Академический Документы
Профессиональный Документы
Культура Документы
Virus Detection
By RAKESH DUGAR (2008-311-035)
B.Tech IT (Sem 8 )
th
Page 1 of 5
INTRODUCTION
Antivirus or anti-virus software is used to prevent, detect, and remove malware, including but not limited to computer viruses, computer worm, trojan horses, spyware and adware. The software used for the prevention and removal of such threats, rather than computer security implemented by software methods. A variety of strategies are typically employed. Signature-based detection involves searching for known patterns of data within executable code. However, it is possible for a computer to be infected with new malware for which no signature is yet known. Some antivirus software can also predict what a file will do by running it in a sandbox and analyzing what it does to see if it performs any malicious actions. No matter how useful antivirus software can be, it can sometimes have drawbacks. Antivirus software can impair a computer's performance. Inexperienced users may also have trouble understanding the prompts and decisions that antivirus software presents them with. An incorrect decision may lead to a security breach. If the antivirus software employs heuristic detection, success depends on achieving the right balance between false positives and false negatives. False positives can be as destructive as false negatives. Finally, antivirus software generally runs at the highly trusted kernel level of the operating system, creating a potential avenue of attack.
Page 2 of 5
OBJECTIVE
After understanding the problem and a clear objective, we actually defined the scope of application by formulating the functions that it would perform. It has the following objectives:-
Network Protection New software in a network should be scanned and checked before it is used. This ensures that all the PCs in the network are protected from exploits by malicious software that may be tagged onto them from files or email attachments. This objective protects all computers in the network or even mobile computers that are introduced to the network.
Page 3 of 5
1. Introduction
1.1. Purpose The main purpose of our algorithm is to detect the viruses and not to include the genuine files into the list. 1.2. Document Conventions The following are the list of conventions and acronyms used in this document and the project as well:
1.3 SCOPEThis work represents a prototype of a virus detection system. Therefore there is a lot of work that could still be done from both a research point of view and from a commercial point of view. 2 Product Features: 2.1 Operating Environment
The product will be operating in windows XP environment. 2.2 Design and Implementation Constraints The Product is developed using C at front end. 2.3 Assumptions and Dependencies
3. System Features
13.1 Stimulus / Response Sequences Responses for User: Page 4 of 5
3.2. Functional Requirements This section gives the list of Functional and non functional requirements which are applicable to the Security Tools Product. 3.2.1 Interface Requirements This section describes how the software interfaces with other software products or users for input or output.
3.2.1.1UserInterfaces
Describes how this product interfaces with the user. GUI Describe the graphical user interface if present.
Page 5 of 5