SecurityTAG’S

Authors

  • Kiran Kumar B Associate Professor, Dept. of CSE, Aditya College of Engineering, Surampalem Affiliated to Jawaharlal Nehru Technological University Kakinada, East Godavari, India
  • Swaroopa K Associate Professor, Dept. of CSE, Aditya College of Engineering, Surampalem Affiliated to Jawaharlal Nehru Technological University Kakinada, East Godavari, India

DOI:

https://doi.org/10.26438/ijcse/v10i1.4144

Keywords:

SecurityTAG,, generator, key, virus

Abstract

In this paper, initially we describe the present antivirus in aspects like –memory[1] they are consuming, and how efficiently they are protecting the system. In the next section of this paper we briefly discuss the design methodologies that are practiced presently, their drawbacks and limitations. Finally we describe an effective design methodology which uses SecurityTAG to protect the system. SecurityTAG is generated by the SecurityTAG generator which takes some parameters as inputs and gives the SecurityTAG as the output. This gives better protection against any virus and detection of infected files is very easy and effective.

References

[1] Memory- memory refers to the main memory or physical memory.

[2] van der Meulen, M.J.P., et al. Protective Wrapping of Off-the-Shelf Components. in the 4th International Conference on COTS-Based Software Systems (ICCBSS `05). Bilbao, Spain: Springer. 2005.

[3] Strigini, L., Fault Tolerance Against Design Faults, in Dependable Computing Systems: Paradigms, Performance Issues, and Applications, H. Diab and A. Zomaya, Editors. J. Wiley & Sons. p. 213-241, 2005.

[4] http://www.raymond.cc/blog/archives/2008/07/11/ -free-antivirus-is-the-lightest-on-system-memory-usage/

[5] Fred Cohen, “Computer Viruses”, Computers €4 Security 0, 22-35.

[6] Computers & Security 7, Specid Issue on Viruses.

[7] Marvin Minsky, Computation: Finite and Infinite Machines, Prentice-Hall.

Downloads

Published

2022-01-31
CITATION
DOI: 10.26438/ijcse/v10i1.4144
Published: 2022-01-31

How to Cite

[1]
B. Kiran Kumar and K. Swaroopa, “SecurityTAG’S”, Int. J. Comp. Sci. Eng., vol. 10, no. 1, pp. 41–44, Jan. 2022.

Issue

Section

Research Article