{"id":2269,"date":"2013-08-26T10:27:50","date_gmt":"2013-08-26T14:27:50","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=2269"},"modified":"2020-12-22T21:16:13","modified_gmt":"2020-12-22T17:16:13","slug":"ksn","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/ksn\/2269\/","title":{"rendered":"Protection From A Cloud \u2014 What Is Kaspersky Security Network"},"content":{"rendered":"<p><strong>Updated:<\/strong> Current principles for the processing of user data by Kaspersky Lab security solutions and technologies can be found <a href=\"https:\/\/www.kaspersky.com\/about\/data-protection\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n<p>According to <a href=\"http:\/\/www.securelist.com\/en\/analysis\/204792255\/Kaspersky_Security_Bulletin_2012_The_overall_statistics_for_2012\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Lab data<\/a>, over <b>200,000<\/b> unique malicious samples emerge daily, meaning 2-3 malware objects appear <b>each second<\/b>. Even an army of analysts can\u2019t manage that onslaught if they process it with traditional methods. That\u2019s why Kaspersky Lab invented another approach \u2013 instead of just hiring more and more people- we\u2019ve created a cloud-based processing center and distributed an antiviral network called <strong>Kaspersky Security Network<\/strong>. This powerful technology promptly detects new dangers on the net and protects every computer connected to KSN. It helps prevent epidemics and blocks the sources of infection in a matter of minutes.<\/p>\n<p>Kaspersky Security Network performs several important tasks: the global monitoring of suspicious activity on users computers, the instant delivery of this data (nothing confidential!) to Kaspersky Lab servers, the analysis of the information gathered and then decision making about either blocking dangerous files or adding them to an allowlist. To use this cloud-based service, users should have Kaspersky Lab products installed, e.g. <a href=\"https:\/\/www.kaspersky.com\/products\/home\/internet-security\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Internet Security<\/a> and give consent to participate in KSN. The reward for participation will come almost immediately, as all computers connected to KSN receive information about new threats less than a minute after the first detection of those threats.<\/p>\n<h2>How Kaspersky Security Network works<\/h2>\n<ul>\n<li>Information about suspicious activity is sent from a user\u2019s computer to the KSN cloud. We don\u2019t collect files, only information about them: which file tries to perform a suspicious task, what is the source of this file, which application launched it, etc.<\/li>\n<li>It is often impossible to decide if a file is malicious or not, basing this decision only on data from one computer. The picture changes when it\u2019s possible to analyze application behavior on multiple computers and also check it against a huge database of millions of legitimate apps and files. Using this data and heuristics, KSN makes a preliminary verdict about a suspected file.<\/li>\n<li>If file behavior looks malicious, KSN instantly adds it to the database of our Urgent Detection System (UDS), instantly available to all users. Otherwise we add this file to an allowlist.<\/li>\n<li>If another user launches this dangerous file, <a href=\"https:\/\/www.kaspersky.com\/products\/home\/anti-virus\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Anti-Virus<\/a> will check the file using a UDS cloud-based database and instantly block it.<\/li>\n<\/ul>\n<ul>\n<li>Our experts check files listed as malicious. They determine the threat level for each file and add descriptions to the antiviral database. It may take more time, up to several hours, but KSN \u2013connected users are protected during this period because this file is already listed in the UDS database.<\/li>\n<li>Information about malicious and blocked files is updated in the database and it\u2019s distributed to all end-users, including ones that aren\u2019t connected to KSN.\n<div class=\"pullquote\">Less than a minute after first threat detection, all KSN-connected computers are protected from it.<\/div>\n<\/li>\n<\/ul>\n<p>The main feature of this cloud-based antivirus solution is a two-way connection between you and the antivirus system. In a traditional setup, it takes a few hours to react to new malware \u2013we need to know that a new threat has emerged. However, in the modern world, it\u2019s too much time to wait. With KSN as the first system to encounter a new threat, it will report to the lab and provide the necessary data for analysis. Additionally, this technology not only detects new threats, but also finds its source (typically, it\u2019s a malicious site) and blocks it as well.<\/p>\n<p>There is another useful function of KSN \u2013 we call it \u2018Wisdom of the Crowd.\u2019 Thanks to information we gather, each file quickly gains its reputation and you can check in inside Kaspersky Lab products. So you may see if the file is popular and if other people trust it. It may help to decide if you want to launch this file or not. For example, such apps as Opera or Flash player are hugely popular. So if you have a file called \u201cFlash update\u201d and it has been downloaded only a few thousand times, not millions, you might quite confidently say that it\u2019s a fake.<\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Updated: Current principles for the processing of user data by Kaspersky Lab security solutions and technologies can be found here. According to Kaspersky Lab data, over 200,000 unique malicious samples<\/p>\n","protected":false},"author":35,"featured_media":2270,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7],"tags":[430,180],"class_list":{"0":"post-2269","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-products","8":"tag-cloud-storage","9":"tag-kaspersky-internet-security"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ksn\/2269\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ksn\/2359\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ksn\/2445\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ksn\/2296\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ksn\/1506\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ksn\/1572\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ksn\/2561\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/ksn\/1464\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ksn\/1572\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ksn\/2561\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ksn\/2561\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/cloud-storage\/","name":"cloud storage"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2269","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/35"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=2269"}],"version-history":[{"count":6,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2269\/revisions"}],"predecessor-version":[{"id":17794,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2269\/revisions\/17794"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/2270"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=2269"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=2269"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=2269"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}