Advertisement

Wirtschaftsinformatik

, Volume 45, Issue 4, pp 435–443 | Cite as

Systematisches Testen von Anti-Viren-Software

  • Andreas Marx
  • Claus Rautenstrauch
WI — State-of-the-Art
  • 75 Downloads

Systematic testing of anti-virus software

Abstract

The application of anti-virus software (AV software) in companies is of increasing importance, caused by the enormous damages of different kinds of malware (malicious software). Features of different AV software systems vary in particular through the fast sequence of releases offered by different vendors. The reason for this release bombing is the still unbounded creativity of malware programmers. Therefore, it can only be analyzed through extensive and systematic tests, which software fits the current requirements regarding detection and disinfection of malware. In this paper first the potentials of damages caused by different kinds of malware will be described, followed by a presentation of a systematic test method for AV software.

Keywords

anti-virus software (av software) malware security test procedures 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literatur

  1. [AvTe02]
    AV-Test.org: Anti-Virus Links. http://www.av-test.org/sites/links.php3?lang=en&extra=viren&sort=1, Abruf am 2002-11-01.
  2. [Bont93]
    Bontchev, V.: Analysis and Maintenance of a Clean Virus Library. http://www.virusbtn.com/OtherPapers/VirLib, Abruf am 2002-11-01.
  3. [Boro02]
    Borowski, S.: Dialer — Die Tricks unse-riö ser Anbieter. http://www.dialerschutz.de/home/Tricks/tricks.html, Abruf am 2002-11-01.
  4. [BrTi01]
    Bridwell, L. M.; Tippett, P.: ICSA Labs Virus Prevalence Survey 2001. http://www.trusecure.com/download/dispatch/vps-survey-2001.pdf, TrueSecure Corp, Herndon (VA) 2001, Abruf am 2003-01-06.
  5. [CEI02]
    Computer Economics: Malicious Code Attacks Had $ 13.2 Billion Economic Impact in 2001. http://www.computereconomics.com/article.cfm?id=133, 2002-01-04, Abruf am 2003-01-05.
  6. [Ford02]
    Ford, R.: Malware. http://www.malware.org/malware.htm, Abruf am 2002-11-01.
  7. [Fst01]
    Freiwillige Selbstkontrolle Telefonmehrwertdienste e.V.: Verhaltenskodex für Telefonmehrwertdienste. http://www.fst-ev.org/ger/druck/verhaltenskodex.html, Abruf am 2002-11-01.
  8. [Fuhs98]
    Fuhs, H.: Internet Hoaxes: Konzeptionelle Gesichtspunkte und praktische Auswirkungen. http://www.vhm.haitec.de/konferenz/1998/vortraege/hoax.htm, Abruf am 2002-11-01.
  9. [GeCA03]
    GeCAD: Realtime Virus Statistics. http://www.rav.ro/ravmsstats/, Abruf am 2003-01-06.
  10. [Kula01]
    Kulakow, S.: NetBus 2.1, Is It Still a Trojan Horse or an Actual Valid Remote Control Administration Tool? http://rr.sans.org/malicious/netbus21.php, Abruf am 2002-11-01.
  11. [Marx00]
    Marx, A.: A Guideline to Anti-MalwareSoftware testing. In: EICAR 2000 Best Paper Proceedings, pp. 218-253. Online verfügbar unter: http://www.av-test.org/down/papers/2000-02_eicar_2000.zip.
  12. [Marx02a]
    Marx, A.: Trouble Makers. In: Virus Bulletin 01/2002, S. 14-15. Online verfügbar unter: http://www.av-test.org/down/papers/2002-01_vb_trouble.pdf.
  13. [Marx02b]
    Marx, A.: Test Lab Installation. In: Virus Bulletin 02/2002, S. 11-13. Online verfügbar unter: http://www.av-test.org/down/papers/2002-02_vb_testlab.pdf.
  14. [Marx02c]
    Marx, A.: Rescue Me: Updating AntiVirus Rescue Systems. In: Virus Bulletin 02/2002, S. 10-12. Online verfügbar unter: http://www.av-test.org/down/papers/2002-05_vb_rescue.pdf.
  15. [Marx02d]
    Marx, A.: (Porn) Dialers — a New Class of Malware? In: Virus Bulletin 12/2002, S. 12- 13. Online verfügbar unter: http://www.av-test.org/down/papers/2002-12_vb_dialer.pdf.
  16. [Mess02]
    MessageLabs: VirusEye Virus Count. http://www.messagelabs.com/viruseye/default.asp?by=all, Abruf am 2003-01-06.
  17. [Nach98]
    Nachenberg, C.: Staying Ahead of the Virus Writers: An in-depth look at heuristics. Proceedings of the Virus Bulletin Conference ’98, pp. 85-98.Google Scholar
  18. [Nai00]
    Network Associates: Virus Information Library: W95/MTX.gen@M. http://vil.nai.com/vil/content/v_98797.htm, Abruf am 2002-11-01.
  19. [Nai02]
    Network Associates: Virus Glossary. http://www.mcafeeb2b.com/naicommon/avert/avert-research-center/virus-glossary.as p, Abruf am 2002-11-01.
  20. [Open02]
    Open Anti-Virus: Mission Statement. http://www.openantivirus.org/mission.php, Abruf am 2002-11-01.
  21. [PoBl96]
    Pomberger, G.; Blaschek, G.: SoftwareEngineering: Prototyping und objektorientierte Software-Entwicklung. 2. Auflage. Hanser, Mün-chen, Wien, 1996.Google Scholar
  22. [Siem02]
    Siemens, M.: Nummer Sicher statt Nummer 0190, AntiVir schützt auch vor überhöhter Telefonrechnung durch kostenintensive Dialer. http://www.antivir.de/news/2002/19_04_02.htm, Abruf am 2002-11-01.
  23. [Tiet02]
    Tietz, T.: Test — Dialer setzt 0190-Schutz-software außer Gefecht. http://www.trojanerinfo.de/news/dialer_warnkiller.shtml, Abruf am 2002-11-01.
  24. [Viru02]
    Virus Bulletin: Useful Links, Anti-Virus Product Developer Index. http://www.virusbtn.com/AVLinks, Abruf am 2002-11-01.
  25. [Wall90]
    Wallmüller, E.: Software-Qualitätssicherung in der Praxis. Hanser, München, Wien, 1990.Google Scholar
  26. [Well02]
    Wells, J.: The WildList Organisation International. http://www.wildlist.org, Abruf am 2002-04-25.
  27. [Whal98]
    Whalley, I.: Testing Times for Trojans. In: Proceedings of the Virus Bulletin Conference ’99, pp. 55-68.Google Scholar
  28. [Ziem02]
    Ziemann, F.: Hoax-Info Service, Über Computer-Viren, die keine sind (sog. „Hoaxes”) und andere Falschmeldungen und Gerüchte. http://www.tu-berlin.de/www/software/hoax.shtml, Abruf am 2002-11-01.

Copyright information

© Springer Fachmedien Wiesbaden GmbH 2003

Authors and Affiliations

  1. 1.Gega IT-Solutions GbRMagdeburgDeutschland
  2. 2.Institut für Technische und Betriebliche InformationssystemeOtto-von-Guericke-Universität MagdeburgMagdeburgDeutschland

Personalised recommendations