The impact of the application of antivirus programs on the security of computer systems

Authors

  • Ivan Jovanović Aviation Academy, Belgrade, Serbia
  • Milena Cvjetković College of Academic Studies "Dositej", Belgrade, Serbia
  • Milovan Cvjetković Technical College of Academic Studies, Belgrade, Serbia

DOI:

https://doi.org/10.5937/bizinfo2402011J

Keywords:

antivirus programs, malicious attacks, system requirements, computer system, neural network

Abstract

The paper presents a study that analyzes the application of different antivirus programs to reduce negative consequences on computer systems caused by malicious attacks. The research has shown the impact of antivirus programs on protecting computer systems from malicious attacks. The effect of antivirus programs was tested using neural networks. The following network activities were analyzed: payment for antivirus programs, sponsor advertising of antivirus programs, protection against viruses, system requirements, automatic updates, and technical support. The research results showed that the accuracy of predicting the intensity of consequences on computer systems was highest for small consequences. The network diagram showed that small and medium consequences were mainly caused, while large consequences were minimized. Analyzing the impact of each independent variable on reducing consequences on the computer system confirmed that the system configuration of the computer had the most significant impact. System requirements of the computer system affect the response rate of antivirus programs and the detection of different types of viruses.

Downloads

Download data is not yet available.

References

Agarap, A. F. M. (2018, February). A neural network architecture combining gated recurrent unit (GRU) and support vector machine (SVM) for intrusion detection in network traffic data. In Proceedings of the 2018 10th international conference on machine learning and computing, 26-30 https://doi.org/10.1145/3195106.3195117

Althubiti, S. A., Jones, E. M., & Roy, K. (2018, November). LSTM for anomaly-based network intrusion detection. In 2018 28th International telecommunication networks and applications conference IEEE. (ITNAC), 1-3.

Bagyalakshmi, G., Rajkumar, G., Arunkumar, N., Easwaran, M., Narasimhan, K., Elamaran, V., ... & Ramirez-Gonzalez, G. (2018). Network vulnerability analysis on brain signal/image databases using Nmap and Wireshark tools. Ieee Access, 6, 57144-57151. http://doi.org/10.1109/ACCESS.2018.2872775

Baykara, M., & DAŞ, R. (2019). SoftSwitch: A centralized honeypot-based security approach using software-defined switching for secure management of VLAN networks. Turkish Journal of Electrical Engineering and Computer Sciences, 27(5), 3309-3325. http://doi.org/10.3906/elk-1812-86

Bensaoud, A., Abudawaood, N., & Kalita, J. (2020). Classifying malware images with convolutional neural network models. International Journal of Network Security, 22(6), 1022-1031. http://doi.org/10.6633/IJNS.202011_22(6).17

Bux, K., Yousaf, M., Jalbani, A. H., & Batool, K. (2021). Detection of malicious servers for preventing client-side attacks. Mehran University Research Journal of Engineering & Technology, 40(1), 230-240. http://doi.org/10.22581/muet1982.2101.20

Clements, J., & Lao, Y. (2018). Hardware trojan attacks on neural networks. arXiv preprint arXiv:1806.05768.

Ghouti, L., & Imam, M. (2020). Malware classification using compact image features and multiclass support vector machines. IET Information Security, 14(4), 419-429. https://doi.org/10.1049/iet-ifs.2019.0189

Gao, Y., Xu, C., Wang, D., Chen, S., Ranasinghe, D. C., & Nepal, S. (2019, December). Strip: A defence against trojan attacks on deep neural networks. In Proceedings of the 35th Annual Computer Security Applications Conference, 113-125. http://doi.org/10.22581/muet1982.2101.20

Gavrylenko, S., Babenko, O., & Ignatova, E. (2018, April). Development of the disable software reporting system on the basis of the neural network. Journal of Physics: Conference Series, 998(1), 012009. https://doi.org/10.1088/1742-6596/998/1/012009

Huang, W., & Stokes, J. W. (2016, July). MtNet: a multi-task neural network for dynamic malware classification. In International conference on detection of intrusions and malware, and vulnerability assessment. Springer, Cham. 399-418.

Kaspersky Company (2021. May 25). Securelist by Kaspersky. https://securelist.com/it-threat-evolution-q3-2020-non-mobile-statistics/99404/

Kaspersky Company (2021. May 30). Malware & Computer Virus Facts & FAQs. https://www.kaspersky.com/resource-center/threats/computer-viruses-and-malware-facts-and-faqs

Li, D., Deng, L., Lee, M., & Wang, H. (2019). IoT data feature extraction and intrusion detection system for smart cities based on deep migration learning. International journal of information management, 49, 533-545. https://doi.org/10.1016/j.ijinfomgt.2019.04.006

Li, C., & Gaudiot, J. L. (2019, July). Detecting malicious attacks exploiting hardware vulnerabilities using performance counters. In 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC) 1, 588-597. IEEE. https://doi.org/10.1109/COMPSAC.2019.00090

Raff, E., Zak, R., Lopez Munoz, G., Fleming, W., Anderson, H. S., Filar, B., ... & Holt, J. (2020, November). Automatic YARA rule generation using biclustering. In Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security, 71-82. https://doi.org/10.1145/3411508.3421372

Raman, M. G., Somu, N., Kirthivasan, K., & Sriram, V. S. (2017). A hypergraph and arithmetic residue-based probabilistic neural network for classification in intrusion detection systems. Neural Networks, 92, 89-97. https://doi.org/10.1016/j.neunet.2017.01.012

Sardina, J., Olkhovskii, A., & Lowell, R. P. (2018). U.S. Patent No. 10,025,710, Washington, DC: U.S. Patent and Trademark Office.

Sarker, I. H. (2021). Deep cybersecurity: a comprehensive overview from neural network and deep learning perspective. SN Computer Science, 2(3), 1-16. https://doi.org/10.1007/s42979-021-00535-6

Saxe, J., & Berlin, K. (2017). eXpose: A character-level convolutional neural network with embeddings for detecting malicious URLs, file paths and registry keys. arXiv preprint arXiv:1702.08568.

Song, Q., Zheng, Y. J., Xue, Y., Sheng, W. G., & Zhao, M. R. (2017). An evolutionary deep neural network for predicting morbidity of gastrointestinal infections by food contamination. Neurocomputing, 226, 16-22. https://doi.org/10.1016/j.neucom.2016.11.018

Soni, V. D. (2019). Role of Artificial Intelligence in Combating Cyber Threats in Banking. International Engineering Journal for Research & Development, 4(1), 7-7.

Švarc, L., & Strnad, P. (2021). Automated Computer Attacks Detection in University Environment. Acta Informatica Pragensia, 10(1), 75-84. http://doi.org/10.18267/j.aip.147

The Economic Times (2021, June 3). What is 'Computer Virus'. https://economictimes.indiatimes.com/definition/computer%20virus

Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2018). Detecting malicious domain names using deep learning approaches at scale. Journal of Intelligent & Fuzzy Systems, 34(3), 1355-1367.

Vuković, I (2020). Application of artificial intelligence in detection of DDoS attacks, Archibald Reiss Days, 10.

Wang, W., Zhu, M., Zeng, X., Ye, X., & Sheng, Y. (2017, January). Malware traffic classification using convolutional neural network for representation learning. In 2017 International conference on information networking (ICOIN), 712-717. IEEE. http://doi.org/%2010.1109/ICOIN.2017.7899588

Xiao, X., Zhang, S., Mercaldo, F., Hu, G., & Sangaiah, A. K. (2019). Android malware detection based on system call sequences and LSTM. Multimedia Tools and Applications, 78(4), 3979-3999. http://doi.org/DOI%2010.1007/s11042-017-5104-0

Yan, J., Qi, Y., & Rao, Q. (2018). Detecting malware with an ensemble method based on deep neural network. Security and Communication Networks, 7247095. https://doi.org/10.1155/2018/7247095

Zacharis, N. Z. (2016). Predicting student academic performance in blended learning using Artificial Neural Networks. International Journal of Artificial Intelligence and Applications, 7(5), 17-29.

Downloads

Published

2024-08-21

How to Cite

Jovanović, I., Cvjetković, M., & Cvjetković, M. (2024). The impact of the application of antivirus programs on the security of computer systems. BizInfo Blace, 15(2), 11-19. https://doi.org/10.5937/bizinfo2402011J

Similar Articles

1-10 of 92

You may also start an advanced similarity search for this article.