Search /
Docfinder:
Advanced search  |  Help  |  Site map
RESEARCH CENTERS
SITE RESOURCES
Click for Layer 8! No, really, click NOW!
Networking for Small Business
TODAY'S NEWS
Where's my gigabit Internet, anyway?
How a cyber cop patrols the underworld of e-commerce
For Red Hat, it's RHEL and then…?
Will the Internet of Things Become the Internet of Broken Things?
Kill switches coming to iPhone, Android, Windows devices in 2015
Israeli start-up, working with GE, out to detect Stuxnet-like attacks
Galaxy S5 deep-dive review: Long on hype, short on delivery
Google revenue jumps 19 percent but still disappoints
Windows XP's retirement turns into major security project for Chinese firm
Teen arrested in Heartbleed attack against Canadian tax site
Still deploying 11n Wi-Fi?  You might want to think again
Collaboration 2.0: Old meets new
9 Things You Need to Know Before You Store Data in the Cloud
Can Heartbleed be used in DDoS attacks?
Secure browsers offer alternatives to Chrome, IE and Firefox
Linksys WRT1900AC Wi-Fi router: Faster than anything we've tested
Heartbleed bug is irritating McAfee, Symantec, Kaspersky Lab
10 Hot Hadoop Startups to Watch
Server makers rushing out Heartbleed patches
Fortinet, McAfee, Trend Micro, Symantec, Bitdefender battle in socially-engineered malware prevention test
Net neutrality ruling complicates US transition to IP networks
6 Social Media Mistakes That Will Kill Your Career
Canonical's new Ubuntu focuses on the long haul
4 Qualities to Look for in a Data Scientist
Big bucks going to universities to solve pressing cybersecurity issues
/

Behavior blocking repels new viruses

Today's breaking news
Send to a friendFeedback


The future of computer viruses seems clear enough: ever more destructive "hybrid worms" that take advantage of software vulnerabilities and destroy files, leave behind holes for hackers to exploit, then scan for new victims at lightning speed.

Viruses such as last year's Code Red and Nimda are overrunning traditional antivirus software and intrusion-detection systems.


Hybrid worms are hard to hook

These products require updated "signatures" to detect and stop most new viruses, possibly leaving a several-hour window when even the best-prepared organizations are at risk.

Although antivirus software vendor Sophos identified 1,000 new viruses last year and such viruses are said to be costing companies billions of dollars on eradication efforts and in lost productivity, the virus writers haven't won this battle yet. Increasingly popular technology - dubbed behavior blocking - is starting to prove itself a worthy adversary.

"It did stop Code Red and Nimda," says Jay Ward, senior network security analyst for First Citizens Bank in Raleigh, N.C., which uses Entercept's behavior-blocking software to protect a Windows NT server running an online banking application.

Behavior-blocking software runs on server and desktop computers, and is instructed through policies that network administrators set to let benign actions take place but to intercede when unauthorized actions occur. Unacceptable behavior can take the form, for example, of a program that attempts to mass mail itself or that rummages around in registries. Behavior-blocking software can set aside suspicious code in a so-called "sandbox," keeping it from causing harm while a network administrator decides whether the code is nefarious.

Behavior-blocking software is available primarily from small companies such as Okena, Entercept and Pelican Security. Analysts also mention Aladdin Knowledge Systems, Finjan, Granite Technology, Sandbox Security, Secure4You and even old-timer Harris as companies carving out niches in protection against malicious code.

So far, traditional antivirus software companies have shown little interest in behavior-blocking, which observers say may be a mistake.

"Based on signatures, antivirus software on the desktop is dying," says John Pescatore, an analyst with Gartner. "We need behavior-based interception."

Behave yourselves

While customers say they aren't necessarily abandoning their signature-based antivirus software, they are starting to complement it with behavior-blocking products.

First Citizens Bank's Ward gave Version 2.0 of Entercept's behavior-blocking software a whirl after learning he couldn't patch known holes in the company's Microsoft servers without messing up an online banking application.

In mid-July, the Entercept software blocked and sandboxed unknown code it identified simply as a "Microsoft Directory Transversal Attack." By the next day, the world had identified the same code string as Code Red, Ward says.

Still, First Citizens Bank isn't about to dispense with its traditional antivirus software, which Ward says is effective at removing known viruses and in cleanup when viruses make a successful strike. However, he pointed to at least one case in which running both behavior-blocking and antivirus software slowed down an NT server, which meant the antivirus software had to be turned off.

Antivirus graphic

Hosted-service provider Corio is also sold on behavior-blocking software, which it used to stop Code Red and Nimda.

"We use the software as a layer of prevention," says Mark Milatovich, Corio's director of security. "The current model of the world - the antivirus model at the gateway, server, mail exchange and desktop - is a cat-and-mouse scenario. Antivirus software is only as good as those signatures. There's a window of exposure even with due diligence. We need prevention because these worms will get nastier."

Staying the course

In spite of such evidence that behavior-based software works, traditional antivirus vendors are largely ignoring the technology. Computer Associates, Network Associates, Sophos and Symantec say their tools will remain signature-based for the foreseeable future. Among other things, they point out that behavior-blocking software isn't geared toward eradicating viruses.

"For the foreseeable future, it's a matter of how up to date are you with signatures," says Sam Curry, McAfee.com's security architect.

While some vendors give behavior-blocking tools a modicum of respect, others are more critical.

"It brings a higher degree of false positives," says Vincent Werf, Symantec's senior director of security response. Symantec touts the "heuristics" capabilities in its Norton Antivirus products as able to detect some unknown viruses without signature, but Werf admits that heuristics didn't detect or stop Code Red or Nimda.

Challenges acknowledged

Even behavior-blocking product vendors say using their wares can be challenging. For one thing, it can be tricky to devise policies that ensure the software can distinguish between good and bad behavior.

"It's difficult to write generic rules that screen valid requests for data from invalid attacks," says Chad Harrington, product director at Entercept.

Behavior-based software also asks a company's IT administrators to be arbiters of whether suspect code, once it is flagged, is actually bad. Not only does this put an administrator on the spot, it could create a delay in action being taken.

But some customers are eager to give the software a chance.

"Behavior-blocking technologies could be easier to manage" because they don't require signature updating, says David Yaacobi, manager of information services at El Al Airlines. The company just deployed Sanctum's AppShield software to keep hackers from getting into its network through a public Web server and is investigating software from Pelican to help guard the airline's desktops.

Antivirus statistics graphic

Interestingly, although behavior-blocking software can stop harmful worms, most vendors that make it are reluctant to press their wares as a substitute for traditional antivirus code. "We don't protect against viruses, such as disk viruses not introduced from the Internet," says Gilad Golan, Pelican's president.

"We don't replace an antivirus product," Entercept's Harrington says. "The best way to stop intrusions is through both, because not all attacks can be detected through behavorial rules."

Ultimately, network executives have to decide whether they are willing to pay for behavior-blocking software, especially where it is seen as being merely complementary to traditional signature-based antivirus or intrusion-detection software that companies may already be spending $25 or more on per desktop. Behavior-blocking software costs roughly $50 or $60 per desktop and between $1,000 and $1,600 per server.

RELATED LINKS

NWFusion offers more than 40 FREE technology-specific email newsletters in key network technology areas such as NSM, VPNs, Convergence, Security and more.
Click here to sign up!
New Event - WANs: Optimizing Your Network Now.
Hear from the experts about the innovations that are already starting to shake up the WAN world. Free Network World Technology Tour and Expo in Dallas, San Francisco, Washington DC, and New York.
Attend FREE
Your FREE Network World subscription will also include breaking news and information on wireless, storage, infrastructure, carriers and SPs, enterprise applications, videoconferencing, plus product reviews, technology insiders, management surveys and technology updates - GET IT NOW.