Eset Live Grid :
The simplest way to provide protection using a cloud system is by exact blacklisting using hashing. This works well for both files and URLs, but it is able to block only objects that match the hash exactly. This limitation has led to the invention of fuzzy hashing. Fuzzy hashing takes into consideration the binary similarity of objects, as similar objects have the same or a similar hash. ESET has moved fuzzy hashing to the next level. We do not perform hashing of data but hashing of the behavior described in DNA Detections. Using DNA hashing, we are able to block thousands of different variants of malware instantly.
Cloud Malware Protection System
The ESET Cloud Malware Protection System is one of several technologies based on ESET’s cloud-based system, ESET LiveGrid. Unknown, potentially malicious applications and other possible threats are monitored and submitted to the ESET cloud via the ESET LiveGrid Feedback System. The samples collected are subjected to automatic sandboxing and behavioral analysis, which results in the creation of automated detections if malicious characteristics are confirmed. ESET clients learn about these automated detections via the ESET LiveGrid Reputation System without the need to wait for the next detection engine update. The mechanism’s turnaround time is typically under 20 minutes, which allows for effective detection of emerging threats even before regular detections are delivered to users’ computers
ESET’s Host-based Intrusion Prevention System
(HIPS) monitors system activity and uses a
pre-defined set of rules to recognize suspicious
system behavior. When this type of activity is
identified, the HIPS self-defense mechanism
stops the offending program or process from
carrying out potentially harmful activity. Users
can define a custom set of rules to be used
instead of the default rule set; however, this
requires advanced knowledge of applications and
operating systems.
Exploit Blocker:
ESET technologies protect against various types of vulnerabilities on different levels: our scanning engine covers exploits that appear in malformed document files; Network Attack Protection targets the communication level; and finally, Exploit Blocker blocks the exploitation process itself. Exploit Blocker monitors typically exploitable applications (browsers, document readers, email clients, Flash, Java, and more) and instead of just aiming at particular CVE identifiers it focuses on exploitation techniques. Each exploit is an anomaly in the execution of the process and we look for anomalies that suggest the presence of exploitation techniques. As the technology is under constant development, new methods of detection are added regularly to cover new exploitation techniques. When triggered, the behavior of the process is analyzed and, if it is considered suspicious, the threat may be blocked immediately on the machine, with further attack related metadata being sent to our ESET LiveGrid cloud system. This information is further processed and correlated, which enables us to spot previously unknown threats and so called zero-day attacks, and provides our lab with valuable threat intelligence. Exploit Blocker adds another layer of protection, one step closer to attackers, by using a technology that is completely different from detection techniques that focus on analyzing malicious code itself.
For more info see:
https://cdn1-prodint.esetstatic.com/ESET/US/docs/about/ESET-Technology-Whitepaper.pdf