Dealing Quarantined Files

Quarantined files Your antivirus program does not remove viruses from your computer. Instead, it puts them into quarantine. You can simply ignore quarantined files.Most modern viruses make their own files,…

Continue Reading Dealing Quarantined Files

Anomaly-based detection method:

Anomaly-based Method The Internet and computer networks are exposed to an increasing number of security threats. With new types of attacks appearing continually, developing flexible and adaptive security oriented approaches…

Continue Reading Anomaly-based detection method:

Data mining for virus detection

What is data mining Data mining is a set of various methods that are used in the process of knowledge discovery for distinguishing the relationships and patterns that were previously…

Continue Reading Data mining for virus detection

Behavior based malware detection

What is behavior detection Security Behavior-based malware detection evaluates an object based on its intended actions before it can actually execute that behavior. An object’s behavior, or in some cases…

Continue Reading Behavior based malware detection

Intrusion Detection System (IDS)

What is Intrusion Detection System (IDS) An Intrusion Detection System (IDS) is a system that monitors network traffic for suspicious activity and issues alert when such activity is discovered. It is a software application…

Continue Reading Intrusion Detection System (IDS)

Signature based detection

What is Signature-based detection of malware An approach that considers attack patterns as signatures and further compares signatures of known attacks to incoming attacks for detection. It helps in detecting only known attacks (known…

Continue Reading Signature based detection