Palo Alto Networks Recommends Three Malware Analysis Methods

Technology > Security

IT teams and security firms are constantly finding new ways to improve their cybersecurity systems, but cybercriminals are also working around their way through the defenses faster than new defenses can be deployed, said Palo Alto Networks.

Ian Raper, the company's vice president, believes that there are many ways to analyze malware, and each come with their own specific pros and cons.

According to Raper, the usage of just a single malware detecting method could make a network vulnerable, and that using numerous methods in the correct sequence would give the security firms better protection against malware. “When implemented in series, malware analysis lets security teams handle most threats automatically, freeing up team resources to actively hunt more advanced threats,” Raper adds.

Palo Alto Networks stated that there are three methods for malware analysis that security firms need to take note of.

The first is static analysis, which is the first line of defense against malware threats. It first separates an unidentified file into several smaller parts for inspection without opening the file. It can see whether a file has signs that malware may be present.

The second is machine learning analysis, which basically groups various malware-like behavior into groups to filter out malicious data and viruses.

The last method mentioned is dynamic analysis. It is done by moving a suspicious file to a separate environment where other files won't be affected, or a virtual machine (VM)-based environment. After that, the file is opened in a tightly-controlled area (also known as sandboxing), which will then see how it behaves and then be extracted.

Image by: bykst / Pixabay