楼主: wasing
收起左侧

[分享] F-PROT使用體會~~

 关闭 [复制链接]
aerbeisi
发表于 2008-4-9 14:18:43 | 显示全部楼层
原帖由 mofunzone 于 2008-4-9 14:13 发表
和一个根本连引擎到底是靠着什么来启发都分不清的人,还有什么好说的,只是天天看着引擎在启发,还说generic的都不是启发,那现在冒顶你也就算一个maximus引擎,因为eldorado和gsa是1000%的generic引擎


你非常喜欢引用别人的话,但是话语里漏洞很多,我从来没有下过论断,generic是启发,还是不是启发。你去仔细推敲我说过的原话再来跟别人争论吧。
mofunzone
发表于 2008-4-9 14:23:25 | 显示全部楼层

回复 21楼 的帖子

http://bbs.kafan.cn/viewthread.p ... page%3D1&page=3
F-Prot的那些generic都不算启发,只有后缀是Eldorado,Maximus,GSA的是启发引擎扫描的结果,我按照官方给出的说法,generic,gen之类的都不计入启发内。

看看你在24楼说的什么
f-prot的generic都不算启发,后缀是eldorado,maximus,gsa的都是启发引擎的结果
你知道eldorado和gsa是什么启发引擎吗?
你有按照你说的把eldorado和gsa的结果剔除出去吗?
而且maximus的!based定义一样是基因,换个名字罢了,真正不是基因的只有类似nod32的probably的报法
aerbeisi
发表于 2008-4-9 14:25:52 | 显示全部楼层
F-Prot的那些generic都不算启发,只有后缀是Eldorado,Maximus,GSA的是启发引擎扫描的结果,我按照官方给出的说法,generic,gen之类的都不计入启发内。


你说好笑吗?不是我的说法。
mofunzone
发表于 2008-4-9 14:27:06 | 显示全部楼层

回复 23楼 的帖子

generic,gen之类的都不计入启发内。
你做了吗?
aerbeisi
发表于 2008-4-9 14:29:48 | 显示全部楼层
转移话题到是挺快,我做没有做,你自己测试F-PROT就会得出结果,不然我光说有什么用,你完全可以说我是胡说。我只是按照官方的说法凡是后缀都有这三个启发代号的都算入启发。
The EQs
发表于 2008-4-9 14:30:06 | 显示全部楼层
Heuristic analysis is often considered a generic AV detection mechanism, not a virus-specific detection mechanism. What is not always considered is that the converse is also true; generic solutions use heuristic rule-sets as part of the diagnostic process.
For instance:
Mail gateway filters use rules to specify what file types and file names are yypermitted as attachments. Such filters are very good at countering obvious threats such as files with extensions like .LNK or .JPG, and .EXE, but can be rather inflexible in their rejection of whole classes of executable files. 1 Some filters use more advanced techniques, such as checking that the headers of the file scanned match the filename extension. This can significantly reduce the risk of false positives (and false negatives).
Change detectors use the rule that if an object’s yycharacteristics have changed, it should be treated as suspicious. Since there are many contexts in which a binary can legitimately change its checksum (as in self-modifying code, recompiled code, reconfiguration, run-time compression, a patched or updated program), such a crude change detection criterion (i.e., the file has changed, so it must be infected) can exhibit a high false positive rate. However, change detection can work well in conjunction with virus-specific scanning. A well-proven technique is to compare an object to its checksum and run a full scan on it only if a previously calculated checksum has changed, reducing the time it takes to process a file that hasn’t changed. This is why an initial scan of a system may take longer than subsequent scans with some AV programs.
Behavior monitors and blockers, which evaluate and act upon the way yyapplications behave, were among the earliest forms of AV software. This approach dovetails nicely with heuristics, which can enhance behavior blocking performance and actually reduce false positives. Classic AV behavior monitoring tends to check for two types of code behavior: replication and potential damage.
Replicative code, by definition, strongly suggests the presence of a virus ——(or worm, depending on the type of code and the definition you favor). This approach has an advantage in that system calls suggesting replicative code are comparatively easy to programmatically identify, especially where the code isn’t significantly obfuscated. It is, however, easier to identify a virus that replicates by writing a straight copy of itself rather than an evolved copy (i.e. a non-polymorphic virus).
Potentially damaging code reflects the likelihood of a malicious payload. ——This approach is ineffective where there is no payload, or where the payload is not obviously damaging. Some forms of damage, such as file deletion, are easier to programmatically detect than others, such as the unwanted and potentially embarrassing display of offensive messages or images. On the other hand, successful detection by payload has an advantage when it comes to detecting non-replicative malware (such as Trojans and other non-viral programs). There is a need for caution though. For instance, deleting a file is by itself an unreliable indicator of malice, since many programs routinely and legitimately delete or overwrite files such as obsolete configuration or data files.
Generic solutions use heuristic rule-sets as part of the diagnostic process.
mofunzone
发表于 2008-4-9 14:31:07 | 显示全部楼层

回复 25楼 的帖子

一边用官方的说法说generic不是启发,一边把2个generic的引擎的结果算进去,你在和我们搞文字游戏吗
p.s 我哪里有转移话题?那天我和你废话那么多就是因为这个原因,要吗你就说generic是启发,要吗你就把两个generic启发引擎的结果剔除出去

[ 本帖最后由 mofunzone 于 2008-4-8 22:36 编辑 ]
sanhu35
发表于 2008-4-9 14:32:05 | 显示全部楼层
。。。。我怎么更新不动啊
tracydk
发表于 2008-4-9 14:40:13 | 显示全部楼层
NOD32现在也是经常报壳
tracydk
发表于 2008-4-9 14:44:04 | 显示全部楼层
个人觉得启发方面还是BD的最好
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-5-17 01:22 , Processed in 0.091573 second(s), 14 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表