What do you think about the concept of developing a "pressure chamber" for malware within which an organization...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
runs all new or incoming content through a system that's designed to safely trigger any executable malcode. Is this practical and cost-effective? If so, under what circumstances?
Ask the expert!
Have questions about enterprise information security threats for expert Nick Lewis? Send them via email today! (All questions are anonymous.)
There are many benefits to running an organization’s executable files through a “pressure chamber” to see what "blows up" when executed in a safe environment; it's a much better alternative than blowing up on your network. However, it is necessary to understand how to use it and its limitations.
An antimalware pressure chamber typically works by running or opening a file in a controlled environment, monitoring all resulting network or system behavior, and analyzing the data to identify malicious activity. Antimalware companies and security researchers have used virtual environments or syscall monitors like Systrace to analyze malware and standard tools such as Process Monitor on Windows can perform many of the same functions. There are other commercial tools that offer similar and even augmented functionality. One potential issue to note is that some malware authors have added functionality to their wares to determine if they are being executed in a virtual environment or a sandbox. They have added this functionality to make it more difficult for antimalware companies and security researchers to reverse-engineer them and create signatures to enable automated malware containment; this may limit the effectiveness of a pressure chamber.
There are some network antimalware devices that are equipped with pressure chamber functionality to help enterprises with malware containment, but it requires the purchasing of another device that potentially sits inline on an enterprise network along with a firewall, IPS, etc. Security professionals may want to evaluate if the pressure chamber functionality is contained within an IPS or firewall prior to buying or deploying a new device. Using a standalone pressure chamber for analyzing new potential malware would require significant expertise and labor in the analysis.
Dig Deeper on Monitoring Network Traffic and Network Forensics
Related Q&A from Nick Lewis
IoT botnet DDoS attacks have been growing in volume and impact. Expert Nick Lewis explains how you can ensure your internet-connected devices are ...continue reading
A new type of macro malware has the ability to evade the detection of virtual machines and sandbox environments. Expert Nick Lewis explains how to ...continue reading
The BENIGNCERTAIN exploit affects certain versions of Cisco systems using the IKEv1 protocol. Expert Nick Lewis explains what the protocol does and ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.