The impact of the application of antivirus programs on the security of computer systems
DOI:
https://doi.org/10.5937/bizinfo2402011JKeywords:
antivirus programs, malicious attacks, system requirements, computer system, neural networkAbstract
The paper presents a study that analyzes the application of different antivirus programs to reduce negative consequences on computer systems caused by malicious attacks. The research has shown the impact of antivirus programs on protecting computer systems from malicious attacks. The effect of antivirus programs was tested using neural networks. The following network activities were analyzed: payment for antivirus programs, sponsor advertising of antivirus programs, protection against viruses, system requirements, automatic updates, and technical support. The research results showed that the accuracy of predicting the intensity of consequences on computer systems was highest for small consequences. The network diagram showed that small and medium consequences were mainly caused, while large consequences were minimized. Analyzing the impact of each independent variable on reducing consequences on the computer system confirmed that the system configuration of the computer had the most significant impact. System requirements of the computer system affect the response rate of antivirus programs and the detection of different types of viruses.
Downloads
References
Agarap, A. F. M. (2018, February). A neural network architecture combining gated recurrent unit (GRU) and support vector machine (SVM) for intrusion detection in network traffic data. In Proceedings of the 2018 10th international conference on machine learning and computing, 26-30 https://doi.org/10.1145/3195106.3195117
Althubiti, S. A., Jones, E. M., & Roy, K. (2018, November). LSTM for anomaly-based network intrusion detection. In 2018 28th International telecommunication networks and applications conference IEEE. (ITNAC), 1-3.
Bagyalakshmi, G., Rajkumar, G., Arunkumar, N., Easwaran, M., Narasimhan, K., Elamaran, V., ... & Ramirez-Gonzalez, G. (2018). Network vulnerability analysis on brain signal/image databases using Nmap and Wireshark tools. Ieee Access, 6, 57144-57151. http://doi.org/10.1109/ACCESS.2018.2872775
Baykara, M., & DAŞ, R. (2019). SoftSwitch: A centralized honeypot-based security approach using software-defined switching for secure management of VLAN networks. Turkish Journal of Electrical Engineering and Computer Sciences, 27(5), 3309-3325. http://doi.org/10.3906/elk-1812-86
Bensaoud, A., Abudawaood, N., & Kalita, J. (2020). Classifying malware images with convolutional neural network models. International Journal of Network Security, 22(6), 1022-1031. http://doi.org/10.6633/IJNS.202011_22(6).17
Bux, K., Yousaf, M., Jalbani, A. H., & Batool, K. (2021). Detection of malicious servers for preventing client-side attacks. Mehran University Research Journal of Engineering & Technology, 40(1), 230-240. http://doi.org/10.22581/muet1982.2101.20
Clements, J., & Lao, Y. (2018). Hardware trojan attacks on neural networks. arXiv preprint arXiv:1806.05768.
Ghouti, L., & Imam, M. (2020). Malware classification using compact image features and multiclass support vector machines. IET Information Security, 14(4), 419-429. https://doi.org/10.1049/iet-ifs.2019.0189
Gao, Y., Xu, C., Wang, D., Chen, S., Ranasinghe, D. C., & Nepal, S. (2019, December). Strip: A defence against trojan attacks on deep neural networks. In Proceedings of the 35th Annual Computer Security Applications Conference, 113-125. http://doi.org/10.22581/muet1982.2101.20
Gavrylenko, S., Babenko, O., & Ignatova, E. (2018, April). Development of the disable software reporting system on the basis of the neural network. Journal of Physics: Conference Series, 998(1), 012009. https://doi.org/10.1088/1742-6596/998/1/012009
Huang, W., & Stokes, J. W. (2016, July). MtNet: a multi-task neural network for dynamic malware classification. In International conference on detection of intrusions and malware, and vulnerability assessment. Springer, Cham. 399-418.
Kaspersky Company (2021. May 25). Securelist by Kaspersky. https://securelist.com/it-threat-evolution-q3-2020-non-mobile-statistics/99404/
Kaspersky Company (2021. May 30). Malware & Computer Virus Facts & FAQs. https://www.kaspersky.com/resource-center/threats/computer-viruses-and-malware-facts-and-faqs
Li, D., Deng, L., Lee, M., & Wang, H. (2019). IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning. International journal of information management, 49, 533-545. https://doi.org/10.1016/j.ijinfomgt.2019.04.006
Li, C., & Gaudiot, J. L. (2019, July). Detecting malicious attacks exploiting hardware vulnerabilities using performance counters. In 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC) 1, 588-597. IEEE. https://doi.org/10.1109/COMPSAC.2019.00090
Raff, E., Zak, R., Lopez Munoz, G., Fleming, W., Anderson, H. S., Filar, B., ... & Holt, J. (2020, November). Automatic YARA rule generation using biclustering. In Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security, 71-82. https://doi.org/10.1145/3411508.3421372
Raman, M. G., Somu, N., Kirthivasan, K., & Sriram, V. S. (2017). A hypergraph and arithmetic residue-based probabilistic neural network for classification in intrusion detection systems. Neural Networks, 92, 89-97. https://doi.org/10.1016/j.neunet.2017.01.012
Sardina, J., Olkhovskii, A., & Lowell, R. P. (2018). U.S. Patent No. 10,025,710, Washington, DC: U.S. Patent and Trademark Office.
Sarker, I. H. (2021). Deep cybersecurity: a comprehensive overview from neural network and deep learning perspective. SN Computer Science, 2(3), 1-16. https://doi.org/10.1007/s42979-021-00535-6
Saxe, J., & Berlin, K. (2017). eXpose: A character-level convolutional neural network with embeddings for detecting malicious URLs, file paths and registry keys. arXiv preprint arXiv:1702.08568.
Song, Q., Zheng, Y. J., Xue, Y., Sheng, W. G., & Zhao, M. R. (2017). An evolutionary deep neural network for predicting morbidity of gastrointestinal infections by food contamination. Neurocomputing, 226, 16-22. https://doi.org/10.1016/j.neucom.2016.11.018
Soni, V. D. (2019). Role of Artificial Intelligence in Combating Cyber Threats in Banking. International Engineering Journal for Research & Development, 4(1), 7-7.
Švarc, L., & Strnad, P. (2021). Automated Computer Attacks Detection in University Environment. Acta Informatica Pragensia, 10(1), 75-84. http://doi.org/10.18267/j.aip.147
The Economic Times (2021, June 3). What is 'Computer Virus'. https://economictimes.indiatimes.com/definition/computer%20virus
Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2018). Detecting malicious domain names using deep learning approaches at scale. Journal of Intelligent & Fuzzy Systems, 34(3), 1355-1367.
Vuković, I (2020). Application of artificial intelligence in detection of DDoS attacks, Archibald Reiss Days, 10.
Wang, W., Zhu, M., Zeng, X., Ye, X., & Sheng, Y. (2017, January). Malware traffic classification using convolutional neural network for representation learning. In 2017 International conference on information networking (ICOIN), 712-717. IEEE. http://doi.org/%2010.1109/ICOIN.2017.7899588
Xiao, X., Zhang, S., Mercaldo, F., Hu, G., & Sangaiah, A. K. (2019). Android malware detection based on system call sequences and LSTM. Multimedia Tools and Applications, 78(4), 3979-3999. http://doi.org/DOI%2010.1007/s11042-017-5104-0
Yan, J., Qi, Y., & Rao, Q. (2018). Detecting malware with an ensemble method based on deep neural network. Security and Communication Networks, 7247095. https://doi.org/10.1155/2018/7247095
Zacharis, N. Z. (2016). Predicting student academic performance in blended learning using Artificial Neural Networks. International Journal of Artificial Intelligence and Applications, 7(5), 17-29.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 BizInfo (Blace) Journal of Economics, Management and Informatics

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.






