Anti Virus Engine
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
mechanical engineering crazy
Active In SP
**

Posts: 226
Joined: Jul 2009
#1
28-08-2009, 02:34 AM


ABSTRACT

As the networks are growing larger, so is the amount of viruses that hit the loophole. A relatively new unknown virus is said to cause some damage before being identified and prevented by existing Antivirus Engines since conventional approach is a reactive solution. The need of the hour is a pro “ active solution to avoid this initial damage. It also addresses a distributed updating mechanism, which allows for greater flexibility in detecting the returning viruses.
So the underlying principle is to construct an AV Engine that stimulates our existing system behavior and any file deviating from the system properties defined in the engine becomes suspicious and undergoes further scrutiny. This prototype AV Engine will be based on file patterns also termed as file signatures. They are like the fingerprints used to identify what type of file format a certain file belongs to. These file patterns are basic necessity for characterizing the system behavior. However since numerous file formats exist, initial work is limited to most common file formats and the ways of generating their corresponding file signatures which are to incorporated in AV Engine to mimic system behavior.
The most preferred and accurate way devised to generate file patterns or signatures is by the use of Byte Frequency Algorithm (BFA). It can be used to identify some particular characters in the input file and determine the frequency of occurrence of those characters. Based on this a BFA graph is built that is used to generate required file patterns of an input file format. But BFA varies for different inputs of the same file and hence a safe standard deviation is set for the most frequently occurring characters. More and more inputs of the same file type leads to generation of more accurate file patterns of that file type thus making it a Self Learning Algorithm.
Also if a new or different file type support is to be added to enhance the stimulation of system behavior by the AV engine, then that file typeâ„¢s signature can be generated independently and added in the form of a plug-in. Hence the AV Engine is also said to be Extensible.

In the scenario of a new file being downloaded to the system, its file pattern is matched with existing file patterns in the AV engine database. If a match occurs, it is bypassed as a genuine file; else it undergoes further scrutiny in Heuristics / Behavior module and Emulation module. This illustrates the Modular approach of the engine. Overall the new AV Engine accentuates a new file pattern approach based on BFA for pro-actively detecting the viruses.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  PERSONALISED SEARCH ENGINE WITH DYNAMIC UPDATION pdf seminar projects maker 0 298 28-09-2013, 12:28 PM
Last Post: seminar projects maker
  A Novel Anti Phishing framework based on Visual Cryptography Report seminar projects maker 0 570 19-09-2013, 03:18 PM
Last Post: seminar projects maker
  Development Of A Repository And Search Engine For Alumni Of College seminar surveyer 8 5,620 19-09-2013, 09:47 AM
Last Post: seminar projects maker
  A Novel Anti Phishing framework based on Visual Cryptography pdf study tips 0 674 13-08-2013, 04:27 PM
Last Post: study tips
  A Fast Pattern-Match Engine for Network Processor-Based Network Intrusion PPT study tips 0 303 18-06-2013, 12:17 PM
Last Post: study tips
  RANKING CONCEPT-BASED USER PROFILE FROM SEARCH ENGINE LOGS pdf study tips 0 674 21-05-2013, 11:19 AM
Last Post: study tips
  GPS Technology- An Anti-theft Tracking System Report study tips 0 495 28-02-2013, 02:02 PM
Last Post: study tips
  GREEDY ROUTING WITH ANTI-VOID TRAVERSAL FOR WIRELESS SENSOR NETWORKS -- MOBILE COMPUT electronics seminars 6 7,586 25-02-2013, 12:42 PM
Last Post: chandra pratap
  Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks full report project topics 4 3,533 14-02-2013, 03:29 PM
Last Post: nishagahane2@gmail.com
  REPORT ON Greedy Routing With Anti-Void Traversal For Wireless Sensor Networks project girl 0 321 08-02-2013, 02:33 PM
Last Post: project girl