• Astraea technology makes up the key “cloud cyberbrain” of the Kaspersky Security Network (KSN) —another element of Kaspersky Lab’s multi-layered, next generation protection.

    The system aggregates all the collected statistics and meta-information about suspicious activities and threats worldwide in real-time, and produces detection decisions towards malicious objects. Then this information becomes immediately available to all users through Kaspersky Security Network.

    Everyday more than 80 million users benefit from using Kaspersky Security Network cloud service. Kaspersky Lab’s products request and receive information on the reputation of requested objects, and participate in sharing statistics with meta-information about suspicious objects. This results in a stream of hundreds of millions of notifications and hundreds of gigabytes daily.

    All of this data is forwarded to an expert filtering and detection system called Astraea. The system verifies the incoming data for consistency to prevent any even hypothetical attempts of data manipulation. Then the data is accumulated into a big data database of objects like files, URLs, etc with corresponding meta-information and interlinks between them.

    For example, a product could send information about a suspicious object, like:

    • – Object 0xc9e13b88​a6f74509​6f7cf4b2​32aad4d4​1054b32d​464c5bed​95aa7de2​16bc22a0
    • – name of the object is “revised invoice and packing list.docx.exe”
    • – the object is located in archive “revised invoice and packing list.docx.zip”
    • – the object was started from filepath c:\windows\temp
    • – the object is not signed
    • – etc.

    After aggregating the incoming information, it is possible to generate knowledge like:

    • – When a particular file becomes known in the world
    • – Full list of URLs where the file was downloaded from, or to what it requested to
    • – Full list of paths where it was ever stored on disk
    • – Full list of detects against the file, if they happened
    • – Full list of processes that started the file
    • – File prevalence and its change over the time

    Each object is verified against a large list of indicators created by experts and expert systems. For example, it could be important to check:

    • – If the file has a double extension by the moment of run (“MyPhotos.jpg .exe”)
    • – If file is located in folder C:\Windows\System32, although is packed and has file attribute “hidden”
    • – If file has an outdated extension (say, “.com” , “.pif”, etc)
    • – If filename is very similar to a trusted system file, with just a single difference (say, “svcnost.exe”)
    • – If file was downloaded by an object which is already known as malicious
    • – etc.

    Passing the list of rules, each object gains a calculated object risk score, which Astraea uses to make an expert decision on whether the object is malicious or not.Therefore the more information about an object is collected, the more precise automatic conclusion could be made. It is clear that in some cases there is still not enough information about the object to make a verdict. If this is the case, the rating will be recalculated later after extra information is collected.

    Once Astraea generates its verdict on an object, it transfers this to the Kaspersky Security Network cloud service, enabling it to immediately reach users all over the world.

    It is important to note that the system logic is not static - the system is permanently self-trained. In the world where malware writers always verify their code against detection by security solutions and weaponise it by new techniques, the system of indicators could become non-actual and easily lead to a decrease of efficiency in the detection rate and an increase of false positives. This means the indicators separately and the list of them as a whole should be tested for efficiency and updated dynamically based on information collected from Kaspersky Lab’s database and expert knowledge.

    Since its start in 2012, the percentage of detections created by Astraea against the total number of new detections increased from 7.53% to 40.5% by the end of 2016 (323,000 new detections daily), with a total of one billion unique malicious files.

Related Products


Kaspersky Security Network: Big Data-powered Security

Read more

Finding the Needle in the Haystack. Introducing:...

Read more

Year 2016: One Billion Items of Malware Held in...

Read more

US 8572740 B2

Method and system for detection of previously unknown malware

Read more

US 7743419 B1

Method and system for detection and prediction of computer virus-related epidemics

Read more

US 7640589 B1

Detection and minimization of false positives in anti-malware processing

Read more


Related Technologies