SlideShare a Scribd company logo
Virus Detection System
         VDS


    seak@antiy.net
Outline
The virus trends of 2004
Qualities of an IDS
Mechanisms of a VDS
Data processing
20047 new kinds of virus in 2004

                             Other   PE
                              10%    2%   worm
      AD/Erotic pieces                    11%
             3%                                  Script virus
       黑客工具                                           1%
          6%




   Back Door
      20%
                                                 Trojan
  Virus writing generation                        45%
                     UNIX
            tool
                      0%
             2%
Outline
The virus trends of 2004
Qualities of an IDS
Mechanisms of a VDS
Data processing
How a traditional IDS works
               Meticulous protocol
               analysis
               Lightweight rule set
               No more than 500
               records in a rule set.
Unitary software designing
Unitary design: In the    AV Ware: Scan
case of dealing with an   target object’s
extensive complicated
incident, we should
                          divergence.
classify the events and   IDS: Protocol’s
unify one or more of      divergence.
the processing modules
by using an extensible
data structure and data
set.
AVML and Snort
Echo
virus(id=”B00801”;type=”Backdoor”;os=”Win32”;format=”pe”;na
me=”bo”;version=”a”;size=”124928”;Port_listen=on[31337];cont
ent=|81EC0805000083BC240C05000000535657557D148B84242
40500008BAC242005000050E9950500000F85800500008B|;delm
ark=1)

alert tcp $EXTERNAL_NET any -> $HOME_NET 21
(msg:"Backdoor.bo.a Upload"; content:
|81EC0805000083BC240C05000000535657557D148B842424050
0008BAC242005000050E9950500000F85800500008B |;)

alert tcp $EXTERNAL_NET any -> $HOME_NET 139
(msg:"Backdoor.bo.a Copy"; content:
|81EC0805000083BC240C05000000535657557D148B842424050
0008BAC242005000050E9950500000F85800500008B |;)。
Redundant scans caused by
       divergence

 FTP
         Transfer
                     NETBIOS
 rules   character     rules

           rules
Rule set scaling pressure
   type         quantity   Besides worms,
                           there are over
Email worm       2807      20,000 Trojans,
                           Backdoors, etc…
 IM-worm          172
                           which transfer over
                           the network.
P2P-worm         1007
                           The corresponding
IRC-worm          715      rule quantity may
                           exceed 30,000
Other worm        675      records.
   total         5376
Outline
The virus trends of 2004
Qualities of an IDS
Mechanisms of a VDS
Data processing
Algorithm optimization(1)
                5000
                4500
                                                                                                                              When the quantity of rules
                4000                                                                                                          is less than 6,000, it is not
                3500                                                                                                          obvious that time
durtation(ms)




                3000
                2500
                                                                                                                              increases linearly with
                2000                                                                                                          record count. But after
                1500                                                                                                          about 10,000 records, that
                1000
                                                                                                                              begins to change, causing
                500
                  0
                                                                                                                              a sudden drop in
                                                                                                                              performance up until it is
                     0
                    00

                           00

                                  00

                                         00

                                                00

                                                       00

                                                            0

                                                                  0

                                                                         0

                                                                                0

                                                                                       0

                                                                                              0

                                                                                                     0

                                                                                                            0

                                                                                                                   0

                                                                                                                          0
                                                          50

                                                                 00

                                                                        50

                                                                               00

                                                                                      50

                                                                                             00

                                                                                                    50

                                                                                                           00

                                                                                                                  50

                                                                                                                         00
                  15

                         30

                                45

                                       60

                                              75

                                                     90

                                                        10

                                                               12

                                                                      13

                                                                             15

                                                                                    16

                                                                                           18

                                                                                                  19

                                                                                                         21

                                                                                                                22

                                                                                                                       24
                                                                  records
                                                                                                                              simply unavailable。


                                  The influence of record quantity on record
                                  matching time
Algorithm optimization (2)
                                                                                                                                                     The scanning speed
                                                                                                                                                     is also affected by
                                                              实际规则检测网络数据
                                                               木马检验网络数据

                                                              实际规则检测随机数据
                                                                                                                                                     the data being
                6000                                          随机规则检测网络数据                                                                             matched and the
                5000                                                                                                                                 quality of the
                                                                                                                                                     patterns.
duration (ms)




                4000

                3000

                2000

                1000

                  0
                       0
                           1500
                                  3000
                                         4500
                                                6000
                                                       7500
                                                              9000
                                                                     10500
                                                                             12000
                                                                                     13500
                                                                                             15000
                                                                                                     16500
                                                                                                             18000
                                                                                                                     19500
                                                                                                                             21000
                                                                                                                                     22500
                                                                                                                                             24000




                                                                                       records




                                                       Scan methods’ and data objects’ influence on the speed
Algorithm optimization (3)

              1200
              1000
speed(kb/s)




                                                                                                                             original                      improved
              800
              600
              400
              200
                0
                     500
                           2000
                                  3500
                                         5000
                                                6500
                                                       8000
                                                              9500
                                                                     11000
                                                                             12500
                                                                                     14000
                                                                                             15500
                                                                                                     17000
                                                                                                             18500
                                                                                                                     20000
                                                                                                                               21500
                                                                                                                                       23000
                                                                                                                                               24500
                                                                                                                                                       26000
                                                                                                                                                               27500
                                                                                                                                                                       29000
                                                                                     records




                 Influence on efficiency caused by limiting the
                 approximation of the virus’ characteristics
Key method of designing VDS




The Unitary Model focuses on matching speed and matching
granularity — matching is of foremost importance.
Network traffic data is classified into three types:data matched
on the binary level, data needing pre-treatment and data needing
specific algorithms。
Data flow direction and
                                                                                                                    the Level of virus detection
                                                                                                                                                    Divided into 4 levels:
                                       Data log / Process backstage




                                                                                                                                  Event process
                                                                                                                                      level
                                                                                                                                                    collection, divergence,
                                                                                                                                                    detection and
                                                                                                                    (File) Scan
                                                                                                             Complete Dataflow
                                                                                                                                                    processing
Cross verification




                                                                                                                                   Virus scan
                                                                                               Stream scan




                                                                                                                                     level



                                                                                                                                                    Provides package
                                                                                                                                                    scanning, incomplete
                                                                                                        t
                                                                                                     en
                                                                                                    m
                                                                                                  at




                        Pa
                                                                                                re
Procotol tag transfer




                                                                                                                                                    data scanning And
                          cka
                                                                                              et




                             g
                                                                                              pr




                                 es
                                      can
                                                                                                                                  Data diffluence
                                                                      Protocol analysis and




                                                                                                                                       level

                                                                                                                                                    complete data
                                                                           diffluence




                                                                                                                                                    scanning.
                                                                                                                                  Data collection
                                                                                                                                       level
                                                                             Sniffer
System structure
Data efficiency




Virus data output from Harbin Institute of Technology on
July 8 , 2003.
Statistics from the 26th week of 2005
Unknown virus forewarning system




Detected an unknown worm (I-
Worm.Unknow) increasing notably on June
5, 2003. On June 6 it was shown to be the
virus I-worm.sobig.f.
Outline
The virus trends of 2004
Qualities of an IDS
Mechanisms of a VDS
Data processing
Event Processing ( 1 )
Detection Events          Processing methods
Description Language      Tech-based Internal
(DEDL).                   combine
We use descriptors to     Parallel combine
define standard formats   Analysis-based Parallel
for network events and    combine
make them support
other formats             Radiant combine
Defined elements:         Convergence combine
event type, event ID,     Chain combine
source IP, target IP,
event time, and so on.
More than 20 such key
     elements.
Event Processing ( 2 )
If existNet_Action(RPC_Exploit)[IP(1)->IP(2);time(1)]
Net_Action(RPC_Exploit) [IP(2)->IP(3) ;time(2)]
and
time(2)>time(1)
than
Net_Action(RPC_Exploit) [IP(1)-> IP(2) -> IP(3)]
Behavior Classifications
DEDL events                                                 AVML diagnostic behavior regulations



Net_Action(act)[IP(1),IP(2):445; ;time(1)]                  Virus_act_lib
Net_Action(act)[IP(1),IP(3):445; ;time(1)]                  Virus
….                                                                seek(id=”W02872”;dport=139,445;trans=ne
Net_Action(act)[IP(1),IP(12):445; ;time(1)]                       tbios)
Net_Action(Trans,Worm.Win32.Dvldr)[IP(1)->IP(12);time(1)]
Data processing
            IRC SERVER                                   IRC SERVER2                   IRC SERVER3




                                                                                 IR
                                                                                   C
                                                                            Co
                                                                               nn
                                                                                            IRC C
          IRC Connection                     IRC Connection




                                                                       ec
                                                                                                 onnec




                                                                         tio
                                                                                                      tion
                            IRC Connection


                                                                             n




                           Virus.A
                           NODE A                 NODE B                  NODE C            NODE D




Virus.A                      Node A                       Node B


                                                                            Virus.A



                                                       Virus.A

                             Virus.A
Thoughts
Network virus monitoring has been
explored academically and
productively. It has now expanded
into a new technology with its own
direction.
The path of virus defense leads us to
the world of freedom.

More Related Content

PDF
Search solutions for big data and collaboration - Comperio seminar October 2012
Comperio - Search Matters.
 
PPT
Ispra 2007 luis martín2
IrSOLaV Pomares
 
XLSX
Ts0012291251
Confidential
 
XLSX
Ts0012291251 (autosaved)
Confidential
 
PPT
Leigh Nelson - Art by Design
Leigh Nelson
 
PDF
Analisis Teknikal Saham 2
Bilawal Alhariri Anwar
 
PPT
Seminar Saham
Bilawal Alhariri Anwar
 
Search solutions for big data and collaboration - Comperio seminar October 2012
Comperio - Search Matters.
 
Ispra 2007 luis martín2
IrSOLaV Pomares
 
Ts0012291251
Confidential
 
Ts0012291251 (autosaved)
Confidential
 
Leigh Nelson - Art by Design
Leigh Nelson
 
Analisis Teknikal Saham 2
Bilawal Alhariri Anwar
 
Seminar Saham
Bilawal Alhariri Anwar
 

Viewers also liked (12)

PDF
Virus Detection Based on the Packet Flow
Antiy Labs
 
PDF
Malware in Mobile Platform from Panoramic Industrial View
Antiy Labs
 
PDF
Data Storage and Security Strategies of Network Identity
Antiy Labs
 
PDF
Security Challenges of Antivirus Engines, Products and Systems
Antiy Labs
 
PPSX
Virus detection system
Akshay Surve
 
PDF
The Evolution Theory of Malware and Our Thought
Antiy Labs
 
PPSX
Virus detection and prevention
Cholo Legisma
 
PPTX
Artificial Intelligence in Virus Detection & Recognition
ahmadali999
 
PPT
Network virus detection & prevention
Khaleel Assadi
 
PPT
Cloud computing ppt
Datta Dharanikota
 
PPT
Cloud computing simple ppt
Agarwaljay
 
PPTX
Introduction of Cloud computing
Rkrishna Mishra
 
Virus Detection Based on the Packet Flow
Antiy Labs
 
Malware in Mobile Platform from Panoramic Industrial View
Antiy Labs
 
Data Storage and Security Strategies of Network Identity
Antiy Labs
 
Security Challenges of Antivirus Engines, Products and Systems
Antiy Labs
 
Virus detection system
Akshay Surve
 
The Evolution Theory of Malware and Our Thought
Antiy Labs
 
Virus detection and prevention
Cholo Legisma
 
Artificial Intelligence in Virus Detection & Recognition
ahmadali999
 
Network virus detection & prevention
Khaleel Assadi
 
Cloud computing ppt
Datta Dharanikota
 
Cloud computing simple ppt
Agarwaljay
 
Introduction of Cloud computing
Rkrishna Mishra
 
Ad

Similar to Virus Detection System (20)

PPT
Too many websites v2
Alan Mather
 
PDF
Effective and Efficient Shape-Based Pattern Detection over Streaming Time Series
ambitlick
 
PDF
Effective and efficient shape based pattern
ambitlick
 
ODS
Conversor nº binarios a decimales y viceversa 2
Jaime914
 
PDF
European initiatives
Edward Baker
 
PDF
Application delivery 2 0
Interop
 
PPT
Introduction to Performance Testing Part 1
C.T.Co
 
XLS
Fsna tool
Travis Eck
 
XLS
Artefatos para gestão de problemas
Fernando Palma
 
PDF
Microsoft Word Hw#2
kkkseld
 
PPT
danijela simic - msm survey 2010 serbia
Partnerships in Health
 
PDF
Measuring and Monitoring Foot and Mouth Disease Occurrence Melissa McLaws EuFMD
FAO
 
PDF
A Retrospective Look at A Retrospective Look at Classifier System ResearchCl...
Xavier Llorà
 
PPTX
A2DataDive workshop: Introduction to R
Open.Michigan
 
KEY
Using Galvanic Skin Response Measures To Identify Areas of Frustration for Ol...
Darren Lunn
 
XLS
Risk log
Confidential
 
XLS
Risk Log
Confidential
 
PPTX
Site Speed Tuneup: Putting Your Code On A Diet
mm_merchant
 
PDF
Binary addition
Martin Jacob
 
XLS
Session 5 6
Genesis C-Tides
 
Too many websites v2
Alan Mather
 
Effective and Efficient Shape-Based Pattern Detection over Streaming Time Series
ambitlick
 
Effective and efficient shape based pattern
ambitlick
 
Conversor nº binarios a decimales y viceversa 2
Jaime914
 
European initiatives
Edward Baker
 
Application delivery 2 0
Interop
 
Introduction to Performance Testing Part 1
C.T.Co
 
Fsna tool
Travis Eck
 
Artefatos para gestão de problemas
Fernando Palma
 
Microsoft Word Hw#2
kkkseld
 
danijela simic - msm survey 2010 serbia
Partnerships in Health
 
Measuring and Monitoring Foot and Mouth Disease Occurrence Melissa McLaws EuFMD
FAO
 
A Retrospective Look at A Retrospective Look at Classifier System ResearchCl...
Xavier Llorà
 
A2DataDive workshop: Introduction to R
Open.Michigan
 
Using Galvanic Skin Response Measures To Identify Areas of Frustration for Ol...
Darren Lunn
 
Risk log
Confidential
 
Risk Log
Confidential
 
Site Speed Tuneup: Putting Your Code On A Diet
mm_merchant
 
Binary addition
Martin Jacob
 
Session 5 6
Genesis C-Tides
 
Ad

Recently uploaded (20)

PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PPTX
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PPTX
Simple and concise overview about Quantum computing..pptx
mughal641
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PPTX
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PPTX
The Future of AI & Machine Learning.pptx
pritsen4700
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
Simple and concise overview about Quantum computing..pptx
mughal641
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
The Future of AI & Machine Learning.pptx
pritsen4700
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 

Virus Detection System

  • 2. Outline The virus trends of 2004 Qualities of an IDS Mechanisms of a VDS Data processing
  • 3. 20047 new kinds of virus in 2004 Other PE 10% 2% worm AD/Erotic pieces 11% 3% Script virus 黑客工具 1% 6% Back Door 20% Trojan Virus writing generation 45% UNIX tool 0% 2%
  • 4. Outline The virus trends of 2004 Qualities of an IDS Mechanisms of a VDS Data processing
  • 5. How a traditional IDS works Meticulous protocol analysis Lightweight rule set No more than 500 records in a rule set.
  • 6. Unitary software designing Unitary design: In the AV Ware: Scan case of dealing with an target object’s extensive complicated incident, we should divergence. classify the events and IDS: Protocol’s unify one or more of divergence. the processing modules by using an extensible data structure and data set.
  • 7. AVML and Snort Echo virus(id=”B00801”;type=”Backdoor”;os=”Win32”;format=”pe”;na me=”bo”;version=”a”;size=”124928”;Port_listen=on[31337];cont ent=|81EC0805000083BC240C05000000535657557D148B84242 40500008BAC242005000050E9950500000F85800500008B|;delm ark=1) alert tcp $EXTERNAL_NET any -> $HOME_NET 21 (msg:"Backdoor.bo.a Upload"; content: |81EC0805000083BC240C05000000535657557D148B842424050 0008BAC242005000050E9950500000F85800500008B |;) alert tcp $EXTERNAL_NET any -> $HOME_NET 139 (msg:"Backdoor.bo.a Copy"; content: |81EC0805000083BC240C05000000535657557D148B842424050 0008BAC242005000050E9950500000F85800500008B |;)。
  • 8. Redundant scans caused by divergence FTP Transfer NETBIOS rules character rules rules
  • 9. Rule set scaling pressure type quantity Besides worms, there are over Email worm 2807 20,000 Trojans, Backdoors, etc… IM-worm 172 which transfer over the network. P2P-worm 1007 The corresponding IRC-worm 715 rule quantity may exceed 30,000 Other worm 675 records. total 5376
  • 10. Outline The virus trends of 2004 Qualities of an IDS Mechanisms of a VDS Data processing
  • 11. Algorithm optimization(1) 5000 4500 When the quantity of rules 4000 is less than 6,000, it is not 3500 obvious that time durtation(ms) 3000 2500 increases linearly with 2000 record count. But after 1500 about 10,000 records, that 1000 begins to change, causing 500 0 a sudden drop in performance up until it is 0 00 00 00 00 00 00 0 0 0 0 0 0 0 0 0 0 50 00 50 00 50 00 50 00 50 00 15 30 45 60 75 90 10 12 13 15 16 18 19 21 22 24 records simply unavailable。 The influence of record quantity on record matching time
  • 12. Algorithm optimization (2) The scanning speed is also affected by 实际规则检测网络数据 木马检验网络数据 实际规则检测随机数据 the data being 6000 随机规则检测网络数据 matched and the 5000 quality of the patterns. duration (ms) 4000 3000 2000 1000 0 0 1500 3000 4500 6000 7500 9000 10500 12000 13500 15000 16500 18000 19500 21000 22500 24000 records Scan methods’ and data objects’ influence on the speed
  • 13. Algorithm optimization (3) 1200 1000 speed(kb/s) original improved 800 600 400 200 0 500 2000 3500 5000 6500 8000 9500 11000 12500 14000 15500 17000 18500 20000 21500 23000 24500 26000 27500 29000 records Influence on efficiency caused by limiting the approximation of the virus’ characteristics
  • 14. Key method of designing VDS The Unitary Model focuses on matching speed and matching granularity — matching is of foremost importance. Network traffic data is classified into three types:data matched on the binary level, data needing pre-treatment and data needing specific algorithms。
  • 15. Data flow direction and the Level of virus detection Divided into 4 levels: Data log / Process backstage Event process level collection, divergence, detection and (File) Scan Complete Dataflow processing Cross verification Virus scan Stream scan level Provides package scanning, incomplete t en m at Pa re Procotol tag transfer data scanning And cka et g pr es can Data diffluence Protocol analysis and level complete data diffluence scanning. Data collection level Sniffer
  • 17. Data efficiency Virus data output from Harbin Institute of Technology on July 8 , 2003.
  • 18. Statistics from the 26th week of 2005
  • 19. Unknown virus forewarning system Detected an unknown worm (I- Worm.Unknow) increasing notably on June 5, 2003. On June 6 it was shown to be the virus I-worm.sobig.f.
  • 20. Outline The virus trends of 2004 Qualities of an IDS Mechanisms of a VDS Data processing
  • 21. Event Processing ( 1 ) Detection Events Processing methods Description Language Tech-based Internal (DEDL). combine We use descriptors to Parallel combine define standard formats Analysis-based Parallel for network events and combine make them support other formats Radiant combine Defined elements: Convergence combine event type, event ID, Chain combine source IP, target IP, event time, and so on. More than 20 such key elements.
  • 22. Event Processing ( 2 ) If existNet_Action(RPC_Exploit)[IP(1)->IP(2);time(1)] Net_Action(RPC_Exploit) [IP(2)->IP(3) ;time(2)] and time(2)>time(1) than Net_Action(RPC_Exploit) [IP(1)-> IP(2) -> IP(3)]
  • 23. Behavior Classifications DEDL events AVML diagnostic behavior regulations Net_Action(act)[IP(1),IP(2):445; ;time(1)] Virus_act_lib Net_Action(act)[IP(1),IP(3):445; ;time(1)] Virus …. seek(id=”W02872”;dport=139,445;trans=ne Net_Action(act)[IP(1),IP(12):445; ;time(1)] tbios) Net_Action(Trans,Worm.Win32.Dvldr)[IP(1)->IP(12);time(1)]
  • 24. Data processing IRC SERVER IRC SERVER2 IRC SERVER3 IR C Co nn IRC C IRC Connection IRC Connection ec onnec tio tion IRC Connection n Virus.A NODE A NODE B NODE C NODE D Virus.A Node A Node B Virus.A Virus.A Virus.A
  • 25. Thoughts Network virus monitoring has been explored academically and productively. It has now expanded into a new technology with its own direction. The path of virus defense leads us to the world of freedom.