SlideShare a Scribd company logo
1 of 33
Using Multiple Antivirus Engine Scanning to 
Protect Critical Infrastructure 
Tony Berning 
Senior Product Manager 
aberning@opswat.com 
8 April 2014
Agenda 
 Introduction to Multi-scanning 
 Factors Shaping Portable Media Security Policies 
 Balancing Security Requirements with Business Needs 
 Common Network Architectures 
 Defining Acceptable Media and Content 
 Ways to Supplement Multi-Scanning in Data Security Workflows 
 Additional Resources
Overview of Multi-Scanning 
Too much malware, insufficient detection
Amount of Malware Exponentially Increasing 
Over 220,000 new 
malware variants appear 
every day 
(AV-TEST) 
“Cyber attacks on 
America’s critical 
infrastructure 
increased 17-fold 
between 2009 and 
2011.” 
http://www.csmonitor.com/Commentary/Opini 
on/2012/0808/Help-wanted-Geek-squads-for- 
US-cybersecurity 
The rapid growth in the amount of malware continues to 
accelerate 
No AV vendor can keep up with the number of new malware 
variants 
The Problem
The Problem 
Factors affecting each antivirus product’s detection rate 
 Heuristics and other detection code 
 Size and coverage of the signature database 
 Update frequency of the signature database 
 Location of the AV vendor’s malware research lab(s)
Why use multiple antivirus engines ? 
 Increase malware zero hour detection rates [via heuristics] 
 Decrease malware detection time after an outbreak [via new signatures] 
 Increase resiliency to antivirus engines’ vulnerabilities
Combining Scan Results from Multiple Engines 
Every engine misses something 
No single antivirus is perfect, however each product has its own 
strengths and weaknesses, and is more efficient at detecting some 
threats than others. 
100% 
AV 2 
Detection Rate: 
Detection Rate:
Results from using multiple antivirus engines 
This graph shows the time between 
malware outbreak and AV detection by six 
AV engines for 75 outbreaks. 
No single engine detected every outbreak! 
Only by combining multiple engines in a 
multi-scanning solution were all outbreaks 
detected quickly. 
By adding additional engines, zero hour 
detection rates increase even further.
Geographic Distribution of AV vendors 
Note: Many vendors have centers in multiple locations
Defining Secure? 
Factors Shaping Portable Media Security 
Policies
Contributing Factors 
 Regulatory Bodies 
 Industry Working Groups 
 Internal Security Groups
Contributing Factors 
Regulatory Bodies 
 Data security requirements are set by many different 
groups 
 NIST 
 Nuclear Regulatory Commission 
 Etc 
 Many aspects are regulated 
 Types of media allowed 
 Virus scanning requirements 
 Logging 
 Authentication
Contributing Factors 
Industry Working Groups 
 Data security working groups to discuss implementations 
 What works 
 What doesn’t 
 Best Practices 
 Implementation Details
Contributing Factors 
Internal Security Groups 
 Multiple groups may have experts with ideas on how to 
implement security solutions 
 IT 
 Security officers
The Right Balance 
Security Requirements vs Business Needs
Security Requirements vs Business Needs 
Cost Considerations 
 Implementation Costs 
 Security Solutions 
 Consulting Costs 
 Infrastructure Costs 
 Costs to Productivity 
 Additional time to follow security procedures 
 Training time and cost 
 Potential downtime if systems fail
Security Requirements vs Business Needs 
Potential Cost Savings 
 Remediation Costs 
 System Downtime 
 Productivity Costs 
 Removal Costs 
 Impact to Reputation 
 Lawsuits 
 Information Loss 
 Classified Information 
 Sensitive Corporate Data
Security Requirements vs Business Needs 
Laptop as secure paperweight
Security Requirements vs Business Needs 
Laptop as a secure productivity tool
How it’s Done 
Common Security Architectures
Common Security Architectures 
Standalone Systems with no Network connectivity 
In this deployment option, portable media scanning kiosks have no network connection. 
Virus definition updates are downloaded from a system connected to the Internet and 
copied to physical media to be transferred to each kiosk. 
Pros 
No network connection required 
Cons 
Updating virus definitions requires physically bringing media (USB drive/DVD/CD) to each 
kiosk and applying the update on each one
Common Security Architectures 
Standalone Systems with Management Station 
In this deployment option, a Management Station is installed on a dedicated system that has network 
connection to each kiosk. The have network connection only to the Management Station. Virus 
definition updates are downloaded on the system with the Management Station and updates are 
applied to the kiosks via the Management Station. 
Pros 
Easier to deploy than standalone systems with no network connectivity 
Cons 
Requires network connectivity between each kiosk and the Management Station 
Definition updates need to be transferred over the network 
Requires an additional system for the Management Station
Common Security Architectures 
Distributed Systems (Metascan Server Offline) 
In a distributed system, kiosks have only a client installed. The scanning server is installed on a 
dedicated system. In this deployment option, the server does not have access to the Internet, and the 
kiosks have network connection to the scanning server only. Virus definition updates are downloaded 
on a system with connection to the Internet and manually transferred and applied to the scanning 
server. 
Pros 
Only requires deploying virus definition updates to a single scanning server 
The server can be higher powered to allow for higher scan throughput 
Cons 
Requires network connectivity between each kiosk and the scanning server 
All files being scanned will be transferred over the network
Common Security Architectures 
Distributed Systems (Metascan Server Online) 
In a distributed system, kiosks have only a client installed. The scanning server is installed on a 
dedicated system. In this deployment option, the scanning server has access to the Internet, and the 
kiosks have network connectivity to the scanning server only. Because of Internet connectivity, virus 
definitions automatically update on the scanning server. 
Pros 
Virus definition updates are applied automatically to the scanning server 
The server can be higher powered to allow for higher scan throughput 
Cons 
Requires network connectivity between each kiosk and the scanning server 
All files being scanned will be transferred over the network 
Requires Internet connection for the scanning server
What’s Allowed 
Defining Acceptable Media Types and Files
Defining Acceptable Media Types and Files 
Types of Portable Media 
 Many Types of Media 
 USB Flash Drives 
 USB Hard Drives 
 CD/DVDs 
 SD Cards 
 Mobile Phones 
 Etc 
 Characteristics more important 
 Read/Write 
 Encrypted 
 Multiple Partitions
Defining Acceptable Media Types and Files 
Types of Files 
 General Classes of Files 
 Office Documents 
 Archives 
 Executables 
 Text 
 Characteristics more important 
 Encrypted 
 Embedded Objects 
 Digitally Signed
Defining Acceptable Media Types and Files 
Methods of Control 
 Blacklisting/Whitelisting 
 Specific Types of files 
 Specific types of sources 
 Specific sources (based on serial number, etc)
Data Security Workflows 
How to Supplement Multi-Scanning
Supplementing Multi-Scanning 
Why Scanning with Multiple Antivirus Engines Sometimes isn’t Enough 
 Zero Day Attacks 
 Embedded Objects 
New Header 
Virus 
Cod 
e 
Host 
File 
Data
Supplementing Multi-Scanning 
Ways to Supplement 
 User Authentication 
 Set different policies for different users 
 Source Blacklisting/Whitelisting 
 File Type Filtering 
 File Type Conversion 
 Remove embedded objects from files not detected by antivirus engines 
 Digital Signatures 
 Validate all executables are digitally signed by a trusted source 
 Digitally sign all files after scanning to verify they have not been changed after 
scanning 
 Periodic Re-scanning 
 Dynamic analysis 
 Sandbox solutions such as FireEye, Bluecoat, ThreatTrack, others 
 Human inspection and reverse engineering
Supplementing Multi-Scanning 
Example
Further Resources 
 My contact information 
 Tony Berning 
 aberning@opswat.com 
 White Paper: “Protecting Critical Infrastructure from Threats” 
 Demo Metascan Server and Metadefender installations available at https://my.opswat.com (requires 
creation of a free OPSWAT Portal account) 
 For further questions on Metascan or Metadefender contact sales@opswat.com

More Related Content

What's hot

Lateral Movement: How attackers quietly traverse your Network
Lateral Movement: How attackers quietly traverse your NetworkLateral Movement: How attackers quietly traverse your Network
Lateral Movement: How attackers quietly traverse your NetworkEC-Council
 
Penetration testing
Penetration testingPenetration testing
Penetration testingAmmar WK
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligenceMarlabs
 
2022 APIsecure_Monitoring your APIs for Attacks Using SIEM versus XDR
2022 APIsecure_Monitoring your APIs for Attacks Using SIEM versus XDR2022 APIsecure_Monitoring your APIs for Attacks Using SIEM versus XDR
2022 APIsecure_Monitoring your APIs for Attacks Using SIEM versus XDRAPIsecure_ Official
 
What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityWhat is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityPanda Security
 
Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceThreat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceVishal Kumar
 
Malware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence MoroccoMalware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence MoroccoTouhami Kasbaoui
 
Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsIain Dickson
 
Getting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsGetting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsOlakanmi Oluwole
 
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...MITRE - ATT&CKcon
 
How MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operationsHow MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operationsSergey Soldatov
 
Bulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalBulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalMahmoud Yassin
 
The ATT&CK Latin American APT Playbook
The ATT&CK Latin American APT PlaybookThe ATT&CK Latin American APT Playbook
The ATT&CK Latin American APT PlaybookMITRE ATT&CK
 
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...MITRE - ATT&CKcon
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligencemohamed nasri
 

What's hot (20)

Lateral Movement: How attackers quietly traverse your Network
Lateral Movement: How attackers quietly traverse your NetworkLateral Movement: How attackers quietly traverse your Network
Lateral Movement: How attackers quietly traverse your Network
 
Osint
OsintOsint
Osint
 
Penetration testing
Penetration testingPenetration testing
Penetration testing
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
2022 APIsecure_Monitoring your APIs for Attacks Using SIEM versus XDR
2022 APIsecure_Monitoring your APIs for Attacks Using SIEM versus XDR2022 APIsecure_Monitoring your APIs for Attacks Using SIEM versus XDR
2022 APIsecure_Monitoring your APIs for Attacks Using SIEM versus XDR
 
Offensive OSINT
Offensive OSINTOffensive OSINT
Offensive OSINT
 
What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityWhat is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda Security
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
 
Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceThreat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement Matrice
 
Malware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence MoroccoMalware analysis _ Threat Intelligence Morocco
Malware analysis _ Threat Intelligence Morocco
 
Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feeds
 
Getting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigationsGetting started with using the Dark Web for OSINT investigations
Getting started with using the Dark Web for OSINT investigations
 
Supply Chain Attacks
Supply Chain AttacksSupply Chain Attacks
Supply Chain Attacks
 
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
 
How MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operationsHow MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operations
 
Bulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalBulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat Landscapefinal
 
The ATT&CK Latin American APT Playbook
The ATT&CK Latin American APT PlaybookThe ATT&CK Latin American APT Playbook
The ATT&CK Latin American APT Playbook
 
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 

Similar to Using Multiple Antivirus Engine Scanning to Protect Critical Infrastructure

Securing data flow to and from organizations
Securing data flow to and from organizationsSecuring data flow to and from organizations
Securing data flow to and from organizationsOPSWAT
 
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINXKeep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINXNGINX, Inc.
 
A trust system based on multi level virus detection
A trust system based on multi level virus detectionA trust system based on multi level virus detection
A trust system based on multi level virus detectionUltraUploader
 
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...IRJET Journal
 
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chancePenetration testing dont just leave it to chance
Penetration testing dont just leave it to chanceDr. Anish Cheriyan (PhD)
 
Automating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS CloudAutomating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS CloudAmazon Web Services
 
Protecting Windows Networks From Malware 31 Jan09
Protecting Windows Networks From Malware 31 Jan09Protecting Windows Networks From Malware 31 Jan09
Protecting Windows Networks From Malware 31 Jan09technext1
 
Protecting Windows Networks From Malware
Protecting Windows Networks From MalwareProtecting Windows Networks From Malware
Protecting Windows Networks From MalwareRishu Mehra
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentationlaonap166
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself Alert Logic
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environmentsamiable_indian
 
Tech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs WhitelistingTech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs WhitelistingInvincea, Inc.
 
Iaetsd evasive security using ac ls on threads
Iaetsd evasive security using ac ls on threadsIaetsd evasive security using ac ls on threads
Iaetsd evasive security using ac ls on threadsIaetsd Iaetsd
 
5 howtomitigate
5 howtomitigate5 howtomitigate
5 howtomitigatericharddxd
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint SecurityBurak DAYIOGLU
 
Security Operations
Security OperationsSecurity Operations
Security Operationsankitmehta21
 
Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51martinvoelk
 
Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010nuttakorn nakkerd
 

Similar to Using Multiple Antivirus Engine Scanning to Protect Critical Infrastructure (20)

Securing data flow to and from organizations
Securing data flow to and from organizationsSecuring data flow to and from organizations
Securing data flow to and from organizations
 
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINXKeep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
Keep Ahead of Evolving Cyberattacks with OPSWAT and F5 NGINX
 
A trust system based on multi level virus detection
A trust system based on multi level virus detectionA trust system based on multi level virus detection
A trust system based on multi level virus detection
 
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
 
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chancePenetration testing dont just leave it to chance
Penetration testing dont just leave it to chance
 
Automating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS CloudAutomating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS Cloud
 
Protecting Windows Networks From Malware 31 Jan09
Protecting Windows Networks From Malware 31 Jan09Protecting Windows Networks From Malware 31 Jan09
Protecting Windows Networks From Malware 31 Jan09
 
Protecting Windows Networks From Malware
Protecting Windows Networks From MalwareProtecting Windows Networks From Malware
Protecting Windows Networks From Malware
 
CICD.pptx
CICD.pptxCICD.pptx
CICD.pptx
 
Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environments
 
Tech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs WhitelistingTech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs Whitelisting
 
Iaetsd evasive security using ac ls on threads
Iaetsd evasive security using ac ls on threadsIaetsd evasive security using ac ls on threads
Iaetsd evasive security using ac ls on threads
 
5 howtomitigate
5 howtomitigate5 howtomitigate
5 howtomitigate
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
Security Operations
Security OperationsSecurity Operations
Security Operations
 
Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51Why Penetration Testing Services Cyber51
Why Penetration Testing Services Cyber51
 
Active Testing
Active TestingActive Testing
Active Testing
 
Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010Antivirus test-wholedynamic2010
Antivirus test-wholedynamic2010
 

More from OPSWAT

Preventing Known and Unknown Threats
Preventing Known and Unknown ThreatsPreventing Known and Unknown Threats
Preventing Known and Unknown ThreatsOPSWAT
 
How to Identify Potentially Unwanted Applications
How to Identify Potentially Unwanted ApplicationsHow to Identify Potentially Unwanted Applications
How to Identify Potentially Unwanted ApplicationsOPSWAT
 
Securing Nuclear Facilities
Securing Nuclear FacilitiesSecuring Nuclear Facilities
Securing Nuclear FacilitiesOPSWAT
 
3 Cases for Quarantine Confirgurations
3 Cases for Quarantine Confirgurations3 Cases for Quarantine Confirgurations
3 Cases for Quarantine ConfirgurationsOPSWAT
 
Protecting the Oil and Gas Industry from Email Threats
Protecting the Oil and Gas Industry from Email ThreatsProtecting the Oil and Gas Industry from Email Threats
Protecting the Oil and Gas Industry from Email ThreatsOPSWAT
 
Reasons for the Popularity of Medical Record Theft
Reasons for the Popularity of Medical Record TheftReasons for the Popularity of Medical Record Theft
Reasons for the Popularity of Medical Record TheftOPSWAT
 
Defense Innovation Summit
Defense Innovation SummitDefense Innovation Summit
Defense Innovation SummitOPSWAT
 
Top 10 Facts About Data Breaches
Top 10 Facts About Data BreachesTop 10 Facts About Data Breaches
Top 10 Facts About Data BreachesOPSWAT
 
Metascan Multi-Scanning Technology for Linux
Metascan Multi-Scanning Technology for LinuxMetascan Multi-Scanning Technology for Linux
Metascan Multi-Scanning Technology for LinuxOPSWAT
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees OPSWAT
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyOPSWAT
 
Introduction to OESIS Framework
Introduction to OESIS FrameworkIntroduction to OESIS Framework
Introduction to OESIS FrameworkOPSWAT
 
Introduction to Metascan Client
Introduction to Metascan ClientIntroduction to Metascan Client
Introduction to Metascan ClientOPSWAT
 
Metascan Multi-scanning Technology
Metascan Multi-scanning TechnologyMetascan Multi-scanning Technology
Metascan Multi-scanning TechnologyOPSWAT
 
The Value of Multi-scanning
The Value of Multi-scanningThe Value of Multi-scanning
The Value of Multi-scanningOPSWAT
 

More from OPSWAT (15)

Preventing Known and Unknown Threats
Preventing Known and Unknown ThreatsPreventing Known and Unknown Threats
Preventing Known and Unknown Threats
 
How to Identify Potentially Unwanted Applications
How to Identify Potentially Unwanted ApplicationsHow to Identify Potentially Unwanted Applications
How to Identify Potentially Unwanted Applications
 
Securing Nuclear Facilities
Securing Nuclear FacilitiesSecuring Nuclear Facilities
Securing Nuclear Facilities
 
3 Cases for Quarantine Confirgurations
3 Cases for Quarantine Confirgurations3 Cases for Quarantine Confirgurations
3 Cases for Quarantine Confirgurations
 
Protecting the Oil and Gas Industry from Email Threats
Protecting the Oil and Gas Industry from Email ThreatsProtecting the Oil and Gas Industry from Email Threats
Protecting the Oil and Gas Industry from Email Threats
 
Reasons for the Popularity of Medical Record Theft
Reasons for the Popularity of Medical Record TheftReasons for the Popularity of Medical Record Theft
Reasons for the Popularity of Medical Record Theft
 
Defense Innovation Summit
Defense Innovation SummitDefense Innovation Summit
Defense Innovation Summit
 
Top 10 Facts About Data Breaches
Top 10 Facts About Data BreachesTop 10 Facts About Data Breaches
Top 10 Facts About Data Breaches
 
Metascan Multi-Scanning Technology for Linux
Metascan Multi-Scanning Technology for LinuxMetascan Multi-Scanning Technology for Linux
Metascan Multi-Scanning Technology for Linux
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny Czarny
 
Introduction to OESIS Framework
Introduction to OESIS FrameworkIntroduction to OESIS Framework
Introduction to OESIS Framework
 
Introduction to Metascan Client
Introduction to Metascan ClientIntroduction to Metascan Client
Introduction to Metascan Client
 
Metascan Multi-scanning Technology
Metascan Multi-scanning TechnologyMetascan Multi-scanning Technology
Metascan Multi-scanning Technology
 
The Value of Multi-scanning
The Value of Multi-scanningThe Value of Multi-scanning
The Value of Multi-scanning
 

Recently uploaded

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 

Recently uploaded (20)

Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 

Using Multiple Antivirus Engine Scanning to Protect Critical Infrastructure

  • 1. Using Multiple Antivirus Engine Scanning to Protect Critical Infrastructure Tony Berning Senior Product Manager aberning@opswat.com 8 April 2014
  • 2. Agenda  Introduction to Multi-scanning  Factors Shaping Portable Media Security Policies  Balancing Security Requirements with Business Needs  Common Network Architectures  Defining Acceptable Media and Content  Ways to Supplement Multi-Scanning in Data Security Workflows  Additional Resources
  • 3. Overview of Multi-Scanning Too much malware, insufficient detection
  • 4. Amount of Malware Exponentially Increasing Over 220,000 new malware variants appear every day (AV-TEST) “Cyber attacks on America’s critical infrastructure increased 17-fold between 2009 and 2011.” http://www.csmonitor.com/Commentary/Opini on/2012/0808/Help-wanted-Geek-squads-for- US-cybersecurity The rapid growth in the amount of malware continues to accelerate No AV vendor can keep up with the number of new malware variants The Problem
  • 5. The Problem Factors affecting each antivirus product’s detection rate  Heuristics and other detection code  Size and coverage of the signature database  Update frequency of the signature database  Location of the AV vendor’s malware research lab(s)
  • 6. Why use multiple antivirus engines ?  Increase malware zero hour detection rates [via heuristics]  Decrease malware detection time after an outbreak [via new signatures]  Increase resiliency to antivirus engines’ vulnerabilities
  • 7. Combining Scan Results from Multiple Engines Every engine misses something No single antivirus is perfect, however each product has its own strengths and weaknesses, and is more efficient at detecting some threats than others. 100% AV 2 Detection Rate: Detection Rate:
  • 8. Results from using multiple antivirus engines This graph shows the time between malware outbreak and AV detection by six AV engines for 75 outbreaks. No single engine detected every outbreak! Only by combining multiple engines in a multi-scanning solution were all outbreaks detected quickly. By adding additional engines, zero hour detection rates increase even further.
  • 9. Geographic Distribution of AV vendors Note: Many vendors have centers in multiple locations
  • 10. Defining Secure? Factors Shaping Portable Media Security Policies
  • 11. Contributing Factors  Regulatory Bodies  Industry Working Groups  Internal Security Groups
  • 12. Contributing Factors Regulatory Bodies  Data security requirements are set by many different groups  NIST  Nuclear Regulatory Commission  Etc  Many aspects are regulated  Types of media allowed  Virus scanning requirements  Logging  Authentication
  • 13. Contributing Factors Industry Working Groups  Data security working groups to discuss implementations  What works  What doesn’t  Best Practices  Implementation Details
  • 14. Contributing Factors Internal Security Groups  Multiple groups may have experts with ideas on how to implement security solutions  IT  Security officers
  • 15. The Right Balance Security Requirements vs Business Needs
  • 16. Security Requirements vs Business Needs Cost Considerations  Implementation Costs  Security Solutions  Consulting Costs  Infrastructure Costs  Costs to Productivity  Additional time to follow security procedures  Training time and cost  Potential downtime if systems fail
  • 17. Security Requirements vs Business Needs Potential Cost Savings  Remediation Costs  System Downtime  Productivity Costs  Removal Costs  Impact to Reputation  Lawsuits  Information Loss  Classified Information  Sensitive Corporate Data
  • 18. Security Requirements vs Business Needs Laptop as secure paperweight
  • 19. Security Requirements vs Business Needs Laptop as a secure productivity tool
  • 20. How it’s Done Common Security Architectures
  • 21. Common Security Architectures Standalone Systems with no Network connectivity In this deployment option, portable media scanning kiosks have no network connection. Virus definition updates are downloaded from a system connected to the Internet and copied to physical media to be transferred to each kiosk. Pros No network connection required Cons Updating virus definitions requires physically bringing media (USB drive/DVD/CD) to each kiosk and applying the update on each one
  • 22. Common Security Architectures Standalone Systems with Management Station In this deployment option, a Management Station is installed on a dedicated system that has network connection to each kiosk. The have network connection only to the Management Station. Virus definition updates are downloaded on the system with the Management Station and updates are applied to the kiosks via the Management Station. Pros Easier to deploy than standalone systems with no network connectivity Cons Requires network connectivity between each kiosk and the Management Station Definition updates need to be transferred over the network Requires an additional system for the Management Station
  • 23. Common Security Architectures Distributed Systems (Metascan Server Offline) In a distributed system, kiosks have only a client installed. The scanning server is installed on a dedicated system. In this deployment option, the server does not have access to the Internet, and the kiosks have network connection to the scanning server only. Virus definition updates are downloaded on a system with connection to the Internet and manually transferred and applied to the scanning server. Pros Only requires deploying virus definition updates to a single scanning server The server can be higher powered to allow for higher scan throughput Cons Requires network connectivity between each kiosk and the scanning server All files being scanned will be transferred over the network
  • 24. Common Security Architectures Distributed Systems (Metascan Server Online) In a distributed system, kiosks have only a client installed. The scanning server is installed on a dedicated system. In this deployment option, the scanning server has access to the Internet, and the kiosks have network connectivity to the scanning server only. Because of Internet connectivity, virus definitions automatically update on the scanning server. Pros Virus definition updates are applied automatically to the scanning server The server can be higher powered to allow for higher scan throughput Cons Requires network connectivity between each kiosk and the scanning server All files being scanned will be transferred over the network Requires Internet connection for the scanning server
  • 25. What’s Allowed Defining Acceptable Media Types and Files
  • 26. Defining Acceptable Media Types and Files Types of Portable Media  Many Types of Media  USB Flash Drives  USB Hard Drives  CD/DVDs  SD Cards  Mobile Phones  Etc  Characteristics more important  Read/Write  Encrypted  Multiple Partitions
  • 27. Defining Acceptable Media Types and Files Types of Files  General Classes of Files  Office Documents  Archives  Executables  Text  Characteristics more important  Encrypted  Embedded Objects  Digitally Signed
  • 28. Defining Acceptable Media Types and Files Methods of Control  Blacklisting/Whitelisting  Specific Types of files  Specific types of sources  Specific sources (based on serial number, etc)
  • 29. Data Security Workflows How to Supplement Multi-Scanning
  • 30. Supplementing Multi-Scanning Why Scanning with Multiple Antivirus Engines Sometimes isn’t Enough  Zero Day Attacks  Embedded Objects New Header Virus Cod e Host File Data
  • 31. Supplementing Multi-Scanning Ways to Supplement  User Authentication  Set different policies for different users  Source Blacklisting/Whitelisting  File Type Filtering  File Type Conversion  Remove embedded objects from files not detected by antivirus engines  Digital Signatures  Validate all executables are digitally signed by a trusted source  Digitally sign all files after scanning to verify they have not been changed after scanning  Periodic Re-scanning  Dynamic analysis  Sandbox solutions such as FireEye, Bluecoat, ThreatTrack, others  Human inspection and reverse engineering
  • 33. Further Resources  My contact information  Tony Berning  aberning@opswat.com  White Paper: “Protecting Critical Infrastructure from Threats”  Demo Metascan Server and Metadefender installations available at https://my.opswat.com (requires creation of a free OPSWAT Portal account)  For further questions on Metascan or Metadefender contact sales@opswat.com