INTRODUCTION
Objective
The
system should be user friendly and should be designed in a way that the system
can be easily understandable by an inexperienced user also.
The
system should scan any file extensions.
The
system should generate a report of the scan performed.
The
report should provide options to delete or quarantine the affected files.
The
system should allow the quarantined files to be moved to the virus vault.
The
user should get the help he needs, when operating our system. So ‘helping’
should be provided, if necessary for the system.
The
system should be designed in way that it can be operated on any machine even
with low configuration also, so that an ordinary user can access it.
The
system should be reliable.
There
should be restrictions on certain kinds of commands in accessing requirements
so that it can provide security.
Scope:
The virus detection method has certainly two types of methods. The
first one is signature scanning and the other one is the heuristic analysis.
The signature scanning method is just specific to a single signature of a
particular virus but most famous method because of its simplicity. Heuristic
analysis unlike signature scanning is generic antivirus approach which we
selected to improve. Our system is developed by using the heuristic analysis
approach which uses decompilation as its main activity. But we just written one
basic disassembler in C language and we are making use of it as our
disassembling tool. So our project can cover the entire virus files that are
being constituted from C and C++ and some more languages. The system scope is
beyond the files that are implemented in other computer languages. The system
scope can be increased further by adding more disassembler tools that can
disassemble the exe file from other languages also.
for more please drop your comments..
Comments
Post a Comment