Real Performance? Ján Vrabec vrabec@eset.sk David Harley dharley@eset.com



Similar documents
VESZPROG ANTI-MALWARE TEST BATTERY

Virtual Desktops Security Test Report

Sophos Computer Security Scan startup guide

Deep Security Vulnerability Protection Summary

What to Look for When Evaluating Next-Generation Firewalls

ESET Security Solutions for Your Business

Executive Brief for Sharing Sites & Digital Content Providers. Leveraging Hybrid P2P Technology to Enhance the Customer Experience and Grow Profits

Security Industry Market Share Analysis

DETERMINATION OF THE PERFORMANCE

McAfee MOVE / VMware Collaboration Best Practices

Content Security Gateway Series Real-time Gateway Web Security Against Spyware and Viruses

Anti-Virus Protection and Performance

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later

SaaS Endpoint Security Solutions Performance Test

F-Secure Internet Gatekeeper Virtual Appliance

Are free Android virus scanners any good?

How To Test For Performance On A 64 Bit Computer (64 Bit)

Anti-Virus Comparative - Performance Test (AV Products) May 2014

Getting Ahead of Malware

Application Visibility and Monitoring >

Simphony v2 Antivirus Recommendations

Endpoint Business Products Testing Report. Performed by AV-Test GmbH

Trend Micro OfficeScan Best Practice Guide for Malware

How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

Tracking Anti-Malware Protection 2015

ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows

the barricademx end user interface documentation for barricademx users

Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT

Anti-Virus Comparative

Unified Threat Management, Managed Security, and the Cloud Services Model

Problematic, Unloved and Argumentative: What is a potentially unwanted application (PUA)?

User Manual. HitmanPro.Kickstart User Manual Page 1

Security Industry Market Share Analysis

The impact of virtualization security on your VDI environment

Upgrade to Webtrends Analytics 8.7: Best Practices

What is PC Matic?...4. System Requirements...4. Launching PC Matic.5. How to Purchase a PC Matic Subscription..6. Additional Installations.

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Real World and Vulnerability Protection, Performance and Remediation Report

Lab Testing Summary Report

ANDRA ZAHARIA MARCOM MANAGER

Check Point: Sandblast Zero-Day protection

Bandwidth consumption: Adaptive Defense and Adaptive Defense 360

SonicWALL Security Appliance

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

Secure Your Mobile Workplace

How To Test Security Products

The enemy within: Stop students from bypassing your defenses

Get Started Guide - PC Tools Internet Security

Tested product: Auslogics BoostSpeed

Install Guide VirusBlokAda

Home Anti-Virus Protection

Symantec Endpoint Protection

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Small Business Endpoint Protection Performance Benchmarks

Full Drive Encryption with Samsung Solid State Drives

Application Whitelisting - Extend your Security Arsenal? Mike Baldi Cyber Security Architect Honeywell Process Solutions

Next-Generation Firewalls: Critical to SMB Network Security

The Advantages of Security as a Service versus On-Premise Security

Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013

Anti-Virus Comparative

STPIC/Admin/002/ / Date: Sub: Quotation for purchase/renewal of Anti Virus Software Reg.

security Cloud vs. On-premise solutions

RESCUE CD. User s Guide

Norton Mobile Privacy Notice

Office 365 Migration Performance & Server Requirements

F-Secure Internet Security 2014 Data Transfer Declaration

Maintaining, Updating, and Protecting Windows 7

Transcription:

Real Performance? Ján Vrabec vrabec@eset.sk David Harley dharley@eset.com

Agenda Introduction Detection vs. Whole Product Test Performance Tests Black box testing suites Irrelevant Testing Types of users

Introduction Detection vs. performance testing Evaluation Testing Buying decisions Missing guidelines Own testing procedures AMTSO

Detection performance isn t enough in itself Usability, ergonomics and configurability Functional adaptation Responsiveness to the needs of and changes in the organizational environment or infrastructure Responsiveness or adaptability to business needs

Detection Testing Versus Whole Product Testing More functions Impact on performance Interactions Out of the box settings Different view

Detection Testing Versus Whole Product Testing

Balanced Product Protection False Positive Performance Usability

Scanning Throughput Static scanning Samples - Clean Set Representative set Skip over files Multiple measurements First and following scans Hashing Faster Secure?

Memory Usage System is in idle state Windows Task Manager Hidden processes, 10 MB antivirus Source: Performance Benchmarking, PassMark January 2010

Memory Usage System in idle Several readings Reserved memory CC of system with installed solution -CC of clean system Memory Consumption Source: Performance Benchmarking, PassMark January 2010

System Boot Speed Active on a system at an early stage When to stop the measurement? Antivirus presence detector Idle state of system

Black Box Testing Suites Instant Testing Tools World Bench or Passmark Focused on hardware White listed Error bigger then difference Interpretation of results

Irrelevant Testing False tests Registry Key Count Process Count No effect on computer performance Improved product rating? Source: Performance Benchmarking, January 2010

Magazines Results German computer magazine reviews Varied results Confused reader

Malware Performance Testing by User Type Consumer Surfer Gamer Worker Corporate Users Administrators

Consumer All Boot time Memory consumption Installing common software applications Copying files to the system or to and from a local network resource Surfer Browsing of web pages from proxy server Browser start-up time Viewing video files streamed from a Web server

Consumer Gamer Latency on the network Degradation of frame per seconds Worker Downloading emails from server Email clients start-up Time of opening, closing, saving and copying documents Editing video and audio files Converting from one format to another Start-up times of specific applications

Corporate Users Simulation of work with common business software Time taken to open, process and close single or multiple documents and applications Network performance Accessing email or messaging services Web browsing Designing internal applications, procedures and implementations in-house. Administrators Performance on File and mail servers, gateways

Conclusion Testing with pitfalls Valid and objective techniques Guidelines More focus on Whole Product Testing

The Nine Principles 1/2 1. Testing must not endanger the public. 2. Testing must be unbiased. 3. Testing should be reasonably open and transparent. 4. The effectiveness and performance of anti malware products must be measured in a balanced way. 5. Testers must take reasonable care to validate whether test samples or test cases have been accurately classified as malicious, innocent or invalid.

The Nine Principles 2/2 6. Testing methodology must be consistent with the testing purpose. 7. The conclusions of a test must be based on the test results. 8. Test results should be statistically valid. 9. Vendors, testers and publishers must have an active contact point for testing related correspondence.

AMTSO Compliance Technically, there s no such thing (yet) The Review Analysis Board can assess whether a test report is compliant with the nine principles: http://amtso.org/amtso---download---amtso-analysisof-reviews-process.html Two analyses (near-)completed to date: NSS Labs Dennis Publishing

AMTSO Documentation http://amtso.org/documents.html Documents and Principles These documents are either fully published or work in progress specifying AMTSO Principles and Guidelines related to testing. Virus Bulletin Spotlight article on AMTSO What AMTSO has achieved so far, and what might lie ahead. David Harley, AMTSO lutely Fabulous, January 2010, Virus Bulletin. Copyright is held by Virus Bulletin Ltd, but is made available on this site for personal use free of charge by permission of Virus Bulletin. AMTSO Fundamental Principles of Testing AMTSO Fundamental Principles of Testing as approved by the AMTSO meeting held in Oxford 31st October 2008. AMTSO Best Practices for Dynamic Testing AMTSO Best Practices for Dynamic Testing as approved by the AMTSO meeting held in Oxford 31st October 2008 AMTSO Best Practices for Validation of Samples AMTSO Best Practices for validation of samples as approved by the AMTSO meeting held in Budapest 7th May 2009

AMTSO Documentation http://amtso.org/documents.html AMTSO Best Practices for Testing In-the-Cloud Security Products AMTSO Best Practices for Testing In-the-Cloud Security Products as approved by the AMTSO meeting held in Budapest 7th May 2009 AMTSO Analysis of Reviews Process AMTSO Analysis of Reviews Process as approved by the AMTSO meeting held in Budapest 7th May 2009 AMTSO Guidelines for testing Network Based Security Products AMTSO Guidelines for testing Network Based Security Products as approved by the AMTSO meeting held in Prague 13th October 2009 AMTSO Issues involved in the "creation" of samples for testing AMTSO Issues involved in the "creation" of samples for testing as approved by the AMTSO meeting held in Prague 13th October 2009

Thank you for your attention Questions? Ján Vrabec vrabec@eset.sk David Harley dharley@eset.com

References AMTSO (2010a). AMTSO Whole Product Testing Guidelines (in preparation) AMTSO (2010b). AMTSO Performance Testing Guidelines (in preparation) ESET Research (2010). Retrieved 10th March 2010 from http://www.eset.com/blog/2010/01/25/generalist-anti-malware-product-testing AV Comparatives (2009) Retrieved 10th March 2010 from http://avcomparatives.org/images/stories/test/performance/performance_dec09.pdf Harley, D. (2009a). Making Sense of Anti-Malware Comparative Testing. Information Security Technical Report. Retrieved 10th March, 2010 from http://dx.doi.org/10.1016/j.istr.2009.03.002, Elsevier. Harley, D. (2009b). Execution Context in Anti-Malware Testing. Conference Proceedings for 18th EICAR Annual Conference. Retrieved 10th March 2010 from http://smallbluegreenblog.wordpress.com/2009/05/15/execution-context-in-antimalware-testing/ Lee, A.J. & Harley, D. (2007). Antimalware Evaluation and Testing. In D. Harley (Ed.) AVIEN Malware Defense Guide for the Enterprise (pp. 441-498): Syngress Vrabec, J. (2010). Generalist Anti-Malware Testing (In preparation)