Antivirus software

Endpoint antivirus software
ClamTk 3.08 free antivirus software

Antivirus (or anti-virus) software is used to prevent, detect, and remove malware, including computer viruses, worms, and trojan horses. Such programs may also prevent and remove adware, spyware, and other forms of malware.

A variety of strategies are typically employed. Signature-based detection involves searching for known malicious patterns in executable code. However, it is possible for a user to be infected with new malware for which no signature exists yet. To counter such so-called zero-day threats, heuristics can be used. One type of heuristic approach, generic signatures, can identify new viruses or variants of existing viruses by looking for known malicious code (or slight variations of such code) in files. Some antivirus software can also predict what a file will do if opened/run by emulating it in a sandbox and analyzing what it does to see if it performs any malicious actions. If it does, this could mean the file is malicious.

However, no matter how useful antivirus software is, it can sometimes have drawbacks. Antivirus software can degrade computer performance. Inexperienced users may have trouble understanding the prompts and decisions that antivirus software presents them with. An incorrect decision may lead to a security breach. If the antivirus software employs heuristic detection (of any kind), success depends on achieving the right balance between false positives and false negatives. False positives can be as destructive as false negatives. Finally, antivirus software generally runs at the highly trusted kernel level of the operating system, creating a potential avenue of attack.[1]

In addition to the drawbacks mentioned above, the effectiveness of antivirus software has also been researched and debated. One study found that the detection success of major antivirus software dropped over a one-year period.[2]

Contents

History

Most of the computer viruses that were written in the early and mid '80s were limited to self-reproduction and had no specific damage routine built into the code (research viruses[3]). That changed when more and more programmers became acquainted with virus programming and released viruses that manipulated or even destroyed data on infected computers. It then became necessary to think about antivirus software to fight these malicious viruses.

There are competing claims for the innovator of the first antivirus product. Possibly the first publicly documented removal of a computer virus in the wild was performed by Bernd Fix in 1987.[4][5]

Fred Cohen, who published one of the first academic papers on computer viruses in 1984[6], started to develop strategies for antivirus software in 1988[7] that were picked up and continued by later antivirus software developers.

Also in 1988 a mailing list named VIRUS-L[8] was initiated on the BITNET/EARN network where new viruses and the possibilities of detecting and eliminating viruses were discussed. Some members of this mailing list like John McAfee or Eugene Kaspersky later founded software companies that developed and sold commercial antivirus software.

Before Internet connectivity was widespread, viruses were typically spread by infected floppy disks. Antivirus software came into use, but was updated relatively infrequently. During this time, virus checkers essentially had to check executable files and the boot sectors of floppy and hard disks. However, as internet usage became common, initially through the use of modems, viruses spread throughout the Internet.[9]

Over the years antivirus software had to check many more types of files (and not only executable files) for several reasons:

As always-on broadband connections became the norm and more and more viruses were released, it became essential to update virus checkers more and more frequently. Even then, a new zero-day virus could become widespread before antivirus companies released an update to protect against it.

Identification methods

Malwarebytes' Anti-Malware version 1.46 - a proprietary freeware antimalware product

There are several methods which antivirus software can use to identify malware.

Signature based detection is the most common method. To identify viruses and other malware, antivirus software compares the contents of a file to a dictionary of virus signatures. Because viruses can embed themselves in existing files, the entire file is searched, not just as a whole, but also in pieces.[12]

Heuristic-based detection, like malicious activity detection, can be used to identify unknown viruses.

File emulation is another heuristic approach. File emulation involves executing a program in a virtual environment and logging what actions the program performs. Depending on the actions logged, the antivirus software can determine if the program is malicious or not and then carry out the appropriate disinfection actions.[13]

Signature based detection

Traditionally, antivirus software heavily relied upon signatures to identify malware. This can be very effective, but cannot defend against malware unless samples have already been obtained and signatures created. Because of this, signature-based approaches are not effective against new, unknown viruses.

Because new viruses are being created each day, the signature-based detection approach requires frequent updates of the virus signature dictionary. To assist the antivirus software companies, the software may allow the user to upload new viruses or variants to the company, allowing the virus to be analyzed and the signature added to the dictionary.[12]

Although the signature-based approach can effectively contain virus outbreaks, virus authors have tried to stay a step ahead of such software by writing "oligomorphic", "polymorphic" and, more recently, "metamorphic" viruses, which encrypt parts of themselves or otherwise modify themselves as a method of disguise, so as to not match virus signatures in the dictionary.[14]

Heuristics

Some more sophisticated antivirus software uses heuristic analysis to identify new malware or variants of known malware.

Many viruses start as a single infection and through either mutation or refinements by other attackers, can grow into dozens of slightly different strains, called variants. Generic detection refers to the detection and removal of multiple threats using a single virus definition.[15]

For example, the Vundo trojan has several family members, depending on the antivirus vendor's classification. Symantec classifies members of the Vundo family into two distinct members, Trojan.Vundo and Trojan.Vundo.B.[16][17]

While it may be advantageous to identify a specific virus, it can be quicker to detect a virus family through a generic signature or through an inexact match to an existing signature. Virus researchers find common areas that all viruses in a family share uniquely and can thus create a single generic signature. These signatures often contain non-contiguous code, using wildcard characters where differences lie. These wildcards allow the scanner to detect viruses even if they are padded with extra, meaningless code. [18] Padded code is used to confuse the scanner so it can't recognize the threat.

A detection that uses this method is said to be "heuristic detection."

Rootkit detection

Anti-virus software now scans for rootkits; a rootkit is a type of malware that is designed to gain administrative-level control over a computer system without being detected. Rootkits can change how the operating system functions and in some cases, rootkits can tamper with the anti-virus program and render it ineffective. Rootkits are also very difficult to remove, in some cases requiring a complete re-installation of the operating system.[19][20]

Issues of concern

Unexpected renewal costs

Some commercial antivirus software end-user license agreements include a clause that the subscription will be automatically renewed, and the purchaser's credit card automatically billed, at the renewal time without explicit approval. For example, McAfee requires users to unsubscribe at least 60 days before the expiration of the present subscription[21] while BitDefender sends notifications to unsubscribe 30 days before the renewal.[22] Norton Antivirus also renews subscriptions automatically by default.[23]

Rogue security applications

Some antivirus programs are actually malware masquerading as antivirus software, such as WinFixer and MS Antivirus.[24] A recent surge in such software has deceived more than a million Microsoft Windows internet users and prompted the FTC to initiate court proceedings.

Problems caused by false positives

A false positive is identifying a file as a virus when it is not a virus. If an antivirus program is configured to immediately delete or quarantine infected files (or does this by default), false positives in essential files can render the operating system or some applications unusable.[25] In May 2007, a faulty virus signature issued by Symantec mistakenly removed essential operating system files, leaving thousands of PCs unable to boot.[26] Also in May 2007 the executable file required by Pegasus Mail was falsely detected by Norton AntiVirus as being a Trojan and it was automatically removed, preventing Pegasus Mail from running.[27] Norton anti-virus has falsely identified three releases of Pegasus Mail as malware; Norton anti-virus can delete the Pegasus Mail installer file when this happens.[28] In response to this Pegasus Mail stated:

On the basis that Norton/Symantec has done this for every one of the last three releases of Pegasus Mail, we can only condemn this product as too flawed to use, and recommend in the strongest terms that our users cease using it in favour of alternative, less buggy anti-virus packages.[28]

In April 2010 McAfee VirusScan detected svchost.exe, a normal Windows binary, as a virus on machines running XP SP3 and removed it, causing a reboot loop and loss of all network access.[29][30]

Spotify has been flagged as a false positive by Symantec and McAfee products. Even when the false positive is rectified by an update, users may have to re-install Spotify.[31]

System and interoperability related issues

Running multiple antivirus programs concurrently can degrade performance and create conflicts.[32]

It is sometimes necessary to temporarily disable virus protection when installing major updates such as Windows Service Packs or updating graphics card drivers.[33] Active antivirus protection may partially or completely prevent the installation of a major update.

Support issues also exist around antivirus application interoperability with common solutions like SSL VPN remote access and network access control products.[34] Often, these technology solutions have policy assessment applications which require that 1. an antivirus is installed 2. that the product is running and 3. that the application's signatures are up to date. If the antivirus application is not recognized by the policy assessment, whether because the antivirus application has been updated or because it is not part of the policy assessment library, the user will be unable to connect. Interoperability testing and certification for antivirus applications is offered by the OESIS OK Program.[35]

Effectiveness

Studies in December 2007 have shown that the effectiveness of antivirus software has decreased in recent years, particularly against unknown or zero day attacks. The German computer magazine c't found that detection rates for these threats had dropped from 40-50% in 2006 to 20-30% in 2007. At that time, the only exception was the NOD32 antivirus, which managed a detection rate of 68 percent.[2]

The problem is magnified by the changing intent of virus authors. Some years ago it was obvious when a virus infection was present. The viruses of the day, written by amateurs, exhibited destructive behavior or pop-ups. Modern viruses are often written by professionals, financed by criminal organizations.[36]

Traditional antivirus software solutions run virus scanners on schedule, on demand and some run scans in real time. If a virus or malware is located the suspect file is usually placed into a quarantine to terminate its chances of disrupting the system. Traditional antivirus solutions scan and compare against a publicised and regularly updated dictionary of malware otherwise known as a blacklist. Some antivirus solutions have additional options that employ an heuristic engine which further examines the file to see if it is behaving in a similar manner to previous examples of malware. A new technology utilized by a few antivirus solutions is whitelisting, this technology first checks if the file is trusted and only questioning those that are not.[37]

Independent testing on all the major virus scanners consistently shows that none provide 100% virus detection. The best ones provided as high as 99.6% detection, while the lowest provide only 81.8% in tests conducted in February 2010. All virus scanners produce false positive results as well, identifying benign files as malware.[38]

Although methodologies may differ, some notable independent quality testing agencies include AV-Comparatives, ICSA Labs, West Coast Labs, VB100 and other members of the AMTSO (Anti-Malware Testing Standards Organization).[39]

New viruses

Most popular anti-virus programs are not very effective against new viruses, even those that use non-signature-based methods that should detect new viruses. The reason for this is that the virus designers test their new viruses on the major anti-virus applications to make sure that they are not detected before releasing them into the wild.[40]

Some new viruses, particularly ransomware, use polymorphic code to avoid detection by virus scanners. Jerome Segura, a security analyst with ParetoLogic, explained:[41]

It's something that they miss a lot of the time because this type of [ransomware virus] comes from sites that use a polymorphism, which means they basically randomize the file they send you and it gets by well-known antivirus products very easily. I've seen people firsthand getting infected, having all the pop-ups and yet they have antivirus software running and it's not detecting anything. It actually can be pretty hard to get rid of, as well, and you're never really sure if it's really gone. When we see something like that usually we advise to reinstall the operating system or reinstall backups.[41]

Rootkits

The detection of rootkits are a major challenge for anti-virus programs. Rootkits are extremely difficult to detect and if undetected, rootkits have full administrative access to the computer and are invisible to users e.g. a rootkit will not be shown in the list of running processes in the task manager. Rootkits can modify the inner workings of the operating system[42] and tamper with the anti-virus program.[43] If a rootkit hides itself in firmware e.g. the motherboard BIOS, it may never be discovered[44] and could persist even if the operating system is cleanly installed on a reformatted or new hard drive.[45][46]

Other methods

A command-line virus scanner, Clam AV 0.95.2, running a virus signature definition update, scanning a file and identifying a Trojan

Installed antivirus software running on an individual computer is only one method of guarding against viruses. Other methods are also used, including cloud-based antivirus, firewalls and on-line scanners.

Cloud antivirus

In current antivirus software a new document or program is scanned with only one virus detector at a time. CloudAV would be able to send programs or documents to a network cloud where it will use multiple antivirus and behavioural detection simultaneously. It is more thorough and also has the ability to check the new document or programs access history.[47]

CloudAV is a cloud computing antivirus developed as a product of scientists of the University of Michigan. Each time a computer or device receives a new document or program, that item is automatically detected and sent to the antivirus cloud for analysis. The CloudAV system uses 12 different detectors that act together to tell the PC whether the item is safe to open.[47][48][49]

Network firewall

Network firewalls prevent unknown programs and Internet processes from accessing the system protected. However, they are not antivirus systems as such and thus make no attempt to identify or remove anything. They may protect against infection from outside the protected computer or LAN, and limit the activity of any malicious software which is present by blocking incoming or outgoing requests on certain TCP/IP ports. A firewall is designed to deal with broader system threats that come from network connections into the system and is not an alternative to a virus protection system.

Online scanning

Some antivirus vendors maintain websites with free online scanning capability of the entire computer, critical areas only, local disks, folders or files.

Specialist tools

Virus removal tools are available to help remove stubborn infections or certain types of infection. Examples include the Trend Micro Rootkit Buster[50] for the detection of rootkits and VundoFix for removing some variants of Vundo infections. Anti-virus vendors also offer tools to remove virus infections, such as the Avira AntiVir Removal Tool.[51]

A rescue disk that is bootable (such as a CD/DVD disc or USB storage device) can be used to run anti-virus software outside of the installed operating system and remove the infections when dormant. A bootable anti-virus disk can be useful when, for example, the installed operating system is no longer bootable or has malware that is resisting all attempts to be disinfected by the anti-virus program on the infected computer. Examples of some of these bootable disks include the Avira AntiVir Rescue System[52] (a Linux-based rescue CD) and AVG Rescue CD.[53] The AVG Rescue CD download page has the option of a bootable USB program for booting off a USB storage device.[54] This could be useful on netbooks which don't have an internal optical drive or on computers which support booting from USB devices, as an alternative to using a blank CD/DVD to create a bootable disc.

Popularity

A survey by Symantec from 2009 suggests that a third of small to medium sized business do not use antivirus protection; whereas more than 80% of home users have some kind of antivirus installed.[55]

On 7 July 2010 OPSWAT issued an antivirus market share report based on endpoint detections which suggested that the majority of endpoint antivirus market share was held by free products like Avast! Avira and AVG.[56][57]

See also

References

  1. "Norton AntiVirus ignores malicious WMI instructions". Munir Kotadia. CBS Interactive. 21 October 2004. http://www.zdnet.com.au/news/security/soa/Norton-AntiVirus-ignores-malicious-WMI-instructions/0,130061744,139163678,00.htm. Retrieved 2009-04-05. 
  2. 2.0 2.1 Goodin, Dan (2007-12-21). "Anti-virus protection gets worse". Channel Register. http://www.channelregister.co.uk/2007/12/21/dwindling_antivirus_protection/. 
  3. History of viruses
  4. Kaspersky Lab Virus list
  5. Wells, Joe (1996-08-30). "Virus timeline". IBM. http://www.research.ibm.com/antivirus/timeline.htm. Retrieved 2008-06-06. 
  6. Fred Cohen 1984 "Computer Viruses – Theory and Experiments"
  7. Fred Cohen 1988 "On the implications of Computer Viruses and Methods of Defense"
  8. VIRUS-L mailing list archive
  9. Panda Security (April 2004). "(II) Evolution of computer viruses". http://www.pandasecurity.com/homeusers/media/press-releases/viewnews?noticia=4974&entorno=&ver=&pagina=&producto=. Retrieved 2009-06-20. 
  10. Szor, Peter (2005). The Art of Computer Virus Research and Defense. Addison-Wesley. pp. 66–67. ISBN 0-32-130454-3. 
  11. Slipstick Systems (February 2009). "Protecting Microsoft Outlook against Viruses". http://www.slipstick.com/outlook/antivirus.htm. Retrieved 2009-06-18. 
  12. 12.0 12.1 Landesman, Mary (2009). "What is a Virus Signature?". http://antivirus.about.com/od/whatisavirus/a/virussignature.htm. Retrieved 2009-06-18. 
  13. Szor, Peter (2005). The Art of Computer Virus Research and Defense. Addison-Wesley. pp. 474–481. ISBN 0-32-130454-3. 
  14. Szor, Peter (2005). The Art of Computer Virus Research and Defense. Addison-Wesley. pp. 252–288. ISBN 0-32-130454-3. 
  15. "Generic detection". Kaspersky. http://www.viruslist.com/en/viruses/glossary?glossid=189210517. Retrieved 2009-02-24. 
  16. Symantec Corporation (February 2009). "Trojan.Vundo". http://www.symantec.com/security_response/writeup.jsp?docid=2004-112111-3912-99. Retrieved 2009-04-14. 
  17. Symantec Corporation (February 2007). "Trojan.Vundo.B". http://www.symantec.com/security_response/writeup.jsp?docid=2005-042810-2611-99. Retrieved 2009-04-14. 
  18. "Antivirus Research and Detection Techniques". ExtremeTech. http://www.extremetech.com/article2/0,2845,1154648,00.asp. Retrieved 2009-02-24. 
  19. Rootkit: Definition, Prevention and Removal
  20. Rootkit
  21. Kelly, Michael (October 2006). "Buying Dangerously". http://michaelkelly.blogs.com/buyingdangerously/2006/10/bad_mcafee_on_a.html. Retrieved 2009-11-29. 
  22. Bitdefender (2009). "Automatic Renewal". http://www.bitdefender.com/site/KnowledgeBase/consumer/#542. Retrieved 2009-11-29. 
  23. Symantec (undated). "Ongoping Protection". http://www.symantecstore.com/dr/sat1/ec_main.entry25?page=OnGoingProtection&client=Symantec&sid=49997&CUR=840&DSP=&PGRP=0&ABCODE=&CACHE_ID=189236. Retrieved 2009-11-29. 
  24. SpywareWarrior (2007). "Rogue/Suspect Anti-Spyware Products & Web Sites". http://www.spywarewarrior.com/rogue_anti-spyware.htm. Retrieved 2009-11-29. 
  25. Heise Media (November 2008). "AVG gives false alarm for Windows system library". http://www.heise-online.co.uk/news/AVG-gives-false-alarm-for-Windows-system-library--/111940. Retrieved 2009-11-29. 
  26. "Flawed Symantec update cripples Chinese PCs". Aaron Tan. CBS Interactive Inc. May 24, 2007. http://news.cnet.com/Flawed-Symantec-update-cripples-Chinese-PCs/2100-1002_3-6186271.html. Retrieved 2009-04-05. 
  27. Norton AntiVirus detecting winpm-32.exe as Trjan.Dropper!!!!
  28. 28.0 28.1 Harris, David (June 2009). "January 2010 - Pegasus Mail v4.52 Release". http://www.pmail.com/v45x.htm. Retrieved 21 May 2010. 
  29. "McAfee DAT 5958 Update Issues". 21 April 2010. http://isc.sans.org/diary.html?storyid=8656. Retrieved 22 April 2010. 
  30. "Botched McAfee update shutting down corporate XP machines worldwide". 21 April 2010. http://www.engadget.com/2010/04/21/mcafee-update--shutting-down-xp-machines/. Retrieved 22 April 2010. 
  31. http://www.theregister.co.uk/2010/01/28/symantec_spotify_false_alarm/
  32. Microsoft (January 2007). "Plus! 98: How to Remove McAfee VirusScan". http://support.microsoft.com/default.aspx?scid=http://support.microsoft.com:80/support/kb/articles/Q189/2/64.ASP&NoWebContent=1. Retrieved 2009-11-29. 
  33. Microsoft (April 2009). "Steps to take before you install Windows XP Service Pack 3". http://support.microsoft.com/kb/950717. Retrieved 2009-11-29. 
  34. Field Notice: FN - 63204 - Cisco Clean Access has Interoperability issue with Symantec Anti-virus - delays Agent start-up
  35. OESIS OK
  36. Illett, Dan (July 2007). "Hacking poses threats to business". http://www.computerweekly.com/Articles/2007/07/13/225537/hacking-poses-threats-to-business.htm. Retrieved 2009-11-15. 
  37. Vamosi, Robert (July 2008). "Will you be ditching your antivirus app anytime soon?". http://news.cnet.com/8301-10789_3-9994679-57.html?tag=mncol. Retrieved 2009-11-29. 
  38. AV Comparatives (February 2010). "Anti-Virus Comparative No. 25". http://www.av-comparatives.org/images/stories/test/ondret/avc_report25.pdf. Retrieved 18 April 2010. 
  39. Guidelines released for antivirus software tests
  40. Kotadia, Munir (July 2006). "Why popular antivirus apps 'do not work'". http://www.zdnet.com.au/why-popular-antivirus-apps-do-not-work-139264249.htm?omnRef=NULL. Retrieved 14 April 2010. 
  41. 41.0 41.1 The Canadian Press (April 2010). "Internet scam uses adult game to extort cash". http://www.cbc.ca/consumer/story/2010/04/16/con-adult-video-virus.html. Retrieved 17 April 2010. 
  42. GIBSON RESEARCH CORPORATION SERIES: Security Now!
  43. Rootkit: Definition, Prevention and Removal
  44. Heasman, John - Black Hat Europe 2006 (2006). [http://www.blackhat.com/presentations/bh-europe-06/bh-eu-06-Heasman.pdf "Implementing and Detecting an ACPI BIOS Rootkit"]. http://www.blackhat.com/presentations/bh-europe-06/bh-eu-06-Heasman.pdf. Retrieved 14 June 2010. 
  45. Newfangled rootkits survive hard disk wiping
  46. Researchers say rootkits are headed for BIOS
  47. 47.0 47.1 Erickson, Jon (August 2008). "Antivirus Software Heads for the Clouds". http://dobbscodetalk.com/index.php?option=com_myblog&show=Antivirus-Software-Heads-for-the-Clouds.html&Itemid=29. Retrieved 2009-05-31. 
  48. University of Michigan (undated). "CloudAV: N-Version Antivirus in the Network Cloud". http://www.eecs.umich.edu/fjgroup/cloudav/. Retrieved 2009-05-31. 
  49. Kalkuhl, Magnus (April 2009). "Clear skies ahead: cloud computing and in-the-cloud security". http://www.viruslist.com/en/analysis?pubid=204792059. Retrieved 2009-05-31. 
  50. Trend Micro (2010). "Root Buster Kit". http://www.trendmicro.com/download/rbuster.asp. Retrieved 26 June 2010. 
  51. Avira GmbH (2010). "AntiVir Removal Tool". http://www.avira.com/en/support/antivir_removal_tool.html. Retrieved 26 June 2010. 
  52. Avira (undated). "Avira AntiVir Rescue System". http://www.free-av.com/en/tools/12/avira_antivir_rescue_system.html. Retrieved 13 July 2010. 
  53. AVG Technologies (2010). "AVG Rescue CD". http://www.avg.com/gb-en/avg-rescue-cd. Retrieved 13 July 2010. 
  54. AVG Technologies (2010). "AVG Rescue CD Download". http://www.avg.com/gb-en/avg-rescue-cd-download. Retrieved 13 July 2010. 
  55. small and medium size businesses are vulnerable
  56. Free Products Dominate Security Software Market
  57. Worldwide Antivirus Market Share Report

External links

Antivirus software at the Open Directory Project