How does an antivirus detect a virus?


The Clubic Studio

March 1, 2024 at 9:09 a.m.

0

How does an antivirus detect a virus?

How does an antivirus detect a virus?

Signature databases have effectively protected our computers for years. With the arrival of more and more threats, publishers ofanti-virus had to redouble their ingenuity to deal with unknown and unpredictable malware. Behavioral analytics goes further by monitoring the system to block suspicious actions at the source. Let’s take a quick look together to understand how a virus is detected and what an antivirus protects you from.

Heuristic or behavioral analysis: two sides of advanced protection

Summary of previous episodes: At the beginning was the virus. Not very widespread and easy to identify, the first malicious software could (and still can) be detected by its signature, a sequence of successive bytes which allows it to be recognized. Within security suites or free antiviruses, these signatures are updated regularly, and can therefore only detect known threats.

This posed no problem until the threats multiplied, in numbers far too great for optimal responsiveness. Hence the need to offer protection that not only responds to a known virus, but can predict its malicious nature by analyzing its behavior.

Two methods provide this possibility. The first is heuristic analysis, which consists of sifting through software, either by “decompiling” its source code or by running it in a virtual machine. We then detect whether it performs actions that could be suspicious, or we compare the structure of its code to those of already identified threats or to patterns of potentially dangerous behavior.

Behavioral analysis is located at the system level itself. It’s not a file that we monitor by passing it through a scanner or a sandbox, it’s the OS as a whole. Behavioral protection observes system activity (Windows, Android, MacOS, etc.) and recognizes actions that appear malicious, such as requests to an unknown server, file modifications, or requests for access to locations. of memory.

The two methods coexist and complement each other. For example, heuristics may have limitations as many recent threats include protection against emulators. At this point, only the actual execution of the file will be able to betray it.

Bitdefender

Bitdefender

Ransomware, stealth attacks: behavioral analysis as a defense

Behavioral analysis, by focusing on the system and not just files, is a defense against more pernicious attacks such as “drive-by downloads”, triggered by code executed on a web browser.

Ransomware, stealth attacks: behavioral analysis as a defense

Ransomware, stealth attacks: behavioral analysis as a defense

In the family of recent threats that have caused particularly damage, ransomware or “ransomware” is typically the type of attack where behavioral protection plays an essential role. Ransomware was born from the mutation of cybercrime. At the time of the first viruses, losing one’s personal files was the most common fear. But what’s the point of destroying documents you care about? Harm the user or the company, certainly. Why not instead take them hostage to try to obtain financial compensation?

This is what ransomware does. They attack your personal files and apply an encryption algorithm to make them inaccessible. Pay the ransom and you will have the key. In practice, this is not even guaranteed.

Bitdefender - protectionBitdefender - protection

Bitdefender – protection

Here, behavioral analysis will be able to detect these abnormal modifications, block these operations and, if necessary, restore the files to their previous version.

Limits and developments

Behavioral scanning faces the biggest problem with any type of virus scanning: false positives. Unusual system operation may simply be unconventional without necessarily being malicious.

However, behavioral analysis modules are also evolving, and are ideal grounds for one of the recent trends: machine learning. With progressive learning, security solutions increasingly leverage neural networks to distinguish legitimate actions from suspicious ones.

Another pitfall comes at the cost of the effectiveness of this type of analysis. Monitoring the behavior of an operating system can be resource-intensive, potentially slowing down demanding tasks. However, this is the price to pay to benefit from a more effective layer of protection against the proliferation of online threats.

A question about antiviruses? Our explanations

  • What do an antivirus and security suite protect me from?
  • How does antivirus work?
  • How antiviruses increase their defenses against hackers
  • Why do antivirus companies offer crypto mining services?

1

Bitdefender

Bitdefender

  • mood

    30 day trial

  • devices

    3 to 10 devices

  • phishing

    Anti-phishing included

  • local_atm

    Anti-ransomware included

  • groups

    Parental controls included

9.5

See the offer

2

Norton360

Norton360

  • mood

    14 day trial

  • devices

    10 devices

  • phishing

    Anti-phishing included

  • local_atm

    Anti-ransomware included

  • groups

    Parental controls included

9.3

See the offer

3

Avast One

Avast One

  • mood

    30 day trial

  • devices

    5 to 30 devices

  • phishing

    Anti-phishing included

  • local_atm

    Anti-ransomware included

  • groups

    No parental controls

9.2

See the offer

The Clubic Studio

The Clubic Studio

Clubic Studio is the creator of original content for Clubic partners. Behind Studio Clubic is a team of experts in brand content and content to commerce, which offers...

Read other articles

Clubic Studio is the creator of original content for Clubic partners. Behind Studio Clubic is a team of experts in brand content and content to commerce, which offers quality content to connect our advertisers with our readers.

Read other articles





Source link -99