Sei sulla pagina 1di 2

International Journal of Scientific & Engineering Research, Volume 1, Issue 1, October-2010 1

A Comparative Study for Performance Meas-


urement of Selected Security Tools
Mr. B.V.Patil, Dr. Prof. M. J. Joshi, Mr. H. N. Renushe

Abstract— Today’s enterprise networks are distributed to different geographical locations and applications are
more centrally located, this technological enhancement offers new flexible opportunities also measure security
threats poses in the networks. These threats can external or Internal, external threats divided as hacking, virus
attack, Trojans, worms etc. These threats can be minimized using number of network security tools and antivirus
software, but all are not equally compatible for each type of attack hence the study is undertaken.
This research paper highlights the performance of antivirus software using the number of parameters
such as installation time, size, memory utilised, boot time, user interface launch time and full system scan time
etc.

Index Terms— Network, Antivirus, virus, security threats, hacking, internet security, Total Security, System scan.

—————————— ——————————

1 INTRODUCTION

T oday enterprise networks are distributed to different


geographical locations and applications are more cen-
trally located. Every company’s data is most valuable
grams. Most often, they are a piece of code embedded in a
larger program, it initiates on a specific action.
Trojan Horses: A Trojan horse is a program which per-
asset and must be treated as such. With the ever growing forms something useful; while in the same time inten-
number of malicious threats; such as Viruses, Spyware tionally performs, unknowingly to the user, some kind of
and Hackers, it has become mandatory to protect yourself destructive function.
against them. Droppers: A dropper is a special kind of Trojan horse,
In order to prevent such data looses many organisation the payload of which is to install a virus on the system
came forward and designed network security tools and under attack. The installation is performed on one or sev-
antivirus packages. Antivirus packages are mainly used eral infect able objects on the targeted system.
to prevent and remove the viruses, Trojans, worms etc, Injectors: An injector is a program very similar to a
where as firewalls are used to monitor incoming and out- dropper, except that it installs a virus not on a program
going connections. but in memory.
Computers are used extensively to process the data Germs: A germ is a program produced by assembling
and to provide information for decision making therefore or compiling the original source code of a virus or of an
it is necessary to control its use. Due to organisational cost infected program.
of data loss, cost of incorrect decision making, and value Worms: Programs which are able to replicate them-
of computer software hardware organisations suffer a selves as stand-alone programs and which do not depend
major loss therefore the integrity of data and information on the existence of a host program are called computer
must be maintained. worms. [3]
Antivirus packages are mainly used to safeguard. Organization need to provide security skeleton
There are number of venders providing antivirus pack- to prevent the data didding due to malicious code. In or-
ages which are differ in various features such as installa- der to provide the security the organizations go through
tion time, size, memory utilised, boot time, user interface the security audit and most of the organization chose the
launch time and full system scan time etc. internet security software as well as design their personal
firewall and antivirus.
2 VIRUS AND ANTIVIRUS OVERVIEW "Antivirus" is protective software designed to de-
A computer virus is self replicating program contain- fend your computer against malicious software. Mali-
ing code that explicitly copies itself and that can infects cious software or Malware includes: viruses, Trojans, key-
other program by modifying then or their environment [1]. loggers, hijackers, diallers, and other code that vandalizes
Harmful program code refers to any part of programme or steals your computer contents.
code which adds any sort of functionality against the spe- Antivirus products are categorised into three
cification.[2] Harmful programme code can be divided in parts such as Internet Security [IS], Total Security [TS],
to Trojan Horses, Malicious Toolkits Computer Worms, and Anti-Virus [AV]. Anti-Virus: products are the prod-
Joke program and logic bombs, computer viruses, Drop- ucts which are primarily focused on detecting and reme-
pers, Injector and Germs. diating viruses and spyware. Internet Security product
Logic Bombs: Logic Bombs are rarely stand-alone pro- provides all the virus and spyware removal features of an

IJSER © 2010
2 International Journal of Scientific & Engineering Research, Volume 1, Issue 1, October-2010

For Complete Paper need to contact:


ijser.editor@ijser.org
IJSER – copyright required from author

Potrebbero piacerti anche