REVIEW OF METHODS FOR IMPLEMENTING ANTI-VIRUS PROTECTION SUBSYSTEMS IN INFORMATION SECURITY SYSTEMS
Keywords:
SOC; antivirus protection; information security; malware; threat detection; monitoring; corporate network; data protection; incident management; systems integration; performance; false positives; database updates; threat response; cyber threats.Abstract
This work is devoted to the development of antivirus protection subsystems as part of the Information Security Monitoring Center (SOC). The main attention is paid to the theoretical foundations of antivirus technologies, as well as a detailed analysis of modern tools for protection against malicious software (SW). The article provides an overview of the functionality of various antivirus solutions, their operating principles and effectiveness in the context of modern information security (IS) threats.
References
1. https://itta.info/ru/10-samyx-vpechatlyayushhix-kiberatak-v-istorii/ (дата обращения 05.01.2025 г.).
2. https://www.intrusion.com/blog/the-biggest-challenges-for-socs/ (дата обращения 15.01.2025 г.).
3. https://www.anti-malware.ru/proactive_test_2010 (дата обращения 20.01.2025 г.).
4. https://www.clamav.net/ https://zeek.org/ (дата обращения 30.01.2025 г.).
5. https://en.wikipedia.org/wiki/ClamAV (дата обращения 05.02.2025 г.).
6.https://itshaman.ru/it-programmy-dlya-linux/4866/zeek-analiz-setevogo-trafika-s-otkrytym-iskhodnym-kodom-dlya-monitoringa-bezopasnosti (дата обращения 10.02.2025 г.).
7. https://www.eset.com (дата обращения 15.02.2025 г.).
8. https://www.kaspersky.com (дата обращения 20.02.2025 г.).
9.https://securitymedia.org/news/kolichestvo-uyazvimostey-nulevogo-dnya-vozroslo-na-chetvert-v-pervoy-polovine-2024 (дата обращения 05.03.2025 г.).
Downloads
Published
Issue
Section
Categories
License
Copyright (c) 2025 Ю.С. Корякина, А. А. Каныбекова

This work is licensed under a Creative Commons Attribution 4.0 International License.