Fighting spyware with unified threat management


Fighting spyware with unified threat management

Spyware is no longer just a petty nuisance, clogging enterprise desktops and access links -- it's also crimeware, driven by the desire for illicit profits. Gartner estimates that these financially motivated attacks will represent 70% of all network security incidents by 2010.

Winning the war against malicious spyware requires a layered defense applied at the desktop, server and network edge. Security professionals are already familiar with desktop antispyware programs, but consider also how

Continue Reading This Article

Enjoy this article as well as all of our content, including E-Guides, news, tips and more.

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Safe Harbor

unified threat management (UTM) appliances can help you defeat spyware at network and workgroup perimeters.

Here, there, everywhere
From pesky adware like ISTBar to stealthy attacks like Trojan-Backdoor-SecureMulti, spyware is now held responsible for one out of four help desk calls and half of the PC crashes reported to Microsoft. IDC estimates that more than 75% of corporate desktops get infected with spyware. According to antispyware vendor Webroot Software Inc., spyware-related downtime and cleanup costs corporations approximately $250 per user annually. Fighting spyware on the desktop requires new techniques and tools because not only has spyware evolved considerably in recent years, it also still behaves differently than viruses and worms. Many enterprise products (e.g., CA Inc.'s eTrust Pest Patrol, Lavasoft Ad-Aware Enterprise, Webroot Spy Sweeper Enterprise) focus exclusively on host spyware eradication. Antispyware programs are also being rolled into desktop security suites, such as Symantec Corp.'s Client Security, which combines host antivirus, antispyware, firewall and intrusion prevention. Microsoft has embedded basic antispyware defenses into its recently released Windows Vista operating system.

Network antispyware
In most companies, desktop antispyware simply isn't good enough. Employees connect infected laptops to the corporate network; desktop software breaks or becomes out of date; visitors, contractors and home workers don't run your chosen antispyware program. Protecting an entire network against spyware really requires a network-based product that can be easily controlled by IT.

UTM appliances complement desktop antispyware by enforcing spyware policies at the network edge. Most UTM appliances, from companies like Cisco Systems Inc., Crossbeam Systems Inc., Juniper Networks Inc., Fortinet Inc., WatchGuard Technologies Inc., SonicWall Inc., and Secure Computing Corp., among others, consolidate firewall, intrusion prevention and antivirus scanning, and may provide additional security services, including VPN, Web filtering, antispam and antispyware.

Antispyware benefits from this unified approach, because network-based defenses can run the gamut from outbound request filtering -- functions one might ask of a firewall or Web filter -- to inbound content inspection, which can resemble intrusion prevention or even antivirus capabilities. Depending on the feature set, countermeasures that may be implemented on a UTM appliance include:

  • Blocking outbound requests to risky Web sites: Many spyware infestations start when a user clicks on a malicious URL embedded in a Web page or a phishing email. UTM appliances can filter outbound HTTP traffic to block access to blacklisted domains and URLs that fall into banned categories (e.g., phishing, P2P file sharing and adware/spyware sites). Stopping a problem before it starts is generally less expensive than cleaning it up later. With tenacious spyware -- especially rootkits -- a complete system rebuild may be required to make a compromised host truly trustworthy again.
  • Stripping banned objects from inbound messages: Although public blacklists and URL databases used by appliances are constantly updated, new spyware programs will slip through the cracks. Most UTM appliances can also be configured to block active content and banned MIME types carried by HTTP, FTP, POP and other protocols, including unsigned ActiveX controls, Java applets, VB scripts, and PC executables. This can be a bit tricky. For example, zip files are used to "hide" executables, or HTTP sessions are encrypted by SSL.
  • Network-based spyware scanning: Some UTM appliances can look beyond message headers and content types, scanning inbound application payloads for known spyware. This technique is a logical extension of desktop antispyware scanning. Like desktop scanners, UTM appliances can use regularly updated signature databases and may take configurable actions -- dropping, cleaning, deleting, quarantining -- when spyware is detected.
  • Back-channel blocking: Unlike desktop antispyware programs, UTM appliances cannot observe the local system behavior of spyware launched on a desktop. However, appliances are well-positioned to react immediately to spyware network behavior. Many UTM appliances can use malware databases to block known spyware back channels, such as outbound HTTP connections to adware servers, outbound non-bizware connections like instant messaging and "phone home" messages sent by remote control Trojans and keystroke loggers. They may generate alerts to help spot infected hosts, and even quarantine those hosts to prevent damage prior to remediation.

When it comes to fighting spyware, a single countermeasure won't do the trick; for example, UTM appliances cannot protect remote access devices when connected to external networks. Combining desktop and network antispyware covers both bases.

UTM appliances are extremely diverse and will continue to evolve along with spyware itself, so look very closely at any given product's feature set to determine how it can help you battle this scourge. Also give serious consideration to the impact that network antispyware may have on appliance capacity, throughput and message latency.

Weighing these factors, consider UTM to strengthen spyware defenses while reducing the operational and productivity burdens associated with this increasingly stealthy, malicious and expensive network threat.

About the author:
Lisa Phifer is vice president of Core Competence Inc., a consulting firm specializing in network security and management technology. Lisa has been involved in the design, implementation and evaluation of data communications, internetworking, security and network management products for over 20 years. At Core Competence, she has advised large and small companies regarding security needs, product assessment and the use of emerging technologies and best practices. Before joining Core Competence, Lisa was a member of technical staff at Bell Communications Research where she won a president's award for her work on ATM network management.

This was first published in March 2007

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.