What are typical anti-virus technologies?
Typical anti-virus technologies include: 1. Signature technology, anti-virus technology based on the analysis and detection of known viruses; 2. Virtual machine technology, anti-virus technology that heuristically detects unknown viruses; 3. , virtual reality, future anti-virus technology, hierarchical detection and use of anti-virus programs.
Typical anti-virus technologies are:
1. Signature code technology: based on known Anti-virus technology for virus analysis and detoxification
Most of the current anti-virus software mainly uses signature checking solutions and manual detoxification in parallel, that is, signature checking is used when checking for viruses. When killing viruses, manually compiled detoxification codes are used.
Character Code Virus Checking
The scheme is actually a simple expression of manual virus checking experience. It reproduces the general method of manual virus identification and adopts "a certain part of the code of the same virus or similar viruses." "Identical" principle, that is to say, if the virus and its variants and deformed viruses have the same identity, this identity can be described and compared with the program body and the description result (that is, the "signature code"). Find viruses. Not all viruses can describe their signatures. Many viruses are difficult to describe or even cannot be described with signatures. The use of signature technology requires the implementation of some supplementary functions, such as the recent automatic scanning and killing technology for compressed packages and compressed executable files.
However, the signature virus detection scheme also has great limitations. The description of the signature depends on human subjective factors. Extracting a virus signature of more than ten bytes from a virus body that is several thousand bytes requires tracking, disassembly and other analysis of the virus. If the virus itself has anti-virus Tracking technology and deformation and decoding technology, then tracking and disassembly to obtain signatures will become extremely complicated. In addition, to capture the signature of a virus, it is necessary to obtain a sample of the virus. Furthermore, due to the different descriptions of the signature, it is difficult for the signature method to gain wide-area support internationally. The main technical flaw of signature virus detection is the large number of false checks and false positives, and the anti-virus technology has led to the technical lag of anti-virus software.
2. Virtual machine technology: anti-virus technology that heuristically detects unknown viruses
The main function of virtual machine technology
is to be able to run certain rules description language. Since the final criterion for determining a virus is its replicative infectivity, and this criterion is not easy to use and implement, if the virus is already infected before it is determined to be a virus, it will definitely bring trouble to the removal of the virus.
So what method is used to check for viruses? Objectively speaking, among various virus checking methods, the eigenvalue method is the method with the widest scope of application, the fastest speed, the simplest and the most effective method. However, due to its own flaws, it only applies to known viruses. For unknown viruses, if the virus can be run under control for a period of time and allowed to restore itself, then the problem will be relatively clear. Arguably, a virtual machine is the best choice in this situation.
Virtual machines are widely used in anti-virus software and have become a trend in anti-virus software. A relatively complete virtual machine can not only identify new unknown viruses, but also eliminate unknown viruses. We will find that this anti-virus tool is no longer a program, but an IBM Deep Blue supercomputer that can compete with Kasparov. First, the virtual machine must provide enough virtualization to complete or nearly complete the "virtual infection" of the virus; secondly, although the "infection" standard established based on the definition of a virus is clear, if this standard can be implemented, it will not be used in determining There will still be problems with the standard of viruses; thirdly, if the previous step can be passed, then we must detect and confirm that the so-called "infected" files are indeed infected with this virus or its deformation.
At present, virtual machines mainly deal with file-type viruses. Boot viruses, word/excel macro viruses, and Trojan programs can theoretically be processed through virtual machines, but the current implementation level is still far behind. Just as virus encoding deformations render traditional eigenvalue methods ineffective, new viruses targeting virtual machines can easily render them useless. Although virtual machines will continue to develop in practice. However, the computing power of PCs is limited, and the manufacturing cost of anti-virus software is also limited, but the development of viruses can be said to be unlimited. It is quite difficult to make virtual technology more practical, and even to use it as a basis to eliminate unknown viruses.
Restricted by the fundamental premise that viruses are theoretically undecidable, in fact, whether it is a heuristic or a virtual machine, it can only be an engineering effort, and its success The probability can never reach 100%. This is the only but helpless shortcoming.
3. Future anti-virus technology: Virtual reality
The prospect of future technology may be just an almost ethereal fantasy, but just like the initial description of computer viruses appearing in science fiction novels, although there are still many technologies that we are still realizing but have not yet realized, even There are many factors that we simply haven’t considered. As long as the technology is mature enough, it is entirely possible that anti-virus technology similar to artificial intelligence will appear in the online world.
One of the problems with anti-virus in the future is that we will never be able to write a reasonable program to identify and kill viruses. The virus has mastered everything that humans have. It can also identify and analyze anti-virus programs and reprogram itself. The anti-virus program must also be able to detect viruses and then program itself. The competition between viruses and anti-virus programs has become the realization of self-programming capabilities, and such a result can only lead to network space tension or even collapse!
We can also consider using another method: manually entering the computing network world to detect and kill viruses. Humans have enough intelligence and experience to identify and eliminate viruses, and this only leaves the problem of establishing a "bridge" between humans and computers.
The current Virtual Reality Technology
focuses on the realization of computer description of the natural communication method between people - "senses". It is like all people's perceptions. Sensing to the brain, the brain makes an experiential description of this sensing, thereby forming perceptual consciousness. If the computer expresses the binary code stream as brain wave stream information and transmits it to the brain through nerve sensing, it can completely describe, guide and control all human thoughts. Simply put, there is such a universal interface between human thinking and computer language!
If this theory can be realized, virtual reality technology will enter a new development field. Although it is theoretically impossible to make an accurate judgment and prevent the virus when the virus is unknown, in practical applications, after anti-virus experts have accumulated experience in statistics, analysis, and research for many years, it is entirely possible to use probability to predict the virus. This method conducts a hierarchical assessment of virus risks and uses anti-virus programs to achieve a relatively accurate defense against the intrusion of unknown viruses.
The above is the detailed content of What are typical anti-virus technologies?. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



After a mobile phone is infected with a certain Trojan virus, it cannot be detected and killed by anti-virus software. This principle is just like a computer infected with a stubborn virus. The virus can only be completely removed by formatting the C drive and reinstalling the system. , then I will explain how to completely clean the virus after the mobile phone is infected with a stubborn virus. Method 1: Open the phone and click "Settings" - "Other Settings" - "Restore Phone" to restore the phone to factory settings. Note: Before restoring factory settings, you must back up important data in the phone. The factory settings are equivalent to those of the computer. "It's the same as formatting and reinstalling the system". After the recovery, the data in the phone will be cleared. Method 2 (1) First turn off the phone, then press and hold the "power button" + "volume + button or volume - button" on the phone at the same time.

What should I do if the edge browser detects a virus and cannot download it? The edge browser is the default browser software for our Microsoft system computers, and it is also a browser software used by many friends. When downloading a file in the edge browser, it will be scanned by the computer's default security protection. If it is determined to be a risky file, it cannot be downloaded normally. If you must download the file, follow the editor to see if it cannot be downloaded. Let’s introduce the solution to the file. What should I do if the edge browser detects a virus and cannot download? 1. Open the edge browser settings and find private search and services - scroll down to find "Security" - turn off Microsoft Defender Smartscreen; 2. Then open our

Files isolated by Win10 viruses are generally stored in fixed locations. Many users want to open the quarantined files and restore their own files, but they don’t know where they are stored. In fact, they can usually be found in the isolation folder of the C drive security software. Where is the win10 virus quarantine file? Answer: In the C:\ProgramData\Microsoft\WindowsDefender\Quarantine folder, we can open this computer and directly copy and paste the file path to the path bar above to find it. Introduction to the virus isolation folder in win10: 1. In win10, the "Quarantine" file usually requires certain permissions to open. It is recommended to open the file as an administrator. 2,

Many guys find that viruses and threats cannot be used without protection when using Win10 Home Edition. First, they need to check whether they have been installed, and then they can open the administrator to check. Let’s take a look at the specific operation content. Win10 Home Edition virus and threat protection cannot be restarted: 1. Please confirm whether third-party anti-virus software such as 360, Tencent Computer Manager, etc. is installed on your computer? If such applications exist, please uninstall them, restart the device, and then observe whether the virus and threat protection functions can start normally. 2. Please press the "Windows logo key + X" key combination to start the "Windows PowerShell (Administrator)" environment and execute the following command: regadd"

With the rapid development of Internet technology, programming languages are also constantly emerging and evolving. Among them, Golang (Go language) has attracted much attention as an efficient and easy-to-use programming language. However, there is some controversy over whether Golang can be used to write viruses. In this article, we will explore Golang’s programming capabilities, explore whether it can be used to write viruses, and give some specific code examples. First, let us briefly introduce Golang. Golang is developed by Google

Common malware and virus problems encountered in Linux systems and their solutions. With the popularity of the Linux operating system and the expansion of its application scope, concerns about its security are also increasing. Although Linux has less attack surface from malware and viruses than other operating systems, it does not mean that it is completely immune. This article will introduce common malware and virus problems in Linux systems and provide corresponding solutions. Common malware and virus types in Linux systems, common malware

Anti-virus software is a type of application software. Application software is software provided to meet the application needs of users in different fields and problems; application software can broaden the application fields of computer systems and amplify the functions of hardware. Anti-virus software is software written in a programming language to eliminate computer viruses.

Solutions to folder exe viruses include using security software, updating the system and software, opening attachments and downloading files with caution, backing up important data, setting up firewalls, cleaning the system regularly, etc. Detailed introduction: 1. Use security software: Install and regularly update trustworthy anti-virus software or security software, such as Tencent Computer Manager, 360 Security Guard, Kingsoft Antivirus, etc., for full scan and real-time protection; 2. Update system and software: Regularly Update operating systems and commonly used software with patches and security updates to fix known vulnerabilities, improve system and software security, and more.