skip to main content
10.1145/2512209.2512212acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
research-article

Using agent technologies to correlate and compare anti-malware software

Published:01 October 2013Publication History

ABSTRACT

Malware is a fast growing threat that consists of software used to disrupt, or impact the confidentiality, availability or integrity of a user's computer experience. Antivirus software can help protect a user against these threats. There are numerous vendors users can choose from for their antivirus protection, each with their own set of virus definitions and various resources that are capable of recognizing new threats. However, there is no established system or process to measure and display data on the performance of antivirus vendors to new malware over an ongoing time period in real time. Such a mechanism would better inform end users of their security options in addition to informing organizations of prevalent threats occurring in networks. In this paper, we propose a cloud sourced malware reporting system that uses distributed agents to assess the performance of antivirus software based on malware signatures.

References

  1. "2013 Trustwave Global Security Report." Accessed April 13, 2013. https://www2.trustwave.com/2013GSR-TY.html?aliId=1417176.Google ScholarGoogle Scholar
  2. "AV-TEST - The Independent IT-Security Institute: Test Procedures." Accessed April 13, 2013. http://www.av-test.org/en/test-procedures/.Google ScholarGoogle Scholar
  3. Aycock, John. Computer Viruses and Malware. Springer, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Cambridge, Rodney D. "Method and System for Bi-directional Updating of Antivirus Database," July 18, 2006. http://www.google.com/patents?id=OaB6AAAAEBAJ.Google ScholarGoogle Scholar
  5. "Comparatives||tests - Reviews - Reports." Accessed April 13, 2013. http://av-comparatives.org/comparativesreviews.Google ScholarGoogle Scholar
  6. Garuba, M., Chunmei Liu, and N. Washington. "A Comparative Analysis of Anti-Malware Software, Patch Management, and Host-Based Firewalls in Preventing Malware Infections on Client Computers." In Fifth International Conference on Information Technology: New Generations, 2008. ITNG 2008, 628--632, 2008. doi:10.1109/ITNG.2008.233. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Gashi, I., V. Stankovic, C. Leita, and O. Thonnard. "An Experimental Study of Diversity with Off-the-Shelf AntiVirus Engines." In Eighth IEEE International Symposium on Network Computing and Applications, 2009. NCA 2009, 4--11, 2009. doi:10.1109/NCA.2009.14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Hodges, Vernon, and Shawn O'Donnell. "Method and System for Providing Automated Updating and Upgrading of ...," March 7, 2000. http://www.google.com/patents?id=TGEDAAAAEBAJ.Google ScholarGoogle Scholar
  9. "Internet Security Threat Report." Accessed April 13, 2013. http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_2011_21239364.en-us.pdf.Google ScholarGoogle Scholar
  10. Lee, Rob. "Is Anti-Virus Really Dead? A Real-World Simulation Created for Forensic Data Yields Surprising Results" Computer Forensics and Incident Response. Blog, April 9, 2012. http://computer-forensics.sans.org/blog/2012/04/09/is-anti-virus-really-dead-a-real-world-simulation-created-for-forensic-data-yields-surprising-results.Google ScholarGoogle Scholar
  11. Maggi, Federico, Andrea Bellini, Guido Salvaneschi, and Stefano Zanero. "Finding Non-trivial Malware Naming Inconsistencies." In Information Systems Security, 144--159. Springer, 2011. http://link.springer.com/chapter/10.1007/978--3--642--25560--1_10. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Mamaghani, Farrokh. "Evaluation and Selection of an Antivirus and Content Filtering Software." Information Management & Computer Security 10, no. 1 (March 1, 2002): 28--32. doi:10.1108/09685220210417481.Google ScholarGoogle ScholarCross RefCross Ref
  13. Oberheide, J., E. Cooke, and F. Jahanian. "Rethinking Antivirus: Executable Analysis in the Network Cloud." In 2nd USENIX Workshop on Hot Topics in Security (HotSec 2007), 2007. http://www.usenix.org/event/hotsec07/tech/full_papers/oberheide/oberheide_html/. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Pikoulas, J., W. Buchanan, M. Mannion, and K. Triantafyllopoulos. "An Intelligent Agent Security Intrusion System." In Engineering of Computer-Based Systems, 2002. Proceedings. Ninth Annual IEEE International Conference and Workshop on The, 94--99, 2002. doi:10.1109/ECBS.2002.999827. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Posey, Brien. "Microsoft Exchange Server Security Dos and Don'ts" TechTarget. SearchExchange. Accessed March 18, 2013. http://searchexchange.techtarget.com/feature/Microsoft-Exchange-Server-security-dos-and-donts.Google ScholarGoogle Scholar
  16. Sanok, Jr., Daniel J. "An Analysis of How Antivirus Methodologies Are Utilized in Protecting Computers from Malicious Code." In Proceedings of the 2nd Annual Conference on Information Security Curriculum Development, 142--144. InfoSecCD '05. New York, NY, USA: ACM, 2005. doi:10.1145/1107622.1107655. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Sukwong, Orathai, Hyong S. Kim, and James C. Hoe. "Despite the Widespread Use of Antivirus Software, Malware Remains Pervasive. A New Study Compares the Effectiveness of Six Commercial AV Products." Accessed April 13, 2013. http://theone.ece.cmu.edu/papers/94.commercial.2011.compmag.pdf.Google ScholarGoogle Scholar
  18. Sycara, K., A. Pannu, M. Willamson, Dajun Zeng, and K. Decker. "Distributed Intelligent Agents." IEEE Expert 11, no. 6 (December 1996): 36--46. doi:10.1109/64.546581. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Tian, Ronghua. An Integrated Malware Detection and Classification System. Deakin University. (2011). Accessed April 24, 2013. http://dro.deakin.edu.au/view/DU:30043244.Google ScholarGoogle Scholar
  20. "Why one virus engine is not enough." Accessed April 13, 2013. http://www.gfi.com/whitepapers/why-one-virus-engine-is-not-enough.pdf.Google ScholarGoogle Scholar

Index Terms

  1. Using agent technologies to correlate and compare anti-malware software

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        RIIT '13: Proceedings of the 2nd annual conference on Research in information technology
        October 2013
        102 pages
        ISBN:9781450324946
        DOI:10.1145/2512209

        Copyright © 2013 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 October 2013

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        RIIT '13 Paper Acceptance Rate12of24submissions,50%Overall Acceptance Rate51of116submissions,44%
      • Article Metrics

        • Downloads (Last 12 months)2
        • Downloads (Last 6 weeks)0

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader