Você está na página 1de 2

Computer Virus and Protection Methodologies

Project Proposal and Plan:


INTRODUCTION:

Nowadays protecting the data has become a big problem for everyone. The IT professionals are
revealing new and different threats on the basis of their research and studies and because of these
threats and vulnerabilities the security of networks is on a high risk (Szor, 2005). As there are a large
number of security threats on internet that can harm the network and the data can be misused. The
biggest threat to a network nowadays is a Virus that can harm the network, system or data of user and
can misuse the information of the user (Mishra, 2007). Despite the fact that, the experts working on
anti-virus programs by and large take after the new methods utilized as a part of cutting edge malwares
and endeavor to defeat them, in any case, all the new guarding procedures are not adequate and there
is a to a great degree need for more scrutinizes. The most imperative thing is to examine and see all the
past strategies, well.

In spite of the fact that the anti-virus programming endeavor to wind up upgraded and overcome the
malwares dangers, be that as it may we need to acknowledge that infection creators are one stage more
ahead, on the grounds that they choose how to assault first and hostile to infection advancements need
to just barrier against their assaults (Skoudis & Zeltser, 2005). In this way, computer virology region
needs more examines and examination to have the capacity to figure the future coming dangers. In this
way, the fundamental reason for this examination is to shield from these sorts of harms in future.

In this paper, firstly, we will give a short depiction on development of computer virus and their
groupings in part of disguise strategies. At that point we will overview the most well-known filtering and
discovery strategies utilized as a part of against infection programming. Antivirus programming utilized
diverse philosophies in breaking down, examining, and distinguishing infections to give adequate
wellbeing to PC frameworks. In the following area, we will introduce an examination table that
demonstrates these recognition strategies and their elements. It will help us to comprehend the
preferences and detriments of every technique and analyze them. In the last area, we will end with a
conclusion and a few proposals.

METHODOLOGIES:

The main focus in this paper will be on theoretical methodologies. We will put together our research on
the undertaken topic with reference to relevant scholarly literature that has been given by previous
researchers. The theoretical framework will demonstrate an understanding of concepts that are relevant
to the topic of our research paper and that relate to the broader areas of knowledge being considered.

Having literature and previous experiments help will identify the limits to those generalizations
identified before. A theoretical framework will specify which key variables influence a phenomenon of
interest and highlights the need to examine how those key variables might differ and under what
circumstances.

EXPECTED OUTCOME:

In this paper, though we try to review all most conventional antivirus techniques. By the end of this
paper, some major problems in detection methods are likely to be identified. As per initial research, we
will be analyzing:

Which detection methods are not powerful against evolutionary advanced or new viruses
The advantages and disadvantages of existing scanning processes
Why anti-virus and its virus database need to be updated continually and extremely to become
reliable.

TIMELINE

Week Task
1 Obtained some knowledge about the research, e.g. how to read papers,
how to evaluate papers
2 Review previous works on the undertaken topic
3 Write proposal
4 Critically Compare different virus detection methodologies
5 Draft initial report
6 Draw conclusions
7 Write final report

REFERENCES

Mishra, U. (2007). An Introduction to Computer Viruses. trizsite journal. Retrieved from


http://www.trizsite.com/articles.

Skoudis, E. & Zeltser, L. (2005). Malware: Fighting Malicious Code. Prentice Hall

Szor, P. (2005). The Art of Computer Virus Research and Defense. Addison Wesley.

Você também pode gostar