Skip to content
Công ty TNHH Aisecurity Việt Nam
  • Trang chủ
  • Giải pháp
    • TƯ VẤN TRIỂN KHAI HẠ TẦNG
    • Giải pháp bảo mật
    • Giải pháp bảo vệ
    • Giải pháp theo dõi
  • Tin tức
  • Khách hàng
  • Giới thiệu
Công ty TNHH Aisecurity Việt Nam

Antivirus and anti-malware

Tháng 4 13, 2024 0

Antivirus is used to prevent, detect, and remove malware, including but not limited to computer viruses, computer worm, trojan horses, spyware and adware.

Virus Detection Methods
There are four major methods of virus detection in use today: scanning, integrity checking, interception, and heuristic detection. Of these, scanning and interception are very common, with the other two only common in less widely-used anti-virus packages. Unfortunately, while scanning is very effective against known viruses, it is completely incapable of dealing with new viruses, forcing anti-virus analysis centers into a reactive stance.

Scanning
A scanner will search all files in memory, in the boot sector (the sector on disk that specifies where boot information is,) and on disk for code snippets that will uniquely identify a file as a virus. Obviously, this requires a list of unique signatures that will be found in viruses and not in benign programs. To prevent false alarms, most scanners also will check the code of a suspected file against either the virus code itself or a checksum of it. (A checksum is a method frequently used to determine if data has been changed, and involves summing all of the bits in a file.) This is the most common method of virus detection available, and is implemented in all major anti-virus software packages. There are two types of scanning: on-access and on-demand. On-access scanning scans files when they are loaded into memory prior to execution. On-demand scanning scans all of main memory, the boot sector, and disk memory as well, and is started by a user when he/she wishes. On-access scanning has become more aggressive recently, with virus scans occurring even if files are selected, but not loaded.

Integrity Checking
An integrity checker records integrity information about important files on disk, usually by checksumming. Should a file change due to virus activity or corruption, the file will no longer match the recorded integrity information. The user is prompted, and can usually be given an option to restore the file to its pre-corrupted/infected state. This is an extensive process, and few virus checkers today utilize it. Norman Virus Control, however, is one.
Heuristic Virus Checking
This is a generic method of virus detection. Anti-virus software makers develop a set of rules to distinguish viruses from non-viruses. Should a program or code segment follow these rules, then it is marked a virus and dealt with accordingly. This allows detection of any virus, and theoretically, should be sufficient to deal with any new virus attacks. F-secure virus software uses this method in addition to scanning, although not very many software packages available today utilize heuristic virus checking.

Interception
Interception software detects virus-like behavior and warns the user about it. How to detect virus-like behavior? Use heuristics again. Many viruses will perform some suspicious action, like relocating themselves in memory and installing themselves as resident programs.

Share
facebookShare on FacebooktwitterShare on TwitterpinterestShare on Pinterest
linkedinShare on LinkedinvkShare on VkredditShare on ReddittumblrShare on TumblrviadeoShare on ViadeobufferShare on BufferpocketShare on PocketwhatsappShare on WhatsappviberShare on ViberemailShare on EmailskypeShare on SkypediggShare on DiggmyspaceShare on MyspacebloggerShare on Blogger YahooMailShare on Yahoo mailtelegramShare on TelegramMessengerShare on Facebook Messenger gmailShare on GmailamazonShare on AmazonSMSShare on SMS
Post navigation
Previous post

Data loss prevention

Next post

Ngăn chặn hợp pháp và theo dõi hợp pháp

Tin khác

  • Dịch vụ tư vấn triển khai hạ tầng Mạng, Máy chủ, Bảo mật
  • Tin mới
  • Bộ Quốc phòng Việt Nam
  • Bộ Công An Việt Nam
  • Thử nghiệm thâm nhập (PenTest)

Công ty TNHH Aisecurity Việt Nam

Add: Số 32 Ngõ 2 Phố Quần Ngựa, Phường Liễu Giai, Quận Ba Đình, TP Hà Nội, Việt Nam
Vp: Số 32 Ngõ 2 Phố Quần Ngựa, Phường Liễu Giai, Quận Ba Đình, TP Hà Nội, Việt Nam
Tel: 84 945 726 381
Email: ceo@aisecurity.com.vn
Copyright © 2026 - Powered by Aisecurity.
Offcanvas