메뉴 건너뛰기




Volumn 2, Issue 1-2, 2007, Pages 50-59

Hash-AV: fast virus signature scanning by cache-resident filters

Author keywords

high performance; prototype; virus scanning algorithm

Indexed keywords


EID: 74049111426     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/ijsn.2007.012824     Document Type: Article
Times cited : (49)

References (31)
  • 1
    • 0016518897 scopus 로고
    • Efficient string matching: an aid to bibliographic search
    • Aho, A.V. and Corasick, M.J. (1975) ‘Efficient string matching: an aid to bibliographic search’, Communications of the ACM, Vol. 18, No. 6, pp.333–340.
    • (1975) Communications of the ACM , vol.18 , Issue.6 , pp. 333-340
    • Aho, A.V.1    Corasick, M.J.2
  • 2
    • 0017547820 scopus 로고
    • A fast string searching algorithm
    • Boyer, R.S. and Moore, J.S. (1977) ‘A fast string searching algorithm’, Communications of the ACM, Vol. 20, No. 10.
    • (1977) Communications of the ACM , vol.20 , Issue.10
    • Boyer, R.S.1    Moore, J.S.2
  • 3
    • 33644905483 scopus 로고    scopus 로고
    • Network applications of bloom filters: a survey
    • Broder, A. and Mitzenmacher, M. (2002). ‘Network applications of bloom filters: a survey’, Allerton 2002, Available at: http://www.eecs.harvard.edu/ichaelm/NEWWORK/papers.
    • (2002) Allerton 2002
    • Broder, A.1    Mitzenmacher, M.2
  • 5
    • 84952951818 scopus 로고    scopus 로고
    • Clementi, A. (2005) ‘Anti-virus comparative’, Available at: http://www.av-comparatives.org/index.html? http://www.av-comparatives.org/seiten/comparatives.html.
    • (2005) Anti-virus comparative
    • Clementi, A.1
  • 7
    • 33846583459 scopus 로고    scopus 로고
    • Dounin, M. (2004) ‘Clamav developer forum’, Available at: http://sourceforge.net/mailarchive/forum.php?forum=clamav-devel.
    • (2004) Clamav developer forum
    • Dounin, M.1
  • 10
    • 84952962082 scopus 로고    scopus 로고
    • GmbH, H.D. (2004) ‘Dazuko’, Available at: http://www.dazuko.org.
    • (2004) Dazuko
    • GmbH, H.D.1
  • 14
    • 84952972410 scopus 로고    scopus 로고
    • Kojm, T. (2004) ‘Clamav’, Available at: http://www.clamav.net.
    • (2004) Clamav
    • Kojm, T.1
  • 22
    • 33846645257 scopus 로고    scopus 로고
    • Scalabium (2004) ‘Elf hash algorithm’, Available at: http://www.scalabium.com/faq/dct0136.htm.
    • (2004) Elf hash algorithm
    • Scalabium1
  • 27
    • 84882658623 scopus 로고
    • Yigit, O. (1990) ‘sdbm – substitute dbm’, Available at: http://search.cpan.org/src/NWCLARK/perl-5.8.4/ext/SDBM _File/sdbm.
    • (1990) sdbm – substitute dbm
    • Yigit, O.1
  • 28
    • 54249151507 scopus 로고    scopus 로고
    • Yigit, O. (2004) ‘Hash functions’, Available at: http://www.cs. yorku.ca/oz/hash.html.
    • (2004) Hash functions
    • Yigit, O.1
  • 29
    • 84952973489 scopus 로고    scopus 로고
    • Last year’s episode of Download.Ject web site infection (Microsoft, 2004) clearly highlights the importance of scanning viruses at Web proxy gateways
    • Last year’s episode of Download.Ject web site infection (Microsoft, 2004) clearly highlights the importance of scanning viruses at Web proxy gateways.
  • 30
    • 84952957410 scopus 로고    scopus 로고
    • A Bloom filter is a bit array holding results of multiple hash functions on a set of strings. A string can be queried against the filter; the filter generates false positives but never false negatives. Bloom filters are used wherever a compact representation of a set is needed (Broder and Mitzenmacher, 2002)
    • A Bloom filter is a bit array holding results of multiple hash functions on a set of strings. A string can be queried against the filter; the filter generates false positives but never false negatives. Bloom filters are used wherever a compact representation of a set is needed (Broder and Mitzenmacher, 2002).
  • 31
    • 84952962525 scopus 로고    scopus 로고
    • Clam-AV chooses to hash three-byte chunks so that the shift table fits in the CPU cache. It has been suggested that Clam-AV’s choice of three-byte chunks is not optimal and ten-byte chunks should be used. However, we experimented with Clam-AV hashing ten-byte chunks (by setting the parameter BM_MIN_LENGTH to 10), and found that the throughput was reduced by 60%. Thus, in our experiments we use the default Clam-AV settings
    • Clam-AV chooses to hash three-byte chunks so that the shift table fits in the CPU cache. It has been suggested that Clam-AV’s choice of three-byte chunks is not optimal and ten-byte chunks should be used. However, we experimented with Clam-AV hashing ten-byte chunks (by setting the parameter BM_MIN_LENGTH to 10), and found that the throughput was reduced by 60%. Thus, in our experiments we use the default Clam-AV settings.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.