StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Heuristic Virus Detection Method - Assignment Example

Cite this document
Summary
The paper "Heuristic Virus Detection Method" presents a method that involves detecting and protecting the computer from viruses that were previously unknown hence are not in the virus definition files. This technology is also used to detect new variants of already existing viruses…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91% of users find it useful
Heuristic Virus Detection Method
Read Text Preview

Extract of sample "Heuristic Virus Detection Method"

Another technique of doing a heuristic test is decompiling the suspected software’s source code and comparing it to known malware source code. If it marches the known malware source code, the user is also notified. This is known as file analysis. Keeping track of known viruses should also be done and investigations done to detect any possible new variants of the same (tools). This is referred to as generic detection.

The basic detection functionality of heuristic detection involves finding false positives and false negatives. A threat to heuristic detection is the constant change of viruses which then may easily infiltrate into the computer system. To curb this, the number of false positives needs to be limited and this leads to the identification and quarantine of files that are not threats. Heuristic detection can also be bypassed through code injection. Code injection is when the virus software code is split into two parts. The core code which performs the malicious activities and the interface code provides a mechanism for injecting the core code into the memory and executing it. Heuristic antiviruses cannot detect this. Metasploit framework is also used to bypass heuristic antiviruses. A stronger form of virus protection software is the use of antiviruses that implement a real-time port monitor. This monitor actively identifies any malware that may have bypassed the antivirus (Malik). Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Memo Assignment Example | Topics and Well Written Essays - 250 words - 14”, n.d.)
Retrieved from https://studentshare.org/information-technology/1648189-memo
(Memo Assignment Example | Topics and Well Written Essays - 250 Words - 14)
https://studentshare.org/information-technology/1648189-memo.
“Memo Assignment Example | Topics and Well Written Essays - 250 Words - 14”, n.d. https://studentshare.org/information-technology/1648189-memo.
  • Cited: 0 times

CHECK THESE SAMPLES OF Heuristic Virus Detection Method

The History of Computer Forensics

In other words, computer forensics is application of the scientific method to digital media in order to establish information for judicial review.... The history of computer forensic starts with the first time a system administration had to figure out how and what a hacker had done to gain unauthorized access to explore the system....
24 Pages (6000 words) Essay

A Critical Analysis of Computer Network Security Methods

The paper "A Critical Analysis of Computer Network Security Methods" tells us about information technology.... The exponential growth of the most popular public network, the Internet, has made inter-communication fast and effective.... ... ... ... The amount of data flow through e-mails, e-commerce, etc has gained new peaks and is still growing....
21 Pages (5250 words) Essay

Investigating Dynamic Malware Analysis Tool

It will be expedient to equip scanners for the detection of.... However, the current malware detection scanning techniques have serious limitations.... An easy obfuscation of a software, which is a common Signature based detection is susceptible to invasion.... Since the pattern or the signature is obtained from a familiar malware, this detection technique is easily evaded by obfuscating a program such as junk insertion and packing (Mishra, 2010)....
4 Pages (1000 words) Research Proposal

Investigating Dynamic Malware Analysis Tool

Taking into consideration of the loss caused by such malicious programs, multiple static and dynamic malware detection tools have also been developed that often prove effective in mitigating the risk associated with malware attacks on crucial data storage and execution systems.... Static and dynamic malware detection analysis are few such tools that are provided by the software vendors, which are capable of identifying existing malware codes within a system and blocking or terminating them at the same instance (Egele et al....
27 Pages (6750 words) Case Study

Building and Managing e-Services

The aim of the following assignment is to describe the main business aspects of utilizing web services for e-commerce.... Thus, the paper examines the impact of online businesses and information technologies on business, revealing its advantages over the traditional approach.... ... ... ... The web application would take into account the ubiquity of the system and the seamless integration of various elements of the business....
16 Pages (4000 words) Assignment

Network Security - Information Assurance

The paper "Network Security - Information Assurance" highlights that in general, the explosive growth of Information Technology and the amalgamation of IT with telecommunication have brought together the world much closer than any time before in history.... ... ... ... It is important to state that the technology has grown leaps and bounds to provide multiple channels of access to various systems blurring the line between physical and logical systems....
12 Pages (3000 words) Coursework

Choosing a System Security Software for Business Organizations

The purpose of the present essay is to describe the significance of the proper protection of volatile data for business organizations.... Specifically, the essay will provide a critical assessment of the full-featured security suite known as Bitdefender Sphere Security.... ... ... ... ... ... ...
5 Pages (1250 words) Essay

Solutions to Performance Problems in VoIP over a Wireless LAN

This bibliography "Solutions to Performance Problems in VoIP over a Wireless LAN" discusses simulation and analysis of packet loss in user datagram protocol transfers.... The bibliography considers static analysis of executables to detect malicious patterns.... ... ... ... With the continued adoption of TCP as the most preferred transport layer protocols, studies have continued to assess the effectiveness of other transport layer protocols....
13 Pages (3250 words) Annotated Bibliography
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us