SlideShare a Scribd company logo
Introduction
                          Heuristic scanning theory
       Case Study: Modern heuristic scanner features
                                           Summary
                                   Further reading...




                    Artificial Intelligence Methods in
                     Virus Detection & Recognition
                           Introduction to heuristic scanning


                                     Wojciech Podg´rski
                                                  o
                                        http://podgorski.wordpress.com




                                         October 16, 2008



Wojciech Podg´rski http://podgorski.wordpress.com
             o                                            Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                            Heuristic scanning theory
         Case Study: Modern heuristic scanner features
                                             Summary
                                     Further reading...


Presentation outline
  1   Introduction
         Fundamentals of malware
         Metaheuristics in Virus Detection & Recognition
  2   Heuristic scanning theory
         Lacks in specific detection
         Heuristic scanning conception
         Recognizing potential threat
         Coping with anti-heuristic mechanisms
         Towards accuracy improvement
  3   Case Study: Modern heuristic scanner features
         Panda’s Technology Evolution
         Genetic Heuristic Engine - Nereus
  4   Summary
  5   Further reading...
  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                          Heuristic scanning theory
                                                        Fundamentals of malware
       Case Study: Modern heuristic scanner features
                                                        Metaheuristics in Virus Detection & Recognition
                                           Summary
                                   Further reading...




Malware
Malware (malicious software) is software designed to infiltrate or
damage a computer system without the owner’s informed consent.
                                                               Source: http://en.wikipedia.org/wiki/Malware




Wojciech Podg´rski http://podgorski.wordpress.com
             o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                            Heuristic scanning theory
                                                          Fundamentals of malware
         Case Study: Modern heuristic scanner features
                                                          Metaheuristics in Virus Detection & Recognition
                                             Summary
                                     Further reading...


Malware types
  We can distinguish quite few malicious software types. It is important to
  be aware that nevertheless all of them have similar purpose, each one
  behave differently.
         Viruses
         Worms
         Wabbits
         Trojan horses
         Exploits/Backdoors
         Spyware/Scumware/Stealware/Parasiteware/Adware
         Rootkits
         Keyloggers/Dialers
         Hoaxes
  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                            Heuristic scanning theory
                                                          Fundamentals of malware
         Case Study: Modern heuristic scanner features
                                                          Metaheuristics in Virus Detection & Recognition
                                             Summary
                                     Further reading...


Malware = Viruses



  Due to different behaviour, each malware group uses alternative
  ways of being undetected. This forces anti-virus software
  producers to develop numerous solutions and countermeasures for
  computer protection.

  This presentation focuses on methods used especially for virus
  detection, not necessarily effective against other types of
  malicious software.




  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                            Heuristic scanning theory
                                                          Fundamentals of malware
         Case Study: Modern heuristic scanner features
                                                          Metaheuristics in Virus Detection & Recognition
                                             Summary
                                     Further reading...


Infection strategies

  To better understand how viruses are detected and recognized, it is
  essential to divide them by their infection ways.
         Nonresident viruses The simplest form of viruses which
         don’t stay in memory, but infect founded executable file and
         search for another to replicate.
         Resident viruses More complex and efficient type of viruses
         which stay in memory and hide their presence from other
         processes. Kind of TSR apps.
                 Fast infectors Type which is designed to infect as many files as
                 possible.
                 Slow infectors Using stealth and encryption techniques to stay
                 undetected outlast.


  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                            Heuristic scanning theory
                                                          Fundamentals of malware
         Case Study: Modern heuristic scanner features
                                                          Metaheuristics in Virus Detection & Recognition
                                             Summary
                                     Further reading...


Infection strategies

  To better understand how viruses are detected and recognized, it is
  essential to divide them by their infection ways.
         Nonresident viruses The simplest form of viruses which
         don’t stay in memory, but infect founded executable file and
         search for another to replicate.
         Resident viruses More complex and efficient type of viruses
         which stay in memory and hide their presence from other
         processes. Kind of TSR apps.
                 Fast infectors Type which is designed to infect as many files as
                 possible.
                 Slow infectors Using stealth and encryption techniques to stay
                 undetected outlast.


  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                            Heuristic scanning theory
                                                          Fundamentals of malware
         Case Study: Modern heuristic scanner features
                                                          Metaheuristics in Virus Detection & Recognition
                                             Summary
                                     Further reading...


Infection strategies

  To better understand how viruses are detected and recognized, it is
  essential to divide them by their infection ways.
         Nonresident viruses The simplest form of viruses which
         don’t stay in memory, but infect founded executable file and
         search for another to replicate.
         Resident viruses More complex and efficient type of viruses
         which stay in memory and hide their presence from other
         processes. Kind of TSR apps.
                 Fast infectors Type which is designed to infect as many files as
                 possible.
                 Slow infectors Using stealth and encryption techniques to stay
                 undetected outlast.


  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                            Heuristic scanning theory
                                                          Fundamentals of malware
         Case Study: Modern heuristic scanner features
                                                          Metaheuristics in Virus Detection & Recognition
                                             Summary
                                     Further reading...


Infection strategies

  To better understand how viruses are detected and recognized, it is
  essential to divide them by their infection ways.
         Nonresident viruses The simplest form of viruses which
         don’t stay in memory, but infect founded executable file and
         search for another to replicate.
         Resident viruses More complex and efficient type of viruses
         which stay in memory and hide their presence from other
         processes. Kind of TSR apps.
                 Fast infectors Type which is designed to infect as many files as
                 possible.
                 Slow infectors Using stealth and encryption techniques to stay
                 undetected outlast.


  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                          Heuristic scanning theory
                                                        Fundamentals of malware
       Case Study: Modern heuristic scanner features
                                                        Metaheuristics in Virus Detection & Recognition
                                           Summary
                                   Further reading...




Metaheuristic
Metaheuristic is a heuristic method for solving a very general class of
computational problems by combining user-given black-box procedures
in a hopefully efficient way. Metaheuristics are generally applied to
problems for which there is no satisfactory problem-specific algorithm
or heuristic.
                                                          Source: http://en.wikipedia.org/wiki/Metaheuristic



Heuristic
Heuristic is a method to help solve a problem, commonly an informal
method. It is particularly used to rapidly come to a solution that is
reasonably close to the best possible answer, or ’optimal solution’...
                                                               Source: http://en.wikipedia.org/wiki/Heuristic




Wojciech Podg´rski http://podgorski.wordpress.com
             o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                            Heuristic scanning theory
                                                          Fundamentals of malware
         Case Study: Modern heuristic scanner features
                                                          Metaheuristics in Virus Detection & Recognition
                                             Summary
                                     Further reading...


General metaheuristics

  It is important to remember that metaheuristics are only ’ideas’ to
  solve a problem not a specific way to do that. List below shows
  main metaheuristics used for virus detection and recognition:
         Pattern matching
         Automatic learning
         Environment emulation
         Neural networks
         Data mining
         Bayes networks
         Hidden Markov models
  and other...

  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                            Heuristic scanning theory
                                                          Fundamentals of malware
         Case Study: Modern heuristic scanner features
                                                          Metaheuristics in Virus Detection & Recognition
                                             Summary
                                     Further reading...


General metaheuristics

  It is important to remember that metaheuristics are only ’ideas’ to
  solve a problem not a specific way to do that. List below shows
  main metaheuristics used for virus detection and recognition:
         Pattern matching
         Automatic learning
         Environment emulation
         Neural networks
         Data mining
         Bayes networks
         Hidden Markov models
  and other...

  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                            Heuristic scanning theory
                                                          Fundamentals of malware
         Case Study: Modern heuristic scanner features
                                                          Metaheuristics in Virus Detection & Recognition
                                             Summary
                                     Further reading...


General metaheuristics

  It is important to remember that metaheuristics are only ’ideas’ to
  solve a problem not a specific way to do that. List below shows
  main metaheuristics used for virus detection and recognition:
         Pattern matching
         Automatic learning
         Environment emulation
         Neural networks
         Data mining
         Bayes networks
         Hidden Markov models
  and other...

  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                            Heuristic scanning theory
                                                          Fundamentals of malware
         Case Study: Modern heuristic scanner features
                                                          Metaheuristics in Virus Detection & Recognition
                                             Summary
                                     Further reading...


General metaheuristics

  It is important to remember that metaheuristics are only ’ideas’ to
  solve a problem not a specific way to do that. List below shows
  main metaheuristics used for virus detection and recognition:
         Pattern matching
         Automatic learning
         Environment emulation
         Neural networks
         Data mining
         Bayes networks
         Hidden Markov models
  and other...

  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                            Heuristic scanning theory
                                                          Fundamentals of malware
         Case Study: Modern heuristic scanner features
                                                          Metaheuristics in Virus Detection & Recognition
                                             Summary
                                     Further reading...


General metaheuristics

  It is important to remember that metaheuristics are only ’ideas’ to
  solve a problem not a specific way to do that. List below shows
  main metaheuristics used for virus detection and recognition:
         Pattern matching
         Automatic learning
         Environment emulation
         Neural networks
         Data mining
         Bayes networks
         Hidden Markov models
  and other...

  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                            Heuristic scanning theory
                                                          Fundamentals of malware
         Case Study: Modern heuristic scanner features
                                                          Metaheuristics in Virus Detection & Recognition
                                             Summary
                                     Further reading...


General metaheuristics

  It is important to remember that metaheuristics are only ’ideas’ to
  solve a problem not a specific way to do that. List below shows
  main metaheuristics used for virus detection and recognition:
         Pattern matching
         Automatic learning
         Environment emulation
         Neural networks
         Data mining
         Bayes networks
         Hidden Markov models
  and other...

  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                            Heuristic scanning theory
                                                          Fundamentals of malware
         Case Study: Modern heuristic scanner features
                                                          Metaheuristics in Virus Detection & Recognition
                                             Summary
                                     Further reading...


General metaheuristics

  It is important to remember that metaheuristics are only ’ideas’ to
  solve a problem not a specific way to do that. List below shows
  main metaheuristics used for virus detection and recognition:
         Pattern matching
         Automatic learning
         Environment emulation
         Neural networks
         Data mining
         Bayes networks
         Hidden Markov models
  and other...

  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                            Heuristic scanning theory
                                                          Fundamentals of malware
         Case Study: Modern heuristic scanner features
                                                          Metaheuristics in Virus Detection & Recognition
                                             Summary
                                     Further reading...


General metaheuristics

  It is important to remember that metaheuristics are only ’ideas’ to
  solve a problem not a specific way to do that. List below shows
  main metaheuristics used for virus detection and recognition:
         Pattern matching
         Automatic learning
         Environment emulation
         Neural networks
         Data mining
         Bayes networks
         Hidden Markov models
  and other...

  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                            Heuristic scanning theory
                                                          Fundamentals of malware
         Case Study: Modern heuristic scanner features
                                                          Metaheuristics in Virus Detection & Recognition
                                             Summary
                                     Further reading...


Concrete heuristics

  Specific heuristics practically used in virus detection and
  recognition, are naturally inherited from metaheuristics.
  And so, for example concrete method for virus detection using
  neural networks can be implementation of SOM (Self Organizing
  Map).


      Neural Networks (metaheuristic) → SOM (heuristic)


  The most popular, and one of most efficient heuristic used by
  anti-virus software is technique called Heuristic Scanning.


  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Lacks in specific detection I

  Great deal of modern viruses are only slightly changed versions of
  few conceptions developed years ago. Specific detection methods
  like signature scanning became very efficient ways of detecting
  known threats. Finding specific signature in code allows scanner to
  recognize every virus which signature has been stored in built-in
  database.


       BB ?2 B9 10 01 81 37 ?2 81 77 02 ?2 83 C3 04 E2 F2

                                                     FireFly virus signature(hexadecimal)



  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction      Lacks in specific detection
                            Heuristic scanning theory       Heuristic scanning conception
         Case Study: Modern heuristic scanner features      Recognizing potential threat
                                             Summary        Coping with anti-heuristic mechanisms
                                     Further reading...     Towards accuracy improvement


Lacks in specific detection II


  Problem occurs when virus source is changed by a programmer or
  mutation engine. Signature is being malformed due to even minor
  changes. Virus may behave in an exactly same way but is
  undetectable due to new, unique signature.


      BB ?2 B9 10 01 81 37 ?2 81 A1 D3 ?2 01 C3 04 E2 F2

                                                          Malformed signature(hexadecimal)




  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                            Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Heuristic scanning conception I




  Q:    How to recognize a virus without any knowledge about its
  internal structure?




  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Heuristic scanning conception I




  Q:    How to recognize a virus without any knowledge about its
  internal structure?

  A:      By examining its behaviour and characteristics.




  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Heuristic scanning conception II


  Heuristic scanning in its basic form is implementation of three
  metaheuristics:

     1   Pattern matching
     2   Automatic learning
     3   Environment emulation

  Of course modern solutions provide more functionalities but
  principle stays the same.



  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Heuristic scanning conception II


  Heuristic scanning in its basic form is implementation of three
  metaheuristics:

     1   Pattern matching
     2   Automatic learning
     3   Environment emulation

  Of course modern solutions provide more functionalities but
  principle stays the same.



  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Heuristic scanning conception II


  Heuristic scanning in its basic form is implementation of three
  metaheuristics:

     1   Pattern matching
     2   Automatic learning
     3   Environment emulation

  Of course modern solutions provide more functionalities but
  principle stays the same.



  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Heuristic scanning conception II


  Heuristic scanning in its basic form is implementation of three
  metaheuristics:

     1   Pattern matching
     2   Automatic learning
     3   Environment emulation

  Of course modern solutions provide more functionalities but
  principle stays the same.



  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Heuristic scanning conception III

  The basic idea of heuristic scanning is to examine assembly
  language instruction sequences(step-by-step) and qualify them by
  their potential harmfulness. If there are sequences behaving
  suspiciously, program can be qualified as a virus. The phenomenon
  of this method is that it actually detects threats that aren’t yet
  known!




  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Recognizing potential threat I


  In real anti-virus software, heuristic scanning is implemented to recognize
  threats by following built-in rules, e.g. if program tries to format hard
  drive its behaviour is highly suspicious but it can be only simple disk
  utility. Singular suspicion is never a reason to trigger the alarm. But
  if the same program also tries to stay resident and contains routine to
  search for executables, it is highly probable that it’s a real virus. AV
  software very often classifies sequences by their behaviour granting them
  a flag. Every flag has its weight, if total values for one program
  exceeds a predefined threshold, scanner regards it as virus.




  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Heuristic Scanning as artificial neuron




                   Figure: Single-layer classifier with threshold                    From [1]




  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Recognizing potential threat II




                          Figure: TbScan 6.02 heuristic flags                  From [3]




     For instance Jerusalem/PLO virus would raise FRLMUZ flags.



  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction      Lacks in specific detection
                            Heuristic scanning theory       Heuristic scanning conception
         Case Study: Modern heuristic scanner features      Recognizing potential threat
                                             Summary        Coping with anti-heuristic mechanisms
                                     Further reading...     Towards accuracy improvement


Malware evolves
  After presenting specific scanning to AV software, malware authors were
  obligated to introduce new techniques of being undetected. Beside of
  polymorphism and mutation engines viruses started to use various
  stealth techniques which basically hooked interrupts and took control
  over them. This allowed them to be invisible for traditional scanner.
  Moreover, most of them started using real-time encryption which made
  them look like totally harmless program.




            Figure: Virus evolution chain                 [Source http://searchsecurity.techtarget.com]



  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                            Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Pattern matching is not enough

  Mixing stealth techniques with encryption and anti-heuristic sequences
  (code obfuscated by meaningless instructions) allowed viruses to be
  unseen even by signature and heuristic scanning combined together.
  It was obvious that new solution was needed. The idea came from VM
  conceptions. Why not to create artificial runtime environment to let
  the virus do its job?
  Such approach found implementation in environment emulation
  engines, which became standard AV software weapon.




  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Virtual reality



  The idea of environment emulation is simple. Anti-virus program
  provides a virtual machine with independent operating system
  and allows virus to perform its routines. Behaviour and
  characteristics are being continuously examined, while virus is
  not aware that is working on a fake system.
  This leads to decryption routines and revealment of its true
  nature. Also stealth techniques are useless because whole VM is
  monitored by AV software.




  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


False positives & automatic learning


  HS as a heuristic method is only reasonably close to the best
  possible answer. In this case we can imagine that heuristic
  scanning will blame innocent programs for being potential threats.
  Such behaviour is called false positive
  We must be aware that program is right when rising alarm,
  because scanned app posses suspicious sequences, we can’t blame
  scanner for failure. So what can be done to avoid false positives?




  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


False positives & automatic learning


  HS as a heuristic method is only reasonably close to the best
  possible answer. In this case we can imagine that heuristic
  scanning will blame innocent programs for being potential threats.
  Such behaviour is called false positive
  We must be aware that program is right when rising alarm,
  because scanned app posses suspicious sequences, we can’t blame
  scanner for failure. So what can be done to avoid false positives?


                                    A:       Automatic learning!




  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Avoiding false positives & improving accuracy I


  Some applications, especially non-commercial ones, can raise false
  positive, because of their suspicious routines. e.g. UnHash v1.0
  through its encryption functionalities (used for finding hash
  collisions) almost every time is qualified as virus. What we can do
  to prevent it, is to:
     1   Let Monitor learn
         Teach AV monitor to recognize programs causing false
         positives. (requires advanced user)




  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Avoiding false positives & improving accuracy I


  Some applications, especially non-commercial ones, can raise false
  positive, because of their suspicious routines. e.g. UnHash v1.0
  through its encryption functionalities (used for finding hash
  collisions) almost every time is qualified as virus. What we can do
  to prevent it, is to:
     1   Let Monitor learn
         Teach AV monitor to recognize programs causing false
         positives. (requires advanced user)




  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Avoiding false positives & improving accuracy II

     2   Set proper scanning depth
         Configure Monitor with suitable heuristic scanning depth by
         manipulating threshold computed from flag weights.
     3   Assume that machine is not infected
         Some AV software can scan through computer knowing it’s
         clean and learn which programs are false positives.
     4   Combine scanning techniques
         Combine multiple scanning techniques to exclude potential
         false positives.
     5   Perform scan as often as possible
         Knowing what’s going on is essential...


  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Avoiding false positives & improving accuracy II

     2   Set proper scanning depth
         Configure Monitor with suitable heuristic scanning depth by
         manipulating threshold computed from flag weights.
     3   Assume that machine is not infected
         Some AV software can scan through computer knowing it’s
         clean and learn which programs are false positives.
     4   Combine scanning techniques
         Combine multiple scanning techniques to exclude potential
         false positives.
     5   Perform scan as often as possible
         Knowing what’s going on is essential...


  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Avoiding false positives & improving accuracy II

     2   Set proper scanning depth
         Configure Monitor with suitable heuristic scanning depth by
         manipulating threshold computed from flag weights.
     3   Assume that machine is not infected
         Some AV software can scan through computer knowing it’s
         clean and learn which programs are false positives.
     4   Combine scanning techniques
         Combine multiple scanning techniques to exclude potential
         false positives.
     5   Perform scan as often as possible
         Knowing what’s going on is essential...


  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Avoiding false positives & improving accuracy II

     2   Set proper scanning depth
         Configure Monitor with suitable heuristic scanning depth by
         manipulating threshold computed from flag weights.
     3   Assume that machine is not infected
         Some AV software can scan through computer knowing it’s
         clean and learn which programs are false positives.
     4   Combine scanning techniques
         Combine multiple scanning techniques to exclude potential
         false positives.
     5   Perform scan as often as possible
         Knowing what’s going on is essential...


  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction    Lacks in specific detection
                            Heuristic scanning theory     Heuristic scanning conception
         Case Study: Modern heuristic scanner features    Recognizing potential threat
                                             Summary      Coping with anti-heuristic mechanisms
                                     Further reading...   Towards accuracy improvement


Avoiding false positives & improving accuracy II

     2   Set proper scanning depth
         Configure Monitor with suitable heuristic scanning depth by
         manipulating threshold computed from flag weights.
     3   Assume that machine is not infected
         Some AV software can scan through computer knowing it’s
         clean and learn which programs are false positives.
     4   Combine scanning techniques
         Combine multiple scanning techniques to exclude potential
         false positives.
     5   Perform scan as often as possible
         Knowing what’s going on is essential...


  Wojciech Podg´rski http://podgorski.wordpress.com
               o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                          Heuristic scanning theory
                                                        Panda’s Technology Evolution
       Case Study: Modern heuristic scanner features
                                                        Genetic Heuristic Engine - Nereus
                                           Summary
                                   Further reading...




                      Presenting Panda Security solutions




Wojciech Podg´rski http://podgorski.wordpress.com
             o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                          Heuristic scanning theory
                                                        Panda’s Technology Evolution
       Case Study: Modern heuristic scanner features
                                                        Genetic Heuristic Engine - Nereus
                                           Summary
                                   Further reading...




Modern Panda Security solutions belong to the third generation
AV software.
       First Generation: Antivirus
       From 1990’s, signature scanning including polymorphic virus
       recognition. Primitive heuristics.
       Second Generation: Antimalware
       From 2000, integrated firewall, anti-malware engine.
       Third Generation: Proactive Technologies
       From 2004, TruPrevent R , genetic and rootkit heuristics,
       behavioral analysis and blocking, uncloaking techniques,
       generic unpacking



Wojciech Podg´rski http://podgorski.wordpress.com
             o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                          Heuristic scanning theory
                                                        Panda’s Technology Evolution
       Case Study: Modern heuristic scanner features
                                                        Genetic Heuristic Engine - Nereus
                                           Summary
                                   Further reading...




Modern Panda Security solutions belong to the third generation
AV software.
       First Generation: Antivirus
       From 1990’s, signature scanning including polymorphic virus
       recognition. Primitive heuristics.
       Second Generation: Antimalware
       From 2000, integrated firewall, anti-malware engine.
       Third Generation: Proactive Technologies
       From 2004, TruPrevent R , genetic and rootkit heuristics,
       behavioral analysis and blocking, uncloaking techniques,
       generic unpacking



Wojciech Podg´rski http://podgorski.wordpress.com
             o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                          Heuristic scanning theory
                                                        Panda’s Technology Evolution
       Case Study: Modern heuristic scanner features
                                                        Genetic Heuristic Engine - Nereus
                                           Summary
                                   Further reading...




Modern Panda Security solutions belong to the third generation
AV software.
       First Generation: Antivirus
       From 1990’s, signature scanning including polymorphic virus
       recognition. Primitive heuristics.
       Second Generation: Antimalware
       From 2000, integrated firewall, anti-malware engine.
       Third Generation: Proactive Technologies
       From 2004, TruPrevent R , genetic and rootkit heuristics,
       behavioral analysis and blocking, uncloaking techniques,
       generic unpacking



Wojciech Podg´rski http://podgorski.wordpress.com
             o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                          Heuristic scanning theory
                                                        Panda’s Technology Evolution
       Case Study: Modern heuristic scanner features
                                                        Genetic Heuristic Engine - Nereus
                                           Summary
                                   Further reading...




Modern Panda Security solutions belong to the third generation
AV software.
       First Generation: Antivirus
       From 1990’s, signature scanning including polymorphic virus
       recognition. Primitive heuristics.
       Second Generation: Antimalware
       From 2000, integrated firewall, anti-malware engine.
       Third Generation: Proactive Technologies
       From 2004, TruPrevent R , genetic and rootkit heuristics,
       behavioral analysis and blocking, uncloaking techniques,
       generic unpacking



Wojciech Podg´rski http://podgorski.wordpress.com
             o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                          Heuristic scanning theory
                                                        Panda’s Technology Evolution
       Case Study: Modern heuristic scanner features
                                                        Genetic Heuristic Engine - Nereus
                                           Summary
                                   Further reading...




Modern Panda Security solutions belong to the third generation
AV software.
       First Generation: Antivirus
       From 1990’s, signature scanning including polymorphic virus
       recognition. Primitive heuristics.
       Second Generation: Antimalware
       From 2000, integrated firewall, anti-malware engine.
       Third Generation: Proactive Technologies
       From 2004, TruPrevent R , genetic and rootkit heuristics,
       behavioral analysis and blocking, uncloaking techniques,
       generic unpacking



Wojciech Podg´rski http://podgorski.wordpress.com
             o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                          Heuristic scanning theory
                                                        Panda’s Technology Evolution
       Case Study: Modern heuristic scanner features
                                                        Genetic Heuristic Engine - Nereus
                                           Summary
                                   Further reading...




Genetic Heuristic Engine, codename: Nereus was initially released in
2005. The innovation connected with Nereus rely on idea inspired by the
field of genetics and its usefulness to understand how organisms are
individually identified and associated to other organisms. Features:
       More than few hundred characteristics of each file that is scanned
       Complex malware recognition (type determination)
       Rootkit heuristics (time based analysis)
       Generic packer detectors and generic unpacking algorithms
       New threat automatic notification
       Automatic creation of detection and disinfection signatures for
       samples previously analyzed by processing and classification module



Wojciech Podg´rski http://podgorski.wordpress.com
             o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                          Heuristic scanning theory
                                                        Panda’s Technology Evolution
       Case Study: Modern heuristic scanner features
                                                        Genetic Heuristic Engine - Nereus
                                           Summary
                                   Further reading...




                Figure: Panda’s integrated endpoint security                       From [6]




Wojciech Podg´rski http://podgorski.wordpress.com
             o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                          Heuristic scanning theory
       Case Study: Modern heuristic scanner features
                                           Summary
                                   Further reading...



Heuristic scanning is the most popular heuristic method for virus
detection and recognition. Basically it is inherited from combination of
pattern matching, automatic learning and environment emulation
metaheuristics. As a heuristic method it’s not 100% effective. So why do
we apply HS?

Pros
       Can detect ’future’ threats
       User is less dependent on product update
       Improves conventional scanning results
Cons
       False positives
       Making decision after alarm requires knowledge


Wojciech Podg´rski http://podgorski.wordpress.com
             o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                          Heuristic scanning theory
       Case Study: Modern heuristic scanner features
                                           Summary
                                   Further reading...




      Peter Szor
      The Art of Computer Virus Research and Defense
      Addison-Wesley Professional, 1st edition, February 2005

      Tomasz Andel, Krzysztof Zawadzki
      Techniki pisania wirus´w oraz antywirus´w
                            o                o
      Inynieria bezpiecze´stwa system´w sieciowych i internetowych, PWr
                         n           o
      Wroclaw 2008

      Frans Veldman
      Heuristic Anti-Virus Technology
      http://mirror.sweon.net/madchat/vxdevl/vdat/epheurs1.htm




Wojciech Podg´rski http://podgorski.wordpress.com
             o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                          Heuristic scanning theory
       Case Study: Modern heuristic scanner features
                                           Summary
                                   Further reading...




      Richard Zwienenberg
      Heuristic Scanners: Artificial Intelligence?
      http://mirror.sweon.net/madchat/vxdevl/vdat/epheurs2.htm

                ´
      edited by Eric Filiol
      Journal in Computer Virology
      Springer Paris, Volume 1-4
      http://www.springerlink.com/content/119769

      Panda Research
      From Traditional Antivirus to Collective Intelligence
      August 2007
      http://research.pandasecurity.com/




Wojciech Podg´rski http://podgorski.wordpress.com
             o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                          Heuristic scanning theory
       Case Study: Modern heuristic scanner features
                                           Summary
                                   Further reading...




      Various online knowledge repositories
      For starters it’s good to search wikipedia...
      VX Heavens http://vx.netlux.org/lib
      Breaking Business and Technology News https://silicon.com/
      IEEE http://ieeexplore.ieee.org/
      Zines: Phalcon/Skism: 40HEX, VLAD, VBB: Viruses Bits & Bytes,
      Immortal Riot: Insane Reality, NuKe: NuKe IntoJournal, Dark Angel
      VirGuide
      AND OTHER...




Wojciech Podg´rski http://podgorski.wordpress.com
             o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                          Heuristic scanning theory
       Case Study: Modern heuristic scanner features
                                           Summary
                                   Further reading...




Why?...


                                   Questions ?
                                                                                           What if?...




Wojciech Podg´rski http://podgorski.wordpress.com
             o                                          Artificial Intelligence Methods inVirus Detection & Recognition
Introduction
                          Heuristic scanning theory
       Case Study: Modern heuristic scanner features
                                           Summary
                                   Further reading...




                              THANK YOU



Wojciech Podg´rski http://podgorski.wordpress.com
             o                                          Artificial Intelligence Methods inVirus Detection & Recognition

More Related Content

What's hot

Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039
Editor IJARCET
 
Anti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewskiAnti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewski
Stonesoft
 
Enhancing Intrusion Detection System with Proximity Information
Enhancing Intrusion Detection System with Proximity InformationEnhancing Intrusion Detection System with Proximity Information
Enhancing Intrusion Detection System with Proximity Information
Zhenyun Zhuang
 
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLSA SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
IJNSA Journal
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
Editor IJMTER
 
Cryptovirology: Virus Approach
Cryptovirology: Virus ApproachCryptovirology: Virus Approach
Cryptovirology: Virus Approach
IJNSA Journal
 
Malware classification using Machine Learning
Malware classification using Machine LearningMalware classification using Machine Learning
Malware classification using Machine Learning
Japneet Singh
 
Malware Detection Using Machine Learning Techniques
Malware Detection Using Machine Learning TechniquesMalware Detection Using Machine Learning Techniques
Malware Detection Using Machine Learning Techniques
ArshadRaja786
 
57 slide presentation
57 slide presentation57 slide presentation
57 slide presentation
Setia Juli Irzal Ismail
 
Antivirus
AntivirusAntivirus
Antivirus
Pankaj Kumawat
 
Malware Dectection Using Machine learning
Malware Dectection Using Machine learningMalware Dectection Using Machine learning
Malware Dectection Using Machine learning
Shubham Dubey
 
Malware classification and detection
Malware classification and detectionMalware classification and detection
Malware classification and detection
Chong-Kuan Chen
 
Signature based virus detection and protection system
Signature based virus detection and protection systemSignature based virus detection and protection system
Signature based virus detection and protection system
Md. Hasan Basri (Angel)
 
website vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paperwebsite vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paper
Bhagyashri Chalakh
 
Malware Classification Using Structured Control Flow
Malware Classification Using Structured Control FlowMalware Classification Using Structured Control Flow
Malware Classification Using Structured Control Flow
Silvio Cesare
 
MITRE ATT&CK framework
MITRE ATT&CK frameworkMITRE ATT&CK framework
MITRE ATT&CK framework
Bhushan Gurav
 
Novel Malware Clustering System Based on Kernel Data Structure
Novel Malware Clustering System Based on Kernel Data StructureNovel Malware Clustering System Based on Kernel Data Structure
Novel Malware Clustering System Based on Kernel Data Structure
iosrjce
 
A trust system based on multi level virus detection
A trust system based on multi level virus detectionA trust system based on multi level virus detection
A trust system based on multi level virus detection
UltraUploader
 
A malware detection method for health sensor data based on machine learning
A malware detection method for health sensor data based on machine learningA malware detection method for health sensor data based on machine learning
A malware detection method for health sensor data based on machine learning
jaigera
 

What's hot (19)

Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039
 
Anti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewskiAnti evasion and evader - klaus majewski
Anti evasion and evader - klaus majewski
 
Enhancing Intrusion Detection System with Proximity Information
Enhancing Intrusion Detection System with Proximity InformationEnhancing Intrusion Detection System with Proximity Information
Enhancing Intrusion Detection System with Proximity Information
 
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLSA SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
 
Cryptovirology: Virus Approach
Cryptovirology: Virus ApproachCryptovirology: Virus Approach
Cryptovirology: Virus Approach
 
Malware classification using Machine Learning
Malware classification using Machine LearningMalware classification using Machine Learning
Malware classification using Machine Learning
 
Malware Detection Using Machine Learning Techniques
Malware Detection Using Machine Learning TechniquesMalware Detection Using Machine Learning Techniques
Malware Detection Using Machine Learning Techniques
 
57 slide presentation
57 slide presentation57 slide presentation
57 slide presentation
 
Antivirus
AntivirusAntivirus
Antivirus
 
Malware Dectection Using Machine learning
Malware Dectection Using Machine learningMalware Dectection Using Machine learning
Malware Dectection Using Machine learning
 
Malware classification and detection
Malware classification and detectionMalware classification and detection
Malware classification and detection
 
Signature based virus detection and protection system
Signature based virus detection and protection systemSignature based virus detection and protection system
Signature based virus detection and protection system
 
website vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paperwebsite vulnerability scanner and reporter research paper
website vulnerability scanner and reporter research paper
 
Malware Classification Using Structured Control Flow
Malware Classification Using Structured Control FlowMalware Classification Using Structured Control Flow
Malware Classification Using Structured Control Flow
 
MITRE ATT&CK framework
MITRE ATT&CK frameworkMITRE ATT&CK framework
MITRE ATT&CK framework
 
Novel Malware Clustering System Based on Kernel Data Structure
Novel Malware Clustering System Based on Kernel Data StructureNovel Malware Clustering System Based on Kernel Data Structure
Novel Malware Clustering System Based on Kernel Data Structure
 
A trust system based on multi level virus detection
A trust system based on multi level virus detectionA trust system based on multi level virus detection
A trust system based on multi level virus detection
 
A malware detection method for health sensor data based on machine learning
A malware detection method for health sensor data based on machine learningA malware detection method for health sensor data based on machine learning
A malware detection method for health sensor data based on machine learning
 

Viewers also liked

Download It
Download ItDownload It
Download It
webhostingguy
 
Classification of Malware based on Data Mining Approach
Classification of Malware based on Data Mining ApproachClassification of Malware based on Data Mining Approach
Classification of Malware based on Data Mining Approach
ijsrd.com
 
Malicious Client Detection Using Machine Learning
Malicious Client Detection Using Machine LearningMalicious Client Detection Using Machine Learning
Malicious Client Detection Using Machine Learning
securityxploded
 
AI approach to malware similarity analysis: Maping the malware genome with a...
AI approach to malware similarity analysis: Maping the  malware genome with a...AI approach to malware similarity analysis: Maping the  malware genome with a...
AI approach to malware similarity analysis: Maping the malware genome with a...
Priyanka Aash
 
Detection of Malware Downloads via Graph Mining (AsiaCCS '16)
Detection of Malware Downloads via Graph Mining (AsiaCCS '16)Detection of Malware Downloads via Graph Mining (AsiaCCS '16)
Detection of Malware Downloads via Graph Mining (AsiaCCS '16)
Marco Balduzzi
 
Understand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day ThreatsUnderstand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day Threats
Rahul Mohandas
 
Malware Analysis and Defeating using Virtual Machines
Malware Analysis and Defeating using Virtual MachinesMalware Analysis and Defeating using Virtual Machines
Malware Analysis and Defeating using Virtual Machines
intertelinvestigations
 
Malware detection software using a support vector machine as a classifier
Malware detection software using a support vector machine as a classifierMalware detection software using a support vector machine as a classifier
Malware detection software using a support vector machine as a classifier
Nicole Bili?
 
Ensembled Based Categorization and Adaptive Learning Model for Malware Detection
Ensembled Based Categorization and Adaptive Learning Model for Malware DetectionEnsembled Based Categorization and Adaptive Learning Model for Malware Detection
Ensembled Based Categorization and Adaptive Learning Model for Malware Detection
Muhammad Najmi Ahmad Zabidi
 
B-Sides Seattle 2012 Offensive Defense
B-Sides Seattle 2012 Offensive DefenseB-Sides Seattle 2012 Offensive Defense
B-Sides Seattle 2012 Offensive Defense
Stephan Chenette
 
Malware Detection - A Machine Learning Perspective
Malware Detection - A Machine Learning PerspectiveMalware Detection - A Machine Learning Perspective
Malware Detection - A Machine Learning Perspective
Chong-Kuan Chen
 
Malware Detection using Machine Learning
Malware Detection using Machine Learning	Malware Detection using Machine Learning
Malware Detection using Machine Learning
Cysinfo Cyber Security Community
 
Malware
MalwareMalware
Malware
Tuhin_Das
 
Telecom Fraud Detection - Naive Bayes Classification
Telecom Fraud Detection - Naive Bayes ClassificationTelecom Fraud Detection - Naive Bayes Classification
Telecom Fraud Detection - Naive Bayes Classification
Maruthi Nataraj K
 

Viewers also liked (14)

Download It
Download ItDownload It
Download It
 
Classification of Malware based on Data Mining Approach
Classification of Malware based on Data Mining ApproachClassification of Malware based on Data Mining Approach
Classification of Malware based on Data Mining Approach
 
Malicious Client Detection Using Machine Learning
Malicious Client Detection Using Machine LearningMalicious Client Detection Using Machine Learning
Malicious Client Detection Using Machine Learning
 
AI approach to malware similarity analysis: Maping the malware genome with a...
AI approach to malware similarity analysis: Maping the  malware genome with a...AI approach to malware similarity analysis: Maping the  malware genome with a...
AI approach to malware similarity analysis: Maping the malware genome with a...
 
Detection of Malware Downloads via Graph Mining (AsiaCCS '16)
Detection of Malware Downloads via Graph Mining (AsiaCCS '16)Detection of Malware Downloads via Graph Mining (AsiaCCS '16)
Detection of Malware Downloads via Graph Mining (AsiaCCS '16)
 
Understand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day ThreatsUnderstand How Machine Learning Defends Against Zero-Day Threats
Understand How Machine Learning Defends Against Zero-Day Threats
 
Malware Analysis and Defeating using Virtual Machines
Malware Analysis and Defeating using Virtual MachinesMalware Analysis and Defeating using Virtual Machines
Malware Analysis and Defeating using Virtual Machines
 
Malware detection software using a support vector machine as a classifier
Malware detection software using a support vector machine as a classifierMalware detection software using a support vector machine as a classifier
Malware detection software using a support vector machine as a classifier
 
Ensembled Based Categorization and Adaptive Learning Model for Malware Detection
Ensembled Based Categorization and Adaptive Learning Model for Malware DetectionEnsembled Based Categorization and Adaptive Learning Model for Malware Detection
Ensembled Based Categorization and Adaptive Learning Model for Malware Detection
 
B-Sides Seattle 2012 Offensive Defense
B-Sides Seattle 2012 Offensive DefenseB-Sides Seattle 2012 Offensive Defense
B-Sides Seattle 2012 Offensive Defense
 
Malware Detection - A Machine Learning Perspective
Malware Detection - A Machine Learning PerspectiveMalware Detection - A Machine Learning Perspective
Malware Detection - A Machine Learning Perspective
 
Malware Detection using Machine Learning
Malware Detection using Machine Learning	Malware Detection using Machine Learning
Malware Detection using Machine Learning
 
Malware
MalwareMalware
Malware
 
Telecom Fraud Detection - Naive Bayes Classification
Telecom Fraud Detection - Naive Bayes ClassificationTelecom Fraud Detection - Naive Bayes Classification
Telecom Fraud Detection - Naive Bayes Classification
 

Similar to Artificial Intelligence Methods in Virus Detection & Recognition - Introduction to heuristic scanning

Basic survey on malware analysis, tools and techniques
Basic survey on malware analysis, tools and techniquesBasic survey on malware analysis, tools and techniques
Basic survey on malware analysis, tools and techniques
ijcsa
 
Cyber Security Threats Unveilded
Cyber Security Threats UnveildedCyber Security Threats Unveilded
Cyber Security Threats Unveilded
Elewayte
 
Malware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptxMalware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptx
Alamgir Hossain
 
Automated malware invariant generation
Automated malware invariant generationAutomated malware invariant generation
Automated malware invariant generation
UltraUploader
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1
NihanthReddyBalaiahg
 
savi technical ppt.pptx
savi technical ppt.pptxsavi technical ppt.pptx
savi technical ppt.pptx
4GH20CS407POONAM
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer support
bozzerapide
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer support
bozzerapide
 
ethicalhacking-140929012151-phpapp02.pdf
ethicalhacking-140929012151-phpapp02.pdfethicalhacking-140929012151-phpapp02.pdf
ethicalhacking-140929012151-phpapp02.pdf
722820106121SARANS
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Monika Deswal
 
A0430104
A0430104A0430104
A0430104
IOSR Journals
 
Utilization Data Mining to Detect Spyware
Utilization Data Mining to Detect Spyware Utilization Data Mining to Detect Spyware
Utilization Data Mining to Detect Spyware
IOSR Journals
 
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
cyberprosocial
 
Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039
Editor IJARCET
 
CHAPTER 1 MALWARE ANALYSIS PRIMER.ppt
CHAPTER 1 MALWARE ANALYSIS PRIMER.pptCHAPTER 1 MALWARE ANALYSIS PRIMER.ppt
CHAPTER 1 MALWARE ANALYSIS PRIMER.ppt
ManjuAppukuttan2
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
Satria Ady Pradana
 
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSA FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
IJNSA Journal
 
Malware Analysis
Malware AnalysisMalware Analysis
Malware Analysis
faris707
 
Hancitor malware recognition using swarm intelligent technique
Hancitor malware recognition using swarm intelligent techniqueHancitor malware recognition using swarm intelligent technique
Hancitor malware recognition using swarm intelligent technique
CSITiaesprime
 
How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUS
Satyam Sangal
 

Similar to Artificial Intelligence Methods in Virus Detection & Recognition - Introduction to heuristic scanning (20)

Basic survey on malware analysis, tools and techniques
Basic survey on malware analysis, tools and techniquesBasic survey on malware analysis, tools and techniques
Basic survey on malware analysis, tools and techniques
 
Cyber Security Threats Unveilded
Cyber Security Threats UnveildedCyber Security Threats Unveilded
Cyber Security Threats Unveilded
 
Malware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptxMalware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptx
 
Automated malware invariant generation
Automated malware invariant generationAutomated malware invariant generation
Automated malware invariant generation
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1
 
savi technical ppt.pptx
savi technical ppt.pptxsavi technical ppt.pptx
savi technical ppt.pptx
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer support
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer support
 
ethicalhacking-140929012151-phpapp02.pdf
ethicalhacking-140929012151-phpapp02.pdfethicalhacking-140929012151-phpapp02.pdf
ethicalhacking-140929012151-phpapp02.pdf
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
A0430104
A0430104A0430104
A0430104
 
Utilization Data Mining to Detect Spyware
Utilization Data Mining to Detect Spyware Utilization Data Mining to Detect Spyware
Utilization Data Mining to Detect Spyware
 
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
 
Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039Volume 2-issue-6-2037-2039
Volume 2-issue-6-2037-2039
 
CHAPTER 1 MALWARE ANALYSIS PRIMER.ppt
CHAPTER 1 MALWARE ANALYSIS PRIMER.pptCHAPTER 1 MALWARE ANALYSIS PRIMER.ppt
CHAPTER 1 MALWARE ANALYSIS PRIMER.ppt
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLSA FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
A FRAMEWORK FOR ANALYSIS AND COMPARISON OF DYNAMIC MALWARE ANALYSIS TOOLS
 
Malware Analysis
Malware AnalysisMalware Analysis
Malware Analysis
 
Hancitor malware recognition using swarm intelligent technique
Hancitor malware recognition using swarm intelligent techniqueHancitor malware recognition using swarm intelligent technique
Hancitor malware recognition using swarm intelligent technique
 
How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUS
 

More from Wojciech Podgórski

[PL] Złożone przetwarzanie zdarzeń w SZSBD StreamBase
[PL] Złożone przetwarzanie zdarzeń w SZSBD StreamBase[PL] Złożone przetwarzanie zdarzeń w SZSBD StreamBase
[PL] Złożone przetwarzanie zdarzeń w SZSBD StreamBase
Wojciech Podgórski
 
[PL] Krótkozasięgowe systemy telemetryczne i identyfikacyjne
[PL] Krótkozasięgowe systemy telemetryczne i identyfikacyjne[PL] Krótkozasięgowe systemy telemetryczne i identyfikacyjne
[PL] Krótkozasięgowe systemy telemetryczne i identyfikacyjne
Wojciech Podgórski
 
[PL] Mechanizmy bezpieczeństwa w sieciach z rodziny 802.11x
[PL] Mechanizmy bezpieczeństwa w sieciach z rodziny 802.11x[PL] Mechanizmy bezpieczeństwa w sieciach z rodziny 802.11x
[PL] Mechanizmy bezpieczeństwa w sieciach z rodziny 802.11x
Wojciech Podgórski
 
Rola projektowania architektonicznego w inżynierii oprogramowania zorientowan...
Rola projektowania architektonicznego w inżynierii oprogramowania zorientowan...Rola projektowania architektonicznego w inżynierii oprogramowania zorientowan...
Rola projektowania architektonicznego w inżynierii oprogramowania zorientowan...
Wojciech Podgórski
 
Metryki obiektowe i ich interpretacja
Metryki obiektowe i ich interpretacjaMetryki obiektowe i ich interpretacja
Metryki obiektowe i ich interpretacja
Wojciech Podgórski
 
[PL] XPrince: balance between agility and discipline
[PL] XPrince: balance between agility and discipline[PL] XPrince: balance between agility and discipline
[PL] XPrince: balance between agility and discipline
Wojciech Podgórski
 
eXtensible Markup Language APIs in Java 1.6 - Simple and efficient XML parsin...
eXtensible Markup Language APIs in Java 1.6 - Simple and efficient XML parsin...eXtensible Markup Language APIs in Java 1.6 - Simple and efficient XML parsin...
eXtensible Markup Language APIs in Java 1.6 - Simple and efficient XML parsin...
Wojciech Podgórski
 

More from Wojciech Podgórski (7)

[PL] Złożone przetwarzanie zdarzeń w SZSBD StreamBase
[PL] Złożone przetwarzanie zdarzeń w SZSBD StreamBase[PL] Złożone przetwarzanie zdarzeń w SZSBD StreamBase
[PL] Złożone przetwarzanie zdarzeń w SZSBD StreamBase
 
[PL] Krótkozasięgowe systemy telemetryczne i identyfikacyjne
[PL] Krótkozasięgowe systemy telemetryczne i identyfikacyjne[PL] Krótkozasięgowe systemy telemetryczne i identyfikacyjne
[PL] Krótkozasięgowe systemy telemetryczne i identyfikacyjne
 
[PL] Mechanizmy bezpieczeństwa w sieciach z rodziny 802.11x
[PL] Mechanizmy bezpieczeństwa w sieciach z rodziny 802.11x[PL] Mechanizmy bezpieczeństwa w sieciach z rodziny 802.11x
[PL] Mechanizmy bezpieczeństwa w sieciach z rodziny 802.11x
 
Rola projektowania architektonicznego w inżynierii oprogramowania zorientowan...
Rola projektowania architektonicznego w inżynierii oprogramowania zorientowan...Rola projektowania architektonicznego w inżynierii oprogramowania zorientowan...
Rola projektowania architektonicznego w inżynierii oprogramowania zorientowan...
 
Metryki obiektowe i ich interpretacja
Metryki obiektowe i ich interpretacjaMetryki obiektowe i ich interpretacja
Metryki obiektowe i ich interpretacja
 
[PL] XPrince: balance between agility and discipline
[PL] XPrince: balance between agility and discipline[PL] XPrince: balance between agility and discipline
[PL] XPrince: balance between agility and discipline
 
eXtensible Markup Language APIs in Java 1.6 - Simple and efficient XML parsin...
eXtensible Markup Language APIs in Java 1.6 - Simple and efficient XML parsin...eXtensible Markup Language APIs in Java 1.6 - Simple and efficient XML parsin...
eXtensible Markup Language APIs in Java 1.6 - Simple and efficient XML parsin...
 

Recently uploaded

"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 

Recently uploaded (20)

"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Artificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic WarfareArtificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic Warfare
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 

Artificial Intelligence Methods in Virus Detection & Recognition - Introduction to heuristic scanning

  • 1. Introduction Heuristic scanning theory Case Study: Modern heuristic scanner features Summary Further reading... Artificial Intelligence Methods in Virus Detection & Recognition Introduction to heuristic scanning Wojciech Podg´rski o http://podgorski.wordpress.com October 16, 2008 Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 2. Introduction Heuristic scanning theory Case Study: Modern heuristic scanner features Summary Further reading... Presentation outline 1 Introduction Fundamentals of malware Metaheuristics in Virus Detection & Recognition 2 Heuristic scanning theory Lacks in specific detection Heuristic scanning conception Recognizing potential threat Coping with anti-heuristic mechanisms Towards accuracy improvement 3 Case Study: Modern heuristic scanner features Panda’s Technology Evolution Genetic Heuristic Engine - Nereus 4 Summary 5 Further reading... Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 3. Introduction Heuristic scanning theory Fundamentals of malware Case Study: Modern heuristic scanner features Metaheuristics in Virus Detection & Recognition Summary Further reading... Malware Malware (malicious software) is software designed to infiltrate or damage a computer system without the owner’s informed consent. Source: http://en.wikipedia.org/wiki/Malware Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 4. Introduction Heuristic scanning theory Fundamentals of malware Case Study: Modern heuristic scanner features Metaheuristics in Virus Detection & Recognition Summary Further reading... Malware types We can distinguish quite few malicious software types. It is important to be aware that nevertheless all of them have similar purpose, each one behave differently. Viruses Worms Wabbits Trojan horses Exploits/Backdoors Spyware/Scumware/Stealware/Parasiteware/Adware Rootkits Keyloggers/Dialers Hoaxes Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 5. Introduction Heuristic scanning theory Fundamentals of malware Case Study: Modern heuristic scanner features Metaheuristics in Virus Detection & Recognition Summary Further reading... Malware = Viruses Due to different behaviour, each malware group uses alternative ways of being undetected. This forces anti-virus software producers to develop numerous solutions and countermeasures for computer protection. This presentation focuses on methods used especially for virus detection, not necessarily effective against other types of malicious software. Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 6. Introduction Heuristic scanning theory Fundamentals of malware Case Study: Modern heuristic scanner features Metaheuristics in Virus Detection & Recognition Summary Further reading... Infection strategies To better understand how viruses are detected and recognized, it is essential to divide them by their infection ways. Nonresident viruses The simplest form of viruses which don’t stay in memory, but infect founded executable file and search for another to replicate. Resident viruses More complex and efficient type of viruses which stay in memory and hide their presence from other processes. Kind of TSR apps. Fast infectors Type which is designed to infect as many files as possible. Slow infectors Using stealth and encryption techniques to stay undetected outlast. Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 7. Introduction Heuristic scanning theory Fundamentals of malware Case Study: Modern heuristic scanner features Metaheuristics in Virus Detection & Recognition Summary Further reading... Infection strategies To better understand how viruses are detected and recognized, it is essential to divide them by their infection ways. Nonresident viruses The simplest form of viruses which don’t stay in memory, but infect founded executable file and search for another to replicate. Resident viruses More complex and efficient type of viruses which stay in memory and hide their presence from other processes. Kind of TSR apps. Fast infectors Type which is designed to infect as many files as possible. Slow infectors Using stealth and encryption techniques to stay undetected outlast. Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 8. Introduction Heuristic scanning theory Fundamentals of malware Case Study: Modern heuristic scanner features Metaheuristics in Virus Detection & Recognition Summary Further reading... Infection strategies To better understand how viruses are detected and recognized, it is essential to divide them by their infection ways. Nonresident viruses The simplest form of viruses which don’t stay in memory, but infect founded executable file and search for another to replicate. Resident viruses More complex and efficient type of viruses which stay in memory and hide their presence from other processes. Kind of TSR apps. Fast infectors Type which is designed to infect as many files as possible. Slow infectors Using stealth and encryption techniques to stay undetected outlast. Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 9. Introduction Heuristic scanning theory Fundamentals of malware Case Study: Modern heuristic scanner features Metaheuristics in Virus Detection & Recognition Summary Further reading... Infection strategies To better understand how viruses are detected and recognized, it is essential to divide them by their infection ways. Nonresident viruses The simplest form of viruses which don’t stay in memory, but infect founded executable file and search for another to replicate. Resident viruses More complex and efficient type of viruses which stay in memory and hide their presence from other processes. Kind of TSR apps. Fast infectors Type which is designed to infect as many files as possible. Slow infectors Using stealth and encryption techniques to stay undetected outlast. Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 10. Introduction Heuristic scanning theory Fundamentals of malware Case Study: Modern heuristic scanner features Metaheuristics in Virus Detection & Recognition Summary Further reading... Metaheuristic Metaheuristic is a heuristic method for solving a very general class of computational problems by combining user-given black-box procedures in a hopefully efficient way. Metaheuristics are generally applied to problems for which there is no satisfactory problem-specific algorithm or heuristic. Source: http://en.wikipedia.org/wiki/Metaheuristic Heuristic Heuristic is a method to help solve a problem, commonly an informal method. It is particularly used to rapidly come to a solution that is reasonably close to the best possible answer, or ’optimal solution’... Source: http://en.wikipedia.org/wiki/Heuristic Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 11. Introduction Heuristic scanning theory Fundamentals of malware Case Study: Modern heuristic scanner features Metaheuristics in Virus Detection & Recognition Summary Further reading... General metaheuristics It is important to remember that metaheuristics are only ’ideas’ to solve a problem not a specific way to do that. List below shows main metaheuristics used for virus detection and recognition: Pattern matching Automatic learning Environment emulation Neural networks Data mining Bayes networks Hidden Markov models and other... Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 12. Introduction Heuristic scanning theory Fundamentals of malware Case Study: Modern heuristic scanner features Metaheuristics in Virus Detection & Recognition Summary Further reading... General metaheuristics It is important to remember that metaheuristics are only ’ideas’ to solve a problem not a specific way to do that. List below shows main metaheuristics used for virus detection and recognition: Pattern matching Automatic learning Environment emulation Neural networks Data mining Bayes networks Hidden Markov models and other... Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 13. Introduction Heuristic scanning theory Fundamentals of malware Case Study: Modern heuristic scanner features Metaheuristics in Virus Detection & Recognition Summary Further reading... General metaheuristics It is important to remember that metaheuristics are only ’ideas’ to solve a problem not a specific way to do that. List below shows main metaheuristics used for virus detection and recognition: Pattern matching Automatic learning Environment emulation Neural networks Data mining Bayes networks Hidden Markov models and other... Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 14. Introduction Heuristic scanning theory Fundamentals of malware Case Study: Modern heuristic scanner features Metaheuristics in Virus Detection & Recognition Summary Further reading... General metaheuristics It is important to remember that metaheuristics are only ’ideas’ to solve a problem not a specific way to do that. List below shows main metaheuristics used for virus detection and recognition: Pattern matching Automatic learning Environment emulation Neural networks Data mining Bayes networks Hidden Markov models and other... Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 15. Introduction Heuristic scanning theory Fundamentals of malware Case Study: Modern heuristic scanner features Metaheuristics in Virus Detection & Recognition Summary Further reading... General metaheuristics It is important to remember that metaheuristics are only ’ideas’ to solve a problem not a specific way to do that. List below shows main metaheuristics used for virus detection and recognition: Pattern matching Automatic learning Environment emulation Neural networks Data mining Bayes networks Hidden Markov models and other... Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 16. Introduction Heuristic scanning theory Fundamentals of malware Case Study: Modern heuristic scanner features Metaheuristics in Virus Detection & Recognition Summary Further reading... General metaheuristics It is important to remember that metaheuristics are only ’ideas’ to solve a problem not a specific way to do that. List below shows main metaheuristics used for virus detection and recognition: Pattern matching Automatic learning Environment emulation Neural networks Data mining Bayes networks Hidden Markov models and other... Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 17. Introduction Heuristic scanning theory Fundamentals of malware Case Study: Modern heuristic scanner features Metaheuristics in Virus Detection & Recognition Summary Further reading... General metaheuristics It is important to remember that metaheuristics are only ’ideas’ to solve a problem not a specific way to do that. List below shows main metaheuristics used for virus detection and recognition: Pattern matching Automatic learning Environment emulation Neural networks Data mining Bayes networks Hidden Markov models and other... Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 18. Introduction Heuristic scanning theory Fundamentals of malware Case Study: Modern heuristic scanner features Metaheuristics in Virus Detection & Recognition Summary Further reading... General metaheuristics It is important to remember that metaheuristics are only ’ideas’ to solve a problem not a specific way to do that. List below shows main metaheuristics used for virus detection and recognition: Pattern matching Automatic learning Environment emulation Neural networks Data mining Bayes networks Hidden Markov models and other... Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 19. Introduction Heuristic scanning theory Fundamentals of malware Case Study: Modern heuristic scanner features Metaheuristics in Virus Detection & Recognition Summary Further reading... Concrete heuristics Specific heuristics practically used in virus detection and recognition, are naturally inherited from metaheuristics. And so, for example concrete method for virus detection using neural networks can be implementation of SOM (Self Organizing Map). Neural Networks (metaheuristic) → SOM (heuristic) The most popular, and one of most efficient heuristic used by anti-virus software is technique called Heuristic Scanning. Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 20. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Lacks in specific detection I Great deal of modern viruses are only slightly changed versions of few conceptions developed years ago. Specific detection methods like signature scanning became very efficient ways of detecting known threats. Finding specific signature in code allows scanner to recognize every virus which signature has been stored in built-in database. BB ?2 B9 10 01 81 37 ?2 81 77 02 ?2 83 C3 04 E2 F2 FireFly virus signature(hexadecimal) Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 21. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Lacks in specific detection II Problem occurs when virus source is changed by a programmer or mutation engine. Signature is being malformed due to even minor changes. Virus may behave in an exactly same way but is undetectable due to new, unique signature. BB ?2 B9 10 01 81 37 ?2 81 A1 D3 ?2 01 C3 04 E2 F2 Malformed signature(hexadecimal) Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 22. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Heuristic scanning conception I Q: How to recognize a virus without any knowledge about its internal structure? Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 23. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Heuristic scanning conception I Q: How to recognize a virus without any knowledge about its internal structure? A: By examining its behaviour and characteristics. Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 24. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Heuristic scanning conception II Heuristic scanning in its basic form is implementation of three metaheuristics: 1 Pattern matching 2 Automatic learning 3 Environment emulation Of course modern solutions provide more functionalities but principle stays the same. Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 25. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Heuristic scanning conception II Heuristic scanning in its basic form is implementation of three metaheuristics: 1 Pattern matching 2 Automatic learning 3 Environment emulation Of course modern solutions provide more functionalities but principle stays the same. Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 26. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Heuristic scanning conception II Heuristic scanning in its basic form is implementation of three metaheuristics: 1 Pattern matching 2 Automatic learning 3 Environment emulation Of course modern solutions provide more functionalities but principle stays the same. Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 27. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Heuristic scanning conception II Heuristic scanning in its basic form is implementation of three metaheuristics: 1 Pattern matching 2 Automatic learning 3 Environment emulation Of course modern solutions provide more functionalities but principle stays the same. Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 28. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Heuristic scanning conception III The basic idea of heuristic scanning is to examine assembly language instruction sequences(step-by-step) and qualify them by their potential harmfulness. If there are sequences behaving suspiciously, program can be qualified as a virus. The phenomenon of this method is that it actually detects threats that aren’t yet known! Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 29. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Recognizing potential threat I In real anti-virus software, heuristic scanning is implemented to recognize threats by following built-in rules, e.g. if program tries to format hard drive its behaviour is highly suspicious but it can be only simple disk utility. Singular suspicion is never a reason to trigger the alarm. But if the same program also tries to stay resident and contains routine to search for executables, it is highly probable that it’s a real virus. AV software very often classifies sequences by their behaviour granting them a flag. Every flag has its weight, if total values for one program exceeds a predefined threshold, scanner regards it as virus. Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 30. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Heuristic Scanning as artificial neuron Figure: Single-layer classifier with threshold From [1] Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 31. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Recognizing potential threat II Figure: TbScan 6.02 heuristic flags From [3] For instance Jerusalem/PLO virus would raise FRLMUZ flags. Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 32. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Malware evolves After presenting specific scanning to AV software, malware authors were obligated to introduce new techniques of being undetected. Beside of polymorphism and mutation engines viruses started to use various stealth techniques which basically hooked interrupts and took control over them. This allowed them to be invisible for traditional scanner. Moreover, most of them started using real-time encryption which made them look like totally harmless program. Figure: Virus evolution chain [Source http://searchsecurity.techtarget.com] Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 33. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Pattern matching is not enough Mixing stealth techniques with encryption and anti-heuristic sequences (code obfuscated by meaningless instructions) allowed viruses to be unseen even by signature and heuristic scanning combined together. It was obvious that new solution was needed. The idea came from VM conceptions. Why not to create artificial runtime environment to let the virus do its job? Such approach found implementation in environment emulation engines, which became standard AV software weapon. Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 34. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Virtual reality The idea of environment emulation is simple. Anti-virus program provides a virtual machine with independent operating system and allows virus to perform its routines. Behaviour and characteristics are being continuously examined, while virus is not aware that is working on a fake system. This leads to decryption routines and revealment of its true nature. Also stealth techniques are useless because whole VM is monitored by AV software. Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 35. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement False positives & automatic learning HS as a heuristic method is only reasonably close to the best possible answer. In this case we can imagine that heuristic scanning will blame innocent programs for being potential threats. Such behaviour is called false positive We must be aware that program is right when rising alarm, because scanned app posses suspicious sequences, we can’t blame scanner for failure. So what can be done to avoid false positives? Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 36. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement False positives & automatic learning HS as a heuristic method is only reasonably close to the best possible answer. In this case we can imagine that heuristic scanning will blame innocent programs for being potential threats. Such behaviour is called false positive We must be aware that program is right when rising alarm, because scanned app posses suspicious sequences, we can’t blame scanner for failure. So what can be done to avoid false positives? A: Automatic learning! Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 37. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Avoiding false positives & improving accuracy I Some applications, especially non-commercial ones, can raise false positive, because of their suspicious routines. e.g. UnHash v1.0 through its encryption functionalities (used for finding hash collisions) almost every time is qualified as virus. What we can do to prevent it, is to: 1 Let Monitor learn Teach AV monitor to recognize programs causing false positives. (requires advanced user) Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 38. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Avoiding false positives & improving accuracy I Some applications, especially non-commercial ones, can raise false positive, because of their suspicious routines. e.g. UnHash v1.0 through its encryption functionalities (used for finding hash collisions) almost every time is qualified as virus. What we can do to prevent it, is to: 1 Let Monitor learn Teach AV monitor to recognize programs causing false positives. (requires advanced user) Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 39. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Avoiding false positives & improving accuracy II 2 Set proper scanning depth Configure Monitor with suitable heuristic scanning depth by manipulating threshold computed from flag weights. 3 Assume that machine is not infected Some AV software can scan through computer knowing it’s clean and learn which programs are false positives. 4 Combine scanning techniques Combine multiple scanning techniques to exclude potential false positives. 5 Perform scan as often as possible Knowing what’s going on is essential... Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 40. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Avoiding false positives & improving accuracy II 2 Set proper scanning depth Configure Monitor with suitable heuristic scanning depth by manipulating threshold computed from flag weights. 3 Assume that machine is not infected Some AV software can scan through computer knowing it’s clean and learn which programs are false positives. 4 Combine scanning techniques Combine multiple scanning techniques to exclude potential false positives. 5 Perform scan as often as possible Knowing what’s going on is essential... Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 41. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Avoiding false positives & improving accuracy II 2 Set proper scanning depth Configure Monitor with suitable heuristic scanning depth by manipulating threshold computed from flag weights. 3 Assume that machine is not infected Some AV software can scan through computer knowing it’s clean and learn which programs are false positives. 4 Combine scanning techniques Combine multiple scanning techniques to exclude potential false positives. 5 Perform scan as often as possible Knowing what’s going on is essential... Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 42. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Avoiding false positives & improving accuracy II 2 Set proper scanning depth Configure Monitor with suitable heuristic scanning depth by manipulating threshold computed from flag weights. 3 Assume that machine is not infected Some AV software can scan through computer knowing it’s clean and learn which programs are false positives. 4 Combine scanning techniques Combine multiple scanning techniques to exclude potential false positives. 5 Perform scan as often as possible Knowing what’s going on is essential... Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 43. Introduction Lacks in specific detection Heuristic scanning theory Heuristic scanning conception Case Study: Modern heuristic scanner features Recognizing potential threat Summary Coping with anti-heuristic mechanisms Further reading... Towards accuracy improvement Avoiding false positives & improving accuracy II 2 Set proper scanning depth Configure Monitor with suitable heuristic scanning depth by manipulating threshold computed from flag weights. 3 Assume that machine is not infected Some AV software can scan through computer knowing it’s clean and learn which programs are false positives. 4 Combine scanning techniques Combine multiple scanning techniques to exclude potential false positives. 5 Perform scan as often as possible Knowing what’s going on is essential... Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 44. Introduction Heuristic scanning theory Panda’s Technology Evolution Case Study: Modern heuristic scanner features Genetic Heuristic Engine - Nereus Summary Further reading... Presenting Panda Security solutions Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 45. Introduction Heuristic scanning theory Panda’s Technology Evolution Case Study: Modern heuristic scanner features Genetic Heuristic Engine - Nereus Summary Further reading... Modern Panda Security solutions belong to the third generation AV software. First Generation: Antivirus From 1990’s, signature scanning including polymorphic virus recognition. Primitive heuristics. Second Generation: Antimalware From 2000, integrated firewall, anti-malware engine. Third Generation: Proactive Technologies From 2004, TruPrevent R , genetic and rootkit heuristics, behavioral analysis and blocking, uncloaking techniques, generic unpacking Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 46. Introduction Heuristic scanning theory Panda’s Technology Evolution Case Study: Modern heuristic scanner features Genetic Heuristic Engine - Nereus Summary Further reading... Modern Panda Security solutions belong to the third generation AV software. First Generation: Antivirus From 1990’s, signature scanning including polymorphic virus recognition. Primitive heuristics. Second Generation: Antimalware From 2000, integrated firewall, anti-malware engine. Third Generation: Proactive Technologies From 2004, TruPrevent R , genetic and rootkit heuristics, behavioral analysis and blocking, uncloaking techniques, generic unpacking Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 47. Introduction Heuristic scanning theory Panda’s Technology Evolution Case Study: Modern heuristic scanner features Genetic Heuristic Engine - Nereus Summary Further reading... Modern Panda Security solutions belong to the third generation AV software. First Generation: Antivirus From 1990’s, signature scanning including polymorphic virus recognition. Primitive heuristics. Second Generation: Antimalware From 2000, integrated firewall, anti-malware engine. Third Generation: Proactive Technologies From 2004, TruPrevent R , genetic and rootkit heuristics, behavioral analysis and blocking, uncloaking techniques, generic unpacking Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 48. Introduction Heuristic scanning theory Panda’s Technology Evolution Case Study: Modern heuristic scanner features Genetic Heuristic Engine - Nereus Summary Further reading... Modern Panda Security solutions belong to the third generation AV software. First Generation: Antivirus From 1990’s, signature scanning including polymorphic virus recognition. Primitive heuristics. Second Generation: Antimalware From 2000, integrated firewall, anti-malware engine. Third Generation: Proactive Technologies From 2004, TruPrevent R , genetic and rootkit heuristics, behavioral analysis and blocking, uncloaking techniques, generic unpacking Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 49. Introduction Heuristic scanning theory Panda’s Technology Evolution Case Study: Modern heuristic scanner features Genetic Heuristic Engine - Nereus Summary Further reading... Modern Panda Security solutions belong to the third generation AV software. First Generation: Antivirus From 1990’s, signature scanning including polymorphic virus recognition. Primitive heuristics. Second Generation: Antimalware From 2000, integrated firewall, anti-malware engine. Third Generation: Proactive Technologies From 2004, TruPrevent R , genetic and rootkit heuristics, behavioral analysis and blocking, uncloaking techniques, generic unpacking Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 50. Introduction Heuristic scanning theory Panda’s Technology Evolution Case Study: Modern heuristic scanner features Genetic Heuristic Engine - Nereus Summary Further reading... Genetic Heuristic Engine, codename: Nereus was initially released in 2005. The innovation connected with Nereus rely on idea inspired by the field of genetics and its usefulness to understand how organisms are individually identified and associated to other organisms. Features: More than few hundred characteristics of each file that is scanned Complex malware recognition (type determination) Rootkit heuristics (time based analysis) Generic packer detectors and generic unpacking algorithms New threat automatic notification Automatic creation of detection and disinfection signatures for samples previously analyzed by processing and classification module Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 51. Introduction Heuristic scanning theory Panda’s Technology Evolution Case Study: Modern heuristic scanner features Genetic Heuristic Engine - Nereus Summary Further reading... Figure: Panda’s integrated endpoint security From [6] Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 52. Introduction Heuristic scanning theory Case Study: Modern heuristic scanner features Summary Further reading... Heuristic scanning is the most popular heuristic method for virus detection and recognition. Basically it is inherited from combination of pattern matching, automatic learning and environment emulation metaheuristics. As a heuristic method it’s not 100% effective. So why do we apply HS? Pros Can detect ’future’ threats User is less dependent on product update Improves conventional scanning results Cons False positives Making decision after alarm requires knowledge Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 53. Introduction Heuristic scanning theory Case Study: Modern heuristic scanner features Summary Further reading... Peter Szor The Art of Computer Virus Research and Defense Addison-Wesley Professional, 1st edition, February 2005 Tomasz Andel, Krzysztof Zawadzki Techniki pisania wirus´w oraz antywirus´w o o Inynieria bezpiecze´stwa system´w sieciowych i internetowych, PWr n o Wroclaw 2008 Frans Veldman Heuristic Anti-Virus Technology http://mirror.sweon.net/madchat/vxdevl/vdat/epheurs1.htm Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 54. Introduction Heuristic scanning theory Case Study: Modern heuristic scanner features Summary Further reading... Richard Zwienenberg Heuristic Scanners: Artificial Intelligence? http://mirror.sweon.net/madchat/vxdevl/vdat/epheurs2.htm ´ edited by Eric Filiol Journal in Computer Virology Springer Paris, Volume 1-4 http://www.springerlink.com/content/119769 Panda Research From Traditional Antivirus to Collective Intelligence August 2007 http://research.pandasecurity.com/ Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 55. Introduction Heuristic scanning theory Case Study: Modern heuristic scanner features Summary Further reading... Various online knowledge repositories For starters it’s good to search wikipedia... VX Heavens http://vx.netlux.org/lib Breaking Business and Technology News https://silicon.com/ IEEE http://ieeexplore.ieee.org/ Zines: Phalcon/Skism: 40HEX, VLAD, VBB: Viruses Bits & Bytes, Immortal Riot: Insane Reality, NuKe: NuKe IntoJournal, Dark Angel VirGuide AND OTHER... Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 56. Introduction Heuristic scanning theory Case Study: Modern heuristic scanner features Summary Further reading... Why?... Questions ? What if?... Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition
  • 57. Introduction Heuristic scanning theory Case Study: Modern heuristic scanner features Summary Further reading... THANK YOU Wojciech Podg´rski http://podgorski.wordpress.com o Artificial Intelligence Methods inVirus Detection & Recognition