What do you think about the concept of developing a "pressure chamber" for malware within which an organization runs all new or incoming content through a system that's designed to safely trigger any executable malcode. Is this practical and cost-effective? If so, under what circumstances?
Ask the expert!
Have questions about enterprise information security threats for expert Nick Lewis? Send them via email today! (All questions are anonymous.)
There are many benefits to running an organization’s executable files through a “pressure chamber” to see what "blows up" when executed in a safe environment; it's a much better alternative than blowing up on your network. However, it is necessary to understand how to use it and its limitations.
An antimalware pressure chamber typically works by running or opening a file in a controlled environment, monitoring all resulting network or system behavior, and analyzing the data to identify malicious activity. Antimalware companies and security researchers have used virtual environments or syscall monitors like Systrace to analyze malware and standard tools such as Process Monitor on Windows can perform many of the same functions. There are other commercial tools that offer similar and even augmented functionality. One potential issue to note is that some malware authors have added functionality to their wares to determine if they are being executed in a virtual environment or a sandbox. They have added this functionality to make it more difficult for antimalware companies and security researchers to reverse-engineer them and create signatures to enable automated malware containment; this may limit the effectiveness of a pressure chamber.
There are some network antimalware devices that are equipped with pressure chamber functionality to help enterprises with malware containment, but it requires the purchasing of another device that potentially sits inline on an enterprise network along with a firewall, IPS, etc. Security professionals may want to evaluate if the pressure chamber functionality is contained within an IPS or firewall prior to buying or deploying a new device. Using a standalone pressure chamber for analyzing new potential malware would require significant expertise and labor in the analysis.
Dig Deeper on Monitoring Network Traffic and Network Forensics
Related Q&A from Nick Lewis, Enterprise Threats
Chameleon malware targets insecure wireless access points. Enterprise threats expert Nick Lewis explains how to defend against the malware.continue reading
The Zeus malware is threatening RTF security by embedding itself in the file, which is commonly seen as safer than other file formats such as PDFs. ...continue reading
Enterprise threats expert Nick Lewis explains how to detect and avoid one of the most advanced malware threats: The Mask.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.