![]() |
| virus.gr results (very bad for clamwin) |
|
alch
Site Admin
|
it's very hard to tell why without knowing what samples the products have been tested with.
I can only guess and suspect that the if the test-set consists of rather old samples, collected before ClamAV has been around, then commercial products have an edge because they started to populate their virus databases much earlier. Although in the real world scenario these figures mean very little, it doesn't matter much if ClamAV/ClamWin cannot detect an old Win3.1 or DOS virus that is harmless in modern Windows. What does matter is how quickly an AV can react to a new threat and ClamAV database team excels in that. |
||||||||||||
|
|
|||||||||||||
|
GuitarBob
|
In all the test results I've seen, ClamWin seems to get about 50% of the viruses, which isn't too bad for a project run on a part-time basis with donated resources against full-time, well-paid/supplied competition, many of whom have been in business since about 1990 or earlier. I recall that I first used McAfee in 1989!
ClamWin is dependent upon ClamAV for malware signatures. ClamAV is designed/used primarily for email service providers, and it does a pretty good job at that. However, some of the viruses/malware in these tests consists of Windows viruses that you will encounter in situations other than emil--such as Active X scripts and other exploits. I don't think Clam is set up too well for that. ClamAV has recently improved its detection process (with version 0.90) by adding support for several commonly used malware packers, but if it can't unpack malware, it can't recognize it. On the other hand, the commercial antivirus programs have generic unpackers for backup support. As far as I know, ClamAV doesn't have anything like that. I feel confident that it would recognize more malware if it did. In addition, the larger commercial AV software also uses heuristics and behaviorial analysis of code. If we want ClamAV/ClamWin to improve more, let's support them! They've done a pretty good job so far, but the developers aren't operating in a vacuum. Regards, Regards, |
||||||||||||
|
|
|||||||||||||
|
GuitarBob
|
Here's a look at the problem from Panda:
https://research.pandasoftware.com/blogs/research/archive/2007/02/12/Packing-a-punch.aspx. Regards, |
||||||||||||
|
|
|||||||||||||
|
GuitarBob
|
Clam detects most of the viruses that are on the Wildlist as of March 20, 2007. So the capability is there in the signature database. If it didn't detect well in the test, it has to be because it was unable to unpack/decrypt a significant portion of the malware in the test.
Something to consider, the well-financed, largeantivirus firms with full-time staffs can unpack all kinds of malware, but malware doesn't really become malware until it's unpacked and RUN. There is some malware that uses runtime unpackers, but you will need a very quick on-access scanner to detect/stop it as it unpacks/runs automatically, and that's out of ClamWin's function until the next version. Emulation might help with this. Regards, |
||||||||||||
|
|
|||||||||||||
| virus.gr results (very bad for clamwin) |
|
||
|
Powered by phpBB © phpBB Group
Design by phpBBStyles.com | Styles Database.
Content © ClamWin Free Antivirus GNU GPL Free Software Open Source Virus Scanner. Free Windows Antivirus. Stay Virus Free with Free Software.
Design by phpBBStyles.com | Styles Database.
Content © ClamWin Free Antivirus GNU GPL Free Software Open Source Virus Scanner. Free Windows Antivirus. Stay Virus Free with Free Software.


