{"id":420,"date":"2013-05-29T00:00:00","date_gmt":"2013-05-29T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/05\/29\/malwares-typical-network-behaviour-makes-it-easier-to-spot-palo-alto\/"},"modified":"2021-12-30T11:37:16","modified_gmt":"2021-12-30T11:37:16","slug":"malwares-typical-network-behaviour-makes-it-easier-to-spot-palo-alto","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/05\/29\/malwares-typical-network-behaviour-makes-it-easier-to-spot-palo-alto\/","title":{"rendered":"Malware\u2019s typical network behaviour makes it easier to spot: Palo Alto"},"content":{"rendered":"<p>The hardest part of maintaining a security defence is figuring out the things we don\u2019t know \u2013 but by applying monitoring to all network traffic and simplifying accessibility to analytics tools, it\u2019s easier than ever to ferret out new malware and seal perimeters that have been compromised by mobile devices, a Palo Alto Networks analyst has advised. While the security solutions market has been flooded with new options for identifying and dealing with malware, \u201cyou need to be able to feed it into something that\u2019s actionable, and is going to help the business and actually give you some protection,\u201d Williamson told CSO Australia after his presentation at the AusCERT 2013 security conference. Analysis of 839 different pieces of malware, and 204 million logs, also found that 55% of all malware uses custom UDP (User Datagram Protocol) packets to communicate with command-and-control (C&amp;C) servers; therefore, when a scan of network activity shows that 1.5% of traffic is comprised of unknown UDP packets, Williamson said, it\u2019s not hard to figure out where it\u2019s coming from.<\/p>\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p style=\"margin: 0px;\">Palo Alto Networks has positioned its WildFire platform to resolve this issue, by providing what Williamson calls a \u201cclassify everything\u201d view of all data coming into and going out of the network.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">Other common signature behaviours of malware include visits to an unregistered domain (24.38% of cases), the sending of emails (20.46%), contacting an IP country different from the host top-level domain (6.92%), downloading a file with an incorrect file extension (4.53%), visiting a recently registered domain (1.87%), and more.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">\u201c\u201dYou can always create an exception if you need to, but you can also set a rule that says \u2018if I see an HTTP post to new domains, that is something worth investigating\u2019.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">This confidence, says Palo Alto Networks\u2019 ANZ country manager Armando Dacal, often translates into a better business-IT alignment because the security team can ensure the business will be protected through highly-granular control over applications and user behavior. Such control will pave the way for higher business and IT confidence around the influx of smartphones and tablets as companies, many grudgingly, give in to the realities of bring your own device (BYOD) policies.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">\u201cBut users wanted to leverage the power in the devices \u2013 and now IT can have a discussion with the business around which users should have access to which applications, and how it can be done safely.\u201d \u201cWe\u2019re dealing with creative [malware authors],\u201d Williamson says, \u201cand we\u2019re in a world where we\u2019re going to have to be looking at what\u2019s coming in \u2013 and be engaged, creatively, about what\u2019s going on.<\/p>\n<p style=\"margin: 0px;\"><\/p>\n<p style=\"margin: 0px;\">Link: <a href=\"http:\/\/www.cso.com.au\/article\/463079\/malware_typical_network_behaviour_makes_it_easier_spot_palo_alto\/\">http:\/\/www.cso.com.au\/article\/463079\/malware_typical_network_behaviour_makes_it_easier_spot_palo_alto\/<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-420","post","type-post","status-publish","format-standard","hentry","category-malware"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/420","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=420"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/420\/revisions"}],"predecessor-version":[{"id":2907,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/420\/revisions\/2907"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=420"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=420"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=420"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}