This is how Antivirus Detect Malware
The Antivirus is that tool that we
constantly mention in our articles and security notices and
whose functionality is essential to preserve the integrity of the information
and the systems that manage it. However, until now, we have not discussed
what it does, exactly, to protect our devices. In this article we will
show you some details and characteristics of this basic cybersecurity tool.
What does an Antivirus do?
An antivirus is a type of software whose main objective
is to detect and block malicious actions on the computer, generated by any type of malware and, in the
event of an infection, to eliminate it. Currently, this type of software is part of
what are known as suites of
security tools that incorporate other functionalities: password managers, Wi-Fi
network analyzers or blockers of malicious websites such as those used in phishing campaigns.
Malware detection
Antiviruses incorporate a large number of
functions. Today we are going to focus on how they detect malicious
code. To do this, they mainly have two types of protection:
- reactive,
signature-based;
- Proactive
or heuristic.
Signature database
The method, traditionally used by antivirus to
detect malware,
is based on signature databases (a way of identifying malware), generated by the
manufacturer, also known as vaccines. The possible malicious file is
checked against the database and if there is a match then it is malware.
Signature-based detection issues
- The main problem with this type of analysis is that
it will only detect those malware samples that have already been
previously identified and for which a signature has been generated that is
in the database. In the event that this does not exist in the
database that the user's antivirus has, the user would be exposed to the
threat.
- Another drawback is the delay that exists between
the identification, generation of the signature and updating of the
database; this window of time leaves the user defenseless against the
threat.
- Finally, there are a lot of malicious files that are
created on a daily basis, rendering the detection, exclusively based on
signature, obsolete.
Heuristics
As a complementary method to signature-based detection
and to solve its deficiencies, proactive detection based on heuristics was
designed. This malware detection
method responds to many situations where signature-based detection does
not arrive, such as:
- The malware still
does not have a signature;
- The malware has been
discovered but the company still has not reached the user.
Heuristics is considered one of the parts of artificial
intelligence, designed under rules obtained from experience and a machine
learning system that make this method better and more accurate over time.
The operation of heuristic algorithms bases its behavior on
different criteria that will determine if a file is malicious, such as, for
example, if the registry is modified or a remote connection is established with
another device. Each of these criteria is assigned a score. If it
exceeds a certain threshold, it will be considered a threat.
Types of heuristic algorithms
This type of proactive analysis can be carried out in
different ways, although the three most common are:
- Generic: this analysis compares the behavior of a
certain file with respect to another already identified as
malicious. If the analyzed file exceeds the similarity threshold, it
will be considered a malicious variant of the first one;
- Passive: it analyzes the file individually, without
making any comparison with another identified as malware, and tries to
find out what it is doing, for example opening a port or connecting to an
IP address. If the actions are considered dangerous, it will mark the
sample as malicious;
- Active: this runs the sample in a safe environment
or sandbox that
will determine its behavior and identify if it is malware or not.
Heuristic-based
detection problems
- The main problem with this type of detection is
false positives. That is, an application, without any malicious
purpose, is identified as malware. Heuristic
algorithms often have different levels of rigor. The more rigorous
the analysis, the more likely it is that a false positive will occur and
vice versa;
- Another drawback of this analysis is that the
workload of the team increases compared to the signature-based analysis,
and the performance of other tools may be affected.
Importance of keeping antivirus updated
This is a recommendation that we always give and now you
know why.
What detection method
to choose?
Deciding solely on one detection method or another would
be a mistake, since the advantages provided by the other would be
lost. Antivirus is one of the key
pieces in preventing threats, so keeping this tool active and up-to-date will
prevent most of them. In addition, they currently have a multitude of
tools that help improve the device's cybersecurity level considerably, be it a
computer or a Smartphone,
since these devices must also be protected. Install an antivirus and if you already
have it, keep it updated to the latest version!
No comments:
Post a Comment