Antivirus performance characterisation: system-wide view

نویسندگان

  • Mohammed I. Al-Saleh
  • Antonio M. Espinoza
  • Jedidiah R. Crandall
چکیده

Cyber security threats are still big concerns of the cyber world. Even though many defense techniques have been proposed and used so far, the antivirus (AV) software is very widely used and recommended for the end-usersPC community. Most effective AV products are commercial and thus competitive and it is not obvious for security researchers or system developers how exactly the AV works or how it affects the whole system. The AV adds layers of complications over the already layered, complicated systems. Because there is very little effort in the literature to provide a way for understanding the AV functionality and its performance impact, in this paper we want to shed some light on that direction. To the best of our knowledge, we are the first to present an OS-aware approach to analyse and reason about the AV performance impact. Our results show that the main reason of performance degradation the tasks have with the existence of the AV software is that they mainly spend the extra time waiting on events. Also, the AV in most of our experiments enforces the tasks to spend more time using the CPU. Although there is an overhead from the competition between the tasks and the AV on the CPU, this competition is not a main factor of the overall overhead. Because of the AV intrusiveness, the tasks in our experiments are caused to create more file IO operations, page faults, system calls, and threads.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Formal Petri Net Based Model for Antivirus Update Agent System

In this paper, a formal model for antivirus update agent system is presented based on mobile agent technology and predicate/transition Petri nets. The mobile agent system contains two mobile agents called DCA and UNA. It sends out agents to update antivirus on client computers in a network. Each agent takes on a specified responsibility. First, DCA roams through the network and check the last d...

متن کامل

A Formal Petri Net Based Model for Antivirus Update Agent System

In this paper, a formal model for antivirus update agent system is presented based on mobile agent technology and predicate/transition Petri nets. The mobile agent system contains two mobile agents called DCA and UNA. It sends out agents to update antivirus on client computers in a network. Each agent takes on a specified responsibility. First, DCA roams through the network and check the last d...

متن کامل

HyperScan, A High-Performance Regular Expression Matching Engine

EXECUTIVE SUMMARY HyperScan is a software pattern matching library that can match large groups of regular expressions against blocks or streams of data. Ideal for applications that need to scan large amounts of data at high speed, such as Intrusion Prevention (IPS), Antivirus (AV), Unified Threat Management (UTM) and Deep Packet Inspection (DPI) systems, HyperScan runs entirely in software and ...

متن کامل

Preparation and Characterisation of Immunoadsorbents for High Performance Liquid Affinity Chromatography (HPLAC)

The efficacy of activation methods and coupling were studied in the context of performance in batch and fixed bed binding experiments utilizing cell culture fluids or blood plasma as feedstock. Conclusions were drawn regarding selection of solid phase according to pore size, rigidity, pH stability, Chemistry of derivation and activation, and gross concentration of immobilized ligand require...

متن کامل

An Analysis of Processor Resource Models for Use in Performance Prediction

With the increasing sophistication of both software and hardware systems, methodologies to analyse and predict system performance is a topic of vital interest. This is particularly true for parallel systems where there is currently a wide choice of both architectural and parallelisation options; and where the costs are likely to be high. Performance data is vital to a diffuse range of users inc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IET Information Security

دوره 7  شماره 

صفحات  -

تاریخ انتشار 2013