can any 1 plllllllllllllllllllll tel me wats the algorithm used in anti-trojans to detect trojans.
Its bit urgent want it asap
hope u ppl wil help it out in this
thanks in advance
Algorithm used in detecting trojan horse?nortan antivirus
Fixed vs. variable-length patterns for detecting suspicious ...The algorithm used to create fixed-length patterns is slightly different and ..... In our case, we have developed a Trojan horse that does no de- ...
www.springerlink.com/index/8qha71rwtre... - Similar pages
Virus and malware with anti-virus and removal information.Lekbot is a Trojan horse that is written in Perl which can be used to perform a .... Bloodhound technology consists of heuristic algorithms used to detect ...cat:ML%26Lifestyle http://wwapak.blogspot.com
Algorithm used in detecting trojan horse?nortonantivirus
Most of the fast tools use mix of file name/file location and file signature and compares it with the one in their bad file database. This approach usualy finds all the common trojans. usually md5 is used as file signature, though there are some variations of this approach.
Another approach is used by anti-virus applications, which scan computer longer and also searches files for specific paterns or dangerous sequences in their code ( heuristics approach). It's slower, but might detect trojans that are new or change their code often.
Third approach is looking at specific points in the system and waiting if program is trying to access it. For example, downloading and installing additional sofware, or changing some your PC settings. This one is used in real-time protection software.
No comments:
Post a Comment