Friday, June 1, 2007

Implementing Virus Scanning in Computer Networks

Author: Umakant Mishra
Abstract:
Some viruses exploit the features and capabilities of computer networks to spread, operate and damage network environments. For example, the virus may copy itself to other computers in the network or may increase network activities congesting the network traffic. The conventional anti-viruses are not efficient enough to detect and control viruses in a network environment. As they are file based they cannot scan the data while being downloaded from the server.

Most of the drawbacks of conventional scanning are taken care by a firewall-based virus scanning. But this method requires high-end machines to withstand the load of centralized scanning. There is another limitation of firewall based scanning. Implementing anti-virus into the firewall prevents outside viruses entering from the Internet but fails to provide protection from viruses spreading within the LAN.

A network virus scanner should be specially designed in order to protect computers in a network environment. It should have capability to scan the data while being transferred from server to client or from one computer to other in order to prevent transfer of infected data. The anti-virus should be capable of controlling virus-outbursts to prevent other commuters in the network from being infected. The article illustrates 10 interesting inventions from US patent database dealing with scanning viruses in a network.

Keywords: computer virus, anti-virus, anti-virus software, computer vulnerability, computer security, anti-virus design, anti-virus development, inoculation, virus scanning, virus detection, signature scanning, integrity checking, heuristic scanning, emulation, activity monitoring, generic scanning, behavior monitoring, network scanning, server scanning, computer worms, firewall, worm communication


Mishra, Umakant, Implementing Virus Scanning in Computer Networks (May 1, 2012). Available at SSRN: http://ssrn.com/abstract=2049313 or http://dx.doi.org/10.2139/ssrn.2049313

Methods of scanning Email Viruses - Applying TRIZ to improve anti-virus programs

Author: Umakant Mishra
Abstract:
An email virus makes use of the email technology and attaches itself to an email to transfer itself from one computer to another. Some email viruses create and send new emails using the address book of the victim computer. The email viruses are a matter of concern as they can spread very fast via emails to different geographical locations.

The conventional scanners are file based and not good for scanning emails as the emails can contain different types of files as attachments. Besides they cannot detect viruses until the emails are downloaded and opened by the recipient in order to be scanned in the receiver’s machine. Scanning emails on the email servers is difficult as the emails on email servers are encrypted for privacy purposes and not accessible to virus scanners. Besides, detecting virus emails is confusing as they often originate from genuine addresses.

The advanced virus scanners use various special techniques to scan the emails at various stages on the way before the infected mails can reach the recipient. The advanced methods not only deal with email virus detection and removal but also detect and control the outbreaks of email viruses.

Keywords: Software Innovation, computer virus, anti-virus, anti-virus software, computer vulnerability, computer security, anti-virus design, anti-virus development, email scanning, virus scanning, virus detection, signature scanning, integrity checking, heuristic scanning, server scanning, generic scanning, behavior monitoring, resident scanning,


Mishra, Umakant, Methods of Scanning Email Viruses: Applying TRIZ to Improve Anti-Virus Programs (May 1, 2012). Available at SSRN: http://ssrn.com/abstract=2049248 or http://dx.doi.org/10.2139/ssrn.2049248