Thursday, July 11, 2013

Proactive virus defense technologies and new mainstream antivirus software - antivirus software, vir - Business

80 end of the decade based on personal computer virus was born then there will be a tool rid of the virus anti virus software During this period the technology used by the virus is relatively simple relatively easy to detect the most widely used is the signature matching method However anti virus software in order to avoid killing the virus began to evolve gradually evolved into the form of deformation each infection time become a form on their own through its own deformation to avoid killing br br Thus a virus variant with a significant increase in virus antivirus software virus database and relying solely on signature technology has been unable to meet today 39 s network security Thus it appeared the concept of broad spectrum signature of this technology for some time some distortion of the virus for the treatment provides a method but also greatly increase the false alarm rate so the technology is currently used broad spectrum signature can not be effective against new and unknown virus the virus killing then is now a wide variety of anti virus software what are the new technologies and new features to adapt to the current virus threat but also how to achieve it br br Defense technology initiative As traditional library based virus scanning anti virus software is very passive and only after a new virus appears to have counter measures a virus written by the virus maker is likely to be anti virus software vendors in the intercept and added to the product into the user 39 s computer before the virus database At this point since the virus has not yet added to the antivirus signature database software viruses virus antivirus software will be considered normal File Letting go making the user computer is infected by the virus Therefore the industry will be able to take the initiative to detect and block unknown threats of the defense is called quot active defense quot br br Anti virus software has lag which is an anti virus software industry rec ognized shortcomings and active defense is very good to solve this problem Active Defense Technology is mainly directed against unknown viruses kill the proposed anti virus technology virus samples in the absence of cases the virus fully comprehensive and effective protection to prevent the operation of the virus from a technical level to respond effectively to the ravages of unknown viruses First unknown viruses and unknown procedures through quot the Judgement quot technology to identify most of the unknown virus has not been intercepted and variants On the other hand attacks on vulnerability monitoring which prevents the virus to other computers using vulnerabilities to attack thus preventing the outbreak of the virus br br However due to the concept of active defense the manufacturers of different skill levels the effect of gap is larger the most significant drawbacks is the large number of false positives often or manslaughter or to conduct surveillance and monitoring o f the virus signatures the same as the way in the active defense although the virus runs its behavior prompted alarm monitoring but even if the user selects quot refuse quot action could not prevent the virus from running In the quot c 39 t quot magazine on 17 major global antivirus software has been tested in that killing in the new virus the antivirus software the average detection rate was only 20 to 30 even lower than last year 39 s 40 to 50 In contrast only ESETNOD32 and BitDefender performed well killing rates were 68 and 41 It is worth mentioning that ESETNOD32 with the world 39 s leading advanced heuristic ThreatSensereg engine which can support the genetic code virtual machine and the code of this heuristic antivirus technology while killing most of the unknown virus produced only very few false positives as the industry 39 s lowest so ESETNOD32 39 s ThreatSense technology has been recognized as a proactive defense technology is mature and stable synthesizer





No comments:

Post a Comment