Security.com

How does antimalware software work and what are the detection types?

By Nick Lewis and Lenny Zeltser

Antimalware is an essential component of any enterprise security program. It identifies known and previously unseen malicious files or actions with the goal of blocking them before they can cause damage. Though tools differ in the implementation of malware detection mechanisms, they tend to incorporate the same malware and virus detection techniques. Familiarity with these techniques can help enterprises understand how antimalware software keeps them safe.

How antimalware works

Antimalware software identifies malware in a number of different ways, depending on the specifics of the tool and where it is used. Fundamentally, it analyzes a file, code, plugin or sample to see if it is malicious, reports the results, stops execution and quarantines the sample. The tool will process a sample to determine if it is encrypted or packed and to uncover the format of the file, along with other characteristics, to determine how to analyze the file. Once the sample is ready for analysis, it filters through various detection techniques to determine if it is indeed malicious.

Depending on the tool, the executable or file is opened and monitored in a restricted environment, such as a sandbox, as part of the sample analysis. If the tool is used on an email, web proxy, intrusion prevention system (IPS) or other network device that scans files going through a system, additional processing may be required prior to filtering through the detection techniques.

Types of malware detection

Virus and malware detection techniques are classified as follows:

Though these approaches are listed under individual headings, the distinctions between various techniques are often blurred. For instance, the terms heuristics-based detection and behavioral detection are often used interchangeably. In addition, these methods -- as well as signature-based detection -- tend to play an active role when the tool incorporates cloud-based capabilities.

Multilayered malware

To keep up with the intensifying flow of malware samples, antimalware vendors have to incorporate multiple layers into their tools because relying on a single approach is no longer a viable option.

Antimalware tools and their various detection techniques each have their own strengths and weaknesses. Using multiple tools in a layered approach can improve detection rates and ensure different varieties of malware are being monitored. Some enterprises go so far as to use malware detection engines on different parts of their network, such as on email systems, file servers and endpoints.

In many cases, antimalware tools are compliance considerations. Many laws, regulations and standards require such tools -- namely, endpoint antimalware.

While a multilayered approach is ideal, many security teams may be overwhelmed managing additional tools. In many cases, using one tool effectively may be difficult enough to provide the insight security teams need to focus on other security controls, such as patch management and access management. Enterprises should evaluate their needs and the capabilities of their security teams when adopting antimalware tools to ensure they provide the best protection against their specific risks.

27 Jan 2020

All Rights Reserved, Copyright 2000 - 2024, TechTarget | Read our Privacy Statement