Skip to main content
Log in

Systematisches Testen von Anti-Viren-Software

Systematic testing of anti-virus software

  • WI — State-of-the-Art
  • Published:
Wirtschaftsinformatik

Abstract

The application of anti-virus software (AV software) in companies is of increasing importance, caused by the enormous damages of different kinds of malware (malicious software). Features of different AV software systems vary in particular through the fast sequence of releases offered by different vendors. The reason for this release bombing is the still unbounded creativity of malware programmers. Therefore, it can only be analyzed through extensive and systematic tests, which software fits the current requirements regarding detection and disinfection of malware. In this paper first the potentials of damages caused by different kinds of malware will be described, followed by a presentation of a systematic test method for AV software.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Literatur

  1. AV-Test.org: Anti-Virus Links. http://www.av-test.org/sites/links.php3?lang=en&extra=viren&sort=1, Abruf am 2002-11-01.

  2. Bontchev, V.: Analysis and Maintenance of a Clean Virus Library. http://www.virusbtn.com/OtherPapers/VirLib, Abruf am 2002-11-01.

  3. Borowski, S.: Dialer — Die Tricks unse-riö ser Anbieter. http://www.dialerschutz.de/home/Tricks/tricks.html, Abruf am 2002-11-01.

  4. Bridwell, L. M.; Tippett, P.: ICSA Labs Virus Prevalence Survey 2001. http://www.trusecure.com/download/dispatch/vps-survey-2001.pdf, TrueSecure Corp, Herndon (VA) 2001, Abruf am 2003-01-06.

  5. Computer Economics: Malicious Code Attacks Had $ 13.2 Billion Economic Impact in 2001. http://www.computereconomics.com/article.cfm?id=133, 2002-01-04, Abruf am 2003-01-05.

  6. Ford, R.: Malware. http://www.malware.org/malware.htm, Abruf am 2002-11-01.

  7. Freiwillige Selbstkontrolle Telefonmehrwertdienste e.V.: Verhaltenskodex für Telefonmehrwertdienste. http://www.fst-ev.org/ger/druck/verhaltenskodex.html, Abruf am 2002-11-01.

  8. Fuhs, H.: Internet Hoaxes: Konzeptionelle Gesichtspunkte und praktische Auswirkungen. http://www.vhm.haitec.de/konferenz/1998/vortraege/hoax.htm, Abruf am 2002-11-01.

  9. GeCAD: Realtime Virus Statistics. http://www.rav.ro/ravmsstats/, Abruf am 2003-01-06.

  10. Kulakow, S.: NetBus 2.1, Is It Still a Trojan Horse or an Actual Valid Remote Control Administration Tool? http://rr.sans.org/malicious/netbus21.php, Abruf am 2002-11-01.

  11. Marx, A.: A Guideline to Anti-MalwareSoftware testing. In: EICAR 2000 Best Paper Proceedings, pp. 218-253. Online verfügbar unter: http://www.av-test.org/down/papers/2000-02_eicar_2000.zip.

  12. Marx, A.: Trouble Makers. In: Virus Bulletin 01/2002, S. 14-15. Online verfügbar unter: http://www.av-test.org/down/papers/2002-01_vb_trouble.pdf.

  13. Marx, A.: Test Lab Installation. In: Virus Bulletin 02/2002, S. 11-13. Online verfügbar unter: http://www.av-test.org/down/papers/2002-02_vb_testlab.pdf.

  14. Marx, A.: Rescue Me: Updating AntiVirus Rescue Systems. In: Virus Bulletin 02/2002, S. 10-12. Online verfügbar unter: http://www.av-test.org/down/papers/2002-05_vb_rescue.pdf.

  15. Marx, A.: (Porn) Dialers — a New Class of Malware? In: Virus Bulletin 12/2002, S. 12- 13. Online verfügbar unter: http://www.av-test.org/down/papers/2002-12_vb_dialer.pdf.

  16. MessageLabs: VirusEye Virus Count. http://www.messagelabs.com/viruseye/default.asp?by=all, Abruf am 2003-01-06.

  17. Nachenberg, C.: Staying Ahead of the Virus Writers: An in-depth look at heuristics. Proceedings of the Virus Bulletin Conference ’98, pp. 85-98.

  18. Network Associates: Virus Information Library: W95/MTX.gen@M. http://vil.nai.com/vil/content/v_98797.htm, Abruf am 2002-11-01.

  19. Network Associates: Virus Glossary. http://www.mcafeeb2b.com/naicommon/avert/avert-research-center/virus-glossary.as p, Abruf am 2002-11-01.

  20. Open Anti-Virus: Mission Statement. http://www.openantivirus.org/mission.php, Abruf am 2002-11-01.

  21. Pomberger, G.; Blaschek, G.: SoftwareEngineering: Prototyping und objektorientierte Software-Entwicklung. 2. Auflage. Hanser, Mün-chen, Wien, 1996.

    Google Scholar 

  22. Siemens, M.: Nummer Sicher statt Nummer 0190, AntiVir schützt auch vor überhöhter Telefonrechnung durch kostenintensive Dialer. http://www.antivir.de/news/2002/19_04_02.htm, Abruf am 2002-11-01.

  23. Tietz, T.: Test — Dialer setzt 0190-Schutz-software außer Gefecht. http://www.trojanerinfo.de/news/dialer_warnkiller.shtml, Abruf am 2002-11-01.

  24. Virus Bulletin: Useful Links, Anti-Virus Product Developer Index. http://www.virusbtn.com/AVLinks, Abruf am 2002-11-01.

  25. Wallmüller, E.: Software-Qualitätssicherung in der Praxis. Hanser, München, Wien, 1990.

    Google Scholar 

  26. Wells, J.: The WildList Organisation International. http://www.wildlist.org, Abruf am 2002-04-25.

  27. Whalley, I.: Testing Times for Trojans. In: Proceedings of the Virus Bulletin Conference ’99, pp. 55-68.

  28. Ziemann, F.: Hoax-Info Service, Über Computer-Viren, die keine sind (sog. „Hoaxes”) und andere Falschmeldungen und Gerüchte. http://www.tu-berlin.de/www/software/hoax.shtml, Abruf am 2002-11-01.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andreas Marx BSc..

Rights and permissions

Reprints and permissions

About this article

Cite this article

Marx, A., Rautenstrauch, C. Systematisches Testen von Anti-Viren-Software. Wirtschaftsinf 45, 435–443 (2003). https://doi.org/10.1007/BF03250908

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF03250908

Keywords

Navigation