ANALYSIS AND RESEARCH OF THE CHARACTERISTICS OF STANDARDIZED IN UKRAINE ANTIVIRUS SOFTWARE

Authors

DOI:

https://doi.org/10.28925/2663-4023.2019.4.6271

Keywords:

antivirus software; information protection; characteristics of antivirus programs; malicious software (malware)

Abstract

The article is devoted to the problem of information security, namely the study of the characteristics of antivirus programs which are standardized in Ukraine. The study used statistical methods to analyze the characteristics of antivirus software and comparative methods of comparing the various types of such programs. Relying on researches in scientific literature, the main threats to information security in the field of information technology were analyzed. The emphasis is placed on the fact that antivirus software is the most effective protection against malicious software (malware). The basic methods of work of the antivirus – signature and heuristic – are described. The list of standardized in Ukraine antivirus programs is determined. The study was based on the quantitative and qualitative results which while testing had obtained by the independent testing laboratory AV-Comparatives (Austria), the independent Virus Bulletin (VB) laboratory for testing and certification in the field of security, the Center for antivirus protection information of the State Special Communication Service of Ukraine.  The comparative analysis of the main characteristics of antivirus programs was carried out, namely: antivirus and anti-spyware; anti-phishing; anti-rootkit protection against exploits; Intrusion Prevention System; Real-time protection; parental control; host-based firewall; antispam; protection against network attacks; home network protection; anti-theft; password management.

Downloads

Download data is not yet available.

References

Steve Morgan, Editor-in-Chief Cybersecurity Ventures. 2017 Cybercrime Report. Herjavec group. Режим доступу: https://cybersecurityventures.com/2015-wp/wpcontent/uploads/2017/10/2017-Cybercrime-Report.pdf.

Cisko report on cybersecurity 2019 – Access mode: https://www.cisco.com/c/uk_ua/products/security/security-reports.html#~stickynav=2

Svchenko A.S., Penkova I.V. An analysis of antivirus software application for information secutiry http://dspace.nbuv.gov.ua/bitstream/handle/123456789/93924/31-Ivchenko.pdf?sequence=1

Smirnov S.A. Antivirus data protection method which uses cloud computing technologies. The dissertation for the degree of candidate of technical sciences. Access mode: http://www.dut.edu.ua/uploads/p_1539_60443732.pdf

Nizovtsev Yu. The usage of antivirus software in forensic expertise against malicious software means / Yu. Nizovtsev, О. Yakovlev // Scientific journal of the National Academy of Public Prosecutor of Ukraine. – 2017. – № 4(16). – P. 161–169. Access mode: http://www.chasopysnapu.gp.gov.ua/chasopys/ua/pdf/4-2017/nizovcev.pdf

Rudnichenko A.K. Kolesnikova D.S., Vereschahina E.A. Protection against malicious software that look as a complex of legitimate software products // Internet journal «Naukovedenie», №9(5), 2017 . Access mode: https://naukovedenie.ru/PDF/72TVN517.pdf .

S.G. Semenov. Development of computer virus detection system, based on the neural network АРТ -1 / S. Semenov, S. Havrilenko, S. Hloba, O. Babenko // Systems of information processing. – 2015. - № 10(135). – р. 126 – 129.

AV-TEST - The Independent IT-Security Institute, 2019. Access mode: https://www.av-test.org/en/statistics/malware/.

The order of updating an antivirus software that has a positive conclusion on the results of state expertise in the field of technical protection of information. Access mode: http://www.dsszzi.gov.ua/dsszzi/control/uk/publish/article?art_id=50825&cat_id=38835

Buryachok V.L. Informational and cyberspaces: security issues, methods and means of struggle. / V.L.Buryacjok, G.M.Gulak, V.L. Tolubko. – К. : PLC “SIC GROUP Ukraine”, 2015. – p.449

The list of АВПЗ, which receive positive expert opinion. Access mode: http://cazi.gov.ua/p.php

Summary Report 2018 AV-Comparatives. Access mode: https://www.av-comparatives.org/tests/summary-report-2018/

VB Testing Virus Bulletin's testing and certification services. Access mode: https://www.virusbulletin.com/testing/

Antivirus rating 2019 – Let’s choose the best antivirus. Access mode: http://softcatalog.info/ru/obzor/reyting-antivirusov

Avast Free Antivirus. Access mode: https://www.avast.ua/ru-ua/free-antivirus-download

Avast Free Antivirus. Access mode: https://avast.ru.softonic.com/

Sophos Home. Access mode: https://www.comss.ru/page.php?id=2879

Panzor CloudAntivirus Always Protected. Access mode: https://panzor.com/

Symantec Endpoint Protection 14. Access mode: https://www.anti-malware.ru/reviews/Symantec_Endpoint_Protection_14

Antivirus Zillya. Access mode: https://zillya.ua/zillya-total-security?product=zts3&term=12&count=1

McAfee Internet Security. Access mode: https://www.mcafee.com/consumer/ru-ru/store/m0/catalog/mis_516/mcafee-internet-security.html

Bitdefender Total Security. Access mode: https://bitdefender.com.ua/product/bitdefender-total-security/

Antivirus plus Security. Access mode: https://www.trendmicro.com/en_us/forHome/products/antivirus-plus.html

ROMAD Cyber Systems. Access mode: https://romad-systems.com/ua/

Decree of the President of Ukraine No.133/2017 On decision of the National Security and Defense Council of Ukraine dated April 28, 2017 “On the Application of Personal Special Economic and Other Restrictive Measures (Sanctions)”. Access mode: https://www.president.gov.ua/documents/1332017-21850

V. Buriachok, S. Shevchenko, and P. Skladannyi, “Virtual Laboratory for Modeling of Processes in Informational and Cyber Securities as a form of Forming Practical Skills of Students”, Cybersecurity: Education, Science, Technique, vol. 2, no. 2, pp. 98-104. https://doi.org/10.28925/2663-4023.2018.2.98104

Downloads


Abstract views: 1040

Published

2019-06-27

How to Cite

Shevchenko, S., Skladannyi, P., & Martseniuk, M. (2019). ANALYSIS AND RESEARCH OF THE CHARACTERISTICS OF STANDARDIZED IN UKRAINE ANTIVIRUS SOFTWARE. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 4(4), 62–71. https://doi.org/10.28925/2663-4023.2019.4.6271

Most read articles by the same author(s)

<< < 1 2 3 > >>