Information Security

Defending the digital infrastructure

iSTOCK/GETTY IMAGES

Manage Learn to apply best practices and optimize your operations.

Fighting viruses: Seven things you should know about antivirus tools

Learn what you should and shouldn't do when it comes to fighting viruses as Rob Rosenberger debunks myths about AV software, updates, reports and unexploited vulnerabilities.

Have you seen that cute screen saver of the Budweiser Frogs? If you do, be careful, 'cause if you download it, you'll lose everything! Your hard drive will crash, and someone from the Internet will get your screen name and password!

This is one of the hundreds of computer virus myths, hoaxes and urban legends I've dispelled on my Web site, vmyths.com. Seems like every day, there's a new hoax circulating on the 'Net, duping users into spamming their friends and relatives with bogus alerts that advise them to "SEND THIS TO EVERYONE YOU KNOW IMMEDITATELY!!!"

While most IT security managers recognize the tell-tale signs of a virus hoax, many of them operate under mistaken assumptions about the best ways to fight viruses -- including what their AV software should and shouldn't do to help.

1. We're addicted to antivirus updates -- and shouldn't be.

We used to inject our PCs with an AV update every quarter, and it felt great. Then we needed a monthly "fix." Next, experts recommended AV updates on a weekly basis. In 1999, users were urged to download an update every single day in preparation for the much-hyped "Y2K viruses." And by May 2000, vendors were telling us to update AV software multiple times per day to deal with all the LoveLetter variants.

Recommendations have returned to weekly AV updates (in "normal" situations), and this may help those of us suffering from a pseudo-syndrome called "addictive updating," triggered by the mildly euphoric sensation we get after obtaining the latest AV update.

AV vendors don't like to point out this addiction, but it's there. In most cases, updating desktop AV daily or even weekly offers only a small increase in effectiveness over updating monthly.

2. Users blame everything except AV software when a virus spreads out of control.

AV software occasionally fails. Yet everything but the software is blamed when a virus gets through and costs enterprises in cleanup expenses and lost productivity.

Security experts blame Microsoft OSes and faulty application software, which is like blaming Boeing for making a flying bomb. Enterprise administrators blame users for failing to recognize a .vbs attachment, even though the AV software also failed to recognize it. Companies order employees to keep an eye out for infected e-mails that an AV product allowed into the network. That's like asking airline passengers to hunt for a terrorist who brazenly walked past a security checkpoint.

Society recently demanded a complete overhaul of inferior airport security. Yet few organizations are demanding better antivirus software from the AV vendors.

3. Better AV technology exists, yet customers won't use it.

Few users remember the days when AV software used "profiling" to detect viruses. Experts call it "heuristic detection," and AV firms use advanced heuristics techniques to keep their own networks free of viruses. Most AV products include some heuristics capabilities, but AV vendors are reluctant to market this technology. Why? Because customers fear change.

Pressure a firm's computer security manager for an explanation, and he or she may very well proclaim, "The cure is worse than the disease." In other words, it costs less to clean up after a virus than to finely tune heuristics software to keep the virus out of the network in the first place.

Few people know that better AV technology exists for one important reason: computer magazines don't like to review heuristic-based AV software. It's much easier to review a "virus scanner" than a "virus profiler."
 
4. Firms can outsource their most important AV headache, yet most don't.

The concept of a "managed firewall service" has grown in popularity. Many firms have discovered it's a major headache to take care of a firewall and are willing to pay outside professionals to do it for them.

If we can outsource the management of firewalls, can we also outsource the management of e-mail security? The answer is a resounding "yes." Companies can hire a firm to scan both incoming and outgoing e-mails for spam and viruses. By judiciously setting a few domain records and firewall parameters, an admin can make sure every e-mail goes through the hired helpers.

Managed e-mail security firms include MessageLabs, Brightmail and AvoCon. Companies already using a managed firewall service should see if their provider can manage e-mail security as well. The truly bold might even consider outsourcing all things e-mail and giving the Exchange administrator a new job.

5. Users generate comprehensive Web server reports -- but they can't generate an AV report.

Web site metric utilities have grown immensely since the late 1990s, with Webmasters typically logging every visit and generating all kinds of reports for their bosses. Companies pay big bucks for Web traffic analysis tools with eye-popping charts and graphs to illustrate the number of visitors, pages viewed and e-commerce generated. Webmasters archive their log files for posterity, too.

Compare this to virus metric utilities, which don't exist. Viruses were big 10 years before the Web came along, yet few virus fighters today can generate a single chart for their bosses. Indeed, few virus fighters can tell you what a chart would even look like.

Sure, AV software keeps an activity log, but most AV programs will limit the file size by default. Old data gets overwritten so it won't fill up a hard disk. Nobody really bothers to store this data for posterity. And why should they? No virus metric utilities exist to study the data.

Ironically, AV industry surveys rely on input from security managers who can't accurately describe the tactical and strategic virus problems in their own firm. Virus fighters themselves will sometimes fall prey to urban legends, because little or no evidence exists to contradict their beliefs. AV vendors worry that AV reports would force them to add more code to their products. Besides, users aren't asking for this capability, so why go through the effort of giving it to them?

6. AV vendors recommend changes to PC settings for security reasons, yet AV software won't make those changes for users.

Virus experts regularly tell users to make changes to their PC settings for security reasons. But today's popular AV software won't make these changes for them. For instance, the Melissa virus swamped the Internet in 1999 because AV software didn't make recommended changes for Microsoft Word users. Three years later, nothing has changed.

Here's why vendors still only recommend, rather than automatically alter, settings: Users only see AV software as a reactive technology. Any proactive capability may lead users to start blaming AV software in the future for failing to stop viruses (see #2).

Also, AV programmers must devote extra effort to write and maintain the extra code needed to change security settings. Some, like Network Associates' McAfee AV line, are moving into the vulnerability assessment arena, but McAfee products still fail to include code that automatically seals holes later exploited by viruses. Again, users apparently aren't asking AV vendors for this capability.

7. AV software contains many unexploited vulnerabilities.

Research published in 1999 and 2002 (including work done by the author) shows that virus writers can easily exploit vulnerabilities in AV software. Thus, it's possible that the more AV protection a user has, the more he is exposed to security vulnerabilities. Thankfully, virus writers don't (yet) bother to exploit AV software vulnerabilities.

AV vendors don't like to admit to the vulnerabilities in their products for three reasons. First, reporters love to write about security flaws in security products-including AV software. Who wants that kind of coverage? Second, the media exposure might give crackers the idea to attack users via their AV software. Third, the media exposure might convince large firms and government agencies to avoid AV software with a history of publicly announced vulnerabilities.

By keeping it quiet though, vendors can fix those flaws without the users' knowledge by incorporating new code in the next update. Any such threat will go away when addicted users unwittingly download their next fix.

About the Author: Rob Rosenberger is editor of vmyths.com.

Article 6 of 11
This was last published in May 2002

Dig Deeper on Malware, virus, Trojan and spyware protection and removal

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

Get More Information Security

Access to all of our back issues View All

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close