Endpoint Protection

 View Only

So what is Krypton anyway? 

Mar 04, 2009 09:27 AM

So what is Krypton anyway?

At the end of January, some of you may have seen a notification from us about a new IPS engine that we released for Symantec Endpoint Protection.  So what’s special about it, and why do you need it anyway?

Firstly, let’s take a high level overview at how IPS works.  The Intrusion Prevention Signature engine in SEP looks at all the network traffic as it flows through your computers network card.  It’s looking for strange occurrences, both in individual packets and also in the reassembled stream (all the packets combined).  Typically, we tell the IPS engine what to look for with signatures but with SEP you can also write your own custom signatures (more on that in a later article).  These signatures are updated every few weeks in response to things like the Microsoft security vulnerability and patch announcements.

By writing clever signatures, we are able to look at actually preventing a malicious piece of code from exploiting the VULNERABILITY, rather than blocking the malicious code itself (which is a nice side effect).  These types of signatures are called “Generic Exploit Blocking” and with a single signature we can block hundreds of different threats which use the same Microsoft vulnerability to propagate themselves.  A quick example of this is the Microsoft patch MS08-067 - BID 31874 Microsoft Windows Server Service RPC Handling Remote Code Execution Vulnerability.  This has been widely exploited by the W32.Downadup variants across the world, using GEB signatures we have been able to significantly slow the spread of Downadup.  In addition to this sort of protection, we also look at such attack vectors as Drive-by-downloads, attack toolkits (such as MPack) planted on third party websites using SQL injection attacks and additional protection against Metasploit attacks and fake codec type of threats like Zlob.

Now, lets take a look at why IPS is so important to your protection strategy.  Lets look at the traditional way of AV detection:

imagebrowser image

This very basic graph shows the detections of a fake codec type threat.  At point 1, a new variant of the threat is released and detections in SEP go down.  Point 2 is when we release a new AV signature to cover the variant, 3 is when another variant is released and 4 is when we updated our signatures again.  So you can see the ebb and flow of detections vs. new variants.  This happened many times over in the space of a few days in June last year, so we started to look at different ways to protect our customers.  What we did was add a single IPS signature into our list.  The result was the graph below - you can see the AV detections dropped hugely.

imagebrowser image

How do we know thats what it was?  Well, as you can see from the next graph, IPS detections shot up

imagebrowser image

Whats that steady trickle of AV detections still occurring?  Well thats those people who arent running IPS on their systems - SAV customers, or SEP customers who aren't running IPS.

Hopefully from this, you can see that IPS is a great way to protect machines from network borne threats (most use the network these days to get onto your machine in some way) and that you really should be installing IPS onto all your SEP clients.

So now let’s look at Krypton.

Krypton is our newest IPS engine.  It’s been in the consumer Norton products for a little while now and has proven itself to be very effective so we decided to release it early into the corporate world.  We released Krypton as part of the Security Update 95 package for SEP – this was downloaded via LiveUpdate (or from your SEPM) and it’s the first time we have delivered any engine update outside of AV via LiveUpdate – it works great!

With Krypton, we added the ability for the IPS engine to do the following:

  • Improved vulnerability protection

o   Stopping exploits of browser based plugins, multimedia applications and ActiveX controls

  • Network Threat Evasion Resistance

o   Krypton can now decode traffic encoded in GZIP and chunk, enabling it to detect threats that try to hide themselves

  • For more accurate and efficient

o   Stateful protocol decoding and identification means that breaking apart traffic by its protocol, the engine can apply a selected portion of the signatures to the selected piece of traffic which leads to faster throughput and better detection

So as you can see, Krypton brings about some MAJOR improvements to performance, efficiency and detection rates.  Let’s see how the old IPS engine would deal with some traffic:

BEFORE

We would write a signature that says “Find the malicious traffic 67 bytes into the packet”

AFTER (with Krypton)

We can now refine that signature and say the following “Find the malicious traffic ONLY in the HTTP client bound traffic AND only 8 bytes from the beginning of the JPEG and NOT in SQL traffic”

Also, in the event that malicious packets pretend to be an .XLS file for example but are really PDF files, we will accurately identify the PDF and process the detection accordingly

Some quick FAQS:

How can I get Krypton?

If you are running Network Threat Protection and your protection signatures are dated past Jan 28th then you have Krypton now

How can I confirm I have Krypton?

Take a look at the file “WpsHelper.sys” in the System32\Drivers folder under where you have Windows installed, its version should be 12.0.0.27

Why Krypton?  Do you like superman?

No, it’s just that we name our latest IPS engines after the inert gases.  The previous engine (which wasn’t in SEP) was called Argon.

Can I just run IPS in SEP, I don’t want the firewall?

At the moment, the IPS engine and the firewall are both combined in the “Network Threat Protection” component, but you can run the firewall with an open set of rules (either by creating allow all rules or “withdrawing” the firewall policy from the group your client is in) which will give you benefit of Krypton without the effort of looking at the firewall rules at this moment.

So are you guys stopping writing AV signatures for these threats now then?

Absolutely not, we will continue to write signatures for AV.  However, AV is a reactive technology and as more and variants are released it is difficult to keep up.  Krypton and IPS is a proactive technology, one early written signature for a vulnerability can block many network borne infection attempts.

Statistics
0 Favorited
0 Views
0 Files
0 Shares
0 Downloads

Tags and Keywords

Comments

Feb 23, 2012 07:44 PM

Nice explanation.

May 25, 2009 04:34 AM

really amzing article

May 10, 2009 02:56 AM

Very well Explained & New Inforamtion too paul ..... i never heart of this Before Thanx For upating our Knowledge...
keep Upating use with this kind of New Technologies.....

May 10, 2009 02:47 AM

THx dude
this is an awesome info

May 09, 2009 11:29 AM

Great,

This analysis done by u, seriously amazed me.......Thanks.....

May 06, 2009 04:46 AM

with this i can now explain it further to our New Prospective clients, even our old clients can now understand the new features as well. thanks for this article i find it very simple to explain... thanks!

May 02, 2009 06:40 PM

Shaun, agreed.. expect to see more of this type of technology as we move forward.  We've been able to seamlessly update our AV engine (not defs) for many years now, without having to manually deploy it (like some of our competitors) and this technology will move across the whole product line as we go forward.  The IPS engine is just the next step in this.

Apr 30, 2009 07:18 PM

Nice to know technologies and enhancements like this are included seamlessly through PTP/NTP updates (live update). Rather than having to update to a new version or maintenance release.

Apr 21, 2009 03:17 AM

 I think this is very cool Paul. Hope to see this soon in the Corporate Line of products

Apr 12, 2009 06:44 PM

Like a lot of our new technologies, Krypton got released as part of the consumer product first.  The main reason for this is we don't always know how effective something is going to be.  Every year with the consumer versions we add lots of new protection technologies and every year we also REMOVE those that didn't work quite as well as we had hoped they would do.

We can do that with a consumer product, its much harder to remove features from an enterprise/business product, so features only make it into the corporate product when we are sure they are viable and useful technologies.  Some of this strategy is changing moving forward - consumer will still remain the "proving ground" for very new protection technologies, but we hope to reduce the time gap and in certain cases, ship consumer and enterprise products with the same versions of the latest versions of technologies that are already proven.  The next version of SEP will include a lot of the features you see today in the consumer product (including ones you don't see yet, but will later this year).

On the FP front, we can reduce FP's because Krypton enables us to have more specific signatures, looking for exactly the right information in the right place, rather than the more simple (but still very powerful) detection we have had in the past.

@Ayed, what do you mean "server side settings"?

hth

Apr 08, 2009 05:47 AM

Good Topic Mr Shah

Apr 07, 2009 01:24 PM

Why was it first launched into cousumenr version and then incorporated into business version?

How it takes care of the false positive?

Tejas

Apr 05, 2009 07:25 AM

Is there any server-side settings for Krypton?


Symantec Certified Specialist (Endpoint Protection)

Mar 29, 2009 05:33 AM

Good Technology, Thanks for your explanation

Mar 25, 2009 12:49 PM

I am passing this on to all of our IT staff.

Mar 22, 2009 09:16 AM

Great. The explaination was also simpler and easy to understand.

Mar 09, 2009 06:06 PM

I think this is a terrific article that users may find very helpful. Please post your comments and let us know what you think.

Related Entries and Links

No Related Resource entered.