zoukankan      html  css  js  c++  java
  • Architecture and working of an Antivirus Engine

    https://www.indiastudychannel.com/resources/151519-Architecture-and-working-of-an-Antivirus-Engine.aspx

    Antivirus is one of the inevitable part of a system, whether at home, office or even on gadgets, the prime concern is that of security of the device, system. But have you ever wondered that how the Antivirus works? In this resource we are having a detailed discussion on the Antivirus Architecture, as well as the algorithms which they follow.

     

    Architecture of an Antivirus Engine


    The antivirus engine has a very interesting layeral architecture. There are around five layers; each has its own specialty as well as the functionality attached to it. The first one is the User Interface layer which has the functionality of enabling the interface. The second layer is of the Engine Core, which follows a particular algorithm. The third layer contains File System Interface, File Type Scanner, Memory scanner, Decompression and code emulator. The last but not the least layer is the Hardware.

    Working of an Antivirus Engine


    Whenever we attach any external drive into our system, the very first step we perform is the security of the system. We try to scan the drive, which so ever is attached by using antivirus we have installed on our system.
    Antivirus engine Architecture

      1. In order to understand how antivirus engine works, it is very necessary to understand the basic architecture and details so that when the one runs on the system, each and every detail can be analyzed.
      1. It is not so evident that every time we have a new version of a particular Antivirus engine, then the core is made from the scratch, it is sometimes revised from the earlier one, so the load is minimized.
      1. The antivirus engine contains an Engine core, the second layer is dedicated to the file system interface, scanner and emulators.
      1. The engine core has the functionality to intact the entire software together. In order words it acts as a sticky substance which is ready to call the desired module, when required.
      1. The basic requirement is to have a scan engine, some prefer to have third party scan engines and it is very clear that they are not considered as part of the framework.
      1. But some of the most popular and genuine used software's have their own scan engines. The Scanner used in these scan engines are their own scanner.
      1. There are generally two scanning algorithms, one is a heuristic based and other is signature. The scan string based technologies search in the given file and looks for a particular matching string.
      1. When the scanner founds the already defined or predefined strings then the necessary actions are performed by the engine.
      1. When following heuristic based scanning algorithms, the string is not looked but we look for certain instruction or commands in the files.
      1. In order to understand better, when certain codes is encrypted then we tend to find decryption code, instructions by following the heuristic scanning algorithms.
      1. So when we select a particular file or folder, then it passes through number of steps, which includes submitting a file to scan engines, scanning based on algorithms and then appropriate actions are performed.
      1. The processing of file is one of the most important phase of any antivirus engine. We have certain modules which are designed appropriately.
      1. The Random Access Memory is generally accessed by the scanning blocks, there are memory scanners which perform the appropriate actions on the memory.
      1. We have emulators and its function is similar to any other emulator. It creates its own virtual environment. There are several benefits of having an emulator attached to it.
      1. The emulator has the ability to determine which action will be performed and what effect can be there on the whole system, if the malware is allowed to run.
    1. Another important module which runs after a particular time interval and acts is the update module. Every day new definitions are created and that has to be added in the database as well.
  • 相关阅读:
    githubz在add ssh key报错 Key is invalid. Ensure you've copied the file correctly 解决办法
    iOS 更改状态栏颜色
    iOS 加载图片选择imageNamed 方法还是 imageWithContentsOfFile?
    iOS UIWebView加载网页、文件、HTML
    XXX is undefine,全局搜索却只得到一个结果
    接口调用报错,全局搜索却找不到?vscode vue
    elementui下拉框选择一次以后再选,多项被选中的情况
    VUE+ elementui 表单rules validator 邮箱验证、电话号码验证、身份证验证、账号验证
    JS 验证input内容框 Demo(复制可测试)
    Vscode setting.json个人设置(包含保存格式化,空格、换行,标点符号自动增删)
  • 原文地址:https://www.cnblogs.com/dhcn/p/15749803.html
Copyright © 2011-2022 走看看