Got it

Payload-Based Signature

Created: Sep 15, 2021 08:00:15Latest reply: Sep 15, 2021 08:23:46 221 3 0 0 0
  Rewarded HiCoins: 0 (problem resolved)

What is a Payload-Based Signature and how to integrades huawei products?

Featured Answers

Best answer

Recommended answer

DDSN
Admin Created Sep 15, 2021 08:23:46

Hi @ zaheernew
Payload-based signatures detect patterns in the content of the file rather than attributes, such as a hash, allowing them to identify and block altered malware.

Security tools often utilize signatures based on easily changed variables like hash, file name or URLs to identify and prevent known malware from infecting systems. With this type of signature, identifying threats requires essentially a one-to-one match against the specific variables the signature is looking for.

While once an effective means for identifying malware, it is now a feeble practice, as attackers have adopted more sophisticated means of evading detection. Malware authors can now easily create thousands of variants of existing malware, containing only slight changes, in order to get around signature matching. As legacy signatures require a static one-to-one match for each unique file, these slight changes allow malware to go undetected.

As attackers have evolved, so have protections, and organizations should consider utilizing security protections that leverage payload-based signatures, which detect patterns in the actual content of the file rather than a simple attribute like hash. If a piece of known malware has been altered in any way, resulting in an entirely new hash or other small change, payload-based signatures would still be able to identify and block what would otherwise have been treated as a new unknown threat.

While payload-based signatures require more evidence and larger sets of data to produce, security teams ultimately have fewer signatures to the author and deploy, as each signature is more effective at blocking variants and polymorphic malware and provides a wider net of protection. With payload-based signatures, one signature can block tens of thousands of variants from the same malware family. The result is a one-to-many malware detection, with significantly quicker and more successful prevention.
View more
  • x
  • convention:

zaheernew
zaheernew Created Sep 16, 2021 06:28:19 (0) (0)
Thanks dear  
All Answers
DDSN
DDSN Admin Created Sep 15, 2021 08:00:41

Hi,
Please wait. Our engineers are looking for the answer.
View more
  • x
  • convention:

DDSN
DDSN Admin Created Sep 15, 2021 08:23:46

Hi @ zaheernew
Payload-based signatures detect patterns in the content of the file rather than attributes, such as a hash, allowing them to identify and block altered malware.

Security tools often utilize signatures based on easily changed variables like hash, file name or URLs to identify and prevent known malware from infecting systems. With this type of signature, identifying threats requires essentially a one-to-one match against the specific variables the signature is looking for.

While once an effective means for identifying malware, it is now a feeble practice, as attackers have adopted more sophisticated means of evading detection. Malware authors can now easily create thousands of variants of existing malware, containing only slight changes, in order to get around signature matching. As legacy signatures require a static one-to-one match for each unique file, these slight changes allow malware to go undetected.

As attackers have evolved, so have protections, and organizations should consider utilizing security protections that leverage payload-based signatures, which detect patterns in the actual content of the file rather than a simple attribute like hash. If a piece of known malware has been altered in any way, resulting in an entirely new hash or other small change, payload-based signatures would still be able to identify and block what would otherwise have been treated as a new unknown threat.

While payload-based signatures require more evidence and larger sets of data to produce, security teams ultimately have fewer signatures to the author and deploy, as each signature is more effective at blocking variants and polymorphic malware and provides a wider net of protection. With payload-based signatures, one signature can block tens of thousands of variants from the same malware family. The result is a one-to-many malware detection, with significantly quicker and more successful prevention.
View more
  • x
  • convention:

zaheernew
zaheernew Created Sep 16, 2021 06:28:19 (0) (0)
Thanks dear  

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.