Title: From AV to Internetized Security Solution
1From AV to Internetized Security Solution
--- The Analysis Report of Malware Technology in
China in 2005
- ?? Jeffrey
- Beijing Rising Tech. Co., Ltd.
2Travel
3Agenda
- Background
- Overview of the security industry
- Overview situation of viruses and spam
- Changes of viruses
- Changes of purpose
- Changes if anti-detection
- Other threats on the internet
- Unauthorized software (Rogue software)
- Summary
4Internet Statistics
Data from CNNIC
5Security Industry Revenue
Data from CCID Consulting
6Product Dispersal
Data from CCID Consulting
7AV Market Share Distribution
Data from IDC 2005
8Agenda
- Background
- Overview of the security industry
- Overview situation of viruses and spam
- Changes of viruses
- Changes of purpose
- Changes if anti-detection
- Other threats on the internet
- Unauthorized software (Rogue software)
- Summary
9Virus Statistics
- 45059 new definitions added to virus database
- From Jan. 1st to Nov. 15th, 2005
Data from RISING
10Most Active Top 10
Data from RISING
11Top 10 Worst Spam Countries (Jan. 19 2005)
http//www.spamhaus.org
12Top 10 Worst Spam Countries (Nov. 11 2005)
http//www.spamhaus.org
13Agenda
- Background
- Overview of the security industry
- Overview situation of viruses
- Changes of viruses
- Changes of purpose
- Changes if anti-detection
- Other threats on the internet
- Unauthorized software (Rogue software)
- Summary
14Changes of the purpose of virus creation
- Gain economic benefits
- Virtual property
- Bank accounts
- Increase website hits
15Viruses have an Economic Purposes
- Total 4163 found till Nov. 15th, 2005
Data from RISING
16Agenda
- Background
- Overview of the security industry
- Overview situation of viruses
- Changes of viruses
- Changes of purpose
- Changes if anti-detection
- Other threats on the internet
- Unauthorized software (Rogue software)
- Summary
17Changes to Anti-Detection
- The economic benefits by improving anti-detection
technology - Methods used for anti-detection
- Root Kit
- Entry Point Obscuring
- Source code level morphing
18Root Kits
- Hooks Native API
- Hides Processes ZwQuerySystemInformation()
- Hides Files ZwQueryDirectoryFile()
- etc
- Many Open Source Code
- www.rootkit.com
19The Viruses Using Root Kit Technology
Viruses using root kit technology found in 2005
325
Data from RISING
20Agenda
- Background
- Overview of the security industry
- Overview situation of viruses
- Changes of viruses
- Changes of purpose
- Changes if anti-detection
- Other threats on the internet
- Unauthorized software (Rogue software)
- Summary
21Other Threats
- Rogue software
- Ad-ware
- Spy-ware
- Browser hijack and ActiveX controls
- Track-ware
- Malicious shareware
-
- Fishing
- etc
22Rogue software
Data from UNB
23How Rogue Software Avoid Being Deleted?
- Make themselves automatically launch
- Install drivers to get a higher privilege
- Create mutually protecting threads
- Inject DLLs or threads into another process
- Rubbish Files
24To remove or not to remove
- Its hard to make the decision.
- To remove
- Annoys the users.
- Not to remove
- Free
- Provides some useful features.
25Agenda
- Background
- Overview of the security industry
- Overview situation of viruses
- Changes of viruses
- Changes of purpose
- Changes if anti-detection
- Other threats on the internet
- Unauthorized software (Rogue software)
- Summary
26The situation of viruses in 2005
- Economic purposes significantly lead to the
increase of new viruses and virus technologies. - Weaknesses of a system is the major reason of
virus infection. - Network is still the most commonly used media
though which viruses spread. - IM tools are utilized by viruses to spread over
internet. - New platforms are becoming the target of viruses
- mobile phones
- PDAs
- and etc
- Open source is still the origin of lots of viruses
27Diary
28Job
29File System
30earth
31People Internetized
- A lot of things around us getting internetized
- Job
- E-mail
- Web office
- Instance Message
- Life
- Blog
- Online Game
- Online Movie
32Threats Internetized
Attack on internet
Threats
Gain from internet
33Protection Needs to be Internetized!
- Virus
- Spam
- Hack
- Spy-ware
- Browser hijack
- Fishing
34Protect Users Online Security
- An internetized security solution provides
- Antivirus
- Anti-spam
- Firewall
- Password protect
- Anti browser hijack
- Anti fishing
35The Hardest Part
- I wish that I could work it out
Thank you!
Jeffrey_at_rising.com.cn