Analysis of Modern Anti-Virus Software in Cyber Security Tasks

Authors

DOI:

https://doi.org/10.15802/stp2021/253290

Keywords:

software, information threat, antivirus, singular method, heuristic method

Abstract

Purpose. The research is aimed at gaining general knowledge about modern anti-virus software. Because it is one aspect of cybersecurity, and is subject to ongoing discussions about its appropriateness. Methodology. To obtain data, the authors conducted a review of world literature on the topic of work using full-text and abstract databases. Signature and heuristic methods of antivirus software operation are considered. As well as the conditional division of these products into programs-detectors, programs-doctors, programs-auditors, programs-filters, programs-immunizers was made. Findings. Content analysis of publications in the direction of anti-virus software proves the number of aspects studied. The question of the ability of such software not only to recognize the threat, but also to be able to destroy it is being studied. To perform this task, the antivirus must have the following functions: regular (or real-time) scanning of system files and programs; scanning the content of messengers and e-mail; full computer scan at the user's command; monitoring of incoming and outgoing network traffic; elimination of the malware operation consequences. In addition, a comparative analysis of the most popular anti-virus software makes it possible to identify the disadvantages and advantages of each of them. Originality. Systematic and generalized analysis of the existing and most common anti-virus software has been further developed, which allows ordinary users to make informed choices about installing such software packages. Practical value. Based on the results obtained, it is possible to adjust your own actions regarding safe work on the Internet. In addition, the article aims to dispel myths suggesting that users do not protect their computers from malware at all. These studies can also be useful in studying the discipline "Fundamentals of Software Testing", the organization of scientific and practical seminars, refresher courses and etc.

References

Belous, A. I., & Solodukha, V. A. (2020). Kiberoruzhie i kiberbezopasnost. O slozhnykh veshchakh prostymi slovami. Moscow, Vologda: Infra-Inzheneriya. (in Russian)

Kardava, N. V. (2018). Kiberprostranstvo kak novaya politicheskaya realnost: vyzovy i otvety. History and Present, 2, 152-166. DOI: https://doi.org/10.30884/iis/2018.02.03 (in Russian)

Kuznetsov, E., & Saurov, A. (2016). Hardware Trojans. Part 1: new threats to cyber security. Nanoindustry Russia, 7, 16-25. DOI: https://doi.org/10.22184/1993-8578.2016.69.7.16.25 (in Russian)

Zagorskii, A. V., & Romashkina, N. P. (Eds.). (2016). Informational Security Problems in Modern International Crises and Conflicts of XXI century. Moscow: IMEMO RAN. DOI: https://doi.org/10.20542/978-5-9535-0477-5 (in Russian)

Sukhomlin, V. A., Belyakova, O. S., Klimina, A. S., Polyanskaya, M. S., & Rusanov, A. A. Model tsifrovykh navykov kiberbezopasnosti. Fond Liga internet-media. (in Russian)

Antivirus software (antivirus program). Retrieved from https://www.techtarget.com/searchsecurity/definition/antivirus-software (in English)

Best Antivirus Software for PC in 2021. Retrieved from https://www.wizcase.com/best-antivirus-for-pc/gr/ (in English)

Data Breach Investigations Report.(2020). Verizon. Retrieved from https://enterprise.verizon.com/resources/reports/2020-data-breach-investigations-report.pdf (in English)

Kostogryzov, A. (Ed.). (2018). Probabilistic Modeling in System Engineering. IntechOpen. DOI: https://doi.org/10.5772/intechopen.71396 (in English)

Trifonov, R., Yoshinov, R., Pavlova, G., & Tsochev, G. (2017). Artificial neural network intelligent method for prediction. In AIP Conference Proceedings (Vol. 1872, pp. 1-7). DOI: https://doi.org/10.1063/1.4996678 (in English)

Published

2021-10-18

How to Cite

Astakhov, D. S., Lysenko, N. O., Mazurenko, V. B., & Fedorovych, A. I. (2021). Analysis of Modern Anti-Virus Software in Cyber Security Tasks. Science and Transport Progress, (5(95), 27–35. https://doi.org/10.15802/stp2021/253290

Issue

Section

INFORMATION AND COMMUNICATION TECHNOLOGIES AND MATHEMATICAL MODELING