You are on page 1of 4

2008 International Symposium on Ubiquitous Multimedia Computing

Malware and Antivirus Deployment for Enterprise IT Security

Nadejda Belbus Vasilyevna1), Sang-Soo Yeo2), Eun-Suk Cho3), Jeon-Ah Kim4)


1)
Tashkent University of Information Technologies, Tashkent, Uzbekistan
2)
R&D Department, BTWorks Inc., Seoul, Korea
3)
School of Multimedia, Hannam University, Daejoen, Korea
4)
Dept. of Computer Education, Kwandong University, KangNung, Korea
nbelbus@mail.ru, ssyeo@btworks.co.kr, eunsukk@empal.com, clara@kd.ac.kr

Abstract pernicious than other forms of information security


(IS) vulnerabilities in that its impact is generally not
Threats to information security are spreading, from confined to one or a few entities; rather, it is normal
both outside and within an organization. Computer for a large number of organizations to be affected at
security has evolved so as the methods of once, to a substantial degree.
identification, detection, and prevention of malware,
only to be followed by a new set of threats that
circumvent those safeguards. Internet and wide 2. Malware and Its Impact
availability of toolsets and documentation exacerbates
this problem by making malware development easy. As Malware is short for malicious software and is
blended threats continue to combine multiple types of typically used as a catch-all term to refer to the class of
attacks into single and more dangerous payloads, software designed to cause damage to any device, be it
newer threats are emerging. Phishing, pharming, an end-user computer, a server, or a computer network.
spamming, spoofing, spyware, and hacking incidents Software is considered malware based on the
are increasing at an alarming rate despite the release perceived intent of the creator rather than any
of breakthrough security defense products. A multi- particular features. Malware includes computer
layered, integrated approach using different security viruses, worms, trojan horses, most rootkits, spyware,
products in conjunction with well-defined security dishonest adware, and other malicious and unwanted
policies and antivirus software will form the software. The number of Malware has increased since
foundation for effective enterprise security its breakthrough in 1986 due to new technologies
management. specially the internet.

Keyword: Antivirus, Malware Prevention, Table. 1 Time taken by Virus to become


Information Security, Enterprise Security prevalent over years (Source: Orshesky, 2002)

Name of Year of Time taken


Type
1. Introduction malware creation to spread
form 1990 boot sector virus 3 years
Enterprise deployment refers to uniform concept 1995 word macro virus 4 months
distribution, operation, administration, and Melissa 1999 e-mail enabled 4 days
maintenance of a common solution across all
word macro
departments in a given organization. The strategies and
teachings from this chapter apply to all organizations, Love
2000 e-mail enabled 5 hours
large and small, as long as an enterprise deployment Letter
solution is used. The increased use of the information script
superhighway has been accompanied, inevitably, by a Slammer 2003 SQL worm 10 minutes
commensurate increase in the incidence and impact of
malware outbreak. A malware attack is more

978-0-7695-3427-5/08 $25.00 © 2008 IEEE 252


DOI 10.1109/UMC.2008.58
Antivirus software has been the chief defense configuration. Typically this layer has firewall and e-
mechanism since the proliferation of viruses started. mail servers that are exposed to the public Internet.
Most antivirus solutions are comprehensive security Layer 1 features “firewall logs” that play a
solutions that can be centrally monitored. They can significant role in antivirus deployment. Malware is
also be configured to remove administrative rights frequently aimed at exploiting certain ports in the
from client machines. Antivirus programs normally target machine and using them to broadcast itself, and
manage the life cycle of viruses in four steps: these Firewall logs in Layer 1 can be “parsed” for such
1. Prevention of virus outbreak; attempts. This security management control process
2. Containment of virus outbreak; could be customized based on past experience and
3. Restoration of the affected nodes; and current activity.
4. Reporting and alerting all the complementing
perimeter security systems. 3.1.2 Content Scanning. The content-scanning
function of Layer1 processes e-mail attachments, scans
e-mails for specific text, identifies spam based on e-
3. Antivirus Solution: The Layered mail content, and provides blacklisting services that
Approach were not included in the firewall filters. The scanning
function is not confined to incoming traffic —
The inherent complexity of enterprise networks malware originating within the organization is also
demands a common security framework for all the addressed by the content scanning function of Layer 1.
entities involved in such a network, as has been
discussed in the earlier sections. We present a generic 3.2 Layer 2 - Intranet servers
three-layered approach:
Layer 1: Gateway and content security Layer 1 dealt with e-mail and proxy servers placed
Layer 2: Intranet servers in the DMZ network. We now address the next layer in
Layer 3: Desktops and user community the security of the enterprise — e-mail servers, file
servers, and proxy servers hosted on the organizational
intranet. Given that the major medium of virus
propagation is e-mail, antivirus solutions for e-mail
servers demand special attention.
Antivirus software should be installed on both e-
mail servers and client machines, and should be
selected based on the e-mail software used. Most
organizations now provide remote-access capability to
Layer 2 e-mail servers, either through a virtual private
network (VPN), a remote access server (RAS), or
Webmail.

3.3 Layer 3 - Desktops and user community

Layer 3, the innermost layer is the one that has


traditionally received maximum attention. The
Figure 1. The 3-Layered Defense scanning issues for file servers in Layer 2 hold good
for desktops as well, thanks to the increase in storage
3.1 Layer 1- Gateway and content security space and processing speed. The use of Webmail,
instant messaging tools, peer-to-peer file sharing,
It deals with the Internet visible servers as well as shared permissions in the intranet, and downloads from
the DMZ network of an organization. It can be further the Internet are all possible sources of virus infection.
subdivided into gateway traffic and content security. Access to such services should be addressed while
formulating the organization’s security policy. It is
3.1.1Gateway Traffic. The antivirus solution in the highly desirable that automated scans be configured
gateway security layer (GSL) complements the for user machines and that administrator privileges on
protection provided by of the firewall and DMZ those machines be unavailable to lay users. This helps
ensure that critical antivirus programs are not

253
uninstalled and that the user does not install any new security managers eradicate this malware. Advanced
programs or tools. anti-spyware tools targeted at the enterprise market
typically feature centralized management tools and
automatic update services.
4. Patch Deployment in Enterprise
Network
5. Mechanics of Malware and Antivirus
Effective patch management includes several Software
critical elements, such as top management support,
standardized policies, dedicated resources, risk This section attempts to provide an understanding
assessment, testing, distribution of patches, and of the mechanics of the working of a virus and of
monitoring the effectiveness of patch deployment. The antivirus software. A real-life example may be salutary
following facts illustrates the seriousness of the current to this purpose.
situation:
5.1 Pattern Recognition
ƒ According to the FBI and Carnegie Mellon
University, more than 90% of all security breaches Pattern file recognition examines key suspect areas
involve a software vulnerability caused by a and uses the virus pattern file to compare and detect
missing patch that the IT department already viruses.
knows about.
5.2 Integrity Checking (Check-Summing)
ƒ On January 25, 2003, the Slammer worm triggered
a global Internet slowdown and caused This is another old method in which the antivirus
considerable harm through network outages and program builds an initial record of the status (size,
other unforeseen consequences. Some of the time, date, etc.) of all the files on the hard disk.
reported incidents due to its impact were: shutting
down of a 911 emergency call center, cancellation 5.3 X-Raying
of airline flights, failure of ATMs, and disruption
of important systems at nuclear power plant This is a method of virus detection that uses a set of
facilities. techniques that enables us to see a picture of the virus
body, seeing through the layer of encryption.
ƒ During the summer of 2003, the Blaster threat
appeared a full 27 days after the associated
5.4 32-Bit Viruses and PE File Infectors
vulnerability was announced through a critical
security bulletin by Microsoft and a patch was
This infects files in 32 bit OS. PE file-infectors
made available by that company. Clearly, had this
work in various ways, change the entry point to that
time been used in simple patch-deployment, much
specific section to run themselves each time the host
of the impact of that worm could have been
file gets executed.
mitigated.
5.5 Entry Point Obscuring
4.1 Patch Management — Common Mistakes
and Solutions Unlike the PE File Infectors, it places a "Jump-to-
Virus" instruction somewhere in the middle of the file
Patch management has become expensive and time- code section.
consuming for most enterprises. Common mistakes are
incompatible patches, defective patches, neglect to 5.6 Encrypted Virus
patch and patches containing vulnerabilities
themselves. These feature the encryption technology in virus
writing that hides the fixed signature by encrypting the
4.2 Antispyware for Enterprise Network scrambling virus, making it unrecognizable to the
antivirus software.
Spyware is fast emerging as a major concern, and
new enterprise anti-spyware tools are helping network

254
5.7 Polymorphic Viruses 7. Conclusion
A polymorphic virus features a scrambled virus These past years were bustled with serial computer
body, a decryption routine of encryptedviruses, and a virus outbreaks. It also saw an increase in bot
third component called a "mutation engine" in programs and the incidence of spam and phishing, as
encrypted form. well as in spyware and adware generation, indicating
the determination of hackers to invade and undermine
5.8 Heuristic-Based Generic Decryption and every popular Internet application and device and
Emulation exploit every available security loophole. Outdated
forms and methods of attacks have been replaced with
This enhancement of generic decryption employs newer, more effective methods that can ensure greater
"heuristics", a generic set of rules that helps reach and effectiveness. Based on the current trend,
differentiate non-virus from virus behavior. some of the future forecasts regarding malware are:
Smarter blended threats are increasingly wreaking
havoc and will continue to present a challenge to
5.9 Anti-Emulation enterprise security. Spam mails and phishing will
continue to be a major concern in e-mail usage, while
Viruses use anti-emulation techniques to defeat the newer malware like pharming viruses are emerging.
generic heuristics detection process by themselves Internet relay chat (IRC), peer-to-peer (P2P)
detecting if emulation is in progress. communication will continue to be weak security links
and new file-swapping technologies continue to raise
5.10 Anti-Debugging new concerns. Social engineering is emerging as one
of the biggest challenges, as there is no technical
Anti-debugging techniques are small pieces of code defense against the exploitation of human weaknesses.
that have no overall effect on the virus when it is run The time between vulnerability disclosure and release
under conditions bereft of antivirus scanning of malware exploiting the vulnerability continues to
techniques. get shorter, requiring more proactive assessment tools
and constant vulnerability assessment of the enterprise
5.11 Retrovirus networks.

Retrovirus is a computer virus that specifically tries References


to bypass or hinder the operation of antivirus
programs. The attack may be generic or specific to a [1] Sharman, R., Krishna, K.P., Rao, H.R., Upadhyaya, S.
(2006) Malware and Antivirus Deployment for
known product, is also known as anti-antivirus.
Enterprise Security
[2] Argaez, E. D. (2004). How to prevent the online
5.12 Backdoor invasion of spyware and adware.
[3] Banes, D. (2001). How to stay virus, worm and Trojan
A program that surreptitiously allows access to a free - without anti-virus software.
computer ’ s resources (files, network connections, [4] Capek, P. G., Chess, D. M. , & White, S. R. (2003,).
configuration information, etc.) via a network Merry Christmas: An early network worm. Security &
Privacy Magazine, IEEE, 1(5), 26-34.
connection is known as a backdoor or remote-access
[5] CSI/FBI. (2004). 9th CSI/FBI Annual computer crime
Trojan. and security survey. CSI Institute.
[6] Dacey, R. F. (2003, September 10). Information
security: Effective patch management is critical to
6. Antivirus Engine and Database mitigating software vulnerabilities. Testimony Before
the Subcommittee on Technology Information Policy,
Antivirus scanners generally include an antivirus Intergovernmental Relations, and the Census, House
(AV) engine and a virus-detection database. These two Committee on Government Reform. U.S. GAO-03-
1138T.
components are normally integrated into a single unit. [7] Ferrie, F. P. a. P. (2004, September 8-9). Principles and
However, in some antivirus software products, the practise of x-raying. Paper presented at the Virus
engine only serves as a loader for the database, and it Bulletin Conference, Jersey, UK.
is here that all the functionality is implemented.

255

You might also like