SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
Aluria Software • 851 Trafalgar Court, Suite 200 • Maitland, Florida 32751 • 1.888.627.4650                                       www.aluriasoftware.com




Spyware Is Everywhere: A Multi-Layered
Solution Is Your Best Defense
Introduction
Spyware is everywhere and both corporate and home users are faced with protecting against a host of malicious               Because spyware attacks
threats that attack multiple entry points and cause critical and costly security breaches. The spyware threat is here to    are inevitable by design,
stay—a billion dollar industry, spyware developers and corporate sponsors are raking in the revenue, tracking user          multi-layered protection
habits and harvesting personal information for monetary gain. Determined to protect their investment, these entities        that includes perimeter,
pour millions into developing newer, harder-to-remove spyware varieties that employ sophisticated mechanisms to             on-demand remediation
evade detection and removal while attacking networks and desktops at numerous entry points.                                 and kernel-level
                                                                                                                            prevention components is
Because spyware attacks are inevitable by design, multi-layered protection that includes perimeter, on-demand               essential for protecting all
remediation and kernel-level prevention components is essential for protecting all entry points against threats that        entry points against
cause harm. Deploying anti-spyware at the perimeter blocks spyware in real-time from infiltrating the network and           threats that cause harm.
secures the threat conduit to the outside world, effectively stopping threats from entering the network and infecting
computers. Desktop-level protection remediates existing spyware on systems and protects desktops, servers, and
laptops from threats that infiltrate via internal entry points. Kernel-level prevention blocks malicious code in real-
time, proactively preventing spyware from being installed in the first place.

The Aluria family of protection SDKs contain all the necessary functionality needed for a robust and flexible multi-
layered gateway, desktop, or dual purpose spyware detection and removal solution. Aluria Gateway Protection SDK™
stops spyware before it even enters the network, well before it reaches its intended desktop target. Aluria
Desktop/Server Protection SDK™ allows users in both business and home environments to scan and remove spyware
already on the desktop and includes preventative blocking that stops inbound spyware from installing to begin with.
Aluria’s two individual but equally effective anti-spyware SDKs can be deployed separately or together to provide
comprehensive protection against fast-evolving spyware threats.


Spyware Is the Number One Internet Threat
Threat motivation
Since the early days of the Internet there have been those who abuse it for malicious purposes. Early on viruses were
the scourge of the World Wide Web. Written solely for the personal gratification of their authors, viruses were
designed to out-do other viruses and became widespread in their infamy. Today viruses have been eclipsed by a
threat whose motivation is financial; marketers use spyware to track and influence customer buying behavior, while
criminals use spyware to steal any private/sensitive data—customer information, passwords, bank account numbers,
etc.—that will benefit them financially.

Now a billion dollar industry, analysts report that spyware has replaced viruses as the greatest Internet security threat
affecting corporations, and end-users worldwide. Unlike viruses, spyware is designed to harvest sensitive data for




© Copyright 2006. All products are trademarks of Aluria Software, a division of EarthLink, Inc.                                                        1
purposes of revenue generation and as such installs and operates quietly and is funded by corporate backers with
deep pockets.

Designed for stealth, spyware motivation is reflected in its behaviors. To achieve its objective of harvesting
information, spyware—unlike viruses that disrupt and draw attention—is made to avoid detection and removal by
incorporating sophisticated stealth technologies. Rootkits, for example, use stealth to create a virtually undetectable
installation at the root (or lowest) level of the computer where it can perform nearly any function including
keylogging and remote access, while keeping processes, registry keys, communication channels, and files hidden
from detection. Some spyware programs also include self-repair features to correct any damage caused by removal
attempts.

The corporate-minded motivation behind spyware development stems from the inexpensive technology’s ability to
track user behavior and generate large amounts of advertising revenue. Spyware is a big business and marketing
corporations who have access to a myriad of funding and talent continue to develop threats that are increasingly
difficult to detect and harder-to-remove than ever before.

Threat Function
October 7, 1994, the first occurrence of the term spyware emerged in a Usenet post poking fun at Microsoft’s business       Given that spyware
model. In 2000, a Zone Labs press release referenced the term in regards to Internet security and today the most            publishers are constantly
relevant and generally accepted definition of spyware comes from the Anti-Spyware Coalition, (an organization made          creating new threats that
up of public interest groups, trade associations and prominent anti-spyware companies) and reads:                           are increasingly difficult
                                                                                                                            to detect, harder to
spyware – (spī’· wâr) n. - Technologies deployed without appropriate user consent and/or implemented in ways                remove, and easier to
that impair user control over: a) Material changes that affect their user experience, privacy, or system security; b) Use   inadvertently install than
of their system resources, including what programs are installed on their computers; and/or c) Collection, use, and         ever before, augmenting
distribution of their personal or other sensitive information.                                                              existing security
                                                                                                                            strategies to include
In short, spyware refers to various types of undesirable software—i.e., malware, tricklers, keyloggers, trojans,            anti-spyware is a must for
adware, dialers, hijackers, and others—that are surreptitiously installed on a computer without explicit permission         those who want to use the
for the purpose of collecting information that can be subverted to benefit a third party, financially or otherwise.         Internet safely.
Typically bundled with freeware or shareware, through e-mail, instant messaging or by someone with administrative
access, spyware is said to reside on 90% of Internet-connected computers, according to industry experts.

Spyware’s actions range from profiling user activity for targeting advertisements to logging keystrokes to gather
passwords and credit card information and/or to perform corporate espionage. Most recently, spyware innovations
include blended threat and the aforementioned rootkit installations that are sophisticated programs indicative of the
level of expertise now being used in spyware attacks. Blended threats—because of their complexity—are
particularly insidious, performing many malicious actions including attacking network vulnerabilities with a
combination of techniques that allow unscrupulous third parties to gain unauthorized administrative privileges.
These newer behaviors are typically beyond the reach of most anti-spyware remediation schemes and are best
stopped before they can install, at the kernel level.

In order for spyware to go undetected while performing the core function of harvesting user behaviors and data, the
surreptitious applications are designed to install without user knowledge in a variety of ways. Many seemingly
innocuous activities can lead to spyware infections. The most common method of transmission involves bundling
spyware with otherwise legitimate or desirable applications. This type of piggybacking most often occurs with
freeware, whose developers allow the product to be installed free of charge in exchange for the right to harvest and
sell user information. In most cases, the user is unaware that s/he has agreed to this arrangement because the




© Copyright 2006. All products are trademarks of Aluria Software, a division of EarthLink, Inc.                                                      2
request for such authorization is buried deep within the application’s End User License Agreement (EULA) using
confusing technical and legal language that few users read, let alone comprehend.

Software installation is only one vector of entry for spyware. Other methods of spyware delivery include “drive-by
downloads,” where an HTML link serves as a gateway for the undetected installation of spyware applications. This
type of clandestine download typically occurs when a user clicks a link in a spam message, an instant messenger (IM)
link, or other unsolicited advertisement. Spyware can also be attached to or embedded in e-mail or instant messenger
communications, included as part of an ActiveX installation, or may be deliberately installed by someone with
administrative access.

Given that spyware publishers are constantly creating new threats that are increasingly difficult to detect, harder to
remove, and easier to inadvertently install than ever before, augmenting existing security strategies to include anti-
spyware is a must for those who want to use the Internet safely. Spyware publishers’ specific intent is to circumvent
conventional technologies, such as anti-virus and firewall applications, leaving those organizations and individuals
who rely on these methods vulnerable to serious risks and costly consequences.


Spyware Risks
While in its earliest incarnations spyware was considered a mere annoyance for computer enthusiasts, today it’s a            Failing to effectively
dangerous and costly threat that affects everyone connected to the Internet. Failing to effectively safeguard against        safeguard against
spyware has numerous consequences including: compromised security of confidential data, loss or destruction of data          spyware has numerous
due to malicious attacks, reduced productivity and computer performance caused by bandwidth and memory drain,                consequences including:
and increased tech support burden.                                                                                           compromised security of
                                                                                                                             confidential data, loss or
Compromised Security of Confidential Data: Spyware that performs surveillance actions—such as rootkits and                   destruction of data due to
keyloggers—allow unauthorized parties to monitor virtually every move made on a network or desktop, granting                 malicious attacks, reduced
intruders direct access to highly sensitive information. This risk is of particular concern for organizations that must      productivity and computer
comply with government information security regulations. In 2005, Sheriff John Whetsel of Oklahoma City reported             performance caused by
that an unknown person had planted surveillance software on office computers that contained details about prisoner           bandwidth and memory
movements, confidential homeland security updates and private personnel files. It is unknown how long the                    drain, and increased tech
programs had been monitoring the sensitive law enforcement information. Individuals also suffer from spyware                 support burden.
attacks when cyber criminals harvest personal and private information including passwords, social security numbers,
and financial data that can be used for bank account and identity theft.

Loss or Destruction of Data Due To Malicious Attack: Spyware infections increase the vulnerability of data loss
by giving attackers the ability to steal or destroy valuable files at will. Corporations looking to safeguard intellectual
property need to be cognizant of the connection between spyware and espionage. In March, 2006 an Israeli couple
was jailed for allegedly selling and installing customized trojan horses that gave rivals access to their competitor’s
stolen documents. Individuals need also be aware of spyware’s propensity to corrupt precious data—irreplaceable
digital photographs and movies, music and other files can all be lost.

Reduced Productivity and Computer Performance: Sluggish system performance, distraction caused by
increased pop-up advertisements, and downtime due to data loss are all byproducts of spyware infections. The
constant transmission of stolen information from infected computers to unauthorized sources consumes bandwidth
and diminishes network performance. Also, many spyware programs store materials such as unwanted
advertisements on the computer’s hard drive. When valuable bandwidth intended for business or personal use is
hijacked, networks become clogged and Internet connectivity/Web browsing slows as a result. More than an
annoyance, these events reduce the amount of time employees and individuals can spend on valuable projects.




© Copyright 2006. All products are trademarks of Aluria Software, a division of EarthLink, Inc.                                                       3
Increased Tech Support Burden: Corporations are expending valuable and costly IT resources in time-consuming
efforts to identify and eradicate spyware and to repair the damage caused to individual computers. Michael George,
Vice President of Dell Computer’s United States consumer business, stated that more customers are calling Dell
Technical Support seeking relief from spyware than for any other technical support issue.

Spyware is evading traditional security measures, causing serious, costly damage to both organizations and
individuals. Computer crimes cost businesses an estimated $67 billion dollars a year, according to the 2005 FBI
Computer Crime Survey. Individual losses are also significant; in early 2006, Ukrainian hacker, Dimitry Ivanovic
Golubov was charged with cybercrimes that involved financial fraud that included—according to an affidavit from an
FBI special agent—the trafficking of “millions of stolen credit card numbers and financial information.” Stolen cards
and information are sold to low-level criminals who use them to withdraw cash from ATMs and buy merchandise.

For anyone connected to the Internet, finding efficient and effective spyware protection is of
paramount concern.


Spyware Prevention and Threat Remedies
Safeguarding business and home environments requires dedicated anti-spyware technology that protects all points             Safeguarding business and
of entry, and includes advanced kernel-level prevention functionality to completely block future spyware                    home environments
installations.                                                                                                              requires dedicated
                                                                                                                            anti-spyware technology
Perimeter                                                                                                                   that protects all points of
For network environments, the first step in circumventing spyware is to stop it at the perimeter, before it infiltrates     entry, and includes
desktop workstations. To do this, an anti-spyware solution must be integrated at the gateway on the network. A              advanced kernel-level
proactive anti-spyware solution scans network traffic in real time, searching for suspect programs, files, and data         prevention functionality
transmissions that exhibit known spyware characteristics. When spyware is detected, an immediate notification               to completely block future
occurs to effectively stop the threat in its tracks. To protect those points of entry that are not on the network           spyware installations.
perimeter a desktop anti-spyware solution with remediation and real-time, kernel-level prevention is
also recommended.

Remediation
The nature of spyware makes infection unavoidable, thus remediation measures to address post-installation infection
is tantamount to protecting against the threat. Remediation works by scanning for existing spyware installations and
quarantining them inside a computer where they can no longer cause damage; all traces of intrusive code that have
been quarantined are blocked from establishing a link back to their source. The limitation of this strategy relies on the
fact that spyware must already be present on a computer before protective measures can be taken.

Prevention
Because today’s threats are specifically designed to avoid removal after successful installation, utilizing advanced
prevention technologies is a critical component in the fight against spyware. Some anti-spyware offerings are
designed to scan systems for existing spyware installations; this reactive response allows spyware to be installed
before removal is attempted which is problematic because many forms of spyware are incredibly difficult to
completely remove once installed. A truly proactive approach, on the other hand—one that prevents infection in
real-time—effectively neutralizes rogue applications as they attempt to write to desktops or file systems, preventing
installation altogether.

             Polling Versus Real-Time
             Generally, there are two approaches to spyware prevention technology—polling and real-time, the latter
             of which is far superior as it offers always-on protection while consuming less resources.



© Copyright 2006. All products are trademarks of Aluria Software, a division of EarthLink, Inc.                                                       4
Polling Prevention
             Unable to effectively stop spyware until its processes have already begun, polling-based prevention is a         Two independently
             less-than-reliable method for preventing spyware infection. Designed to check systems periodically,              engineered SDKs—the
             polling technology only reacts once spyware launches a process. Thus spyware infection has already               Aluria Gateway Protection
             occurred by the time the polling solution recognizes the malicious code.                                         SDK, and the Aluria
                                                                                                                              Desktop/Server SDK—can
             Real-Time Prevention
                                                                                                                              be implemented
             The advantage of real-time prevention—as opposed to polling—is that malicious code is blocked at the
                                                                                                                              separately or can combine
             kernel level, before processes ever have a chance to launch. Real-time monitoring means the system is
                                                                                                                              for a dual solution that
             “aware” of every process at all times, constantly prepared to block malicious code from ever executing. By
                                                                                                                              stops spyware from
             intercepting and neutralizing malicious activity before it writes to the hard drive, real-time methods
                                                                                                                              entering a network
             provide a layer of kernel-level protection that proactively prevents spyware from being installed in the first
                                                                                                                              regardless of point of
             place.
                                                                                                                              entry—whether Web,
                                                                                                                              disk, e-mail, network, etc.
Anti-Spyware at the Gateway
To protect its multiple entry points from dangerous and destructive spyware, corporate networks must employ a
multi-layered anti-spyware strategy that includes perimeter, remediation, and prevention components. A gateway
application serves as a network’s first line of defense, providing real-time protection at the perimeter. A desktop
solution, equipped with remediation and prevention components, removes existing instances of spyware and
protects against attacks that enter via unsecured internal access, (by way of personal laptop or USB storage device, for
example).

Anti-Spyware on the Desktop
Combining both remediation and prevention functionality into a single desktop anti-spyware application prevents all
risks associated with spyware infections. Regardless whether securing a network or home environment, reactive
scanning allows users to scan and remove spyware already on the desktop, while preventative blocking stops
inbound spyware from reaching the desktop in the first place.

For businesses and individuals alike, anti-spyware technology that comes complete with remediation and prevention
technologies is essential for total threat protection.


The Aluria Solution
The Aluria family of SDKs offer complete multi-layered anti-spyware protection that can be leveraged to rapidly
create robust applications for corporate networks and/or individual computers. Two independently engineered
SDKs—the Aluria Gateway Protection SDK, and the Aluria Desktop/Server SDK—can be implemented separately or
can combine for a dual solution that stops spyware from entering a network regardless of point of entry—whether
Web, disk, e-mail, network, etc. SDK partners can tailor the SDKs to their specific needs by implementing the original
SDK engines and integrating them into an existing framework. The Aluria development team can also help with SDK
setup and address partner requests for new features and customizations to our interface, to provide the closest
possible fit with implementation requirements. Because the Aluria SDKs require minimal development effort,
adopters benefit from a rapid return on investment.

Aluria Gateway Protection SDK
Specially designed to allow rapid deployment of real-time spyware blocking within Linux/UNIX/Windows gateway
appliances and products for Internet servers and other gateways, the Aluria Gateway Protection SDK protects against
spyware in two different ways: 1) by blocking known malicious IP addresses and URL’s, and 2) by performing
signature analysis.




© Copyright 2006. All products are trademarks of Aluria Software, a division of EarthLink, Inc.                                                         5
Here’s how it works: A typical implementation of the Aluria Gateway Protection SDK involves loading Aluria’s IP-
domain black list into an appliance, creating a firewall-type protection that enables the gateway to prohibit incoming
or outgoing access of specified URLs. If a malicious IP is detected, the SDK blocks its entrance into the appliance. If the
incoming data is not a malicious IP, it will pass through the appliance and will be either written to the disk or
buffered in memory (as specified by the SDK partner). After the gateway processes these files, they are passed to the
Aluria SDK using simple calls. The SDK then performs a signature-based analysis—on files, ActiveX, and Browser
Helper Objects—by scanning incoming files against those in the spyware database. Once the analysis is complete,
the SDK notifies the gateway to either block or accept the files. This event-driven approach to spyware detection and
blocking allows for minimum use of resources with maximum versatility in implementation.

Versatile in its universal support of operating systems and architectures, the Aluria Gateway Protection SDK can be
easily integrated into any environment. Platform agnostic, designed for all operating systems and 95% of
architectures, the SDK’s supported operating systems include, but are not limited to: Windows NT to 2003, Linux
(Debian, Mandrake, SUSE, Red Hat and Knoppix), and Unix (Free BSD and NetBSD); the unprecedented variety of
architectures includes, but is not limited to: x86, 32bit Little Endian, ARM Big Endian/Little Endian, and MIPS Big
Endian/Little Endian.

Aluria Desktop/Server Protection SDK
The Aluria Desktop/Server Protection SDK contains all the necessary functionality needed for robust and flexible
remediation of existing spyware and prevention of further infections. Designed to eliminate any existing spyware and
defend against spyware as it attempts to infiltrate a Windows PC/host, the SDK includes two core strategies: an On-
Demand Scan & Removal Engine™ and a real-time Active Defense Shield (ADS)™.

The Aluria Desktop/Server Protection SDK’s On-Demand Scan & Removal Engine is a reactive scanning utility that is
useful in situations where spyware already exists on a system prior to anti-spyware installation or when real-time
preventions, like ADS, have been temporarily disabled. Completely customizable, developers can configure the SDK to
perform scans in memory, registry, specific directories, specific files, cookie directories, and any other exploit-sensitive
entry point on the system. Desktops can then be scanned on demand or at prescheduled times. When spyware is
detected, it can be processed by quarantining, ignoring, or removal; quarantined items can be restored or removed.
Removed items are permanently deleted. For reporting purposes, the SDK can also return spyware descriptions,
threat levels, variants, and categories. Once scanning and removal are complete, the SDK allows for unloading the
ScanEngine object and releasing used memory.

Aluria’s exclusive ADS technology provides the Aluria Desktop/Server Protection SDK with truly proactive, real-time,
event-based prevention that goes far beyond traditional reactive/frequency-based monitoring. It guards computers
against all attempted spyware installations including those that originate on the Web as installers, on intranets,
mapped network drives, CD-ROMs, floppy drives, and USB drives. ADS catches spyware as soon as it attempts to write,
move, or rename files and automatically performs a pre-configured action to Auto-Delete, Auto-Quarantine or Ignore.

In production, here’s how ADS works: ADS consists of a file-system driver that resides in the operating system Ring-0
or the kernel, which enables it to hook into the file system and monitor for particular events such Open, Close, or
Rename. When such an event occurs, ADS blocks the file from gaining any access for analysis and takes appropriate
action if spyware is found. Safe files may proceed with their normal actions. Unlike most anti-spyware monitoring
solutions, ADS does not conflict with popular anti-virus programs or require constant CPU cycles, and it functions
unobtrusively in the background.




© Copyright 2006. All products are trademarks of Aluria Software, a division of EarthLink, Inc.                                6
Dual Protection SDK
Expressly for network environments, the Aluria Gateway Protection SDK can be implemented together with the Aluria
Desktop/Server Protection SDK to protect all points of entry on the network. Aluria’s two protection SDKs—when
used in tandem—institute a fully integrated anti-spyware solution that provides real-time protection at both the
network and desktop parameters.

Aluria protection SDKs are designed specifically for original equipment manufacturers (OEM) and independent
software vendors (ISV) to add value to their product offerings. Software developers, network appliance and hardware
manufacturers, and system integrators seeking the ultimate protection from online threats and malicious spyware
can easily implement the Aluria solutions through proven, tested methods. “Developer-friendly” APIs (application
programming interface) allow quick, easy, and effective implementations that add the value that customers demand.




To download the Aluria SDK Datasheet, visit http://www.aluriasoftware.com/files/pdfs/SDK_Datasheet.pdf




© Copyright 2006. All products are trademarks of Aluria Software, a division of EarthLink, Inc.                       7
Proven Provider, Trusted Partner
Built on Aluria’s widely-trusted, event-driven technology, Aluria SDKs feature a light footprint, a robust and strategic
tool set, flexible options, diverse OS and hardware compatibility and the partnership and technical support that only
an established industry leader can provide. All Aluria anti-spyware technology is backed by an in-house team of
spyware experts and engineers, automated, patent-pending Threat Prevention System™ spyware research
technologies designed to provide zero-day protection against the most elusive threats, and Aluria’s massive database
of verified spyware signatures and definitions.


For more information about Aluria Software and the Aluria family of protection SDKs, please visit our Web site at
www.aluriasoftware.com or contact us via phone at 1.888.627.4650 or by e-mail at oemsales@aluriacorporate.com.




© Copyright 2006. All products are trademarks of Aluria Software, a division of EarthLink, Inc.                            8

Mais conteúdo relacionado

Mais procurados

The Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityThe Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityLumension
 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesWAJAHAT IQBAL
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and MoreCommunity IT Innovators
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)Zara Nawaz
 
Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...Mark John Lado, MIT
 
Cyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughCyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughSavvius, Inc
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)WAJAHAT IQBAL
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basicsSrinu Potnuru
 
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...IJNSA Journal
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and AttacksSachin Darekar
 
Report on Rogue Security Software
Report on Rogue Security SoftwareReport on Rogue Security Software
Report on Rogue Security SoftwareSymantec Italia
 
AI for Ransomware Detection & Prevention Insights from Patents
AI for Ransomware Detection & Prevention Insights from PatentsAI for Ransomware Detection & Prevention Insights from Patents
AI for Ransomware Detection & Prevention Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMohsin Dahar
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyOPSWAT
 
Malicious software
Malicious softwareMalicious software
Malicious softwareCAS
 
WEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfWEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfSetiya Nugroho
 

Mais procurados (20)

The Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityThe Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day Reality
 
Policy report barrat & associates ltd
Policy report  barrat & associates ltdPolicy report  barrat & associates ltd
Policy report barrat & associates ltd
 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practises
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
 
Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...Computer hacking and security - Social Responsibility of IT Professional by M...
Computer hacking and security - Social Responsibility of IT Professional by M...
 
Cyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughCyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enough
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basics
 
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
 
Report on Rogue Security Software
Report on Rogue Security SoftwareReport on Rogue Security Software
Report on Rogue Security Software
 
AI for Ransomware Detection & Prevention Insights from Patents
AI for Ransomware Detection & Prevention Insights from PatentsAI for Ransomware Detection & Prevention Insights from Patents
AI for Ransomware Detection & Prevention Insights from Patents
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
Cyber security
Cyber securityCyber security
Cyber security
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny Czarny
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
WEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdfWEEK5 Mobile Device Security 31032022.pdf
WEEK5 Mobile Device Security 31032022.pdf
 

Destaque

Paladin Troubleshooting Guide
Paladin Troubleshooting GuidePaladin Troubleshooting Guide
Paladin Troubleshooting Guidehanniw79
 
Učební obor kadeřník kadeřnice
Učební  obor kadeřník  kadeřniceUčební  obor kadeřník  kadeřnice
Učební obor kadeřník kadeřnicevilankovaj
 
Business management consulting response (2)
Business management consulting response (2)Business management consulting response (2)
Business management consulting response (2)Marcelo Alterman
 
Technology causing childhood obesity 8gpy kole_v1
Technology causing childhood obesity 8gpy kole_v1Technology causing childhood obesity 8gpy kole_v1
Technology causing childhood obesity 8gpy kole_v1riley
 
Sw208 Report On03
Sw208 Report On03Sw208 Report On03
Sw208 Report On03manduul
 
Au psy492 e_portfolio template for slideshare_garcia_j
Au psy492 e_portfolio template for slideshare_garcia_jAu psy492 e_portfolio template for slideshare_garcia_j
Au psy492 e_portfolio template for slideshare_garcia_jAltair Global Relocation
 

Destaque (10)

Paladin Troubleshooting Guide
Paladin Troubleshooting GuidePaladin Troubleshooting Guide
Paladin Troubleshooting Guide
 
Učební obor kadeřník kadeřnice
Učební  obor kadeřník  kadeřniceUčební  obor kadeřník  kadeřnice
Učební obor kadeřník kadeřnice
 
Business management consulting response (2)
Business management consulting response (2)Business management consulting response (2)
Business management consulting response (2)
 
Technology causing childhood obesity 8gpy kole_v1
Technology causing childhood obesity 8gpy kole_v1Technology causing childhood obesity 8gpy kole_v1
Technology causing childhood obesity 8gpy kole_v1
 
Sw208 Report On03
Sw208 Report On03Sw208 Report On03
Sw208 Report On03
 
Au psy492 e_portfolio template for slideshare_garcia_j
Au psy492 e_portfolio template for slideshare_garcia_jAu psy492 e_portfolio template for slideshare_garcia_j
Au psy492 e_portfolio template for slideshare_garcia_j
 
Herzigi tierli
Herzigi tierliHerzigi tierli
Herzigi tierli
 
The weather presentation
The weather presentationThe weather presentation
The weather presentation
 
Ukk
UkkUkk
Ukk
 
Truther
TrutherTruther
Truther
 

Semelhante a SDK Whitepaper

Types-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfTypes-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfANUSREEASHOK5
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdfPavelVtek3
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpointgalaxy201
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdfahmed53254
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfsrtwgwfwwgw
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementMuhammad FAHAD
 
Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...Lana Sorrels
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 
Different Types Of Network Security Devices And Tools.docx
Different Types Of Network Security Devices And Tools.docxDifferent Types Of Network Security Devices And Tools.docx
Different Types Of Network Security Devices And Tools.docxSameerShaik43
 
WithSecure Deepguard WhitePaper
WithSecure Deepguard WhitePaperWithSecure Deepguard WhitePaper
WithSecure Deepguard WhitePaperlincktello
 
Designing Security Assessment of Client Server System using Attack Tree Modeling
Designing Security Assessment of Client Server System using Attack Tree ModelingDesigning Security Assessment of Client Server System using Attack Tree Modeling
Designing Security Assessment of Client Server System using Attack Tree Modelingijtsrd
 

Semelhante a SDK Whitepaper (20)

Types-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfTypes-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdf
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 
185
185185
185
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Mitppt
MitpptMitppt
Mitppt
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
network_security.docx_2.pdf
network_security.docx_2.pdfnetwork_security.docx_2.pdf
network_security.docx_2.pdf
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
 
iTM ppt....pptx
iTM ppt....pptxiTM ppt....pptx
iTM ppt....pptx
 
Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...Kudler Fine Foods IT Security Report And Presentation –...
Kudler Fine Foods IT Security Report And Presentation –...
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Cn35499502
Cn35499502Cn35499502
Cn35499502
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Different Types Of Network Security Devices And Tools.docx
Different Types Of Network Security Devices And Tools.docxDifferent Types Of Network Security Devices And Tools.docx
Different Types Of Network Security Devices And Tools.docx
 
WithSecure Deepguard WhitePaper
WithSecure Deepguard WhitePaperWithSecure Deepguard WhitePaper
WithSecure Deepguard WhitePaper
 
Designing Security Assessment of Client Server System using Attack Tree Modeling
Designing Security Assessment of Client Server System using Attack Tree ModelingDesigning Security Assessment of Client Server System using Attack Tree Modeling
Designing Security Assessment of Client Server System using Attack Tree Modeling
 

SDK Whitepaper

  • 1. Aluria Software • 851 Trafalgar Court, Suite 200 • Maitland, Florida 32751 • 1.888.627.4650 www.aluriasoftware.com Spyware Is Everywhere: A Multi-Layered Solution Is Your Best Defense Introduction Spyware is everywhere and both corporate and home users are faced with protecting against a host of malicious Because spyware attacks threats that attack multiple entry points and cause critical and costly security breaches. The spyware threat is here to are inevitable by design, stay—a billion dollar industry, spyware developers and corporate sponsors are raking in the revenue, tracking user multi-layered protection habits and harvesting personal information for monetary gain. Determined to protect their investment, these entities that includes perimeter, pour millions into developing newer, harder-to-remove spyware varieties that employ sophisticated mechanisms to on-demand remediation evade detection and removal while attacking networks and desktops at numerous entry points. and kernel-level prevention components is Because spyware attacks are inevitable by design, multi-layered protection that includes perimeter, on-demand essential for protecting all remediation and kernel-level prevention components is essential for protecting all entry points against threats that entry points against cause harm. Deploying anti-spyware at the perimeter blocks spyware in real-time from infiltrating the network and threats that cause harm. secures the threat conduit to the outside world, effectively stopping threats from entering the network and infecting computers. Desktop-level protection remediates existing spyware on systems and protects desktops, servers, and laptops from threats that infiltrate via internal entry points. Kernel-level prevention blocks malicious code in real- time, proactively preventing spyware from being installed in the first place. The Aluria family of protection SDKs contain all the necessary functionality needed for a robust and flexible multi- layered gateway, desktop, or dual purpose spyware detection and removal solution. Aluria Gateway Protection SDK™ stops spyware before it even enters the network, well before it reaches its intended desktop target. Aluria Desktop/Server Protection SDK™ allows users in both business and home environments to scan and remove spyware already on the desktop and includes preventative blocking that stops inbound spyware from installing to begin with. Aluria’s two individual but equally effective anti-spyware SDKs can be deployed separately or together to provide comprehensive protection against fast-evolving spyware threats. Spyware Is the Number One Internet Threat Threat motivation Since the early days of the Internet there have been those who abuse it for malicious purposes. Early on viruses were the scourge of the World Wide Web. Written solely for the personal gratification of their authors, viruses were designed to out-do other viruses and became widespread in their infamy. Today viruses have been eclipsed by a threat whose motivation is financial; marketers use spyware to track and influence customer buying behavior, while criminals use spyware to steal any private/sensitive data—customer information, passwords, bank account numbers, etc.—that will benefit them financially. Now a billion dollar industry, analysts report that spyware has replaced viruses as the greatest Internet security threat affecting corporations, and end-users worldwide. Unlike viruses, spyware is designed to harvest sensitive data for © Copyright 2006. All products are trademarks of Aluria Software, a division of EarthLink, Inc. 1
  • 2. purposes of revenue generation and as such installs and operates quietly and is funded by corporate backers with deep pockets. Designed for stealth, spyware motivation is reflected in its behaviors. To achieve its objective of harvesting information, spyware—unlike viruses that disrupt and draw attention—is made to avoid detection and removal by incorporating sophisticated stealth technologies. Rootkits, for example, use stealth to create a virtually undetectable installation at the root (or lowest) level of the computer where it can perform nearly any function including keylogging and remote access, while keeping processes, registry keys, communication channels, and files hidden from detection. Some spyware programs also include self-repair features to correct any damage caused by removal attempts. The corporate-minded motivation behind spyware development stems from the inexpensive technology’s ability to track user behavior and generate large amounts of advertising revenue. Spyware is a big business and marketing corporations who have access to a myriad of funding and talent continue to develop threats that are increasingly difficult to detect and harder-to-remove than ever before. Threat Function October 7, 1994, the first occurrence of the term spyware emerged in a Usenet post poking fun at Microsoft’s business Given that spyware model. In 2000, a Zone Labs press release referenced the term in regards to Internet security and today the most publishers are constantly relevant and generally accepted definition of spyware comes from the Anti-Spyware Coalition, (an organization made creating new threats that up of public interest groups, trade associations and prominent anti-spyware companies) and reads: are increasingly difficult to detect, harder to spyware – (spī’· wâr) n. - Technologies deployed without appropriate user consent and/or implemented in ways remove, and easier to that impair user control over: a) Material changes that affect their user experience, privacy, or system security; b) Use inadvertently install than of their system resources, including what programs are installed on their computers; and/or c) Collection, use, and ever before, augmenting distribution of their personal or other sensitive information. existing security strategies to include In short, spyware refers to various types of undesirable software—i.e., malware, tricklers, keyloggers, trojans, anti-spyware is a must for adware, dialers, hijackers, and others—that are surreptitiously installed on a computer without explicit permission those who want to use the for the purpose of collecting information that can be subverted to benefit a third party, financially or otherwise. Internet safely. Typically bundled with freeware or shareware, through e-mail, instant messaging or by someone with administrative access, spyware is said to reside on 90% of Internet-connected computers, according to industry experts. Spyware’s actions range from profiling user activity for targeting advertisements to logging keystrokes to gather passwords and credit card information and/or to perform corporate espionage. Most recently, spyware innovations include blended threat and the aforementioned rootkit installations that are sophisticated programs indicative of the level of expertise now being used in spyware attacks. Blended threats—because of their complexity—are particularly insidious, performing many malicious actions including attacking network vulnerabilities with a combination of techniques that allow unscrupulous third parties to gain unauthorized administrative privileges. These newer behaviors are typically beyond the reach of most anti-spyware remediation schemes and are best stopped before they can install, at the kernel level. In order for spyware to go undetected while performing the core function of harvesting user behaviors and data, the surreptitious applications are designed to install without user knowledge in a variety of ways. Many seemingly innocuous activities can lead to spyware infections. The most common method of transmission involves bundling spyware with otherwise legitimate or desirable applications. This type of piggybacking most often occurs with freeware, whose developers allow the product to be installed free of charge in exchange for the right to harvest and sell user information. In most cases, the user is unaware that s/he has agreed to this arrangement because the © Copyright 2006. All products are trademarks of Aluria Software, a division of EarthLink, Inc. 2
  • 3. request for such authorization is buried deep within the application’s End User License Agreement (EULA) using confusing technical and legal language that few users read, let alone comprehend. Software installation is only one vector of entry for spyware. Other methods of spyware delivery include “drive-by downloads,” where an HTML link serves as a gateway for the undetected installation of spyware applications. This type of clandestine download typically occurs when a user clicks a link in a spam message, an instant messenger (IM) link, or other unsolicited advertisement. Spyware can also be attached to or embedded in e-mail or instant messenger communications, included as part of an ActiveX installation, or may be deliberately installed by someone with administrative access. Given that spyware publishers are constantly creating new threats that are increasingly difficult to detect, harder to remove, and easier to inadvertently install than ever before, augmenting existing security strategies to include anti- spyware is a must for those who want to use the Internet safely. Spyware publishers’ specific intent is to circumvent conventional technologies, such as anti-virus and firewall applications, leaving those organizations and individuals who rely on these methods vulnerable to serious risks and costly consequences. Spyware Risks While in its earliest incarnations spyware was considered a mere annoyance for computer enthusiasts, today it’s a Failing to effectively dangerous and costly threat that affects everyone connected to the Internet. Failing to effectively safeguard against safeguard against spyware has numerous consequences including: compromised security of confidential data, loss or destruction of data spyware has numerous due to malicious attacks, reduced productivity and computer performance caused by bandwidth and memory drain, consequences including: and increased tech support burden. compromised security of confidential data, loss or Compromised Security of Confidential Data: Spyware that performs surveillance actions—such as rootkits and destruction of data due to keyloggers—allow unauthorized parties to monitor virtually every move made on a network or desktop, granting malicious attacks, reduced intruders direct access to highly sensitive information. This risk is of particular concern for organizations that must productivity and computer comply with government information security regulations. In 2005, Sheriff John Whetsel of Oklahoma City reported performance caused by that an unknown person had planted surveillance software on office computers that contained details about prisoner bandwidth and memory movements, confidential homeland security updates and private personnel files. It is unknown how long the drain, and increased tech programs had been monitoring the sensitive law enforcement information. Individuals also suffer from spyware support burden. attacks when cyber criminals harvest personal and private information including passwords, social security numbers, and financial data that can be used for bank account and identity theft. Loss or Destruction of Data Due To Malicious Attack: Spyware infections increase the vulnerability of data loss by giving attackers the ability to steal or destroy valuable files at will. Corporations looking to safeguard intellectual property need to be cognizant of the connection between spyware and espionage. In March, 2006 an Israeli couple was jailed for allegedly selling and installing customized trojan horses that gave rivals access to their competitor’s stolen documents. Individuals need also be aware of spyware’s propensity to corrupt precious data—irreplaceable digital photographs and movies, music and other files can all be lost. Reduced Productivity and Computer Performance: Sluggish system performance, distraction caused by increased pop-up advertisements, and downtime due to data loss are all byproducts of spyware infections. The constant transmission of stolen information from infected computers to unauthorized sources consumes bandwidth and diminishes network performance. Also, many spyware programs store materials such as unwanted advertisements on the computer’s hard drive. When valuable bandwidth intended for business or personal use is hijacked, networks become clogged and Internet connectivity/Web browsing slows as a result. More than an annoyance, these events reduce the amount of time employees and individuals can spend on valuable projects. © Copyright 2006. All products are trademarks of Aluria Software, a division of EarthLink, Inc. 3
  • 4. Increased Tech Support Burden: Corporations are expending valuable and costly IT resources in time-consuming efforts to identify and eradicate spyware and to repair the damage caused to individual computers. Michael George, Vice President of Dell Computer’s United States consumer business, stated that more customers are calling Dell Technical Support seeking relief from spyware than for any other technical support issue. Spyware is evading traditional security measures, causing serious, costly damage to both organizations and individuals. Computer crimes cost businesses an estimated $67 billion dollars a year, according to the 2005 FBI Computer Crime Survey. Individual losses are also significant; in early 2006, Ukrainian hacker, Dimitry Ivanovic Golubov was charged with cybercrimes that involved financial fraud that included—according to an affidavit from an FBI special agent—the trafficking of “millions of stolen credit card numbers and financial information.” Stolen cards and information are sold to low-level criminals who use them to withdraw cash from ATMs and buy merchandise. For anyone connected to the Internet, finding efficient and effective spyware protection is of paramount concern. Spyware Prevention and Threat Remedies Safeguarding business and home environments requires dedicated anti-spyware technology that protects all points Safeguarding business and of entry, and includes advanced kernel-level prevention functionality to completely block future spyware home environments installations. requires dedicated anti-spyware technology Perimeter that protects all points of For network environments, the first step in circumventing spyware is to stop it at the perimeter, before it infiltrates entry, and includes desktop workstations. To do this, an anti-spyware solution must be integrated at the gateway on the network. A advanced kernel-level proactive anti-spyware solution scans network traffic in real time, searching for suspect programs, files, and data prevention functionality transmissions that exhibit known spyware characteristics. When spyware is detected, an immediate notification to completely block future occurs to effectively stop the threat in its tracks. To protect those points of entry that are not on the network spyware installations. perimeter a desktop anti-spyware solution with remediation and real-time, kernel-level prevention is also recommended. Remediation The nature of spyware makes infection unavoidable, thus remediation measures to address post-installation infection is tantamount to protecting against the threat. Remediation works by scanning for existing spyware installations and quarantining them inside a computer where they can no longer cause damage; all traces of intrusive code that have been quarantined are blocked from establishing a link back to their source. The limitation of this strategy relies on the fact that spyware must already be present on a computer before protective measures can be taken. Prevention Because today’s threats are specifically designed to avoid removal after successful installation, utilizing advanced prevention technologies is a critical component in the fight against spyware. Some anti-spyware offerings are designed to scan systems for existing spyware installations; this reactive response allows spyware to be installed before removal is attempted which is problematic because many forms of spyware are incredibly difficult to completely remove once installed. A truly proactive approach, on the other hand—one that prevents infection in real-time—effectively neutralizes rogue applications as they attempt to write to desktops or file systems, preventing installation altogether. Polling Versus Real-Time Generally, there are two approaches to spyware prevention technology—polling and real-time, the latter of which is far superior as it offers always-on protection while consuming less resources. © Copyright 2006. All products are trademarks of Aluria Software, a division of EarthLink, Inc. 4
  • 5. Polling Prevention Unable to effectively stop spyware until its processes have already begun, polling-based prevention is a Two independently less-than-reliable method for preventing spyware infection. Designed to check systems periodically, engineered SDKs—the polling technology only reacts once spyware launches a process. Thus spyware infection has already Aluria Gateway Protection occurred by the time the polling solution recognizes the malicious code. SDK, and the Aluria Desktop/Server SDK—can Real-Time Prevention be implemented The advantage of real-time prevention—as opposed to polling—is that malicious code is blocked at the separately or can combine kernel level, before processes ever have a chance to launch. Real-time monitoring means the system is for a dual solution that “aware” of every process at all times, constantly prepared to block malicious code from ever executing. By stops spyware from intercepting and neutralizing malicious activity before it writes to the hard drive, real-time methods entering a network provide a layer of kernel-level protection that proactively prevents spyware from being installed in the first regardless of point of place. entry—whether Web, disk, e-mail, network, etc. Anti-Spyware at the Gateway To protect its multiple entry points from dangerous and destructive spyware, corporate networks must employ a multi-layered anti-spyware strategy that includes perimeter, remediation, and prevention components. A gateway application serves as a network’s first line of defense, providing real-time protection at the perimeter. A desktop solution, equipped with remediation and prevention components, removes existing instances of spyware and protects against attacks that enter via unsecured internal access, (by way of personal laptop or USB storage device, for example). Anti-Spyware on the Desktop Combining both remediation and prevention functionality into a single desktop anti-spyware application prevents all risks associated with spyware infections. Regardless whether securing a network or home environment, reactive scanning allows users to scan and remove spyware already on the desktop, while preventative blocking stops inbound spyware from reaching the desktop in the first place. For businesses and individuals alike, anti-spyware technology that comes complete with remediation and prevention technologies is essential for total threat protection. The Aluria Solution The Aluria family of SDKs offer complete multi-layered anti-spyware protection that can be leveraged to rapidly create robust applications for corporate networks and/or individual computers. Two independently engineered SDKs—the Aluria Gateway Protection SDK, and the Aluria Desktop/Server SDK—can be implemented separately or can combine for a dual solution that stops spyware from entering a network regardless of point of entry—whether Web, disk, e-mail, network, etc. SDK partners can tailor the SDKs to their specific needs by implementing the original SDK engines and integrating them into an existing framework. The Aluria development team can also help with SDK setup and address partner requests for new features and customizations to our interface, to provide the closest possible fit with implementation requirements. Because the Aluria SDKs require minimal development effort, adopters benefit from a rapid return on investment. Aluria Gateway Protection SDK Specially designed to allow rapid deployment of real-time spyware blocking within Linux/UNIX/Windows gateway appliances and products for Internet servers and other gateways, the Aluria Gateway Protection SDK protects against spyware in two different ways: 1) by blocking known malicious IP addresses and URL’s, and 2) by performing signature analysis. © Copyright 2006. All products are trademarks of Aluria Software, a division of EarthLink, Inc. 5
  • 6. Here’s how it works: A typical implementation of the Aluria Gateway Protection SDK involves loading Aluria’s IP- domain black list into an appliance, creating a firewall-type protection that enables the gateway to prohibit incoming or outgoing access of specified URLs. If a malicious IP is detected, the SDK blocks its entrance into the appliance. If the incoming data is not a malicious IP, it will pass through the appliance and will be either written to the disk or buffered in memory (as specified by the SDK partner). After the gateway processes these files, they are passed to the Aluria SDK using simple calls. The SDK then performs a signature-based analysis—on files, ActiveX, and Browser Helper Objects—by scanning incoming files against those in the spyware database. Once the analysis is complete, the SDK notifies the gateway to either block or accept the files. This event-driven approach to spyware detection and blocking allows for minimum use of resources with maximum versatility in implementation. Versatile in its universal support of operating systems and architectures, the Aluria Gateway Protection SDK can be easily integrated into any environment. Platform agnostic, designed for all operating systems and 95% of architectures, the SDK’s supported operating systems include, but are not limited to: Windows NT to 2003, Linux (Debian, Mandrake, SUSE, Red Hat and Knoppix), and Unix (Free BSD and NetBSD); the unprecedented variety of architectures includes, but is not limited to: x86, 32bit Little Endian, ARM Big Endian/Little Endian, and MIPS Big Endian/Little Endian. Aluria Desktop/Server Protection SDK The Aluria Desktop/Server Protection SDK contains all the necessary functionality needed for robust and flexible remediation of existing spyware and prevention of further infections. Designed to eliminate any existing spyware and defend against spyware as it attempts to infiltrate a Windows PC/host, the SDK includes two core strategies: an On- Demand Scan & Removal Engine™ and a real-time Active Defense Shield (ADS)™. The Aluria Desktop/Server Protection SDK’s On-Demand Scan & Removal Engine is a reactive scanning utility that is useful in situations where spyware already exists on a system prior to anti-spyware installation or when real-time preventions, like ADS, have been temporarily disabled. Completely customizable, developers can configure the SDK to perform scans in memory, registry, specific directories, specific files, cookie directories, and any other exploit-sensitive entry point on the system. Desktops can then be scanned on demand or at prescheduled times. When spyware is detected, it can be processed by quarantining, ignoring, or removal; quarantined items can be restored or removed. Removed items are permanently deleted. For reporting purposes, the SDK can also return spyware descriptions, threat levels, variants, and categories. Once scanning and removal are complete, the SDK allows for unloading the ScanEngine object and releasing used memory. Aluria’s exclusive ADS technology provides the Aluria Desktop/Server Protection SDK with truly proactive, real-time, event-based prevention that goes far beyond traditional reactive/frequency-based monitoring. It guards computers against all attempted spyware installations including those that originate on the Web as installers, on intranets, mapped network drives, CD-ROMs, floppy drives, and USB drives. ADS catches spyware as soon as it attempts to write, move, or rename files and automatically performs a pre-configured action to Auto-Delete, Auto-Quarantine or Ignore. In production, here’s how ADS works: ADS consists of a file-system driver that resides in the operating system Ring-0 or the kernel, which enables it to hook into the file system and monitor for particular events such Open, Close, or Rename. When such an event occurs, ADS blocks the file from gaining any access for analysis and takes appropriate action if spyware is found. Safe files may proceed with their normal actions. Unlike most anti-spyware monitoring solutions, ADS does not conflict with popular anti-virus programs or require constant CPU cycles, and it functions unobtrusively in the background. © Copyright 2006. All products are trademarks of Aluria Software, a division of EarthLink, Inc. 6
  • 7. Dual Protection SDK Expressly for network environments, the Aluria Gateway Protection SDK can be implemented together with the Aluria Desktop/Server Protection SDK to protect all points of entry on the network. Aluria’s two protection SDKs—when used in tandem—institute a fully integrated anti-spyware solution that provides real-time protection at both the network and desktop parameters. Aluria protection SDKs are designed specifically for original equipment manufacturers (OEM) and independent software vendors (ISV) to add value to their product offerings. Software developers, network appliance and hardware manufacturers, and system integrators seeking the ultimate protection from online threats and malicious spyware can easily implement the Aluria solutions through proven, tested methods. “Developer-friendly” APIs (application programming interface) allow quick, easy, and effective implementations that add the value that customers demand. To download the Aluria SDK Datasheet, visit http://www.aluriasoftware.com/files/pdfs/SDK_Datasheet.pdf © Copyright 2006. All products are trademarks of Aluria Software, a division of EarthLink, Inc. 7
  • 8. Proven Provider, Trusted Partner Built on Aluria’s widely-trusted, event-driven technology, Aluria SDKs feature a light footprint, a robust and strategic tool set, flexible options, diverse OS and hardware compatibility and the partnership and technical support that only an established industry leader can provide. All Aluria anti-spyware technology is backed by an in-house team of spyware experts and engineers, automated, patent-pending Threat Prevention System™ spyware research technologies designed to provide zero-day protection against the most elusive threats, and Aluria’s massive database of verified spyware signatures and definitions. For more information about Aluria Software and the Aluria family of protection SDKs, please visit our Web site at www.aluriasoftware.com or contact us via phone at 1.888.627.4650 or by e-mail at oemsales@aluriacorporate.com. © Copyright 2006. All products are trademarks of Aluria Software, a division of EarthLink, Inc. 8