Why Don't Traditional Defenses Work?

Status
Not open for further replies.

Terry Ganzi

Level 26
Thread author
Verified
Top Poster
Well-known
Feb 7, 2014
1,537
7,271
2,469
51
Despite bold claims and billions of dollars invested, legacy protections like traditional and next-generation firewalls, intrusion prevention systems, anti-virus, and Web gateways no longer stop advanced malware or targeted APT attacks. These systems rely too heavily on signatures, known patterns of misbehavior, and reputation to be effective at accurately identifying and blocking advanced targeted attacks. This leaves a gaping hole in network defenses that remain vulnerable to today's new breed of cyber attacks.

In the following pages, we review how each technology has been victimized and bypassed by today's cyber attacks.


Next-generation firewalls (NGFWs) have proven to be incapable of stopping advanced malware and targeted attacks. While NGFWs typically take a more application-centric approach to traffic classification, they do not detect nor block the new breed of advanced attacks such as zero-day, targeted attacks or advanced persistent threat (APT) attacks.

At their core, NGFWs' anti-malware technologies rely on traditional anti-virus and IPS signatures, reputation analysis, and URL blacklists. These approaches are reactive and have proven incapable of stopping advanced threats. With more than 286 million new malware variants surfacing in 2010 alone, it is no wonder NGFWs, like traditional firewalls, fall short when it comes to next-generation threats.

NGFW vendors have tacitly conceded this point and are now augmenting their products with cloud-based analysis of binaries and DLLs and "rapid" hourly updates of the firewall signature set.

Fundamentally, cloud-based analysis does not provide advanced malware protection.

Does not stop Web page attacks
NGFW cloud-based analysis does not analyze document and file formats for malware (PDFs, Microsoft documents, image formats) used to exploit application vulnerabilities.

Does not stop email-based attacks
NGFW cloud-based analysis does not analyze emails for malware, so it cannot stop spear phishing attacks. Spear phishing is a primary mechanism used in targeted APT attacks.

Cannot address encrypted binaries
NGFW cloud-based analysis is based on the premise that malware binaries will be transmitted in the clear and that there is no need to detect the exploit phase that actually initiates a binary download.

Too slow and reactive
Hourly updates of attack signatures are too slow even if they manage to detect a new attack binary. FireEye research has found that 90% of binaries morph within one hour and initiate callbacks within minutes of compromise to download further malware infections.
 
What is the difference between next-generation firewalls and traditional firewalls? Which brands if any are still in the latter category?
 
What is the difference between next-generation firewalls and traditional firewalls? Which brands if any are still in the latter category?
Traditional firewalls are software-based, next generation firewalls are hardware-based like gateways, DNS services, virtual networks and some routers.

Most security vendors offer gateway controls and virtual networks for enterprise environments- not needed for home users.
Most modern routers have a hardware firewall included and if configured correctly will offer better security than any software-based firewall. - recommend for home users.

This article is intended for enterprise environments with large amounts of data which commonly get hacking attacks. FireEye, Inc. is a distributor of enterprise security products they don't even make products for home users. The information really doesn't apply to home users.

Enjoy!! :D
 
Fundamentally, cloud-based analysis does not provide advanced malware protection.
Oh, but *they* will do ANYTHING to convince us otherwise. ;-$

Most modern routers have a hardware firewall included and if configured correctly will offer better security than any software-based firewall. - recommend for home users.
Another, easier (or as a last-resort; lol), thing that can be done is to use a (software) rule-based firewall - like Comodo - but, have it in (full) manual mode where rules are added for each application and none of the built-in components are enabled..

For example, screenshot of Comodo Application Rules (is) attached; the 'Custom' is mostly: 'Ask All the Remaining Requests'; because once you have installed/allowed the virus or malware on your box: it'll communicate through 'Windows\System32\dllhost.exe' and/or 'Windows\System32\svchost.exe', 'System', and/or similar (it could take a while to understand how each firewall labels-what; but you're not relying on 'signatures, known patterns of misbehavior, and reputation' - as per the article).

(Auto Sandbox - on 'Partially Limited', also for example)

P.S.
Hope it helps, even though I've explained nothing - basically; oh - and - *major* case of Deja vu, posting this, lolz. xD
 

Attachments

  • 2014-05-08_0-07-30.png
    2014-05-08_0-07-30.png
    106.4 KB · Views: 358
Status
Not open for further replies.