Tuesday 6 December 2016

How Secure and Reliable are the Most Used Antivirus against New Malware?

How Secure and Reliable are the Most Used Antivirus against New Malware?
Abstract
            Hundreds of new malware and computer virus sample appear daily. Therefore, it is imperative for computer users to update their antivirus software regularly. On the other hand, the antivirus products should not only provide the periodic updates but also detect the imminent threats in advance through the employment of heuristic and generic techniques. Undeniably, the latest antivirus scanners provide hourly and daily cloud updates. Notwithstanding, there are vulnerability timeframes when most of the programs cannot effectively protect the user. The researcher must conduct an extensive test to determine the different capabilities of antiviruses such as Kaspersky, Avast, ESET Bitdefender and Panda and to evaluate the proactive protection or detection rates within a set timeframe.
Background
A computer virus refers to a type of malware that randomly replicates itself and infects other connected systems. It is malicious software mainly designed by black-hat hackers to damage or otherwise take advantage of a personal computer (PC).  Other forms of malware are spyware and adware that lack the reproductive ability. Today, the business world is transitioning to complete dependence on information technology for effectiveness in service delivery. In particular, the advent of the World Wide Web has led to global interconnectivity, hence an increase in the spread viruses. Even worse, the absence of powerful software to guarantee 24-hour protection accelerates the rate of system damage and loss of valuable data. Still, dozens of multinational antivirus software manufacturers work hard to arrest the rising cases of phishing and to restore their client’s confidence. Although the producers have simplified the use of antivirus software, it is hard to understate their effect.
More than ever, the modern computers can detect harmful programs online because most users access information via the internet. The latest development sharply contrasts the early 1990s when viral attacks were abundant and a new phenomenon. In the United States, software producers commercialized malware at the dawn of the millennium. Consequently, thousands of volumes of malicious online programs have disappeared. The latest research indicates that most of the modern computer infections emanate from untrustworthy websites, thus calling for the installation of the best anti-malware programs.
On the other hand, the Antivirus software refers to a computer program that detects, protects, and removes malware such as Trojan horses, viruses, and worms. There are multiple brands of antivirus software, each with unique capabilities and areas of strength. While some software can scan the system upon request, others automatically run as long as the user reboots the PC. However, the majority of PC users complain that antivirus like Avast and Kaspersky slow down the system, especially when configured poorly. Still, the PC owners should disable the antivirus protection to improve performance because this will increase the risk of attack. Technology experts recommend that the system protection should be active at all time even if the system’s performance rate is slow.
Computer experts rate Bitdefender as one of the most powerful antivirus software of all times. Annually, this antivirus firm protects hundreds of millions of business and home users globally. In fact, the computer user can set his system for automatic weekly updates and periodic scans. Bitdefender 2015 restores the system whenever it detects a malicious activity. In addition, it controls the system registry status, thus can notify the users of any suspicious program. Contrastingly, Kaspersky ESET 2016 provides an easy and complete protection from internet threats. Similarly, the Avast 2016 responds fast in the defense against a variety of malware ad malicious software. Ideally, the latest version uses a multifaceted security technology that work harmoniously to identify, detect, and block the attacks as soon as they are launched. Lastly, Panda 2015 is a recommendable option for Windows 2010. It has enhanced detection and malware removal capabilities.
How Antivirus Software Works
            Software manufacturers design antivirus programs specifically for the protection of computer systems. They have two functionality levels. First, they provide real-time system protection from unauthorized access. Secondly, antivirus scans the stored files on disks and external computer drives. Moreover, the programs detect viruses and malware through footprint and program traits. The footprint technique is common for Bitdefender and Panda users since it is effective in virus identification. It is a data pattern that includes file. The aim of this technique is to compare the virus footprint with a database of virus matches available online or in the cloud. When the program detects new malware, they are added to the available catalog for future reference. The disadvantage of footprint method is that it fails to detect new viruses, especially during an ongoing update of the virus database and footprints.
Secondly, the viruses are detectable through their characteristics. This technique is also referred to as heuristic scanning because it speculates and monitors the actions of a suspicious program. Essentially, programs such as Kaspersky closely monitor the type of computer function calls incorporated in the executable code. If the call is potentially suspicious, the antivirus flags the program as a system risk and request for user intervention. Similar to the footprint technique, this second method is disadvantageous in that the system is vulnerable to attacks during program update.
Identification Methods
Antivirus engine identifies malware through several methods:
a.     Sandbox Detection: Sandbox detection is a behavioral-based technique that virtually executes programs and logs the program actions rather than detecting the behavioral fingerprint in real time. The antivirus determines if a software program is malicious or not depending on the logged actions. If not, the antispyware grants its execution in real time.
b.     Data Mining: the technique was recently invented. Particularly, data mining is effective in malware and spyware detection. Together with machine learning algorithms, they classify the file behavior as benign or malicious. In addition, this virus detection method outlines a list of file features as extracted from data scan.
Signature-Based Detection
The signature-based detection technique is appropriate for this experiment because traditional; antivirus software such as Kaspersky, Panda, and Avast rely on signatures to reveal viruses and spyware. Substantially, the arrival of a malware to the antivirus firm account prompts its analysis through dynamic systems.
Once the malware researchers determine the file to be a malware, they extract a proper file signature and add it to the antivirus software’s signature databases. Undeniably, the signature-based technique easily prevents malware outbreaks from spreading further and damaging the system.
However, the modern malware authors stay one step ahead by writing hardly detectable viruses (metamorphic, polymorphic, and oligotrophic malware) which modify or encrypt themselves a disguise to avoid matching virus signatures stored in the databases and directories.
Heuristics
Notably, the majority of PC viruses start as a single infection. If undetected at early stages they mutate or are refined by other sophisticated attackers. Resultantly, the viruses grow into hundreds with each having a slight variation (Nachenberg 2015). Therefore, it is possible for a specially designed antivirus to generically detect system threats and eliminate them using a single viral definition.
The Vindo Trojan, for instance, has dozens of family members, depending on the Kaspersky’s, Avast’s or Panda’s classification. Specifically, Bitdefender classifies Vundo family members into Trojan.vundo and Trojan.vundo.b. While the identification of a specific virus is advantageous, the detection of a virus family through heuristic or inexact signature match is quicker.
Already, virus researchers concede that all malware of a family has shared traits, hence can form a generic signature. Often, such signatures bear a non-contagious code that can be unearthed using wildcard characters especially in places where the differences lie. Wildcards such as these allow the scanner to detect malware even if they have additional elusive codes. Kaspersky and Bitdefender use heuristic detection for system and internet scans.
Rootkit Detection
            The latest antivirus software can scan rootkits. Rootkits are types of malware designed to gain administrative control on the PC without detection. They can change the functionality of the operating system. In other cases, rootkits can tamper with the antivirus software, thus rendering it ineffective. It is also difficult to remove rootkits, even requiring a complete operating system re-installation.
Detection of rootkits is one of the main challenges that Kaspersky and Panda face. The reason is that rootkits bear total administrative access to the personal computer. Therefore, they are invisible to system users since they are automatically hidden from the task manager’s list of running processes.
If a computer virus infects a file, both Avast and Bitdefender attempt to eliminate the virus code attached to the file during disinfection. Still, Avast cannot always restore a file to its original state. In this case, it is only possible to restore damaged files from shadow copies or existing backups.
Real-Time Protection
According to Kouznetsov (2014), real-time protection is the automatic protection that most antiviruses provide. It is also referred to as background guard, on-access scanning, or auto protection. A real-time protection monitors computer system from adware, spyware, and viruses during internet access, while inserting compact disk, or when opening the email.
Benefits of Antivirus Protection
            An up-to-date antivirus program guarantees the safety of the computer system from malicious online attacks, loss of data, and unauthorized access. The software is the safest measure to stop or eliminate risk and system effects. There are multiple security levels for personal computers which are dependent on the package’s cost and particular programs provided by anti-malware vendors. Firstly, the antivirus thwarts any malware related to computer damage. The latest versions of Bitdefender, Avast, Kaspersky, and Panda are effective in the prevention of operating system damage. In addition, they prevent the PC functionalities from virus intrusion, either online or in the cloud storage. Besides, the antivirus software maintains the system security through regular automated updates of the anti-malware package. Further, it creates a firewall to block malicious hackers from accessing sensitive data such as bank account records and corporate secrets. Thirdly, Kaspersky and Panda secure critical data, presentations, photos, files, and personal data from virus infections and attacks. If a PC lacks an antivirus or antispyware program, it is easier for hackers to retrieve information without the owner’s knowledge. However, the installation of powerful programs such as Kaspersky eliminates the user’s need for costly technical assistance and support.
Experiment
            In this experiment, the researcher includes only new and most prevalent malware. If heuristic or generic detection technique could not detect the samples, they were consciously executed to determine if behavior-blocking software features would halt them. In most cases, I deduced that the behavior blockers could not protect against all the viruses and unauthorized access but warned of system changes and the dropped malware components. Therefore, it is hard to count cases like these as a block. Given that the behavior blockers are effective during the malware execution, the risk of compromise always lingers, albeit when a Kaspersky, Bitdefender, or Avast claims have blocked or eliminated a threat. In light of this, it is preferable that the virus is detected prior to its execution, for instance by on-access Avast scanner using heuristics. In fact, behavior blockers are complementary to other security product features like multi-layer protection rather than replacements.
            Technically, the test employs the use of cloud services. However, in the required time for the procedure, chances are that the cloud services or vendor’s signatures would blacklist nearly all the samples, implying that the outcome is non-reflective of the real proactive protection. In prior experiments, it was clear that the use of cloud services in scanning for malware can take days or weeks. However, the antivirus technology advances at a rapid pace, thus the use of the latest version of Kaspersky, ESET, Avast, and Panda enables the detection of elusive malware. Notably, the Kaspersky2016 antivirus version is highly dependent on the cloud services. Nevertheless, it is worth noting that the company policies disable cloud connections in most corporate environments and other product features have to provide for the detection of latest malware. Essentially, cloud features are economically convenient for antivirus software vendors since they allow for the processing and collection of significant amounts of metadata. Nonetheless, they are reliant on blacklisting of identifiable malware. For example, if a file is anonymous, the cloud can hardly determine if it is malicious or good.
False Alarm Test
The false alarm test is taken into account to improve the evaluation of proactive detection capabilities. A false positive (or false alarm) occurs when an antivirus mistakenly flags an innocent file as containing a malware or is a virus. At times, false alarms are as troublesome as real infections. When conducting an antivirus testing, it is imperative to measure both reliability and detection capabilities. One of the reliability aspects is the recognition of clean files and non-production of false alarms. No antivirus is immune from false positives, but some produce less in comparison to others. One of the goals of this experiment is to determine the number of false alarms that each antivirus produces after file scan. Given the tediousness of the test, the researcher cannot completely collect the legitimate files in the in their current form, thus the false positive test is inconclusive. What can be reasonably done, however, is to form and utilize a clean files set which is collected.
At the time of testing, the researcher encountered all listed false positives. Indeed, unencrypted data blocks cause false alarms in antivirus related files. Additionally, if the anti-malware program indicates that one software containing several false alarms, it is countable as a single alarm. Moreover, Keygens and cracks shared or distributed primarily by antivirus developers are uncountable as false positives.
In most instances, false alarms fall into level 1 or level 2. Notwithstanding, I am convinced that all anti-malware products must not bear any type of false alarm in spite of the number of users affected. Truly, most vendors play up the malware risk and neglect the danger of false alarms. An antivirus that uses third party signature has more or less false positives than a licensed engine.
Table 1.1 Panda had 3 false alarms
Table 1.2: Bitdefender had 9 alarms
Table 1.3: Kaspersky Lab 2016 had 9 false alarms
Table 1.4: Avast 2016 had 14 false alarms
Table 1.5: ESET 2016 had 1 false alarm
1false alarm
ESET
A few false alarm
Bitdefender, Kaspersky 2016, Panda
More than 10 false alarms
Avast
Table 1.6: Summary
Experiment Results
The graph1.0 indicates the proactive protection capabilities of numerous antivirus products. Not only does the graph consider the false alarm rates but also the rates of protection against the latest malware.
Key:
Yellow---user dependent
Green-----Protected or blocked
Red------compromised or not blocked
The blue line shows MSE (Microsoft Security Essentials)
Graph 1.2: Experiment Results
The experiment results in graph 2.1 indicate the proactive (behavioral/heuristic) protection capabilities of numerous antiviruses against the latest malware. The researcher rounded the percentages to the nearest 1. In addition, the table 1.7 below depicts how the antimalware perform when combined with cloud connection and updated signatures against prevalent malware and spyware files. A careful analysis of this table gives a PC user a chance the ideal product for use according to the work environment. For instance, the laptop owners worried about flash drive infection during offline connection should pay a keen attention to the outcomes in this table.

Blocked Malware
User Dependent[1]
Compromised
PRP (Proactive Rate of Protection)
FP (False Alarms)
Cluster
Bitdefender
1448
-
15
99
few
1
Kaspersky 2016
1343
-
120
93
few
1
ESET
1253
-
210
86
many
1
Avast
985
-
478
67
Very many
2
Panda
1422
-
211
92
few
1
Table 1.7: Proactive Protection Outcome
Bitdefender
From the results in table 1.7, it is clear that Bitdefender tops the list in 2016 due to its ability to keep the PC safe from malware and spyware harm. Particularly, Bitdefender detects internet security breach and eliminates the malicious penetration before warning the user. It is especially recommendable for use in social media, email service and offline connections with USB drives since it guarantees full security. Most technology experts admit that Bitdefender is the best cyber safety available because it keeps PC owner safe from computer security, malware, and virus concerns. Given that this product has passed lab tests annually, it has exceeded expectations of the most pessimistic researchers. In addition, the user of this security product can seamlessly execute it in the background without compromising the PC’s speed and performance. Besides its excellent phishing protection, its virtualized browser is isolated from the operating system to block security threats. Bitdefender can also filter spam accurately as shown in the experiment. Furthermore, it comes with a wider range of anti-malware protection tools as compared to Avast and other antiviruses.
On a negative note, the Bitdefender’s manufacturer has limited the user’s password management. Besides, not only is it difficult to install the product on malware-infested systems but also the firewall default settings omits some protection privileges. Lastly, the installation of this antispyware program implies a longer shutdown and boot time.
Kaspersky
            Kaspersky ranks second in the table due to its excellent results in the experiment. Some of its areas of strength include a sustained computer performance and protection.  Therefore, the client will confidently access the internet and utilize computer tools without the fear of data loss or malicious attack. Notably, the product has one of the most effective software removal tools, particularly for windows PC. Additionally, it bears a system watcher tool that detects risky behavior, thus allowing the user to roll back potentially malicious activities. Further, Kaspersky’s automatic exploit prevention controls, restricts, and analyzes the behavior and actions of PC applications to prevent exploitation of vulnerabilities. Besides stopping more than 90% of undiscovered attacks, this software can work in the background and offer real-time system protection.
However, the experiment reveals that the installation of Kaspersky slows the speed of virus scan. Secondly, it is ineffective for use in the social media because of the relatively low rates of detection when compared with Bitdefender and Eset.
Panda
Panda allows the users to freely share threat information for real-time protection.  The product strives for superior system protection with minimal impact on the PC. For example, the latest version has multiple useful tools to guarantee the data safety both offline and online. In fact, Panda should have topped the list were it not for its provision of email and installation protection only. Others such as Bitdefender and Kaspersky have numerous tools and provide an extensive range of security services.
There are numerous merits of Panda antivirus. First, its collective intelligence capability allows optimum protection while the PC is minimally impacted. Second, it is the browser that exploits the protection rather than the product’s designer. Third, not only does Panda guarantee real time protection but also automated data leverage. Lastly, it automatically detects and scans USB devices even if the system is offline.
Avast software is freely available to internet subscribers. Avast Pro 2016 rivals Bitdefender and Kaspersky because it has numerous useful security tools. Regardless of the type of operating system used by PC owner, Avast runs seamlessly in the background without a detectable compromise on other programs or system’s performance. It is one of the most used security utility with more than 210 million active clients globally. The free Apple Mac version has email and file system protection. Besides, it can protect against infected online platforms through drag-and-drop file scanning technique. Avast has a registry startup protection and streams real-time virus database information and updates for online users. Its auto-sandbox feature allows PC owners to confidently run untrusted programs without fearing malicious intrusion or system harm. Additionally, the WebRep feature (available only in the 2016 versions).
 Most of Avast’s disadvantages are linkable to their advertisement strategy. For instance, IT experts agree that the manufacturer is too pushy especially when encouraging their clients to upgrade to new versions. Furthermore, the designer provides automatic updates at times when the user requires full bandwidth. Lastly, the free security utility pops up annoying advertisements trying to sell Avast products to clients.
ESET
ESET is one of the most expensive antivirus protection software, but it compensates this by offering a wider array of system protection utilities and tools. It is the first antivirus to employ ThreatSense technology in eliminating Trojans, viruses, rootkits and worms. Clearly, ESET is light and fast performing software where the browser exploits protection. Essentially, it has a cloud-enhanced whitelisting system for faster protection. Besides, the program comes with a social media scanner to fulfill the need of the modern internet users. Still, its interface is non-user friendly as compared to Avast. Besides, it registers high false positives (FP) with each scan. Lastly, it lacks in-depth scanning technology.
Drawbacks of Antivirus
The first drawback of antiviruses is that they impact the system’s performance. In addition, hackers and antivirus designers lure the amateur computer users into a false sense of security when using their PCs. Consequently, they consider themselves invulnerable, hence can develop problems in understanding decisions and prompts that the product presents them with. If they make wrong choices the malicious hackers will breach their security. In light of this, it is recommendable that the antiviruses that mainly use heuristic detection should be fine-tuned to minimize misidentification of harmless programs as malicious.
In summary, it is clear that different antivirus programs are used to protect the PCs from malicious and viral attacks. Each product has strengths and weaknesses depending on the level of performance and the number of false alarms, and system tools. Albeit, all the antivirus programs analyzed in the experiment have a unique ability to prevent unauthorized system intrusion. Still, some programs such as Bitdefender and Kaspersky are powerful and offer high quality of protection. Some of the ways that antiviruses use to detect malware include signature-based detection, data mining, and rootkit detection. However, the majority of the anti-malware programs employ heuristics to reveal hidden codes attached to genuine system software. Essentially, a combination of heuristics and signature-based detection methods leads to the detection of false alarms from distinct anti-viruses. In this way, the researcher can rank the listed products as per their effectiveness. I suggest that the future antivirus firms should adopt Avast’s strategy by eliminating the monthly subscription costs. In addition, their products should target the social media sites since an increasing number of young internet users access Facebook, Twitter, and Instagram daily. Consequently, such sites have become a target for hackers. Lastly, the manufacturers should minimize pop-up adverts to simplify the user interface.
Some of the alternative methods of protecting computers against malware include the installation of network and hardware firewall, Unified Threat Management, online scanners, and cloud-based antivirus. Active network firewalls inhibit unknown processes and programs from accessing the computer system. However, they fall short of removing them. Cloud-based antivirus employs lightweight agent program on a system while providing useful feedback to the user. It is possible for a client to use various scanners at the same time for optimum effectiveness. On the other hand, other software vendors such as Avast Inc maintain free online platforms for users to scan their PCs completely. Periodically, all internet users should use online scanning tools because the offline antiviruses may fail to detect the latest malware.











References
Kouznetsov, V. (2015). U.S. Patent No. 6,973,577. Washington, DC: U.S. Patent and Trademark Office.
Nachenberg, C. S. (2015). U.S. Patent No. 6,357,008. Washington, DC: U.S. Patent and Trademark Office.



[1] I gave half credit for user dependent caser. For instance if an antivirus blocks 85% of malware without the assistance of windows defender, plus a 15 % user-dependence, I give it 93% (85%+ {15%x0.5}).

No comments:

Post a Comment