Build a system of defensive and offensive tackle for the next viruses and virus filtering using the method of static files
Abstract
Talking about building anti-virus systems in traditional and well-known ways has become useless at the present time, due to the fact that we are dealing with terminal stations within local and international networks, which makes us vulnerable to many viruses coming through those networks, which anti-virus programs cannot address because These programs depend on the names of common viruses that are recorded in the file of warnings or programs that are not allowed to pass into the calculator. Accordingly, computers that do not participate in a specific network can be controlled and protected from viruses, with the exception of modern viruses that are not registered with anti-programs and that come through some common storage media. As for the topic of our research, it deals with how to build effective systems far from the traditional method known to it, as this system includes defining operating systems on non-standard files to book those files using software prepared for this purpose within extended operating systems and at the same time preparing a special independent memory that these programs deal with Processing operations are delegated to the input and output processor. The process also requires that there is software running across the network. What is in effect on the Internet is the monitoring operations carried out by Symantce, as this company owns many sites and has a special department called the MSS Security Operations Department, where the work of this company focuses on monitoring many of its sites and addressing all breaches that occur through firewalls Where the company has prepared software that possesses geographical maps through which the location that was attacked is determined, and therefore it cannot be said that the aforementioned company and through all its branches can control all offensive operations, and if so, where do these destructive viruses come from. Accordingly, it must be said that the work of Symantec is a central work to monitor the sites of danger that appear across the network, where the monitoring sites begin to address hundreds of thousands of intrusions per day after the destructive programs cause damage to many sites. Computer operating systems and international network programs, so that the response to virus programs is local through a system or program included in the operating system, before these destructive programs cause damage. They are confronted and destroyed.