Hardware and software setup

Comparison of anti-virus programs in graphs and tables. Comparative analysis of antivirus programs

Send your good work in the knowledge base is simple. Use the form below

Students, graduate students, young scientists who use the knowledge base in their studies and work will be very grateful to you.

Posted on http://www.allbest.ru/

COMPARATIVE ANALYSIS OF ANTI-VIRUS SOFTWARE FOR COMPUTER

Ivanchenko Alexander Evgenievich,

Chistyakova Natalya Sergeevna,

Federal State Budgetary Educational Institution of Higher Education "Magnitogorsk State

technical university. G.I. Nosov"

In this article, we will compare several free antivirus programs and find out which one is safer.

Keywords: sandbox, firewall.

Ensuring information security of systems is one of the primary issues. AT modern society information protection plays a particularly significant role, since the Internet is teeming with viruses, and even the simplest of them can cause serious harm to a computer and the data stored on it. These threats can be of the most diverse nature - disrupt the system by destroying important system files, steal important information, passwords, documents. This leads to sad consequences - from reinstalling the system to losing important data or money. Therefore, the question of choosing an antivirus program for a computer that can protect important data becomes very important. In this article, we will look at some popular antiviruses and try to choose the most optimal among them for the average user (most of them will be free, since, nevertheless, free antiviruses are the most accessible to a wide audience of users). So, we will consider 4 antiviruses - Avast Free Antivirus, Panda Antivirus, 360 Total Security, ESET NOD32. Let's start with an introduction and brief information about each of them.

Avast Free Antivirus- one of the most famous free antiviruses. Avast includes an AutoSandbox feature that automatically places suspicious files in a so-called "sandbox" where you can fully analyze the file and then disinfect it if necessary. This function saves a large percentage of information from automatic deletion, which in turn helps prevent problems and errors resulting from accidental damage to system files. Avast also has remote support, allowing users to connect to each other for mutual assistance. Overall, Avast Free Antivirus is a good choice for the average user, providing good security and system protection.

360 Total Security- slightly less than Avast, but still quite a well-known antivirus that relies on reliability and simplicity, according to its creators. It will appeal to a variety of categories of users. For beginners, it will be convenient for the strong automation of antivirus functions that protect the computer without the direct participation of the user. For advanced users, there are flexible application settings, the ability to optimize system performance through antivirus, and the ability to create multiple profiles with different settings.

panda antivirus is positioned by the developers as an easy-to-use, but reliable and effective antivirus. Let's take a look at its functionality. Most of the functions are automated, including automatically scanning your computer for threats. There is a function of the Panda Cloud Cleaner anti-virus boot disk that allows you to cure the system when it cannot boot itself due to infection.

ESET NOD32 - a fairly effective antivirus with an aggressive approach to detecting and neutralizing threats. Here are just some of its features: several levels of protection against various variations of unwanted software and viruses; firewall with the ability to customize to encrypt the connection; parental control; scanning connected devices. Unfortunately, such an abundance of functions significantly increases the load on the system.

So, for clarity, we present the results of the analysis of the characteristics and functionality of anti-virus programs in tabular form (Table 1).

From table 1, we see that if we talk about the number of different functions, then ESET NOD32 will be the undisputed leader, and Panda Antivirus and 360 Total Security are the least reliable. Now let's test the interaction of antiviruses with the system. The test results are presented in table 2.

Table 1-Results of a comparative analysis of the characteristics and functionality of anti-virus programs

Antivirus functionality

Avast Free Antivirus

360 Total Security

Antivirus scanner and antivirus monitor

Protection of personal information

Heuristic algorithm

The presence of a firewall

Email protection

Ability to work in the cloud

Intrusion detection and prevention system

Antispam

Update system

Web protection

Behavior Blocker

table 2-Results of tests for the interaction of antiviruses with the system

In tests, he showed himself the most "easy" for the system Avast Free Antivirus.360 Total Security and panda antivirus slightly inferior in scanning speed, while ESET NOD32 almost never lags behind. In terms of memory usage, the leaders are Avast and Panda. ESET NOD32 and 360 Total Security consume significantly more memory.

Thus, the best antivirus option is Avast Free Antivirus, which showed good results both in the review of the functionality and in the tests. antivirus review safety optimal

ESET NOD32 is also good option, but, as mentioned earlier, significantly loads the system.

360 Total Security and Panda Antivirus are good choices for beginners due to the automation of many features and a nice simple interface, but still fall short of the first two antiviruses in terms of security settings.

Bibliographic list

1. Gaisina A.D., Makhmutova M.V. Problems of ensuring information security of an automated system of an enterprise / In the collection: Modern instrumental systems, information Technology and innovation. Collection of scientific papers of the XII International scientific and practical conference. Managing editor: Gorokhov A.A. 2015. S. 290-293.

2. Bobrova I.I. Information Security cloud technologies/ In the collection: Information security and prevention of cyber extremism among young people. Materials of intrauniversity conference. Edited by G.N. Chusavitina, E.V. Chernova, O.L. Kolobova. 2015. S. 80-84

3. Chernova E.V., Bobrova I.I., Movchan I.N., Trofimov E.G., Zerkina N.N., Chusavitina G.N. Тeachers training for prevention of pupils deviant behavior in ICT/ Proceedings of the 2016 Conference on Information Technologies in Science, Management, Social Sphere and Medicine (ITSMSSM 2016) 2016. P. 294-297.

4. Makhmutova M.V., Podkolzina L.V., Makhmutov R.R. Application of innovative educational technologies in the study of the foundations of information security of organizational management systems / M.V. Makhmutova, L.V. Podkolzina, R.R. Makhmutov // In the collection: Information security and prevention of cyber extremism among young people. Materials of intrauniversity conference. Edited by G.N. Chusavitina, E.V. Chernova, O.L. Kolobova. 2015. S. 297-305.

Hosted on Allbest.ru

...

Similar Documents

    The concept of computer viruses, their types and classification. The main signs of a computer infection. Kaspersky Antivirus, Dr.Web CureIt, Nod32, Avast, Norton AntiVirus, Panda, McAfee, Avira Free Antivirus, ADinf32, NANO Antivirus, 360 Total Security.

    presentation, added 05/14/2016

    The emergence of computer viruses, their classification. The problem of anti-virus programs fighting computer viruses. Conducting a comparative analysis of modern anti-virus tools: Kaspersky, Panda Antivirus, Nod 32, Dr. Web. Virus search methods.

    term paper, added 11/27/2010

    Main functional and technological capabilities file manager Total Commander. Practical skills in the use of anti-virus programs on the example of the NOD32 program. Features of using basic and additional Opportunities Total commander.

    laboratory work, added 03/08/2010

    The most popular and effective types of antivirus programs. List of the most common anti-virus programs in Russia. What to do if a virus enters your computer. Role antivirus protection and her choice for safe work computer.

    presentation, added 06/08/2010

    Functional diagram local computer network and its information flows. Classification of information security tools. Types of anti-virus programs: Kaspersky, Trend Micro ServerProtect for Microsoft Windows, Panda Security for File Servers, Eset Nod32.

    thesis, added 01/19/2014

    Comparative characteristics antivirus programs. Firm-developer and characteristics of the Eset program smart security, the form of selling licenses and the structure of information security modules. Purpose of the Eset SysInspector utility. Correct update rules.

    control work, added 03/10/2011

    The concept of computer viruses, their types, the main methods of detection. Classification of anti-virus software and their comparative analysis. Essence of Kaspersky Anti-Virus Doctor Web, Norton AntiVirus Professional Edition, NOD 32 Antivirus System.

    practice report, added 04/07/2010

    Installation and use of antivirus programs. Determination of the speed of scanning files for viruses. Checking anti-virus programs for the effectiveness of searching for infected files. Antivirus programs NOD32, Dr. web, kaspersky internet security.

    term paper, added 01/15/2010

    The concept and classification of computer viruses. Basic methods of protecting information from viruses. Review of modern software tools for the safe operation of a computer. Classification of antiviruses. Kaspersky Antivirus, Norton Antivirus, Dr. Weber, Eset NOD32.

    term paper, added 10/26/2015

    General information, the concept and varieties of computer viruses. Creation of computer viruses as a type of crime. Ways of penetration of viruses and signs of their appearance in the computer. Antivirus tools. Comparative analysis of anti-virus programs.

Today, more than ever, anti-virus software is not only the most in-demand security system of any operating system, but also one of its main components. And if earlier the user had a very limited, modest choice, now there are a lot of such programs. But if you look at the list of "Top 10 antiviruses", you will notice that not all of them are equal in terms of functionality. Consider the most popular packages. At the same time, the analysis will include both paid and shareware (anti-virus for 30 days), and freely distributed applications. But first things first.

Top 10 Antiviruses for Windows: Testing Criteria

Before proceeding with the compilation of a certain rating, perhaps, you should familiarize yourself with the main criteria that in most cases are used when testing such software.

Naturally, it is simply impossible to consider all known packages. However, among all those designed to protect a computer system in the broadest sense, the most popular ones can be distinguished. At the same time, we will take into account both the official ratings of independent laboratories and the reviews of users who use this or that software product in practice. In addition, mobile programs will not be affected, we will focus on stationary systems.

As for the conduct of basic tests, as a rule, they include several main aspects:

  • availability of paid and free versions and restrictions related to functionality;
  • regular scan speed;
  • the speed of identifying potential threats and the ability to remove or isolate them in quarantine using built-in algorithms;
  • update frequency anti-virus databases;
  • self-defense and reliability;
  • availability of additional features.

As you can see from the above list, checking the operation of antivirus software allows you to determine the strengths and weaknesses of a particular product. Next, I will consider the most popular software packages included in the Top 10 antiviruses, and also give their main characteristics, of course, taking into account the opinions of people who use them in their daily work.

Kaspersky Lab software products

To begin with, let's consider the software modules developed by Kaspersky Lab, which are extremely popular in the post-Soviet space.

It is impossible to single out any one program here, because among them you can find a regular Kaspersky Antivirus scanner, and modules like Internet Security, and portable utilities like the Virus Removal Tool, and even boot disks for damaged Rescue Disc systems.

Immediately it is worth noting two main disadvantages: firstly, judging by the reviews, almost all programs, with rare exceptions, are paid or shareware, and secondly, the system requirements are unreasonably high, which makes it impossible to use them in relatively weak configurations . Naturally, this scares off many ordinary users, although activation keys for Kaspersky Antivirus or Internet Security can easily be found on the World Wide Web.

On the other hand, the situation with activation can be corrected in another way. For example, Kaspersky keys can be generated using special applications like Key Manager. True, this approach is, to put it mildly, illegal, however, as a way out, it is used by many users.

The speed of work on modern machines is average (for some reason, more and more heavy versions are created for new configurations), but constantly updated databases, the uniqueness of technologies for detecting and removing known viruses and potentially dangerous programs are on top here. It is not surprising that Kapersky Lab is today a leader among developers of security software.

And two more words about the recovery disk. It is unique in its own way, because it loads the scanner from GUI even before the start of Windows itself, allowing you to remove threats even from random access memory.

The same goes for the portable Virus Removal Tool, which can track down any threat on an infected terminal. It can only be compared with a similar utility from Dr. Web.

Protection from Dr. web

Before us is another of their strongest representatives in the field of security - the famous "Doctor Web", who stood at the origins of the creation of all anti-virus software from time immemorial.

Among the huge number of programs, you can also find regular scanners, and protection tools for Internet surfing, and portable utilities, and recovery disks. You can't list everything.

The main factor in favor of the software of this developer can be called high speed, instant detection of threats with the ability to either complete removal, or isolation, as well as a moderate load on the system as a whole. In general, from the point of view of most users, this is a kind of lightweight version of Kaspersky. there is still something interesting here. In particular, this is Dr. web katana. It is believed that this is a new generation software product. It is focused on the use of "sand" technologies, i.e. placing a threat in the "cloud" or "sandbox" (whatever you want to call it) for analysis before it penetrates the system. However, if you look at it, there are no special innovations here, because this technique was used back in free antivirus Panda. In addition, according to many users, Dr. Web Katana is a kind of Security Space with the same technologies. However, speaking in general, any software from this developer is quite stable and powerful. It is not surprising that many users prefer just such packages.

ESET software

Speaking about the Top 10 antiviruses, one cannot fail to mention another brightest representative of this area - ESET, which became famous for such a well-known product as NOD32. A little later, the module was born ESET Smart security.

If we consider these programs, we can note an interesting point. To activate the full functionality of any package, you can do two things. On the one hand, this is the acquisition of an official license. On the other hand, you can install a trial antivirus for free, but activate it every 30 days. With activation, too, an interesting situation.

As noted by absolutely all users, for ESET Smart Security (or for regular antivirus) on the official website it was possible to find freely distributed keys in the form of a login and password. Until recently, only this data could be used. Now the process has become somewhat more complicated: first you need a login and password on a special site, convert it into a license number, and only then enter it in the registration field already in the program itself. However, if you do not pay attention to such trifles, it can be noted that this antivirus is one of the best. Benefits reported by users:

  • virus signature databases are updated several times a day,
  • definition of threats at the highest level,
  • there are no conflicts with system components (firewall),
  • the package has the strongest self-protection,
  • no false alarms, etc.

Separately, it is worth noting that the load on the system is minimal, and the use of the Anti-Theft module even allows you to protect data from theft or misuse for personal gain.

AVG Antivirus

AVG Antivirus is paid software designed to provide comprehensive security for computer systems (there is also a free truncated version). And although today this package is no longer among the top five, nevertheless, it demonstrates a fairly high speed and stability.

In principle, it is ideal for home use, because, in addition to the speed of work, it has a convenient Russified interface and more or less stable behavior. True, as some users note, sometimes it is able to skip threats. And this is not about viruses per se, but rather about spyware or adware called Malware and Adware. The program's own module, although widely advertised, still, according to users, looks somewhat unfinished. Yes, and an additional firewall can often cause conflicts with the "native" Windows firewall if both modules are in the active state.

Avira package

Avira is another member of the antivirus family. Fundamentally, it does not differ from most similar packages. However, if you read user reviews about it, you can find quite interesting posts.

Many in no case recommend using the free version, since some modules are simply missing in it. To ensure reliable protection, you will have to purchase a paid product. But such an antivirus is suitable for the 8th and 10th versions, in which the system itself uses a lot of resources, and the package uses them at the lowest level. In principle, Avira is best suited, say, for budget laptops and weak computers. On a network installation, however, there can be no question.

Cloud service Panda Cloud

Free at one time became almost a revolution in the field of antivirus technology. The use of the so-called "sandbox" to send suspicious content for analysis before it enters the system has made this application especially popular among users of all levels.

And it is with the "sandbox" that this antivirus is associated today. Yes, indeed, this technology, unlike other programs, allows you to keep the threat out of the system. For example, any virus first saves its body on the hard drive or in RAM, and only then begins its activity. Here, the matter does not come to preservation. First, a suspicious file is sent to the cloud service, where it is checked, and only then can it be saved in the system. True, according to eyewitnesses, alas, this can take quite a lot of time and unnecessarily heavily loads the system. On the other hand, here it is worth asking yourself what is more important: security or increased scan time? However, for modern computer configurations with an Internet connection speed of 100 Mbps or higher, it can be used without problems. By the way, its own protection is provided precisely through the "cloud", which sometimes causes criticism.

Scanner Avast Pro Antivirus

Now a few words about another bright representative. It is quite popular with many users, however, despite the presence of the same “sandbox”, anti-spyware, network scanner, firewall and virtual office, unfortunately, Avast Pro Antivirus clearly loses to such giants as software products Kaspersky Labs or applications using Bitdefender technologies, although it demonstrates high scanning speed and low resource consumption.

Users in this product are attracted mainly by the fact that the free version of the package is as functional as possible and does not differ much from paid software. In addition, this antivirus works on all Windows versions, including the "top ten", and behaves perfectly even on outdated machines.

360 Security Packages

Before us is probably one of the fastest antiviruses of our time - 360 Security, developed by Chinese specialists. In general, all products labeled "360" are distinguished by an enviable speed of work (the same Internet browser 360 Safety Browser).

Despite the main purpose, the program has additional modules to eliminate vulnerabilities operating system and its optimization. But neither the speed of work nor the free distribution can be compared with false alarms. In the list of programs that have the highest indicators for this criterion, this software occupies one of the first places. According to many experts, conflicts arise at the system level due to additional optimizers, the action of which intersects with the tasks of the OS itself.

Software products based on Bitdefender technologies

Another "old man" among the most famous defenders of "OSes" is Bitdefender. Unfortunately, in 2015 he lost the palm to Kaspersky Lab products, nevertheless, in the antivirus fashion, so to speak, he is one of the trendsetters.

If you look a little more closely, you can see that many modern programs (the same 360 ​​Security package) in different variations are made on the basis of these technologies. Despite the rich functional base, it also has its shortcomings. Firstly, you will not find the Russian antivirus (Russified) Bitdefender, since it does not exist in nature at all. Secondly, despite the use of the latest technological developments in terms of system protection, alas, it shows too high a number of false positives (by the way, according to experts, this is typical for the entire group of programs created on the basis of Bitdefender). The presence of additional optimizer components and your own firewalls generally affects the behavior of such antiviruses not for the better. But you can't refuse the speed of this application. In addition, P2P is used for verification, but there is no verification at all Email in real time, which many do not like.

Antivirus from Microsoft

Another app that scores enviably well with and without reason is Microsoft's own product called Security Essentials.

This package is included in the Top 10 antiviruses, apparently, only because it was developed exclusively for Windows systems, which means that it does not cause absolutely no conflicts at the system level. Besides, who, if not specialists from Microsoft, should know all the security holes and vulnerabilities of their own operating systems. Incidentally, it is interesting that the initial Windows builds 7 and Windows 8 had MSE in the basic configuration, but then for some reason this kit was abandoned. However, it is for Windows that it can become the simplest solution in terms of protection, although you can’t count on special functionality.

McAfee app

As for this application, it looks quite interesting. True, it has earned the greatest popularity in the field of application on mobile devices with all kinds of blocking, nevertheless, this antivirus behaves no worse on stationary computers.

The program has low-level support for P2P networks when sharing Instant Messenger files, and also offers 2-level protection, in which the main role is assigned to the WormStopper and ScriptStopper modules. But in general, according to consumers, the functional set is average, and the program itself is focused more on detecting spyware, computer worms and trojans and preventing executable scripts or malicious codes from penetrating the system.

Combined antiviruses and optimizers

Naturally, only those included in the Top 10 antiviruses were considered here. If we talk about the rest of the software of this kind, we can note some packages that contain anti-virus modules in their sets.

What to prefer?

Naturally, all antiviruses have certain similarities and differences. What to install? Here you need to proceed from the needs and the level of protection provided. Usually, to corporative clients it is worth buying something more powerful with the ability network installation(Kaspersky, Dr. Web, ESET). As for home use, here the user himself chooses what he needs (if desired, you can even find an antivirus for a year - without registration or purchase). But, if you look at user reviews, it is better to install Panda Cloud, even with some additional system load and sandboxing time. But it is here that there is a full guarantee that the threat will not penetrate the system in any way. However, everyone is free to choose what he needs. If activation does not make it difficult, please: ESET products work fine in home systems. But using optimizers with anti-virus modules as the main means of protection is highly undesirable. Well, it’s also impossible to say which program takes the first place: how many users, so many opinions.


I’ll make a reservation right away that the article will only compare those anti-virus solutions that are common in Russia, namely Kaspersky Anti-Virus , Eset Nod32 , Doctor Web , Symantec/Norton , Trend Micro , Panda, McAfee, Sophos, BitDefender, F-Secure, Avira, Avast!, AVG, Microsoft. Such exotics as G-DATA AVK, F-Prot Anti-Virus and AEC TrustPort will not be considered. So, let's start preparing the tests.

Patriarchs of Testing

One of the first to test anti-virus products was the British magazine Virus Bulletin, the first tests published on their website date back to 1998. The basis of the test is a collection malware wild list. To successfully pass the test, you must identify all viruses in this collection and demonstrate a zero false positive rate on a collection of "clean" log files. Testing is carried out several times a year on various operating systems; Products that successfully pass the test receive the VB100% award. Below you can see how many VB100% awards were received in 2006-2007 by the products of various antivirus companies.


Of course, the Virus Bulletin magazine can be called the oldest antivirus tester, but the status of the patriarch does not save him from criticism of the antivirus community. For example, at the September Virus Bulletin conference in Vienna, well-known expert Andreas Marx from the AV-Test research laboratory at the University of Magdeburg made a presentation on The WildList is Dead, Long Live the WildList! In his report, Marks emphasized that all tests that are carried out on the WildList virus collection (including VB100%) have whole line shortcomings associated with the composition of this collection. First, WildList includes only viruses and worms and only for the Windows platform, while other types of malware (trojans, backdoors) and malware for other platforms are left out. Secondly, the WildList collection contains a small number of malicious programs and is replenished very slowly: only a few dozen new viruses appear in the collection per month, while, for example, the AV-Test collection is replenished with several tens or even hundreds of thousands of malware instances during this time.

All this suggests that in its present form, the WildList collection is obsolete and does not reflect the real situation with viruses on the Internet. As a result, according to Andreas Marx, tests based on the WildList collection are becoming increasingly meaningless. They are good for advertising products that have passed them, but they do not really reflect the quality of anti-virus protection.

From WildList to tests on large collections

Independent research laboratories such as AV-Comparatives, AV-Tests are not limited to criticizing testing methods. Twice a year, they themselves test their antivirus products for on-demand malware detection. At the same time, the collections on which testing is carried out contain up to a million malicious programs and are regularly updated. The test results are published on the websites of these organizations (www.AV-Comparatives.org, www.AV-Test.org) and in well-known computer magazines PC World, PC Welt, etc. The results of the August tests are presented below:


Speaking of the most common Russian market products, then, as we can see, according to the results of these tests, only solutions from Kaspersky Lab and Symantec are in the top three. Avira, the leader in the tests, deserves special attention, but we will return to this topic later in the section on false positives.

Modeling the user

Tests of research laboratories AV-Comparatives and AV-Test, as well as any tests, have their pros and cons. The upside is that testing is done on large collections of malware, and that these collections represent a wide variety of malware types. The disadvantages are that these collections contain not only "fresh" malware samples, but also relatively old ones. As a rule, samples collected within the last six months are used. In addition, during these tests, the results of the check are analyzed hard drive on demand, while in real life the user downloads infected files from the Internet or receives them as attachments by e-mail. It is important to detect such files at the very moment they appear on the user's computer.

An attempt to develop a testing methodology that does not suffer from this problem was made by one of the oldest British computer magazines-PC Pro. Their test used a collection of malware that had been detected two weeks prior to the test in traffic passing through MessageLabs' servers. MessageLabs offers filtering services to its clients various kinds traffic, and its collection of malicious programs really reflects the situation with the spread of computer infection on the Web.

The PC Pro log team did not just scan infected files, but simulated user actions: infected files were attached to emails as attachments, and these emails were downloaded to a computer from installed antivirus. In addition, using specially written scripts, infected files were downloaded from a web server, i. user surfing on the Internet was simulated. The conditions under which such tests are carried out are as close to real as possible, which could not but affect the results: the detection rate for most antiviruses turned out to be significantly lower than with a simple on-demand scan in the AV-Comparatives and AV-Test tests. In such tests, an important role is played by how quickly antivirus developers react to the emergence of new malware, as well as what proactive mechanisms are used when malware is detected.

Rapid Response Team

The speed of release of antivirus updates with new malware signatures is one of the most important components of effective antivirus protection. The sooner the signature database update is released, the less time the user will remain unprotected. In April 2007, the AV-Test laboratory team conducted a study on the response rate to new threats for the American magazine PC World, and this is what they came up with:

Known unknown

Lately, new malware has been appearing so frequently that antivirus labs can barely keep up with new samples. In such a situation, the question arises of how an antivirus can resist not only already known viruses, but also new threats for the detection of which a signature has not yet been released.

So-called proactive technologies are used to detect unknown threats. Roughly, these technologies can be divided into two types: heuristics (detect malicious programs based on the analysis of their code) and behavioral blockers (block the actions of malware when they are launched on a computer, based on their behavior).

Speaking of heuristics, their effectiveness has long been studied by AV-Comparatives, a research laboratory led by Andreas Clementi. The AV-Comparatives team uses a special technique: antiviruses are checked against the current virus collection, but an antivirus with three-month-old signatures is used. Thus, the antivirus has to counter malware that it knows nothing about. Antiviruses are tested by scanning the collection of malware on the hard drive, so only the effectiveness of the heuristic is checked, another proactive technology - behavior blocker - is not used in these tests. As we can see, even the best heuristics on this moment show a detection rate of only about 70%, and many of them also suffer from false positives on clean files. All this, unfortunately, suggests that so far this proactive detection method can only be used simultaneously with the signature method.

As for another proactive technology - a behavioral blocker, no serious comparative tests have been conducted so far. First, in many anti-virus products (Doctor Web, NOD32, Avira, etc.) there is no behavioral blocker in principle. Secondly, the conduct of such tests is fraught with some difficulties. The fact is that to test the effectiveness of a behavioral blocker, it is necessary not to scan a disk with a collection of malicious programs, but to run these malware on a computer and observe how successfully the antivirus blocks their actions. This process is very time consuming and few researchers are capable of undertaking such tests. All that is currently available to the general public is the results of individual product tests conducted by the AV-Comparatives team. If, during testing, antiviruses successfully blocked the actions of malicious programs unknown to them while they were running on the computer, then the product received the Proactive Protection Award. AT this moment such awards were received by F-Secure with DeepGuard behavioral technology and Kaspersky Anti-Virus with its Proactive Defense module.

Infection prevention technologies based on analysis of malware behavior are becoming more widespread, and the lack of comprehensive comparative tests in this area cannot but be alarming. Recently there has been hope for the emergence of such tests: at the Virus Bulletin 2007 conference, specialists from the AV-Test research laboratory held a broad discussion of this issue, in which developers of anti-virus products also participated. The result of this discussion was a new methodology for testing the ability of antivirus products to resist unknown threats. The methodology will be presented in detail at the end of November at the Asian Association of Antiviral Researchers Conference in Seoul.

False positives are worse than viruses

A high level of malware detection using various technologies is one of the most important characteristics of an antivirus. But perhaps no less important characteristic is the absence of false positives. False positives can cause no less harm to the user than a virus infection: block the work desired programs, block access to sites, etc. Unfortunately, false positives happen quite often. After another update in September 2007 AVG antivirus began to accept Adobe Acrobat Reader 7.0.9 for the SHueur-JXW Trojan, and the NOD32 antivirus in July 2007 reported to users about the detection of the Tivso.14a.gen Trojan when faced with banners from serving-sys.com on popular sites like Yahoo, MySpace and other portals mainly of a news orientation .

In the course of its research, AV-Comparatives, along with studying the ability of antiviruses to detect malware, also conducts tests for false positives on collections of clean files (see the results in the diagram below). According to the test, Doctor Web and Avira have the worst false positives.

We treat what is not caught

As sad as it is to admit, there is no 100% protection against viruses. From time to time, users are faced with a situation where a malicious program has penetrated a computer and the computer has become infected. This happens either because there was no antivirus on the computer at all, or because the antivirus did not detect the malware either by signature or proactive methods. In such a situation, it is important that when an antivirus with fresh signature databases is installed on the computer, the antivirus can not only detect a malicious program, but also successfully eliminate all the consequences of its activity, cure an active infection. At the same time, it is important to understand that virus writers are constantly improving their "skill", and some of their creations are quite difficult to remove from a computer - malware can different ways mask their presence in the system (including with the help of rootkits) and even counteract the work of anti-virus programs. In addition, it is not enough to simply delete or disinfect an infected file, you need to eliminate all changes made by a malicious process in the system (for example, changes in the registry), and completely restore the system to working order. The authors are unaware of only one group of researchers that conducts tests for the treatment of active infection - this is the team of the Russian portal Anti-Malware.ru. They last conducted such a test in September last year, its results are presented in the following diagram:

Integrating estimates

Above, we reviewed a variety of approaches to testing antiviruses and showed what parameters of antivirus operation are considered during testing. It is clear that for some antiviruses one indicator turns out to be advantageous, for others - another. At the same time, it is natural that in their promotional materials, antivirus developers focus only on those tests where their products occupy a leading position. For example, Kaspersky Lab focuses on the speed of response to the emergence of new threats, Eset on the strength of its heuristic technologies, Doctor Web describes its advantages in the treatment of active infection. But what should the user do, how to make the right choice?

We hope that this article will help users in choosing an antivirus. To do this, the results of a variety of tests were presented so that the user gets an idea of ​​​​the strengths and weaknesses of anti-virus software. It is clear that the solution that the user chooses must be balanced and, according to most parameters, must be among the leaders according to the test results. To complete the picture below, the positions that antiviruses took in the tests considered are summarized in a single table, as well as an integrated assessment is derived - what place does a particular product take on average in all tests. As a result, in the top three winners: Kaspersky, Avira, Symantec.

In this graduation qualifying work the problem of combating computer viruses, which anti-virus programs are engaged in, is considered. Among the set of programs used by most personal computer users every day, anti-virus programs traditionally occupy a special place.


Share work on social networks

If this work does not suit you, there is a list of similar works at the bottom of the page. You can also use the search button


Other related works that may interest you.vshm>

20284. Public participation as a factor in the effectiveness of the development and implementation of programs for the development of megacities and agglomerations: a comparative analysis 146.65KB
The role and importance of strategic planning for the development of large cities and agglomerations. Expanding the scope of strategic planning. World experience in the development of strategic development documents and the presence of a public participation factor in them. The Barcelona experience: The evolution of strategic planning in Barcelona and its metropolis.
19100. Comparative analysis of intuitive and logical thinking 22.37KB
Comparative analysis of intuitive and logical thinking. Basic theories of thinking and approaches to its study in foreign and domestic psychology. In the process of thinking, a person reflects the objective world differently than in the processes of perception and imagination. During independent work the main theories of thinking and approaches to its study in psychology will be considered.
21121. Comparative analysis of econometric regression models 1.78MB
The basis of econometrics is the construction of an econometric model and the determination of the possibilities of using this model to describe the analysis and forecasting of real economic processes. The goals of the course project are the development of design solutions for information and methodological support of research in the field of econometric modeling, as well as obtaining practical skills in building and researching econometric models. The ultimate applied goal of econometric modeling of real socio-economic processes in this ...
14351. SHADOW ECONOMY IN MODERN INTERPRITATION: A COMPARATIVE ANALYSIS 186.56KB
To achieve the formulated goal, the following tasks are set. First, it is necessary to consider the main causes and prerequisites for the emergence of the shadow economy. Second, give general characteristics the concept of the phenomenon of the shadow economy, its economic nature. Thirdly, there is a need to conduct a meaningful and structural analysis of this economic phenomenon.
18490. 115.79KB
Responsibility of a public notary in the implementation of notarial acts. The legal basis for the activities of privately practicing notaries in the territory of the Republic of Kazakhstan. Responsibility of a notary in private practice. Comparative analysis of institutions of public and private notaries in the territory of the Republic of Kazakhstan. Judicial practice in considering cases of challenging the actions of notaries in the exercise of notarial ...
18483. NORTH AMERICA INDIAN TALES: A COMPARATIVE ANALYSIS 8.39KB
The phenomenon of a fairy tale is a very mysterious topic of research, since oral folk art, more than other types of art, is subject to changes and distortions of meaning under the influence of changing factors in the sociocultural environment.
9809. Comparative analysis and prospects for the development of portable computers 343.85KB
The problem of this study is relevant in modern conditions. This is evidenced by the frequent study of the issues raised, and despite all the abundance of information about portable computers, their functional features, fundamental differences and long-term development prospects remain unclear.
20554. Comparative analysis of approaches to determining margin requirements for derivatives portfolios 275.48KB
Central counterparties serve markets that often differ significantly both in microstructure and in the range of financial instruments with different risk profiles: spot markets with T+ execution mode, money market instruments (for example, repos), exchange-traded and over-the-counter derivatives
16100. Demand for Education Services in Russia: Comparative Econometric Analysis 228.72KB
Data and variables used To analyze Russian household spending on educational services, we used data from a regular sample micro-survey of household budgets. Federal Service state statistics of the Russian Federation for 2007. The variable was changed to eliminate outliers in the sample and obtain more robust estimation results. Models and results Heckman model The Heckman model was chosen to estimate household demand for education, the variables with asterisks are unobservable...
19049. COMPARATIVE ANALYSIS AND EVALUATION OF THE PERFORMANCE CHARACTERISTICS OF PC POWER SUPPLY 1.04MB
A modern power supply is a switching unit, not a power unit. Impulse block contains more electronics and has its advantages and disadvantages. The advantages include low weight and the possibility of continuous power supply when the voltage drops. The disadvantages are the presence of a not very long service life compared to power units due to the presence of electronics.

Antivirus programs exist to protect your computer from malware, viruses, trojans, worms, and spyware that can delete your files, steal your personal information, and make your computer and web connection extremely slow and problematic. Hence, choosing a good antivirus program is an important priority for your system.

There are over 1 million computer viruses in the world today. Due to the prevalence of viruses and other malware, there are many various options for computer users in the field of antivirus software.

Antivirus programs quickly became big business, and the first commercial antiviruses hit the market in the late 1980s. Today you can find many free and paid antivirus programs to protect your computer.

What do antivirus programs do

Antivirus programs will regularly scan your computer for viruses and other malware that may be on your PC. If the software detects a virus, it usually quarantines it, cures it, or removes it.

You choose how often the scan will occur, although it is generally recommended that you run it at least once a week. In addition, most anti-virus programs will protect you during daily activities such as checking email and surfing the web.

Whenever you download any file to your computer from the Internet or from e-mail, the antivirus will check it and make sure that the file is OK (virus-free or “clean”).

Antivirus programs will also update what are called “antivirus definitions”. These definitions are updated as often as new viruses and malware appear and are discovered.

New viruses appear every day, so you should regularly update the anti-virus database on the website of the anti-virus program manufacturer. After all, as you know, any anti-virus program can recognize and neutralize only those viruses that the manufacturer “trained” it with. And it's no secret that several days may pass from the moment the virus is sent to the program developers until the update of the anti-virus databases. During this period, thousands of computers around the world can be infected!

So, make sure you have one of the best antivirus packages installed and update it regularly.

FIREWALL (FIREWALL)

Protecting your computer from viruses depends on more than just one antivirus program. Most users are mistaken in believing that the antivirus installed on the computer is a panacea for all viruses. A computer can still become infected with a virus, even with a powerful antivirus program. If your computer has Internet access, one antivirus is not enough.

An antivirus can remove a virus when it is directly on your computer, but if the same virus enters your computer from the Internet, for example, by downloading a web page, then the antivirus program will not be able to do anything with it - until it will not show its activity on the PC. Therefore, full computer protection from viruses is impossible without a firewall - a special protective program that will notify you of suspicious activity when a virus or worm tries to connect to your computer.

Using a firewall on the Internet allows you to limit the number of unwanted connections from the outside to your computer, and significantly reduces the likelihood of infection. In addition to protecting against viruses, it also makes it much more difficult for intruders (hackers) to access your information and attempt to download a potentially dangerous program to your computer.

When a firewall is used in conjunction with an antivirus program and operating system updates, computer protection is maintained at its maximum. high level security.

OPERATING SYSTEM AND SOFTWARE UPDATES

An important step in protecting your computer and data is to keep your operating system up to date with the latest security patches. It is recommended to do this at least once a month. The latest updates for the OS and programs will create conditions under which computer protection against viruses will be at a sufficiently high level.

Updates are fixes for bugs found over time in software. A large number of viruses use these bugs (“holes”) in system and program security to spread. However, if you close these “holes”, then you will not be afraid of viruses and computer protection will be at a high level. An additional plus of regular updates is more reliable system operation due to bug fixes.

LOGIN PASSWORD

A password to log into your system, especially for the “Administrator” account, will help protect your information from unauthorized access locally or over a network, and will also create an additional barrier to viruses and spyware. Make sure you use a complex password - as Many viruses use simple passwords, for example 123, 12345, starting with empty passwords.

SAFE WEB SURFING

Protecting your computer from viruses will be complicated if, while browsing websites and surfing the Internet, you agree to everything and install everything. For example, under the guise of updating Adobe Flash Player, one of the varieties of the virus is being distributed - “Send sms to a number”. Practice safe web surfing. Always read what exactly you are offered to do, and only then agree or refuse. If you are offered something foreign language try to translate this into otherwise feel free to refuse.

Many viruses are contained in e-mail attachments and begin to spread as soon as the attachment is opened. We strongly recommend that you do not open attachments without prior agreement to receive them.

Antiviruses on SIM, flash cards and USB devices

Mobile phones produced today have a wide range of interfaces and data transfer capabilities. Users should carefully study the protection methods before connecting any small devices.

Protection methods such as hardware, perhaps antiviruses on USB devices or on SIM, are more suitable for mobile phone users. A technical evaluation and review of how to install an antivirus program on a cellular mobile phone should be considered as a scanning process that may affect other legitimate applications on that phone.

Anti-virus software on SIM with anti-virus built into the small capacity memory zone provides anti-malware/virus protection to protect PIM and phone user information. Anti-viruses on flash cards allow the user to exchange information and use these products with various hardware devices.

Antiviruses, mobile devices and innovative solutions

No one will be surprised when the viruses that infect personal and laptop computers will also be transferred to mobile devices. More and more developers in this field offer anti-virus programs to fight viruses and protect mobile phones. AT mobile devices There are the following types of virus control:

  • § CPU limitations
  • § memory limit
  • § identifying and updating the signatures of these mobile devices

Antivirus companies and programs

  • § AOL® Virus Protection as part of the AOL Safety and Security Center
  • § ActiveVirusShield by AOL (based on KAV 6, free)
  • § AhnLab
  • § Aladdin Knowledge Systems
  • § ALWIL Software (avast!) from the Czech Republic (free and paid versions)
  • § ArcaVir from Poland
  • § AVZ from Russia (free)
  • § Avira from Germany (there is a free version of Classic)
  • § Authentium from UK
  • § BitDefender from Romania
  • § BullGuard from Denmark
  • § Computer Associates from USA
  • § Comodo Group from USA
  • § ClamAV -- GPL license -- free with open source source codes programs
  • § ClamWin -- ClamAV for Windows
  • § Dr.Web from Russia
  • § Eset NOD32 from Slovakia
  • § Fortinet
  • § Frisk Software from Iceland
  • § F-Secure from Finland
  • § GeCAD from Romania (Microsoft bought the company in 2003)
  • § GFI Software
  • § GriSoft (AVG) from the Czech Republic (free and paid versions)
  • § Hauri
  • § H+BEDV from Germany
  • § Kaspersky Anti-Virus from Russia
  • § McAfee from USA
  • § MicroWorld Technologies from India
  • § NuWave Software from Ukraine
  • § MKS from Poland
  • § Norman from Norway
  • § Outpost from Russia
  • § Panda Software from Spain
  • § Quick Heal AntiVirus from India
  • § rising
  • § ROSE SWE
  • § Sophos from UK
  • § Spyware Doctor
  • § Stiller Research
  • § Sybari Software (Microsoft bought the company in early 2005)
  • § Symantec from the US or UK
  • § Trojan hunter
  • § Trend Micro of Japan (nominally Taiwan-US)
  • § Ukrainian National Antivirus from Ukraine
  • § VirusBlockAda (VBA32) from Belarus
  • § VirusBuster from Hungary
  • § ZoneAlarm AntiVirus (American)
  • § Checking a file with several antiviruses
  • § Checking a file with several antiviruses
  • § Checking files for viruses before downloading
  • § virusinfo.info Information security portal (virology conference) where help can be requested.
  • § antivse.com Another portal where you can download the most common antivirus programs, both paid and free.
  • § www.viruslist.ru Internet virus encyclopedia created by Kaspersky Lab

Antivirus

Avast! * AVS * Ashampoo Antivirus * AVG * Avira AntiVir * BitDefender * Clam Antivirus * ClamWin * Comodo Antivirus * Dr. Web * F-Prot *F-Secure Antivirus * Kaspersky Anti-Virus * McAfee VirusScan * NOD32 * Norton Antivirus * Outpost Antivirus * Panda Antivirus * PC-cillin *Windows Live OneCare

Liked the article? Share with friends!
Was this article helpful?
Yes
Not
Thanks for your feedback!
Something went wrong and your vote was not counted.
Thank you. Your message has been sent
Did you find an error in the text?
Select it, click Ctrl+Enter and we'll fix it!