- Google I/O 2013's Coolest Products and Services
- 10 Star Trek Technologies That are Almost Here
- 19 Generations of Computer Programmers
- 25 Must-Have Technologies for SMBs
Network World - This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.
If you're charged with keeping malware out of your organization you're probably getting lots of visits from vendors of automated dynamic analysis systems for malware, the latest and greatest mouse trap being hawked by a slew of security companies.
Automated dynamic analysis systems and sandboxes for malware are the latest "must-have" antivirus gap-filler. While signature-based detection and automated static analysis systems have continued to improve in incremental jumps, and have managed to keep pace with the threats they were designed to thwart, the overall percentage of malware threats that they're capable of detecting has been decreasing for a decade.
As a detection technology, the combination of these two methods probably ends up finding 10% to 20% of malware threats within one week of the malware being created and released by the bad guys. Ten years ago, that figure was likely in the 60% to 80% range.
To address the growing detection gap, the much touted and pimped solution is to use automated dynamic analysis systems (software- or appliance-based) to uncover the maliciousness of any binary file traversing the corporate network. The idea is to force any suspicious binary to run in a mock environment so it will exhibit its true behaviors, and if those behaviors are malicious, then the file is classified as malware. To deliver this mock environment just about all the vendors hawking "better mouse trap" solutions use some form of operating system emulation or virtualization (e.g. VMware).
The objective of the approach should be to detect malware that slips by the signature and static analysis systems, taking you from 10% to 20% detection back up to the glorious days of 60% to 80%. You'll even encounter some vendors claiming their solution will take you to the oxygen-deprived altitude of 99% to 100%.
Unfortunately, the reality of the situation is considerably different from the marketing pitch. The combination of signature detection, static analysis and automated dynamic analysis systems for malware detection yields different levels of success depending on the type of threat encountered.
Consider the corporate world which faces three separate threat categories: generic Internet threats (such as any target, anywhere on the Internet, with no victim selection); infiltration threats (such as malware crafted to work against typical/average corporate defense in depth strategies); and espionage threats (such as malware tools tuned to operate within your organization).
For generic Internet threats, the combination of antivirus defenses probably thwarts 80% to 90% of threats within one week of release by criminal authors. For infiltration threats orchestrated by criminals looking for bigger monetary yields, those same defenses thwart around 40% to 50% of the malware they employ. Meanwhile, for targeted espionage threats, you'd be hard pressed to detect up to 10% of the malware tools used to conduct such an attack.