Week 9. Improving Threat Detection
Antivirus companies have tried different methods to detect and stop threats. Unfortunately, they seem to be one step behind the malware makers. There are many various types of malware detections; all can be summarized into three groups: pattern matching, instruction matching, and behavioral detection.
Pattern matching is usually referred to as signature or fingerprint matching. It searches the files for known patterns. Once a match or close match is found, the file is flagged as a threat and is classified according to the pattern's threat class. With that said, the pattern was found and studied from one of the infected machines. By the time the pattern gets extracted from the malware and updated to the installed detection software, the malware already infected many more.
Instruction matching is similar to pattern matching technique. However, instead of look for known fingerprints, it looks for known instructions or commands. This method usually keeps track and monitor system and other important files. When detecting a suspected operation such as delete or modify is being done on the files, the malware is either deleted or blocked and wait for user action. The instruction matching method requires permission at OS level.
The behavioral detection method takes a completely different approach than the other two categories. This method monitors all programs on the system for abnormal behaviors. When detected, the system can either delete the program or suspend the operation and notify the user. This mechanism is better at detecting new threats before they can spread.
With all the improvement, malware still manages to get in computer systems. So what is the missing links? I don't know the answer. I do however believe that the suspicious behavior method should be able to contain the threat. If that does not work, there must be constraints that limit the capabilities of the approach. I think one of the limitations is the inability to reach low-level control. Let's assume the OS can to distinguish between user actions versus system, remote, or scripting actions. Suppose the detection programs can communicate with each other within the same network. The detection mechanism can make a better prediction about the potential threats. When detected, it then can notify other systems to prevent the threat from spreading.
Comments
Post a Comment