Risk
8/6/2008
00:00 AM
Commentary
Commentary
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Antivirus Software Heads for the Clouds

When you stop and think about it, there's nothing really new about "cloud computing" other than it being a buzzword du jour for high-tech hypemeisters. That's not to say that as a concept, cloud computing -- Internet-based infrastructures that deliver IT services -- isn't useful. It most certainly is, and with any luck at all, new and unique applications for cloud computing will continue to pop up. Like the CloudAV project at the University of Michigan, for instance.

When you stop and think about it, there's nothing really new about "cloud computing" other than it being a buzzword du jour for high-tech hypemeisters. That's not to say that as a concept, cloud computing -- Internet-based infrastructures that deliver IT services -- isn't useful. It most certainly is, and with any luck at all, new and unique applications for cloud computing will continue to pop up. Like the CloudAV project at the University of Michigan, for instance.

According to security reseachers, traditional antivirus software is becoming increasingly ineffective, as evident by malware detection rates as low as 35 percent against the most recent threats and an average window of vulnerability exceeding 48 days. In other words, new threats go undetected for an average of seven weeks

The CloudAVCloudAV approach that Jon Oberheide, Evan Cooke, and Farnam Jahanian describe in their paper CloudAV: N-Version Antivirus in the Network Cloud, moves antivirus functionality off local PCs and into the cloud where it analyzes suspicious files using multiple antivirus and behavioral detection programs simultaneously.

To develop this approach, the trio evaluated 12 traditional antivirus software programs from vendors such as Avast, AVG, BitDefender, ClamAV, CWSandbox, F-Prot, F-Secure, Kaspersky, McAfee, Norman Sandbox, Symantec, and Trend Micro against 7,220 malware samples, including viruses, collected over a year. Traditional antivirus software that resides on a PC checks documents and programs as they are accessed. Because of performance constraints and program incompatibilities, only one antivirus detector is typically used at a time. CloudAV, however, can support a large number of malicious software detectors that act in parallel to analyze a single incoming file. Each detector operates in its own virtual machine, so the technical incompatibilities and security issues are resolved.

CloudAV is accessible to any computer or mobile device on the network that runs a simple software agent. Each time a computer or device receives a new document or program, that item is automatically detected and sent to the antivirus cloud for analysis. The CloudAV system the researchers built uses 12 different detectors that act together to tell the PC whether the item is safe to open.

CloudAV also caches analysis results, speeding up the process compared with traditional antivirus software. This could be useful when multiple employees access the same document. The new approach also includes what the developers call "retrospective detection," which scans its file access history when a new threat is identified. This allows it to catch previously-missed infections earlier. Finally, they see opportunities for CloudAV application to cell phones and other mobile devices that aren't robust enough to carry powerful antivirus software.

 

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4262
Published: 2014-07-28
svnwcsub.py in Subversion 1.8.0 before 1.8.3, when using the --pidfile option and running in foreground mode, allows local users to gain privileges via a symlink attack on the pid file. NOTE: this issue was SPLIT due to different affected versions (ADT3). The irkerbridge.py issue is covered by CVE-...

CVE-2013-4840
Published: 2014-07-28
Unspecified vulnerability in HP and H3C VPN Firewall Module products SECPATH1000FE before 5.20.R3177 and SECBLADEFW before 5.20.R3177 allows remote attackers to cause a denial of service via unknown vectors.

CVE-2013-7393
Published: 2014-07-28
The daemonize.py module in Subversion 1.8.0 before 1.8.2 allows local users to gain privileges via a symlink attack on the pid file created for (1) svnwcsub.py or (2) irkerbridge.py when the --pidfile option is used. NOTE: this issue was SPLIT from CVE-2013-4262 based on different affected versions...

CVE-2014-2974
Published: 2014-07-28
Cross-site request forgery (CSRF) vulnerability in php/user_account.php in Silver Peak VX through 6.2.4 allows remote attackers to hijack the authentication of administrators for requests that create administrative accounts.

CVE-2014-2975
Published: 2014-07-28
Cross-site scripting (XSS) vulnerability in php/user_account.php in Silver Peak VX before 6.2.4 allows remote attackers to inject arbitrary web script or HTML via the user_id parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.