Research of comprehensive anti-virus for network device

被引:0
|
作者
Information Center, Hefei University of Technology, Hefei 230009, China [1 ]
机构
来源
Yi Qi Yi Biao Xue Bao | 2007年 / SUPPL. 3卷 / 146-149期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
In the fields of anti-virus technology, characteristic code technology has been the main approach for many years. Heuristic scan skill of computer virus developed in the recent years is still with many insufficiencies. Therefore, there are difficulties to seek and kill Trojan horse backdoors, which become more and more similar with normal programs. In view of these problems, starting from independence of dataflow and the shortcomings of system and application, the study adopts strategy anti-virus technology to resist various harmful procedures. The infected action link of malicious code is analyzed and, in order to improve the anti-virus effect, it is also used as the main theoretical basis to be connected with current anti-virus technology.
引用
收藏
相关论文
共 50 条
  • [21] Contribution to the study of the anti-virus choleraic
    Golovanoff
    COMPTES RENDUS DES SEANCES DE LA SOCIETE DE BIOLOGIE ET DE SES FILIALES, 1924, 91 : 929 - 930
  • [22] Management tradeoffs in anti-virus strategies
    Post, G
    Kagan, A
    INFORMATION & MANAGEMENT, 2000, 37 (01) : 13 - 24
  • [23] Fast Proxyless Stream-Based Anti-Virus for Network Function Virtualization
    Kao, Chia-Nan
    Salim, S., I
    Huang, Nen-Fu
    Liao, I-Ju
    Liu, Rong-Tai
    Hung, Hsien-Wei
    2015 1ST IEEE CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT), 2015,
  • [24] Effect of anti-virus software on infectious nodes in computer network: A mathematical model
    Mishra, Bimal Kumar
    Pandey, Samir Kumar
    PHYSICS LETTERS A, 2012, 376 (35) : 2389 - 2393
  • [25] Anti-virus framework based on application monitor
    Wu, Yanjun
    Shi, Wenchang
    Liang, Hongliang
    Zhou, Zhouyi
    Jisuanji Gongcheng/Computer Engineering, 2006, 32 (12): : 152 - 153
  • [26] How to assess the effectiveness of your anti-virus?
    Josse, Sebastien
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2006, 2 (01): : 51 - 65
  • [27] Deployment of anti-virus software: A case study
    Sherif, Joseph S.
    Gilliam, David P.
    Information Management and Computer Security, 2003, 11 (01): : 5 - 10
  • [28] FIGHTING THE VIRUSES - PRACTICAL ANTI-VIRUS TRAINING
    LARSSON, M
    COMPUTER SECURITY, 1993, 37 : 301 - 311
  • [29] Is "intuitive" anti-virus software the wave of the future?
    Schultz, E
    COMPUTERS & SECURITY, 2004, 23 (08) : 628 - 629
  • [30] ALGORITHMS AND IMPLEMENTATION TECHNIQUES IN ANTI-VIRUS PROGRAMS
    Neamtu, Mircea Iosif
    INDUSTRIAL REVOLUTIONS, FROM THE GLOBALIZATION AND POST-GLOBALIZATION PERSPECTIVE, VOL V: ECONOMIC INFORMATION TECHNOLOGY IN THE AVANT-GARDE OF CHANGE, 2009, : 153 - 156