changes to our classifier. We have further fine-tuned the classifier to deal with these trends. We have also added about 60 new features to our classifier and have seen significant improvement in threat detection rates in our internal lab testing. This brings our set of features to about 400!

This large number of features give us the advantage that, with SONAR tracking and inspecting so many aspects about a file, a process, or its related activity for classification, it becomes that much harder for a malware variant to get past our classification engine or for a clean sample to be misclassified. Of course the challenge is in analyzing all this information almost instantaneously without impacting system performance, while making decisions automatically for the user. And SONAR 3 is proof of how all of this is possible.



Having analyzed more than 140 million incidents for millions of Norton users, in SONAR 3 we have added many more features and provisions for identifying clean samples so that we can specifically focus on suspicious scenarios. This is what enables us to continue to add to our feature set for an even more accurate classifier. The quicker we can ignore a sample and classify it as clean, better the user experience.



In addition to the changes we have made to add many more attributes, the SONAR team has been very busy adapting and creating new classifiers as the world of malware and clean software evolves. The team has been busy updating our classifiers and releasing seven definition updates in the last nine months since shipping SONAR 2. The SONAR team generated and evaluated over 200 different classifiers since we shipped SONAR last year, addressing the feedback we have gotten from our Norton users to convict more malware and reduce the infrequent false-positive incidents that have occurred.



One major threat category that we have focused on with SONAR 3 is misleading applications. This class of threat has gotten much attention and we are glad to be able to provide significant improvements for detecting it in SONAR 3.



We have also made further improvements in the area of behavioral signatures, where we can quickly react to new and upcoming threats by writing behavioral signatures that leverage specific features. While our classifier has been quite successful at detecting new and emerging threats and their variants, we believe in a layered security model. In some specific threat scenarios it is more effective and worthwhile to target the threat with its specific characteristics than to leave it to a classifier.



As has been detailed in the SONAR 2 posts,  SONAR aggregates and correlates information from a number of engines within the product like the Firewall, AV Engine, Intrusion Prevention Engine, etc. All this information is then used by the classifier to improve efficacy. We feel this is a big differentiator for Norton over other vendors. Most other security products simply don’t have this depth and breadth of information to make a good classifier. In SONAR 3 we have further enhanced our integration with the network component in order to classify, convict, and remediate malware on the basis of its malicious network activity. With this feature in place, we will continue to block and remove many new variants of malware that leave their network footprint unchanged.



With these and all the improvements we are continuing to work on, we believe we are taking behavioral security to a whole new level. We hope that these new improvements will prove to be invaluable in dealing with the fast-evolving threat landscape and in keeping you safe. We cannot wait to ship SONAR 3 out to millions of Norton users. All the Norton 2010 and N360v4 users will also benefit from these advances, thanks to the ability to use Live Update for SONAR enhancements that we adopted with SONAR 2.



So that’s what we are up to! Let us know what you think--the SONAR team values your feedback and we hope you see all the improvements in the public Beta. Your feedback helps us know where we need to improve and we take your comments and suggestions as our most important barometer of success!

评分

参与人数 1人气 +1 收起 理由
尘梦幽然 + 1 感谢解答: )

查看全部评分

wjhstu-VxG
 楼主| 发表于 2012-5-8 22:08:40 | 显示全部楼层
……这个最好去问问吧~本身这个并不是datasheet,逐字逐句没意思,而且那个更新我看也是匆匆加上去的,有些没整合,前后两版也有些地方不一致,估计达意即可;至于实际,我觉得肯定有关联,FW高级组建监控里的击键,注入,网络协议层监控,本身就是恶意软件主要行为,SONAR肯定要监控,难道在设一层传感器?而且吧FW的数据共享给SONAR分析,并不需要多少成本啊,铁壳那个协议开发的时候,也应当整合了各个团队了吧?……问问吧
wjcharles
发表于 2012-5-8 22:18:20 | 显示全部楼层
本帖最后由 wjcharles 于 2012-5-8 22:38 编辑
5234377 发表于 2012-5-8 19:39
SONAR2到3变革非常大,SONAR3具备了真正的动态行为分析能力,出现较大规模的样本回滚现象,所以我不承认现 ...


首先,官方一直是说“从(与)防火墙。。。获取信息(通信)”,没说联动
如果所谓"联动"就是上述含义,那么最多说官方资料没有直接提到“SONAR4可以与防火墙联动”,跟NIS2012实际是否存在SONAR4与防火墙联动没有联系。。。

而SONAR3官方资料直接提到了,见125L
As has been detailed in the SONAR 2 posts,  SONAR aggregates and correlates information from a number of engines within the product like the Firewall, AV Engine, Intrusion Prevention Engine, etc.


另外这个算是SONAR4的从防火墙获取信息(联动)吗?

完整路径: 不可用
____________________________
____________________________
在电脑上的创建时间 2012/4/29 ( 23:22:37 )
上次使用时间 2012/4/29 ( 23:22:37 )
启动项目 否
已启动 是
____________________________
____________________________
极少用户信任的文件
诺顿社区中有不到 5 名用户使用了此文件。
____________________________
极新的文件
该文件已在8 天 前发行。
____________________________

此文件具有高风险。
____________________________
威胁详细信息
SONAR 主动防护监视电脑上的可疑程序活动。
____________________________


源文件:
00_1.exe
____________________________
文件操作
受感染文件: c:\users\sshss\downloads\00_1\00_1.exe
已删除
____________________________
网络操作
事件: 网络活动 (执行者 c:\users\sshss\downloads\00_1\00_1.exe, PID:10496)
未采取操作

____________________________
系统设置操作
事件: 进程启动 (执行者 c:\users\sshss\downloads\00_1\00_1.exe, PID:10496)
未采取操作
____________________________
文件指纹 - SHA:
bb781a63a5135495e8590315f6d8062d740e51bcfb963e16e6ec4c5e1a8bcc05
____________________________
文件指纹 - MD5:
01f2d4cbf58916890988f9a658cc11e7
____________________________

尘梦幽然
发表于 2012-5-8 22:52:27 | 显示全部楼层

RE:

wjhstu-VxG 发表于 2012-5-8 22:08
……这个最好去问问吧~本身这个并不是datasheet,逐字逐句没意思,而且那个更新我看也是匆匆加上去的,有些 ...

我再参考一下驭龙的信息吧。
有一些情况下,被防火墙block的程序不一定会被SONAR报,同样,被SONAR报的程序不一定会被防火墙阻止。[我是指关闭一方后测试]所以我的观点和这种情况有一定联系。
尘梦幽然
发表于 2012-5-8 22:59:21 | 显示全部楼层

RE:

wjcharles 发表于 2012-5-8 22:18
首先,官方一直是说“从(与)防火墙。。。获取信息(通信)”,没说联动
如果所谓"联动"就是上述含义 ...

你前面那段不知道是不是因为逻辑问题我没看懂。关于历史记录,有一些情况下,被防火墙block的程序不一定会被SONAR报,同样,被SONAR报的程序不一定会被防火墙阻止。[我是指关闭一方后测试]所以我的观点和这种情况有一定联系。
既然官方的资料中提到了能与防火墙交换信息,那么我也就不打算争辩更多了,你们提供的证据足够充足了。
只能说明STAR技术介绍可能没写完整。也或许是赛门铁克因为某些原因隐去了关于FW的几乎所有介绍。
wjcharles
发表于 2012-5-8 23:38:28 | 显示全部楼层
5234377 发表于 2012-5-8 22:59
你前面那段不知道是不是因为逻辑问题我没看懂。关于历史记录,有一些情况下,被防火墙block的程序不一定会 ...


最新的STAR介绍里确实隐去了FW相关介绍,说不定NIS2013的FW会有大变化,等公布后再补上
尘梦幽然
发表于 2012-5-9 13:22:13 | 显示全部楼层

RE:

wjcharles 发表于 2012-5-8 23:38
最新的STAR介绍里确实隐去了FW相关介绍,说不定NIS2013的FW会有大变化,等公布后再补上

大变化你也看到一些了,之前你在诺顿中国论坛上提的关于Insight与防火墙联动处理白加黑网购木马的建议看来赛门铁克早有打算了,或者是你的建议被采纳了。
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-1-20 20:10 , Processed in 0.104252 second(s), 15 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表