<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom"
	xml:lang="en-us">
	<title>Comments on Do AntiVirus Products Detect Bots?</title>
	<subtitle></subtitle>
	<link rel="self" type="application/atom+xml" title="Comments on Do AntiVirus Products Detect Bots?" href="http://blog.fireeye.com/research/2008/11/does-antivirus-stop-bots/comments/atom.xml" />
	<link rel="alternate" type="text/html" title="Do AntiVirus Products Detect Bots?" href="http://blog.fireeye.com/research/2008/11/does-antivirus-stop-bots.html"/>
	<generator uri="http://www.typepad.com/">TypePad</generator>
	<xhtml:meta xmlns:xhtml="http://www.w3.org/1999/xhtml" name="robots" content="noindex" />
	<updated>2008-11-20T02:17:44Z</updated>
	<author>
		<name>FireEye</name>
		<uri>http://blog.fireeye.com/research/</uri>
	</author>
	<id>tag:typepad.com,2003:http://blog.fireeye.com/research/2008/11/does-antivirus-stop-bots/comments/atom.xml/</id>
    
		<entry>
			<title>Didier Stevens commented on &#39;Do AntiVirus Products Detect Bots?&#39;</title>
			<link rel="alternate" type="text/html" title="Aside from using VT, I noticed another flaw in your study. You didn&#39;t test (false) negatives, only positives. If you..." href="http://blog.fireeye.com/research/2008/11/does-antivirus-stop-bots.html?cid=141049286#comment-6a00d835018afd53ef010536310b84970c" />
			<id>tag:typepad.com,2003:6a00d835018afd53ef010536310b84970c</id>
			<published>2008-12-02T12:08:08Z</published>
			<updated>2008-12-02T12:08:08Z</updated>
			<author>
				<name>Didier Stevens</name>
                <uri>http://DidierStevens.com</uri>
			</author>
			<summary>Aside from using VT, I noticed another flaw in your study. You didn&#39;t test (false) negatives, only positives. If you...</summary>
			<content type="html" xml:base="http://blog.fireeye.com/research/2008/11/does-antivirus-stop-bots.html">&lt;p&gt;Aside from using VT, I noticed another flaw in your study.&lt;/p&gt;

&lt;p&gt;You didn&amp;#39;t test (false) negatives, only positives. If you don&amp;#39;t test executables that were not identified as malware by your appliances, you&amp;#39;re excluding test results that could potentially show that AV performs better than your appliances.&lt;/p&gt;</content>
		</entry>
	
		<entry>
			<title>David Harley commented on &#39;Do AntiVirus Products Detect Bots?&#39;</title>
			<link rel="alternate" type="text/html" title="This is a carefully constructed methodology with fatal flaws. It&#39;s based on two fallacies. (1) That a Virus Total report..." href="http://blog.fireeye.com/research/2008/11/does-antivirus-stop-bots.html?cid=140992882#comment-6a00d835018afd53ef01053627cf39970b" />
			<id>tag:typepad.com,2003:6a00d835018afd53ef01053627cf39970b</id>
			<published>2008-12-01T23:02:58Z</published>
			<updated>2008-12-01T23:02:58Z</updated>
			<author>
				<name>David Harley</name>
                <uri>http://www.eset.com/threat-center/blog/</uri>
			</author>
			<summary>This is a carefully constructed methodology with fatal flaws. It&#39;s based on two fallacies. (1) That a Virus Total report...</summary>
			<content type="html" xml:base="http://blog.fireeye.com/research/2008/11/does-antivirus-stop-bots.html">&lt;p&gt;This is a carefully constructed methodology with fatal flaws. It&amp;#39;s based on two fallacies. (1) That a Virus Total report is an absolute metric for detection performance on the part of anti-malware vendors. This isn&amp;#39;t the case, and it&amp;#39;s not what the service is for (see &lt;a href=&quot;http://blog.hispasec.com/virustotal/22).&quot; rel=&quot;nofollow&quot;&gt;http://blog.hispasec.com/virustotal/22).&lt;/a&gt; Because VT uses command-line versions of participating products, detections based on behavior analysis aren&amp;#39;t taken into account. (2) You also seem to be assuming that over time, VT reports should get nearer to 100% vendor detection on the same sample, an assumption based on a 1990s view of anti-malware as being primarily signature-based. There is, in fact, no reason why a product that has effective heuristic or behavioral detection (which Virus Total doesn&amp;#39;t, remember, necessarily measure) should &amp;quot;update&amp;quot; it to malware-specific detection when a sample is available. Such an update may or may not happen: whether or not it does is certainly not a fair assessment of product capability. It&amp;#39;s actually rather similar to &amp;quot;Time to Update&amp;quot; testing, which has declined as testers have realized that it penalizes products that use proactive detection techniques. &lt;/p&gt;</content>
		</entry>
	
		<entry>
			<title>Donald commented on &#39;Do AntiVirus Products Detect Bots?&#39;</title>
			<link rel="alternate" type="text/html" title="&quot;The typical scenario for a web-driven bot is that you accidentally brush up against a compromised website that has had..." href="http://blog.fireeye.com/research/2008/11/does-antivirus-stop-bots.html?cid=140826534#comment-6a00d835018afd53ef0105362c2c5f970c" />
			<id>tag:typepad.com,2003:6a00d835018afd53ef0105362c2c5f970c</id>
			<published>2008-11-30T07:47:02Z</published>
			<updated>2008-11-30T07:47:02Z</updated>
			<author>
				<name>Donald</name>
                
			</author>
			<summary>&quot;The typical scenario for a web-driven bot is that you accidentally brush up against a compromised website that has had...</summary>
			<content type="html" xml:base="http://blog.fireeye.com/research/2008/11/does-antivirus-stop-bots.html">&lt;p&gt;&amp;quot;The typical scenario for a web-driven bot is that you accidentally brush up against a compromised website that has had an  inserted which brings you (possibly via a chain of other sites) into contact with an exploit server which delivers you some malicious javascript (usually) that exploits your browser to take control of the machine.&amp;quot;&lt;/p&gt;

&lt;p&gt;Thanks for the interesting article.&lt;/p&gt;

&lt;p&gt;I&amp;#39;ve read about similar methods of malware collection done by anti-virus or anti-spyware companies (&amp;#39;honey monkey&amp;#39; is the term I remember) but a out of date and insecure browser was always used (deliberately) to allow drive-by downloads. &lt;/p&gt;

&lt;p&gt;Your customers are presumably not deliberately running insecure browsers. Where the exploits encountered &amp;#39;zero-day&amp;#39; exploits, or had your customers just been tardy in applying patches? &lt;/p&gt;

&lt;p&gt;Do you have any information on the browser used and the version?&lt;/p&gt;</content>
		</entry>
	
		<entry>
			<title>Martin commented on &#39;Do AntiVirus Products Detect Bots?&#39;</title>
			<link rel="alternate" type="text/html" title="What about rewarding efficient AV by naming them? :) Although they should all buy an access to your fresh malware..." href="http://blog.fireeye.com/research/2008/11/does-antivirus-stop-bots.html?cid=140621520#comment-6a00d835018afd53ef0105361e64db970b" />
			<id>tag:typepad.com,2003:6a00d835018afd53ef0105361e64db970b</id>
			<published>2008-11-27T12:01:09Z</published>
			<updated>2008-11-27T12:01:10Z</updated>
			<author>
				<name>Martin</name>
                
			</author>
			<summary>What about rewarding efficient AV by naming them? :) Although they should all buy an access to your fresh malware...</summary>
			<content type="html" xml:base="http://blog.fireeye.com/research/2008/11/does-antivirus-stop-bots.html">&lt;p&gt;What about rewarding efficient AV by naming them? :) Although they should all buy an access to your fresh malware source to begin with and end up with high detection rates.. I also wonder how zero-hour AV vendors fare (IronPort). Thanks anyway for posting this informative stuff.&lt;br /&gt;
&lt;/p&gt;</content>
		</entry>
	
		<entry>
			<title>Aa&#39;ed Alqarta commented on &#39;Do AntiVirus Products Detect Bots?&#39;</title>
			<link rel="alternate" type="text/html" title="In my opinion, Anti virus products should implement some kind of a technique that would inspect network connections based on..." href="http://blog.fireeye.com/research/2008/11/does-antivirus-stop-bots.html?cid=140063050#comment-6a00d835018afd53ef01053610106f970b" />
			<id>tag:typepad.com,2003:6a00d835018afd53ef01053610106f970b</id>
			<published>2008-11-22T10:07:20Z</published>
			<updated>2008-11-22T10:07:20Z</updated>
			<author>
				<name>Aa&#39;ed Alqarta</name>
                <uri>http://extremesecurity.blogspot.com</uri>
			</author>
			<summary>In my opinion, Anti virus products should implement some kind of a technique that would inspect network connections based on...</summary>
			<content type="html" xml:base="http://blog.fireeye.com/research/2008/11/does-antivirus-stop-bots.html">&lt;p&gt;In my opinion, Anti virus products should implement some kind of a technique that would inspect network connections based on user&amp;#39;s activity. So, for example if there is a connection originated by process (X), to a web site/mail server (Y), requesting a malicious file/sending e-mails (Z). We can analyze if this connection is originated due to the user&amp;#39;s action or due to a malware. (clicking on a link event , typing a url on the keyboard event, or using the e-mail client event) &lt;/p&gt;

&lt;p&gt;It would be strange if a computer is sending GET/PUT http requests to a remote server, where there is no logged-in user, or no launched browser (by a user). &lt;/p&gt;

&lt;p&gt;Malicious bot activity detection should depend on many factors, for example: &lt;/p&gt;

&lt;p&gt;User A is browsing the following websites (A, B, C), this is a normal activity. But what if a fourth strange and not originated by the user (typing it in the browser URL bar) connection which founds it&amp;#39;s way to some Russian or Chinese web server and downloads another malicious component??? and not on some kind of &amp;quot;Allowed Applications&amp;quot; or &amp;quot;White List&amp;quot; ? This should raise a red flag. &lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;http://extremesecurity.blogspot.com&quot; rel=&quot;nofollow&quot;&gt;http://extremesecurity.blogspot.com&lt;/a&gt;&lt;/p&gt;</content>
		</entry>
	
</feed>

<!-- ph=1 -->