本帖最后由 pkuyzy 于 2016-4-6 17:57 编辑
这些都是由相关杀软的白皮书上摘录下来的
DG
4. How DeepGuard works
DeepGuard's behavioral analysis is activated by two events. When a program is launched for the first time, DeepGuard analyses it to determine if it is safe to run. Subsequently, DeepGuard continues to monitor the program while running.
4.1 Pre-launch analysis
When a program is first executed, regardless of how it is launched
(the user clicks the file icon, an e-mail attachment or program initiates it, etc.), DeepGuard temporarily delays it from executing in order to perform the following checks:
File reputation check
If an Internet connection is available, DeepGuard sends a query to the Security Cloud to check for the latest information on the program's reputation in the clean file database, which contains the latest security evaluations for a vast catalog of commonly used applications. This database is maintained and constantly updated by Response Labs analysts. Programs that have been rated as clean in the database are allowed to bypass additional checks and launch immediately, whereas known malicious files are blocked at once.
For the user, the clean file cloud lookup functionality offers a number of advantages. Being able to use the security verdict for a known file from the clean file database not only removes the burden of identifying unknown or unfamiliar programs as legitimate or malicious from the user, it also means unnecessary security checks on clean files can be avoided. At the same time, by reducing to a manageable level the volume of software that needs to be individually evaluated, the ability to still white- or black-list selected programs becomes more meaningful. And finally, even when the product's signature databases are outdated or rarely updated, DeepGuard can still use the most up-to-date file reputation information to fine-tune its analysis.
Behavioral analysis
If the program is flagged as suspicious during the file reputation check, or if Internet access is unavailable, DeepGuard executes it in a virtual environment and observes its behavior for malicious actions, such as attempting to self-replicate, edit or delete critical system files, and so on.
Response Labs analysts continually research and update DeepGuard's scanning logic with detections for the most effective behavior patterns needed to spot malware. These detections may identify specific malware families (which typically share similar features or behavior) or they may more generally identify suspect actions, such as attempting to hide from process enumeration programs, which are indicative of malicious intent. The analyst's ability to tweak DeepGuard's engine in this manner permits an element of human discretion and flexibility, to provide a more fine-grained and ultimately more accurate analysis.
Prevalence rate check
DeepGuard includes a module that focuses on a file's prevalence rate. Clean files typically have thousands or millions of users, making them highly prevalent. In contrast, malware samples are comparatively rare. According to statistics generated from F-Secure's internal systems monitoring known threats, in a random sample of malicious programs found in the first four months of 2013, 99.7% of the threats were rarely seen in our user base. Rare or new files are automatically considered more suspect and subjected to greater scrutiny during the subsequent process monitoring stage.
Judgement on execution
Based on the file's reputation and behavior during emulation, DeepGuard makes one of four possible judgements:
a) The file is malicious and blocked
b) The user is given the option to allow or deny the launch
c) The file is clean and allowed to execute
d) The file's status as clean or malicious is still unknown
If the file is blocked from launching, a notification message is displayed providing additional details and an option to whitelist the program, if so desired.
If the status of the file is still unknown, DeepGuard allows the file to execute but continues to monitor it during the subsequent process monitoring stage.
4.2 During application execution
Even after a program has successfully passed pre-launch analysis and is executed, DeepGuard continues to monitor its behavior as a precaution against delayed malicious routines, a common tactic used by malware to circumvent runtime checks. This form of quiet vigilance also allows DeepGuard to provide constant protection for the user without visibly intruding on their experience by displaying excessive prompts.
Process monitoring
Applications are monitored for a number of suspicious actions, including (but not limited to):
.
Modifying the Windows registry
.
Editing files in certain critical system directories
.
Injecting code in another process's space
.
Attempting to hide processes or replicate themselves
As legitimate programs will also perform such actions from time to time, DeepGuard does not red-flag a program on the basis of a single action but instead watches for multiple suspicious operations. Once a critical threshold of suspect actions is reached, DeepGuard will block the process from continuing.
If available, file reputation and prevalence rating information from the Security Cloud is taken into account to determine this critical threshold. For example, DeepGuard treats files with a low-prevalence rating more aggressively by lowering the critical threshold of suspicious actions that can be performed before the file is blocked.
DeepGuard行为分析是由两个事件激活。当一个程序启动首次,DeepGuard对其进行分析以确定它是否是安全运行。随后,DeepGuard继续运行时监视程序。
4.1执行前的分析
当第一次执行的程序,不管它是如何启动
(用户点击文件图标,电子邮件附件或程序启动它,等等),DeepGuard暂时以进行下列检查执行延迟吧:
文件信誉检查
如果Internet连接可用,DeepGuard发送一个查询到的云安全检查该程序在一个干净的文件信誉数据库,其中包含最新的安全评估的常用应用广阔的目录中的最新信息。该数据库维护和响应Labs分析不断更新。已被评为数据库中的清洁程序允许绕过额外的检查,并立即启动,而已知的恶意文件被阻止一次。
对于用户来说,该干净的文件云查找功能提供了许多优点。能够使用的安全判决为已知的文件从清洁文件数据库不仅消除识别未知的或不熟悉的方案,作为合法或恶意来自用户的负担,这也意味着能够避免在清洁文件不必要的安全检查。同时,通过降低到可管理的水平,需要的软件的体积也可以单独评估,仍白色或黑列表中选择的能力的程序变得更有意义。最后,即使当产品的签名数据库过时或很少更新,DeepGuard仍然可以使用最先进的最新文件信誉信息,以微调的分析。
行为分析
如果程序被标记为文件信誉检查中可疑,或者上网不可用,DeepGuard在虚拟环境中执行它,并观察其行为的恶意行为,如试图自我复制,编辑或删除关键的系统文件,等等。
响应Labs分析研究不断和更新DeepGuard与检测的现货恶意软件所需要的最有效的行为模式扫描逻辑。这些检测可以识别特定的恶意软件家族(其通常具有相似的特征或行为),或者它们可以更一般地识别可疑行动,例如试图从过程枚举方案,其中指示恶意的隐藏。分析师对调整DeepGuard发动机以这种方式力所能及的人力谨慎和灵活的元素,提供更精细的,最终更准确的分析。
患病率检查
DeepGuard包括侧重于文件的患病率的模块。干净的文件通常具有数千或数百万的用户,使他们非常普遍。相反,恶意软件样本是比较罕见的。据F-Secure公司的内部监控系统的已知威胁产生,在第四个月2013年发现的恶意程序的随机抽样统计,在威胁中99.7%很少见到我们的用户群。罕见或新的文件将被自动认为是更嫌疑人,在随后的过程监控阶段受到更严格的审查。
判决执行上
根据仿真过程中该文件的信誉和行为,DeepGuard使得四个可能的判断之一:
一)该文件是恶意的和阻止
二)用户被给予允许或拒绝所推出的选项
三)该文件是干净,允许执行
四)本文件的干净的或恶意的状态仍是未知数
如果该文件是从启动阻塞,则通知消息提供更多的细节和白名单程序,如果需要的选项。
如果文件的状态仍是未知数,DeepGuard允许执行该文件,但会继续在后续过程监控阶段进行监控。
4.2在应用程序执行
即使程序已经成功通过发射前的分析和执行,DeepGuard将继续监控其作为对延迟恶意程序预防措施,使用的恶意软件绕过运行时检查常用的战术行为。安静的警惕这种形式也允许DeepGuard来为用户提供持续的保护,而不通过显示过度提示他们的经验明显侵入。
过程监控
应用程序为一些可疑操作,包括(但不限于)的监测:
。
修改Windows注册表
。
在某些关键的系统目录中编辑文件
。
在另一个进程的空间注入代码
。
试图隐藏进程或自我复制
作为合法程序会时不时还执行这样的操作,DeepGuard不警告单个动作的基础上,而是监视多个可疑的操作。一旦达到嫌疑操作的临界阈值,DeepGuard将阻止继续该过程。
如果可用,从安全的云文件信誉和患病率的评价信息,是考虑到,以确定此临界阈值。例如,DeepGuard通过降低嫌疑操作的临界阈值,可以提高低流行病毒的查杀率。
@root1605 ,大神有什么问题,麻烦指点一下,谢了
|