REVIEW OF METHODS FOR IMPLEMENTING ANTI-VIRUS PROTECTION SUBSYSTEMS IN INFORMATION SECURITY SYSTEMS

Authors

  • Ю.С. Корякина Институт машиноведения автоматики и геомеханики НАН КР
  • А. А. Каныбекова Институт информационных технологий КГТУ им. И. Раззакова

Keywords:

SOC; antivirus protection; information security; malware; threat detection; monitoring; corporate network; data protection; incident management; systems integration; performance; false positives; database updates; threat response; cyber threats.

Abstract

This work is devoted to the development of antivirus protection subsystems as part of the Information Security Monitoring Center (SOC). The main attention is paid to the theoretical foundations of antivirus technologies, as well as a detailed analysis of modern tools for protection against malicious software (SW). The article provides an overview of the functionality of various antivirus solutions, their operating principles and effectiveness in the context of modern information security (IS) threats.

References

1. https://itta.info/ru/10-samyx-vpechatlyayushhix-kiberatak-v-istorii/ (дата обращения 05.01.2025 г.).

2. https://www.intrusion.com/blog/the-biggest-challenges-for-socs/ (дата обращения 15.01.2025 г.).

3. https://www.anti-malware.ru/proactive_test_2010 (дата обращения 20.01.2025 г.).

4. https://www.clamav.net/ https://zeek.org/ (дата обращения 30.01.2025 г.).

5. https://en.wikipedia.org/wiki/ClamAV (дата обращения 05.02.2025 г.).

6.https://itshaman.ru/it-programmy-dlya-linux/4866/zeek-analiz-setevogo-trafika-s-otkrytym-iskhodnym-kodom-dlya-monitoringa-bezopasnosti (дата обращения 10.02.2025 г.).

7. https://www.eset.com (дата обращения 15.02.2025 г.).

8. https://www.kaspersky.com (дата обращения 20.02.2025 г.).

9.https://securitymedia.org/news/kolichestvo-uyazvimostey-nulevogo-dnya-vozroslo-na-chetvert-v-pervoy-polovine-2024 (дата обращения 05.03.2025 г.).

Downloads

Published

2025-05-11