查看: 5601|回复: 12
收起左侧

[讨论] 主动防御给软件行为打分

[复制链接]
天耀群星
头像被屏蔽
发表于 2016-5-5 21:23:22 | 显示全部楼层 |阅读模式
本帖最后由 天耀群星 于 2016-5-6 18:49 编辑

主动防御给软件行为打分。小动作违反规则就少量扣分,大行为【如修改物理内存】大扣分。
10分扣完得零分的软件,则阻止病毒行为,自动回滚或者隔离。比特梵德、费尔就是这样的主动防御。大家怎么看?
ccboxes
发表于 2016-5-5 23:49:48 | 显示全部楼层
费尔不清楚,BD的ATC是明确基于评分的主防机制,但估值函数相当复杂,同一行为在不同情况下的分值有不同,重复的同一行为也不会导致分数的线性增加,远不像你说的这么简单。优点是检测率高(很难被变种迷惑)以及可能便于与启发云整合(根据原理猜测),缺点是估值函数稳定后再调整不如规则式主防灵活。

至于哪一种更好限于知识水平无法评价。
windows7爱好者
发表于 2016-5-6 01:15:36 | 显示全部楼层
星云劫 发表于 2016-5-5 23:49
规则化和打分制之间有什么不同呢?

规则是指程序触发了主防的内置规则行为,一般触发多个才会被判定为病毒,比如拷贝自身到windows目录,修改注册表,添加启动项,禁止任务管理器等等,但是若没有触发规则或者触发的不到一定数量,就不会被拦截
打分制是根据陌生程序的行为来扣分,比如添加启动项-5分,修改系统文件-15分之类,达到一定的负分(其实是正数,我这里说负的形象一点),就会被主防击杀
一般打分制主防表现是优于规则制的,因为病毒会想办法避开规则主防的内置规则

评分

参与人数 1人气 +1 收起 理由
天耀群星 + 1 版区有你更精彩: )

查看全部评分

pal家族
发表于 2016-5-5 21:32:06 | 显示全部楼层
本帖最后由 pal家族 于 2016-5-5 22:59 编辑

编辑掉,刚才是瞎讲得得。。。。。。。。。抱歉哈
电脑发烧友
发表于 2016-5-5 21:45:09 | 显示全部楼层
我胡说八道一会。个人认为应该不知存在此类判定方式,应该还会根据多个行为所构成的效果,个人认为是行为间的逻辑关系。
例如根目录autorun+自我复制(到共享目录,根目录等)+注册表自启动我觉得应该是一个典型的蠕虫行为,也就是说多个行为间构成了一个明显的目的。主防的判断应该有考虑到这个。
例如屏蔽任务管理器+屏蔽键盘+自启动+巨大窗口无限置顶等,多个行为间构成了一个典型的锁屏行为。如果主防能够判断出来应该也能报毒。

仅为个人理解,如有错误,请多指教。

评分

参与人数 1人气 +1 收起 理由
天耀群星 + 1 版区有你更精彩: )

查看全部评分

windows7爱好者
发表于 2016-5-5 22:19:44 | 显示全部楼层
pal家族 发表于 2016-5-5 21:32
你说的我问题。
卡巴斯基 诺顿 趋势科技 等 也是如此

诺顿是规则化的主防吧,不是打分制的
我觉得两者结合用不错
900703
发表于 2016-5-5 22:22:33 | 显示全部楼层
廢爾在M01上有人被勒鎖軟體加密了啊
pal家族
发表于 2016-5-5 22:59:23 | 显示全部楼层
windows7爱好者 发表于 2016-5-5 22:19
诺顿是规则化的主防吧,不是打分制的
我觉得两者结合用不错

卧槽,我是傻逼了 被拉去打LOL,文章没仔细看没想就回复了。。。。。。
简直就是滑天下之大稽~~~~~@电脑发烧友

唉唉,好丢脸,,,,,,,,噗

评分

参与人数 1人气 +2 收起 理由
windows7爱好者 + 2 .......

查看全部评分

pal家族
发表于 2016-5-5 23:03:27 | 显示全部楼层
本帖最后由 pal家族 于 2016-5-5 23:07 编辑

简直羞死了,。。。。。。。。卡巴的SW和诺都的sonar,趋势的宙斯都是基于规则的。。。。。

What is the System Watcher component in Kaspersky PURE 2.0?
http://support.kaspersky.com/7587
The System Watcher component in Kaspersky PURE 2.0 collects data about the actions performed by applications on your computer and gives this information to other components for improved protection.

On the basis of the information collected, the System Watcher component allows you to roll back actions performed by malicious applications. In Kaspersky PURE 2.0, information about suspicious actions in the system is collected not only for the current session, but also for previous sessions. This makes it possible to roll back all actions performed by the application if the application is subsequently recognized as malicious.

Rolling back actions after malicious activity is detected in the system can be initiated either by the System Watcher component on the basis of patterns of dangerous behavior, or by Proactive Defense, or by running a virus scan task, or during the operations of File Anti-Virus.

Kaspersky PURE 2.0 includes support for updatable heuristics. Updatable heuristics are a regularly updated set of patterns of dangerous application behavior.

The application of this technology means that upon detection of a new virus or of a new modification to already known malware, it does not update the whole System Watcher module, but instead adds a new pattern to the heuristics database, updating it together with Kaspersky Lab's antivirus databases. This technology allows you to block other malicious software with similar behavior.

The operation mode of Kaspersky PURE 2.0 determines the way that this component reacts when an application's actions coincide with the patterns of dangerous behavior, and also determines whether to roll back a malicious application's actions. After detecting suspicious events in the system, the protection components of Kaspersky PURE 2.0 can request additional information from the System Watcher component.

In the interactive mode of Kaspersky PURE 2.0 you can view incident data collected by the System Watcher component in the form of a report on dangerous activity history, allowing you to make a decision about which action to take in the notification window. When the component detects a potentially dangerous application, a link to the System Watcher report is displayed in the upper part of the notification window with a request to take action.

Kaspersky PURE 2.0 includes the Applications Activity module, with which you can view information about installed applications and currently launched applications (such as information about an application's status and the level of trust attributed to it by Kaspersky PURE 2.0). You can find more detailed information about this in KB7936.



楼主讲的,多用于扫描组件:
Heuristic analysis in Kaspersky Internet Security 2013
http://support.kaspersky.com/8936
Heuristic analyzer (or simply, a heuristic) is a technology of virus detection, which cannot be detected by Anti-virus databases. It allows detecting objects, which are suspected being infected by unknown or new modification of known viruses. Files which are found by heuristics analyzer are considered to be probably infected.

An analyzer usually begins by scanning the code for suspicious attributes (commands) characteristic of malicious programs. This method is called static analysis. For example, many malicious programs search for executable programs, open the files found and modify them. A heuristic examines an application’s code and increases its “suspiciousness counter” for that application if it encounters a suspicious command. If the value of the counter after examining the entire code of the application exceeds a predefined threshold, the object is considered to be probably infected.

The advantages of this method include ease of implementation and high performance. However, the detection rate for new malicious code is low, while the false positive rate is high.

Thus, in today’s antivirus programs, static analysis is used in combination with dynamic analysis. The idea behind this combined approach is to emulate the execution of an application in a secure virtual environment before it actually runs on a user’s computer. In their marketing materials, vendors also use another term - “virtual PC emulation”.

A dynamic heuristic analyzer copies part of an application’s code into the emulation buffer of the antivirus program and uses special “tricks” to emulate its execution. If any suspicious actions are detected during this “quasi-execution”, the object is considered malicious and its execution on the computer is blocked.

The dynamic method requires significantly more system resources than the static method, because analysis based on this method involves using a protected virtual environment, with execution of applications on the computer delayed according to the amount of time required to complete the analysis. At the same time, the dynamic method offers much higher malware detection rates than the static method, with much lower false positive rates.
欧阳宣
头像被屏蔽
发表于 2016-5-5 23:44:00 来自手机 | 显示全部楼层
又一知乎体。。。楼主想得到什么类型的答案?
星云劫
发表于 2016-5-5 23:49:53 | 显示全部楼层
windows7爱好者 发表于 2016-5-5 22:19
诺顿是规则化的主防吧,不是打分制的
我觉得两者结合用不错

规则化和打分制之间有什么不同呢?
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2024-11-25 16:29 , Processed in 0.140466 second(s), 19 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表