Online Mind Mapping and Brainstorming

Create your own awesome maps

Online Mind Mapping and Brainstorming

Even on the go

with our free apps for iPhone, iPad and Android

Get Started

Already have an account? Log In

The Positive Trust Model and Whitelisting by Mind Map: The Positive Trust Model and Whitelisting
0.0 stars - reviews range from 0 to 5

The Positive Trust Model and Whitelisting

Structure

Intro

not a new solutions but evidence that it's time has come, resurgence of interest, like virtualization, Whitelisting, the concept of which dates back to the mainframe days of locked-down and controlled applications, lets only approved and authorized applications run on user machines., Rather than track and quarantine harmful bits, whitelisting involves barring all but approved executables from running on a given machine.

The idea is simple – signatures of known bad stuff is a blacklist, signatures of known good stuff is a whitelist. Blacklisting has been the preferred method for AV over the last decade. Blacklisting has the benefit of near-zero false positives – something customers expect. Blacklisting also keeps the customers coming back – new malware means new signatures – perfect for recurring revenue models for vendor’s balance sheet.

John T quote of 2008, darkreading.com > Security > Management > ShowArticle ? ..., The number of exposed records has tripled in the last year,” Thompson said. He called for the creation of a federal law that requires companies to disclose details on their security breaches in a timely fashion. “If ever there was a cry for change in public policy, it’s now." The Symantec research also indicates that, for the first time, there are more malicious applications (65 percent) being spread across the Web than legitimate applications. “I don’t usually make predictions, but if the growth of malware continues at this pace, I predict that technologies such as whitelisting will become more critical."

conventional solutions reached limits, like firewalls, AV is the definitive blacklisting solution, but the solution reached an inflection point, who said that?, point of diminishing returns

BL always be present

essentially days are numbered as front line defense

erosion of trust

Blacklisting limitations

why is malware growing?, from mass distribution of a small number of threats to micro distribution of millions of distinct threats, facilitated by malware server generating new strains every few mins, We now know of over 1.8M distinct malware strains We’re collecting 10,000s of new strains per day, malware exceeds goodware, passed inflection point, Bit9 ppt, future of AV, Stealthiness is increasingly a dominant design goal 70-80% of malware samples are packed, in many cases through multiple layers of packing, leads to packing problem, Common attacker tactic: take a known malware binary and pack it with 10 layers of potentially different/proprietary packers Symantec knows about 1145 families of packers, each of which can have multiple versions, e.g. UPX or ASPack, and can recognize/unpack about 100 of them Malware signature size keeps growing and no end in sight Possible solutions: Just-in-time AV scanning White-listing vs. Blacklisting Behaviour blocking, multiple layers of pecking addas dimensions to sig files, 1m altogther, 2/3 created in 2008, better method for capturing and recording, Today, new malware can be automatically collected, without human intervention. The slow trickle of malware turned into a flood as honeypot technology emerged. Sensor grids can obtain new malware samples with efficiency - they automatically ‘drive by’ (aka spidering) malicious websites to get infections and leave open ports on the ‘Net so automated scanners will exploit them. In parallel to the automated collection efforts, cybercrime has risen to epic levels., more money behind malware development, entry barrier falling, Finally, the barrier to entry has dropped for the cyber criminal. Cyber weapon toolkits have become commonly available. Anti-detection technology is standard fare. New variants of a malware program can be auto-generated. A safe bet is to expect thousands of new malware to hit the Internet per day., malware toolkits, anti-detection technology available, auto-generate and release variants, figures, avertlabs.com > Research > Blog > Index.php > 2008 > 07 > 01 > The-end-of-exponential-malware-growth

the signature scan method, Scanning, basic modes, on-access scan, disk scan, only as good as the DB, Perfect for detecting known malware, known insecure software, known intellectual property., They are the cash cow of the anti-virus companies., good revenue model, pattern-matching approach not adapted to changes in malware, A few years ago, a single classic signature could protect 10,000s of users Today a single classic signature typically protects < 20 users, producing more signatures but less effective than say 10 years ago, matching every malware signature against every file is archaic, not feasible, but what is the alternative?, not feasible to process, and can only increase, mention the Kaspersky patent, Norton risk based as well, Tom Powledge, vice president of consumer product management at Symantec, told me the new products are lighter and faster in part because they've jettisoned the multiple copies of the signature database found in previous versions. They're also not scanning each and every file. Instead, the 2009 products will be building a trust index--that is, the app will declaring certain files (say photos or MP3s) clean and then not scan them again unless the files change. He showed me a graphic where roughly 70 percent of a given machine is trusted, and only that last 30 percent is actively scanned., what fraction of malware goes undetected?, The flaw in blacklisting has been exposed – it cannot address new and unknown malware threats. Figures range, but a safe claim is that 80% of all new malware goes undetected. This isn’t just a minor flaw; it’s a gross misstep in technology. Blacklisting is, and always has been, snake oil., 65% another figure, fingerprinting model needs to be augmented or replaced, terms, scan, fingerprinting, pattern-matching, Cost, Even for systems with enough resources to shoulder scanning over­head, as well as the connectivity and availability to receive frequent anti-virus signature updates, these security products are reactive in nature and lack potency regarding new or tightly tar­geted threats not yet included in the anti-virus vendors’ signature databases., there’s considerable system overhead associated with scanning, and the fre­quent signature updates required to keep anti-virus applications in good working order can be difficult to main­tain.

Need new or alternate strategy

Application whitelisting offers organizations an anti-malware option that can be more flexible than total lockdown yet more comprehen­sive than the blacklisting approach embodied by anti-virus.

Symantec’s top security architects believe a hybrid whitelisting and reputation-based antivirus approach will become the only effective means of securing enterprise & consumer endpoints

WL, Tracking Applications Only Listed Applications Run Listed Applications are ‘Good’, not good but not known to be bad, define good, Trusted Source Signed Binary Mega-whitelist Database, still not getting away from DBs!, No zero-day threats No chronic signature updating No paying for chronic signature updating, does not eliminate zero day threat !, Blocks malware and unlicensed/ unauthorized software from installing and executing Eliminates reactive security patching Eliminates unplanned or unmanaged configuration drift

WL management

is it easier to manager DB of good apps as opposed to 1m malware and growing?

Compiling the initial whitelist requires detailed reviews of users' tasks and the applications they need to complete them. The growing complexity of business processes and applications makes maintaining the list a lot of work.

To make application whitelists a success in your organization, you need not only senior management buy-in, but also a way of letting users quickly and easily request permission to run a new application.

A more draconian step would be to allow systems to only install software that is digitally signed and downloaded from a trusted repository.

At this point, administra­tors also can add other appli­cations to their whitelist policies and, in most cases, determine separate allowed application policies for dif­ferent sets of users based on group information in Active Directory. Certain applica­tion whitelisting products, such as those from Bit9 and CA, also offer administrators guidance in deciding which applications to include in their whitelists. Both ven­dors maintain databases of scanned applications, along with trust ratings based on the vendors’ analysis.

And displaying a pop-up that asks you to decide whether an unknown app is okay to run ensures that you'll eventually make the wrong call and break your software or even your system. Most antivirus companies rightly make every effort to minimize the number of alerts that ask us to make a decision; an overreliance on whitelists could roll back those improvements.

how to handle the non-standard stuff, Recently Released Applications Proprietary Applications Miscellaneous dlls, drivers, etc.

Limits

not safe computing, Whitelists, however, cannot fix an allowed program that has a vulnerability. Even in a whitelist environment, a typical buffer-overflow attack, for example, can still run malicious executables, because the system thinks it's the whitelisted, but vulnerable program running the code.

granularity, selective user install and run, A simple "Yes" or "No" decision either allows the program to run or not, whereas it may be appropriate for some users to use a certain program, but only access certain features.

Changing the approach by antivirus software of fighting viruses to whitelisting would involve antivirus software having a list of only those programs which are known to not contain viruses or malware. The software would only allow programs to run on your computer that are known to be free of viruses and malware., no no no

technical issues, fasthorizon.blogspot.com > 2008 > 06 > Whitelisting-is-next-snake-oil, is this snake oil?Whitelists are based upon files on disk. A whitelist, in current industry terms, means a list of the MD5 sums for files ON DISK. Please understand that files on disk are not the same as files in memory. And all that matters is memory. When a file is LOADED into memory, it CHANGES. This means on-disk MD5 sums do not map to memory. There are several reasons memory is different: 1) Memory contains much more data than the on disk file 2) Memory contains thread stacks 3) Memory contains allocated heaps 4) Memory contains data downloaded from the Internet 5) Memory contains secondary or tertiary files that were opened and read 6) Memory contains data that is calculated at runtime 7) Memory contains data that is entered by a user All of the above are not represented by the file on disk. So, none of the above are represented by the whitelist MD5 sum. Yet, when the file hash on disk passes for white-listed, the running in-memory file is considered whitelisted by proxy. This is where the whole model breaks down. In memory, there are millions of bytes of information that are calculated at runtime – they are different every time the program is executed, the DLL is loaded, or the EXE is launched. These bytes are part of the process, but unlike the file on disk they change every time the program is executed. Therefore, they cannot be whitelisted or checksummed. This data can change every minute, every second of the program’s lifetime. None of this dynamic data can be hashed with MD5. None of this dynamic data is represented by the bytes on disk. So, none of it can be whitelisted., For malware authors, the whitelist is a boon. It means that a malware author only needs to inject subversive code into another process that is whitelisted. Since the whitelist doesn’t and cannot account for dynamic runtime data, the malware author knows his injected code is invisible to the whitelist. And, since the process is whitelisted on disk, he can be assured his malware code will also be whitelisted by proxy. So, in effect, whitelisting is actually WORSE than blacklisting. In the extreme, the malware may actually inject into the desktop firewall or resident virus scanner directly as a means of obtaining this blanket of trust., just see the art at the end

Strategy

interest from big players, What's interesting is that the big guys Google (Green Border Technologies), Microsoft (Winternals Software's Protection Manager, and now Symantec have started paying attention to whitelisting., Patchlink, AppSense, Bit9, SignaCert, CA et al)Patchlink, AppSense, Bit9, SignaCert, CA et al), Patchlink and SecureWave, If you speak to the management of either Patchlink or SecureWave they'll provide you with a series of reasons why the merger between the two makes sense, in terms of growth goals, customer base, geographical coverage, corporate culture, etc., all have something to say in bit9 ppt, gradual introduction, how to move to WL while preserving BL revenue base, AV vendors are now beginning to realise that their time has passed and the majors (Symantec, McAfee and Trend Micro) are looking for ways to join the whitelisting movement without poisoning their AV revenues.

Application whitelisting is a good complement to other anti-virus strategies, such as blacklisting, diligent patching and user education, and the PCI DSS (Payment Card Indus­try Data Security Standard) specifically mandates the use of anti-virus software on machines through which credit card data passes., Bit9 and Kaperskty partnership, In the face of that sobering reality, Kaspersky this summer will release its first consumer antivirus products that bring in whitelists. It will use lists from Bit9, a whitelisting company that maintains a 6.3 billion-strong list of known good applications. The new Kaspersky applications won't automatically block programs not on the Bit9 list, but instead will focus scanning resources on those programs that Bit9 doesn't recognize. Theoretically, that could allow for more careful scrutiny of unknown files with less risk of false alerts., With AV, every year or so a new client security technology comes along and the death of AV is prophesised. In the end, users either decide that the new technology is not as important or good as the start-ups make out and ignore it, or it turns out that AV and the new technology have their benefits and the result is the new technology is integrated into the AV clients., deja vu, actually abosorbed under AV name

Cloud, probably unmanageable for the desktop, ping the cloud instead, trend micro, An added benefit, says Chen, is that new samples are submitted in real time and evaluated quickly. In her estimate, Trend Micro can have a new signature file for an unknown threat ready within 15 minutes., this may be the new model even w/o WLs

Articles

news.cnet.com > 8301-10789 3-9994679-57

searchsecurity.techtarget.com > Tip > 0,289483,sid14 gci1338514,00

eweek.com > C > A > Security > Application-Whitelisting-Gains-Traction

it-director.com > Blogs > Robin Bloor > 2007 > 6 > The Decline of AntiVirus and the Rise of Whitelisting