• Title/Summary/Keyword: Anti-Virus System

Search Result 99, Processing Time 0.02 seconds

Managing the Heterogeneous File System for Anti-Virus

  • Kim, Kyung-Su;Han, Seung-Jo;Kim, Pan-Koo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.3
    • /
    • pp.3-10
    • /
    • 1997
  • Computer viruses are increasing in number and are continually intellectualized as well. To cope with this problem, anti-virus tools such as a scanner and the monitoring program have been developed. But it is not guaranteed that these softwares will work in safety under MS-DOS' control. If the virus is run first, it can avoid the monitoring of anti-virus software or even can attack the anti-virus software. Therefore, anti-virus programs should be run before the system is infected. This paper presents a new PC starting mechanism which allows the PC system to start from a clean state after booting. For this mechanism, we build a new disk file system different from DOS' file system, and manage the two file systems heterogeneously. Our system is strong against boot viruses and recovers from infections automatically.

Design and Implement of Active Server-based Anti-Virus System (능동서버기반의 안티바이러스 시스템 설계 및 구현)

  • Lee, Sang-Hoon;Kim, Won;Jeon, Moon-Seok
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.1
    • /
    • pp.29-38
    • /
    • 2004
  • It was fast and easily used limitless information as a development of information technology, but it was increased side effects. There are hacking or cracking, personal information leakage in these side effects. A computer virus is stated in a serious problem recently. The best solution about a computer virus is an anti-virus. An anti-virus downloads and is updated virus signature in server after it was installed in a client computer. Products interworking with server are released recently. However, if signature isn't aptly updated, anti-virus program doesn't normally operate these anti-virus systems, and remote management is impossible. Therefore, in this paper, an active server-based anti-virus system which is installed in server and was able to be managed remotely was designed and implemented in order to solve these problems.

  • PDF

AHP 기법을 이용한 안티바이러스 소프트웨어 평가 요인 분석

  • Kim, Jong-Ki;Hwang, Suk-Yeon;Lee, Dong-Ho
    • The Journal of Information Systems
    • /
    • v.14 no.1
    • /
    • pp.19-40
    • /
    • 2005
  • The history of computer virus comes along with that of computer. Computer virus han surfaced as a serious problem in information age. The advent of open network and widespread use of Internet made the problem even more urgent. As a method of defense for computer virus most companies use anti-virus software. Selecting appropriate anti-virus software involves various criteria and thus it is a multiple-attribute decision making problem. The purpose of this study is to prioritize anti-virus software evaluation factors. To do that, first of all, important evaluation factors are selected based on previous research on anti-virus software as well as general software evaluation models. Then, a questionnaire survey was conducted on end-users, system administrators and anti-virus software developers. The survey result was analyzed with ExpertChoice 2000 which is based on Analytic hierarchy Process technique. This study found that there are clear differences among three survey groups regarding the relative importance of overall evaluation factors. End-user group ranked "cost" first, but it was the least important factor to developer group. Developers pointed out "operational support" ad the most important factor. There were also obvious differences in the relative importance of detail evaluation items. Both end-users and system administrators shared 7 common items among top 10 most important items. Moreover, neither of the two groups ranked any of the items in the "operational support" factor in top 10, whereas all 4 items in the factor were included in top 10 by developer group.

  • PDF

Analysis on Operation of Anti-Virus Systems with Real-Time Scan and Batch Scan (실시간스캔과 배치스캔을 갖춘 안티바이러스시스템의 운영 분석)

  • Yang, Won Seok;Kim, Tae-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.11
    • /
    • pp.861-869
    • /
    • 2013
  • We consider an information system where viruses arrive according to a Poisson process with rate ${\lambda}$. The information system has two types of anti-virus operation policies including 'real-time scan' and 'batch scan.' In the real-time scan policy, a virus is assumed to be scanned immediately after its arrival. Consequently, the real-time scan policy assumes infinite number of anti-viruses. We assume that the time for scanning and curing a virus follows a general distribution. In the batch scan policy, a system manager operates an anti-virus every deterministic time interval and scan and cure all the viruses remaining in the system simultaneously. In this paper we suggest a probability model for the operation of anti-virus software. We derive a condition under which the operating policy is achieved. Some numerical examples with various cost structure are given to illustrate the results.

An improved synthesis of 2'-fluoro-2'-deoxyarabinofuranosyl pyrimidine nucleosides

  • Chun, Moon-Woo
    • Archives of Pharmacal Research
    • /
    • v.6 no.1
    • /
    • pp.79-81
    • /
    • 1983
  • Several potent anti-herpes virus nucleosides, 2'fluoro-2'-deoxyarabinofuranosyl pyrimidine nucleosides, were prepared in good yields by a new condensation method using sodium iodide and a new solvent system, and FMAU could be also prepared directly from thymine by this method.

  • PDF

Antiviral Effects of Natural Products on the Inhibition of Hepatitis B Virus DNA Replication in 2.2.15 Cell Culture System

  • Nam, Kung-Woo;Chang, Il-Moo;Choi, Jae-Sue;Hwang, Ki-Jun;Mar, Woong-Chon
    • Natural Product Sciences
    • /
    • v.2 no.2
    • /
    • pp.130-136
    • /
    • 1996
  • Evaluation of plant extracts that might inhibit hepatitis B virus (HBV) replication was performed to find potent anti-HBV agents. Eighty-five species of plants from forty-three families were tested for their anti-HBV activities using HBV-producing HepG2-derived 2.2.15 cells. The anti-HBV activity of plant extracts was measured by slot blot hybridization technique and cytotoxicity was determined by crystal violet staining procedure. All plants were extracted with methanol and the extracts were partitioned into n-hexane, ethyl acetate and aqueous layer. The ethyl acetate fractions of Rhus verniciflua $(stem:\;EC_{50},\;8.2{\mu}g/ml;\;CC_{50},\;9.4{\mu}g/ml)$, Gastrodia elata $(root:\;EC_{50},\;17.7{\mu}g/ml;\;CC_{50},\;>20{\mu}g/ml)$, Raphanus sativus $(seeds:\;EC_{50},\;17.3{\mu}g/ml;\;CC_{50},\;>20{\mu}g/ml)$, and Angelica gigas $(root:\;EC_{50},\;8.3{\mu}g/ml;\;CC_{50},\;15.6{\mu}g/ml)$ revealed the anti-HBV activity in 2.2.15 cell culture system and these fractions are under the process of further sequential fractionation by column chromatography to find the active principles against HBV.

  • PDF

An Anti-Virus Vaccine Selection Model Based on Stackelberg Game (슈타켈버그 게임 기반 Anti-virus 백신 선택 모형)

  • Sung, Si-Il;Choi, In-Chan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.135-144
    • /
    • 2009
  • This paper deals with an information security problem that involves the strategies of both an attacker and an administrator of a web-based system. A game-theoretic model for the problem, based on an Stackelberg game environment, is presented. In the model, the administrator selects a set of anti-virus vaccines to cope with potential system attackers and the intruder chooses attacking modes that are most effective against the administrator's chosen set of vaccines. Moreover, the model considers a number of practical constraints, such as a budget limit on the vaccine purchase and a limit on the system performance. In addition, two different scenario analyses are provided, based on the results of the proposed model applied to a simulated pseudo-real-world data.

Development of S-SLA based on the Analyses of Security Functions for Anti-virus System (안티바이러스 시스템 보안기능 분석을 통한 보안SLA 등급화 지표 개발)

  • Yi, Wan-Suck;Lee, Dong-Bum;Won, Dong-Ho;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.237-249
    • /
    • 2010
  • If one analyzes recent cyber incidents including personal information infringement cases, it seems like actual attack is targeting Internet service providers but actually they are targeting Internet service users. For many users, all the services were not provided to them as they have signed for in the contract or personal informations, which users have provided to service providers when signing contracts, were disclosed to public without users' consent causing aftereffect. As a result, importance of S-SLA indexes, which is to be included in the SLA to be signed between a user and a service provider, is ever more increasing. Especially, if there is a S-SLA indexes for anti-virus services, service providers have to provide a high quality of service as they have signed in the SLA. However, there wasn't any researches in the S-SLA area domestically and there are only limited SLA indexes related to system or service maintenances at the moment. Therefore, this paper analyses security functions in anti-virus services and proposes S-SLA indexes for different security level.

A Study on Quality evaluation Methodology Establishment of Anti-Virus Software based on the Real Test Environment (리얼 테스트 환경 기반의 안티바이러스 소프트웨어의 품질평가 방법론 정립에 관한 연구)

  • Maeng, Doo-Iyel;Park, Jong-Kae;Kim, Sung-Joo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.440-452
    • /
    • 2010
  • For an evaluation of the software product, the national/international organizations and labs have been studying various methodologies for the quality on the basis of ISO/IEC Quality Assurance System, but they still have many issues in evaluation of the anti-virus software that has special characteristics of complexity. In this paper, to establish a methodology of the quality evaluation for the anti-virus software, fulfilling the requirements more than reasonable level, a process to draw the evaluation items and quantification was established. And the information of weight was objectified by analyzing the relative magnitude between each factors. Based on the defined information (evaluation item, weight), conducting the quality evaluations for 70 kinds of open anti-virus software collected from the portal sites in the real test environment, and as a result of the positive analysis with user's long-term experience, this paper justifies the evaluation item and the weight.

Analysis and Recovery of CIH virus (CIH 바이러스 분석 및 대책)

  • 김광조
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.4
    • /
    • pp.49-60
    • /
    • 1999
  • In this paper we introduce the definition and historical overviews of computer virus program and review their side-effect and ways of infections. We describe the feature of CIH virus which damaged lots of PC systems in Asian countries recently and propose new methods how to rescue against destruction under the operating system of the Microsoft's Windows 95/98. Our experiment results can fix hard disk having FAT32 file system structure and show some popular program cases of having recovered by commercial vaccine program.