Results 1 to 8 of 8

Thread: Malware (Virus) Detection Techniques Integrated in Antivirus Softwares

  1. #1
    coolcool1227's Avatar
    coolcool1227 is offline Advance Member
    Last Online
    4th March 2022 @ 12:29 AM
    Join Date
    23 May 2009
    Location
    Sialkot
    Gender
    Male
    Posts
    2,219
    Threads
    62
    Credits
    1,575
    Thanked
    139

    Default Malware (Virus) Detection Techniques Integrated in Antivirus Softwares

    Malware (Virus) Detection Techniques



    Signature Based or Pattern Matching or String or Mask or Fingerprinting Technique

    A signature is an algorithm or hash (a number derived from a string of text) that uniquely identifies a specific virus. Depending
    on the type of scanner being used, it may be a static hash which, in its simplest form, is a calculated numerical value of a snippet
    of code unique to the virus. Or, less commonly, the algorithm may be behavior-based. A single signature may be consistent
    among a large number of viruses. A virus signature is the viral code. To identify viruses and other malware, antivirus software
    compares the contents of a file to a dictionary of virus signatures.

    Heuristic Analysis or Pro-Active Defense

    Heuristic scanning is similar to signature scanning, except that instead of looking for specific signatures, heuristic scanning
    looks for certain instructions or commands within a program that are not found in typical application programs. As a result, a
    heuristic engine is able to detect potentially malicious functionality in new, previously unexamined, malicious functionality such
    as the replication mechanism of a virus, the distribution routine of a worm or the payload of a Trojan.
    Here are a few of the common heuristic scanning techniques:

    File Emulation or Sandbox or Dynamic

    Also known as “sandbox testing” or dynamic scanning, file emulation allows the file to run in a controlled virtual system (or
    “sandbox”) to see what it does. If the file acts like a virus, it’s deemed a virus.

    File Analysis or Rule Based

    File analysis involves the software taking an in-depth look at the file and trying to determine its intent, destination, and purpose.
    Perhaps the file has instructions to delete certain files, and should be considered a virus.

    Weight Based

    A heuristic engine based on a weight-based system, which is a quite old styled approach, rates each functionality it detects with
    a certain weight according to the degree of danger it may pose. If the sum of those weights reaches a certain threshold, also an
    alarm can be triggered.

    Rule Based

    Nearly all nowadays utilized heuristic approaches implement rule-based systems. This means, that the component of the
    heuristic engine that conducts the analysis (the analyzer) extracts certain rules from a file and this rules will be compared against
    a set of rule for malicious code. If there matches a rule, an alarm can be triggered.

    Generic Signature Detection

    This technique is particularly designed to locate variations of viruses. Several viruses are re-created and make themselves known
    by a variety of names, but essentially come from the same family (or classification). Genetic detection uses previous antivirus
    definitions to locate these similar “cousins” even if they use a slightly different name or include some unusual characters. The
    best way to illustrate this idea is with identical twins. They may have slightly different fingerprints, but their DNA is identical.
    Heuristic Detection is an effective way to locate unknown threats for the most up-to-date realtime protection, but there are downsides. Obviously this sort of scanning and analysis can take some time, which may slow-down system performance. The main concern with heuristic detection is that it often increases false positives. False positives are when the antivirus software determines a file is malicious (and quarantines or deletes it) when in reality it is perfectly fine and/or desired. Because some files may look like viruses but really aren’t, they are restricted and stopped from working on your computer.

    Behavioral Blocking

    The suspicious behavior approach, by contrast, does not attempt to identify known viruses, but instead monitors the behavior
    of all programs. It involves Behavior based Heuristics and Generic Detections. If one program tries to write data to an executable program, for example, the antivirus software can flag this suspicious behavior, alert a user, and ask what to do. Unlike the signature based approach, the suspicious behavior approach therefore provides protection against brand-new viruses that do not yet exist in any virus dictionaries. However, it can also sound a large number of false positives. In recent years, however, sophisticated behavior analysis has emerged, which analyzes processes and calls to the kernel in context before making a decision, which gives it a lower false positive rate than rules based behavior monitoring.

    Unlike heuristics or fingerprint-based scanners, behavior blocking software integrates with the operating system of a host
    computer and monitors program behavior in real-time for malicious actions. The behavior blocking software then blocks
    potentially malicious actions before they have a chance to affect the system. Monitored behaviors can include:

    1) Attempts to open, view, delete, and/or modify files;
    2) Attempts to format disk drives and other unrecoverable disk operations;
    3) Modifications to the logic of executable files, scripts of macros;
    4) Modification of critical system settings, such as start-up settings;
    5) Scripting of e-mail and instant messaging clients to send executable content; and,
    6) Initiation of network communications.

    If the behavior blocker detects that a program is initiating would-be malicious behaviors as it runs, it can block these behaviors
    in real-time and/or terminate the offending software. This gives it a fundamental advantage over such established anti-virus
    detection techniques such as fingerprinting or heuristics. While there are literally trillions of different ways to obfuscate and rearrange the instructions of a virus or worm, many of which will evade detection by a fingerprint scanner or heuristic, eventually malicious code must make a well-defined request to the operating system. Given that the behavior blocker can intercept all such requests, it can identify and block malicious actions regardless of how obfuscated the program logic appears to be.

  2. #2
    Silentjan's Avatar
    Silentjan is offline Senior Member
    Last Online
    5th July 2013 @ 03:10 PM
    Join Date
    24 Jun 2010
    Location
    Tarbela
    Age
    34
    Gender
    Male
    Posts
    13,868
    Threads
    323
    Thanked
    1628

    Default

    بہت خوب

    لیکن اگر اس کو اردو میں شیئر کرتے تو سونے پر سہاگہ ہو جاتا

  3. #3
    haseebazeem's Avatar
    haseebazeem is offline Senior Member+
    Last Online
    5th January 2013 @ 02:13 PM
    Join Date
    09 Jun 2012
    Age
    56
    Gender
    Male
    Posts
    118
    Threads
    15
    Credits
    0
    Thanked
    2

    Default

    as it is possible to detect virus with above techniques but there are sometime very strong virus which only be found through some antivirus....

  4. #4
    coolcool1227's Avatar
    coolcool1227 is offline Advance Member
    Last Online
    4th March 2022 @ 12:29 AM
    Join Date
    23 May 2009
    Location
    Sialkot
    Gender
    Male
    Posts
    2,219
    Threads
    62
    Credits
    1,575
    Thanked
    139

    Default

    Actually is mein bahut Technical Terms hein, urdu mein samjhana mushkil ho jata.

    Aur janab yeh Techniques antivirus softwares mein hi use hoti hein.

  5. #5
    Silentjan's Avatar
    Silentjan is offline Senior Member
    Last Online
    5th July 2013 @ 03:10 PM
    Join Date
    24 Jun 2010
    Location
    Tarbela
    Age
    34
    Gender
    Male
    Posts
    13,868
    Threads
    323
    Credits
    0
    Thanked
    1628

    Default

    Quote coolcool1227 said: View Post
    actually is mein bahut technical terms hein, urdu mein samjhana mushkil ho jata.
    بھائی جو تکنیکی اصلاحات ہیں
    وہ تو آپ ہو بہو اسی طرح اردو میں شامل کر سکتے ہیں
    اردو زبان میں یہ صلاحیت موجود ہے کہ وہ اپنے اندر بہت سی زبانوں کو سما سکتی ہے۔

    اور اس طرح کرنے سے اردو میں مال ویئر پر ایک اچھا آرٹیکل بن جائے گا۔

  6. #6
    JAGUARS is offline Senior Member+
    Last Online
    8th October 2012 @ 02:10 PM
    Join Date
    28 Apr 2012
    Gender
    Male
    Posts
    73
    Threads
    5
    Credits
    0
    Thanked
    0

    Default

    nice sharing

  7. #7
    mamnoon's Avatar
    mamnoon is offline Senior Member+
    Last Online
    10th June 2020 @ 03:33 PM
    Join Date
    27 Jun 2012
    Gender
    Male
    Posts
    575
    Threads
    96
    Credits
    38
    Thanked
    19

    Default

    nice sharing janab

  8. #8
    ITD Student is offline Member
    Last Online
    5th July 2013 @ 08:08 PM
    Join Date
    03 Mar 2012
    Location
    Multan
    Gender
    Male
    Posts
    772
    Threads
    83
    Thanked
    70

    Default

    thanks for sharing

Similar Threads

  1. 1click Scan File With 32 Antivirus Software's
    By Net-Rider in forum Website Reviews
    Replies: 105
    Last Post: 15th June 2013, 08:41 AM
  2. Uninstall Tools for Antivirus Softwares
    By coolcool1227 in forum English IT Zone
    Replies: 20
    Last Post: 12th February 2013, 02:29 PM
  3. Answered agar aap mera ye masla hal kardain to ma apka buhut shukar guzar rahunga
    By Faisal Khan1 in forum Ask an Expert
    Replies: 49
    Last Post: 14th January 2012, 02:32 PM
  4. Softwares ko online scan kark virus dhond ek zabardast site
    By zulfiali86 in forum General Discussion
    Replies: 10
    Last Post: 10th June 2011, 08:01 AM
  5. Malware Trojan Virus Help need
    By gr8khali in forum Ask an Expert
    Replies: 8
    Last Post: 20th June 2007, 05:39 PM

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •