Members
  • Total Members: 14197
  • Latest: Levine
Stats
  • Total Posts: 43431
  • Total Topics: 16526
  • Online today: 2962
  • Online ever: 51419
  • (01. January 2010., 10:27:49)
Users Online
Users: 1
Guests: 2820
Total: 2821









Author Topic: Security software performs poorly in exploit test  (Read 2519 times)

0 Members and 2 Guests are viewing this topic.

Samker

  • SCF Administrator
  • *****
  • Posts: 7529
  • KARMA: 322
  • Gender: Male
  • Whatever doesn't kill us makes us stronger.
    • SCforum.info - Samker's Computer Forum
Security software performs poorly in exploit test
« on: 14. October 2008., 08:18:15 »


Security software suites are doing a poor job of detecting when a PC's software is under attack, according to Danish vendor Secunia.

Secunia tested how well a dozen Internet security suites could identify when a software vulnerability was being exploited, said Thomas Kristensen, Secunia's CTO.

That's a different approach from how the programs are architected today. Security software tends to focus on the detection of malicious software that ends up on a PC after a vulnerability has been exploited. The software is updated with signatures, or data files, that recognize certain malicious payloads that are delivered to the PC post exploit.

There's a distinct advantage in focusing on detecting an exploit rather than defending against innumerable payloads, Kristensen said. The exploit itself doesn't change and must be utilized in the same way for the PC to be hacked.

An innumerable number of payloads -- ranging from keystroke loggers to botnet software -- could be deployed during an attack against a vulnerability.

Identifying the exploit isn't easy work, however, Kristensen said. Versions of the program affected by the vulnerability must be analyzed before and after a patch is applied in order to figure out how the exploit works.

For its test, Secunia developed its own working exploits for known software vulnerabilities. Of those exploits, 144 were malicious files, such as multimedia files and office documents. The remaining 156 were exploits incorporated into malicious Web pages that look for browser and ActiveX vulnerabilities, among others.

Symantec came out on top, but even then, its results were not stellar: the company's Internet Security Suite 2009 detected 64 out of 300 exploits, or 21.33% of the sample set.

The results then became much worse. BitDefender's Internet Security Suite 2009 build 12.0.10 came in second, detecting 2.33% of the sample set. Trend Micro's Internet Security 2008 had the same detection rate as BitDefender, followed by McAfee's Internet Security Suite 2009 in third at 2%.

Kristensen cautioned that Secunia was aware most vendors are not focused on detecting exploits. But it would benefit vendors to start creating signatures for exploits rather than merely payloads, since it could save them more time. There are far fewer exploits than payloads, he said.

Vendors such as Symantec appear to be moving in that direction, as it has created signatures for Microsoft-related exploits, Kristensen said.

"We are not seeing any of the other vendors having anything similar to that," Kristensen said.

In the meantime, users should apply software patches as soon as those patches are released. If there's a delay between when an exploit is public and a patch released, users also can simply avoid using the particular program.

"Too many people think they have nothing to be worried about if they only have [antivirus software]," Kristensen said. "Unfortunately, that is definitely not the case."

(NetworkWorld)

Samker's Computer Forum - SCforum.info

Security software performs poorly in exploit test
« on: 14. October 2008., 08:18:15 »

 

With Quick-Reply you can write a post when viewing a topic without loading a new page. You can still use bulletin board code and smileys as you would in a normal post.

Name: Email:
Verification:
Type the letters shown in the picture
Listen to the letters / Request another image
Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.codekids.ba:

Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Kursevi programiranja za ucenike u Sarajevu

Terms of Use | Privacy Policy | Advertising
TinyPortal 2.3.1 © 2005-2023