MRG Effitas Real Time Protection Test Project, First Quarter – Q2 2013

MRG Effitas Real Time Protection Test Project, First Quarter (Q2 2013)

Copyright 2013 MRG Effitas Ltd. This article or any part of it must not be published or reproduced without the consent of the copyright holder. 1

MRG Effitas Real Time Protection Test Project, First Quarter – Q2 2013

Contents: Introduction

3

Security Applications Tested

3

Methodology used in the Test

4

Samples Used

5

Test Results

6

Conclusions

7

Copyright 2013 MRG Effitas Ltd. This article or any part of it must not be published or reproduced without the consent of the copyright holder. 2

MRG Effitas Real Time Protection Test Project, First Quarter – Q2 2013

Introduction: The MRG Effitas Real Time Protection Testing Project is a replacement for and an evolution of the “Flash Tests” conducted to date. For those unfamiliar with the Flash Tests, their purpose was to give an indication of product efficacy against live, ITW threats applied to the System Under Test (SUT) using a valid, real world infection vector and process. Despite using live ITW malware and realistic infection vectors, we always added the caveat that due to the small malware sample size used, the individual Flash Tests should not be used as a rigorous assessment of product efficacy and that their purpose was to give an indication of efficacy over time. The MRG Effitas Real Time Protection Testing Project is designed to overcome the limitation of the Flash Tests by using greatly increased number of malware samples and higher testing frequency. The project will run for twelve months commencing at the start of Q2 2013 and finishing at the end of Q1 2014 – in line with all our other projects. Testing is conducted weekly, using approximately fifty unique samples (no sister files) and results will be published at the end of each quarter. We are publishing this quarter’s results early as it affords us the opportunity to liaise with vendors before commencement of the first full quarter testing starting the first week of July 2013. Security Applications Tested: 1. avast! Internet Seucirty 8.0 2. AVG Internet Security 2013 3. Avira Internet Security 2013 4. BitDefender Internet Security 2013 5. Emsisoft Anti-Malware 7.0 6. ESET Smart Security 6.0 7. GFI VIPRE Internet Security 2013 8. Kaspersky Internet Security 9. Malwarebytes Anti-Malware 1.75 * 10. McAfee Internet Security 2013 11. Microsoft Security Essentials 4.2 12. Norton Internet Security 2013 13. Panda Internet Security 2013 14. SoftSphere DefenseWall 3.21 15. SourceFire Immunet Antivirus Plus 3.0 16. SUPERAntiSpyware 5.6 * 17. Trend Micro Titanium Premium Security 2013 * Denotes a complementary application. Copyright 2013 MRG Effitas Ltd. This article or any part of it must not be published or reproduced without the consent of the copyright holder. 3

MRG Effitas Real Time Protection Test Project, First Quarter – Q2 2013

Methodology Used in the Test: 1. Windows 7 Service Pack 1 32 bit operating system is installed on a virtual machine and all updates are applied. A variable range of third party applications are added, appropriate for any specific exploit testing that may be conducted. 2. An image of the operating systems is created. 3. A clone of the imaged system is made for each of the 17 security applications to be used in the test. 4. An individual security application is installed using default settings on each of the systems created in step 3 and then, where relevant is updated. 5. A clone of the system as it is at the end of 4 is created. 6. Testing is conducted by: a. Downloading the sample using Internet Explorer to the desktop, closing Internet Explorer, conducting a context menu scan or where unavailable a system scan and then executing the sample. 7. A test is deemed to have been passed by the following criteria: a. The security application blocks the URL where the sample is located, thus preventing its download. b. The security application detects the sample whilst it is being downloaded to the desktop. c. The security application detects the sample during the context or system scan. d. The security application detects the sample when it is executed according to the following criteria: i. It identifies the sample as being malicious and either automatically blocks it or pauses its execution and advises the user not to execute it and awaits user input. 8. A test is deemed to have been failed by the following criteria: a. The security application fails to detect the sample under conditions 7a, 7b, 7c or 7d. 9. Testing is conducted with all systems having internet access. 10. All security applications are fully functional unregistered versions or versions registered anonymously, with no connection to MRG Effitas.

Copyright 2013 MRG Effitas Ltd. This article or any part of it must not be published or reproduced without the consent of the copyright holder. 4

MRG Effitas Real Time Protection Test Project, First Quarter – Q2 2013

Samples used: Sample selection is of fundamental importance to this and all similar tests. In the case of the Real Time Protection Project, all samples used are “live” and “in the wild”, by which we mean they are residing at the URLs selected or created by the cybercriminals and they are not from a time lagged ITW list. As these are live ITW samples, they represent current zero day threats which can present an issue with sample verification. There is no effective and reliable way to verify samples before testing that does not introduce possible artificial sample submission or delay, so all verification is conducted after testing. Tests conducted using samples which are later proven to be invalid are excluded from the results. The type and ratios of samples used is decided by MRG Effitas on the basis of a mixture of criteria, centering about key relevancies: 1. Prevalence – they are widespread and so represent the most common threats. 2. Growth – they may be few now, but our research shows they are rapidly expanding. 3. Innovation – they are employing innovative techniques to counter security measures. In total, 585 live ITW samples were used in testing. The chart below shows the proportions of each category of malware:

Copyright 2013 MRG Effitas Ltd. This article or any part of it must not be published or reproduced without the consent of the copyright holder. 5

MRG Effitas Real Time Protection Test Project, First Quarter – Q2 2013

Test Results: The table below details the performance of each security application tested in order of efficacy.

The granular test results are detailed in the table below:

Vendor DefenseWall Emsisoft Kaspersky Avast BitDefender SourceFire Symantec Trend Micro Malwarebytes Avira Eset GFI AVG McAfee Panda Microsoft SUPERAntiSpyware

Passed 585 585 585 585 581 580 580 580 579 573 573 571 568 564 562 484 343

Valid UIR 0 0 0 11 0 0 1 0 0 0 0 0 26 0 0 0 0

Failed 0 0 0 0 4 5 5 5 6 12 12 14 17 21 23 101 242

Total % 100 100 100 100 99.3 99.1 99.1 99.1 99 97.9 97.9 97.6 97.1 96.4 96.1 82.7 58.6

Copyright 2013 MRG Effitas Ltd. This article or any part of it must not be published or reproduced without the consent of the copyright holder. 6

MRG Effitas Real Time Protection Test Project, First Quarter – Q2 2013

Conclusions: In this first quarter, Kaspersky, Emsisoft and SoftSphere attained exceptional results, each achieving 100% efficacy without relying on user input requests, thus demonstrating effective and risk free protection against these threats. These three applications are awarded our highest five star rating. Avast scored 100% but misses out on the top five star rating as it relied on user input requests to achieve this, so is awarded four and a half stars along with BitDefender, TrendMicro, Symantec, SourceFire, Malwarebytes, Eset, Avira and GFI who all performed well. Special mention is made of Malwarebytes as it is a “complementary” antimalware product and so one should reasonably expect it to perform below its full antimalware counterparts, but it does not. Our congratulations go to them on their exceptional performance in this test cohort. AVG, McAfee and Panda performed reasonably well with failure rates below four percent, but clearly have room for improvement and so are awarded four stars. Microsoft had a failure rate of over seventeen percent and so is awarded three stars. SUPERAntiSpyware, like Malwarebytes is a complementary antimalware and had a failure rate of over forty one percent and is awarded two and a half stars. The table below details the star ratings awarded to the products for the first quarter of testing:

Copyright 2013 MRG Effitas Ltd. This article or any part of it must not be published or reproduced without the consent of the copyright holder. 7

MRG Effitas Real Time Protection Test Project, First Quarter (Q2 2013)

A clone of the imaged system is made for each of the 17 security applications to ... desktop. c. The security application detects the sample during the context or ...

308KB Sizes 1 Downloads 92 Views

Recommend Documents

MRG Effitas Real Time Protection Test Project, First Quarter (Q2 2013)
Windows 7 Service Pack 1 32 bit operating system is installed on a virtual machine and all ... A clone of the system as it is at the end of 4 is created. 6. ... desktop. c. The security application detects the sample during the context or system scan

MRG Effitas Real Time Protection Test Project, First Quarter (Q2 2013)
Windows 7 Service Pack 1 32 bit operating system is installed on a virtual machine and all ... Testing is conducted with all systems having internet access. 10.

Quarter 1 Test Form A
12, 9, 6, 3,. ,. 27. You want a two-dip ice cream cone with two different flavors of ice cream. How many different combinations can you choose if the ice cream store has: a. 4 flavors of ice cream? b. 12 flavors of ice cream? c. 20 flavors of ice cre

2013, Quarter 4 Report.pdf
Terrance Hunt, principal. phone: (303) 260-4477; fax (303) 260-4234. email: [email protected]. Rocky Mountain Property Management, Inc. 446 E. 4th Street.

Halliburton Provides First Quarter 2016 Operational Update
Feb 17, 2015 - a new record low. ... sequentially, and setting new record lows every week. ..... real-time pressure and temperature data for the reservoir and ...

Updates to SobekCM in first quarter 2015
Can upload the collection banner, or choose to let the system auto-generate the banner g. Can upload .... Signed MSI with certificate for authenticity. 4. Installs ...

Halliburton 2011 First Quarter Conference Call
Jan 24, 2011 - The company will issue a press release regarding the 2011 first quarter earnings prior to the conference call. Halliburton's first quarter press ...

Halliburton Announces First Quarter 2018 Results
Apr 23, 2018 - “Turning to the international markets, Halliburton has never been better ... As a result of recent changes in the foreign currency exchange system in Venezuela and ... and managing geological data, to drilling and formation evaluatio

Updates to SobekCM in first quarter 2015
2. Restored Tree View on the main instance home page to work correctly, and ... Updates to the HTML viewer, which allows a HTML file to be embedded as one ...

Halliburton 2011 First Quarter Conference Call
Jan 24, 2011 - The company will issue a press release regarding the 2011 first quarter earnings prior to the conference call. Halliburton's first quarter press ...

Halliburton Provides First Quarter 2016 Operational Update
Feb 17, 2015 - production by integrating coiled tubing with downhole measurement tools, fiber optic sensing and telemetry. The new family of services consists ...

Halliburton Provides First Quarter 2016 Operational Update
Feb 17, 2015 - first quarter operating income was $310 million, which decreased $192 million, or 38%, sequentially, driven by ... North Sea throughout the first quarter, including our Baroid BaraECD® drilling fluid system and .... Founded in 1919, H

Halliburton Announces First Quarter 2017 Results
Apr 24, 2017 - operations for the fourth quarter of 2016, excluding impairments and ..... underlying trends in the business and to establish operational goals.

Real Time Research
including the use of mobile hand-held computers, cloud-based data storage ... computer modelling techniques and multivariate statistical analyses as well as ...

Real-Time Bidding
Display Network, Think with Google and YouTube are trademarks or registered trademarks of Google. Inc. All other company and product names may be.

Texas Real Estate Commission Consumer Protection Notice.pdf ...
Page 1 of 1. Mga karaniwang sugat na maaaring maging kanser sa bibig. Frictional keratosis. Leukoplakia. Magaspang at maputing patse sa bahagi na.

accurate real-time windowed time warping - CiteSeerX
used to link data, recognise patterns or find similarities. ... lip-reading [8], data-mining [5], medicine [15], analytical .... pitch classes in standard Western music.

accurate real-time windowed time warping - CiteSeerX
lip-reading [8], data-mining [5], medicine [15], analytical chemistry [2], and genetics [6], as well as other areas. In. DTW, dynamic programming is used to find the ...

Project Title: Implementing Memory Protection Primitives on ...
reference monitor (RM) enforces a policy that specifies legal memory accesses [1]. When a core ... CPU and an AES encryption core can share a block of BRAM.

Real Time Systems -
Real-time programming is assembly coding, priority interrupt programming, and writing device drivers. Real-time systems operate in a static environment.

Real Time Protocol (RTP) - EPFL
From a developer's perspective, RTP belongs to the application layer rather than the transport layer. 3. Real Time Transport Protocol (RTP). ❑ RTP. ○ uses UDP.

real time programming.pdf
servicescontact test and automation. Math toolkit for real time. programming math toolkit for real time. Embrio a visual, real time development tool for the arduino.