Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
College aantekeningen

A detailed Review on Antivirus and their impacts on digital tool

Beoordeling
-
Verkocht
-
Pagina's
6
Geüpload op
30-05-2025
Geschreven in
2022/2023

It provides a deapth knowledge about Antiviruses and their impact on digital devices.

Instelling
Vak

Voorbeeld van de inhoud

Antivirus software (abbreviated to AV software) is a computer program that detects, prevents,
and eliminates malware. Antivirus software, as the name implies, was intended to detect and
eliminate computer infections. Antivirus software began to protect against additional computer
risks as other malware became more prevalent. Modern antivirus software can defend users
against harmful browser helper objects (BHOs), browser hijackers, ransomware, keyloggers,
backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraud tools, adware, and
spyware, among other threats. Certain programs also protect against other computer threats such
as infected and malicious URLs, spam, scam and phishing attacks, online identity (privacy),
online banking attacks, social engineering techniques, advanced persistent threat (APT), and
botnet DDoS attacks.


Identification methods

Frederick B. Cohen's 1987 proof that no algorithm can completely detect all conceivable viruses
is one of the few solid theoretical results in the research of computer viruses. However, by
employing many levels of security, a high detection rate can be attained.

Antivirus engines can detect malware using a variety of approaches, including:

 Sandbox detection:

A behavioral-based detection technique that, rather than detecting the behavioral fingerprint at
run time, executes programs in a virtual environment and logs the actions they take. The
antivirus engine can assess whether or not the program is malicious based on the actions logged.
If this is not the case, the application is run in the real world. Even though this technique has
proven to be extremely successful, it is rarely employed in end-user antivirus solutions due to its
heaviness and slowness.

 Data mining techniques:

One of the most recent ways to malware detection Given a set of file features collected from the
file, data mining, and machine learning methods are used to try to identify the behavior of the
file (as malicious or benign).

,  Signature-based detection

When it comes to detecting malware, traditional antivirus software mainly depends on
signatures. When a malware sample reaches the hands of an antivirus company, it is thoroughly
examined by malware researchers or dynamic analysis systems. After it has been confirmed that
the file is malware, an appropriate signature of the file is extracted and added to the antivirus
software's signature database.

Although signature-based approaches can effectively contain malware outbreaks, malware
authors have attempted to stay one step ahead of such software by creating "oligotrophic,"
"polymorphic," and, more recently, "metamorphic" viruses, which encrypt parts of themselves or
otherwise modify themselves to avoid matching virus signatures in the dictionary.

 Heuristics

Many viruses begin as a single infection and can evolve into dozens of slightly different strains,
known as variations, through mutation or refinement by other attackers. The detection and
elimination of multiple threats using a single viral definition are referred to as generic detection.

Depending on the antivirus vendor's classification, the Vundo trojan, for example, has numerous
family members. Members of the Vundo family are divided into two groups by Symantec:
Trojan and Virus. Vundo and Trojan are two characters. Vundo. B.

While identifying a single virus may be advantageous, detecting a virus family using a generic
signature or an inexact match to an existing signature can be faster. Virus researchers can
establish a single generic signature by identifying common locations that all viruses in a family
share. Non-contiguous code is frequently used in these signatures, with wildcard characters used
where differences exist. These wildcards enable the scanner to discover infections that are
padded with nonsensical code. Heuristic detection is a term used to describe a detection that
employs this strategy.

 Rootkit detection

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
30 mei 2025
Aantal pagina's
6
Geschreven in
2022/2023
Type
College aantekeningen
Docent(en)
Anil
Bevat
Alle colleges

Onderwerpen

$9.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
anuwanshisharma

Maak kennis met de verkoper

Seller avatar
anuwanshisharma Self
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
-
Lid sinds
11 maanden
Aantal volgers
0
Documenten
2
Laatst verkocht
-

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen