R
Roger Wilco
Julian said:And how many of those viruses are samples that have never been seen in
the wild, including ones that the analyses say things like "can only be
persuaded to replicate with great difficulty"?
If all you are concerned with are the ones that replicate profusely and
can be easily 'detected' visually by the subject lines alone, then you
could boast a pretty high number of detections with little technology.
Having the technology to detect viruses that only replicate under
certain specific conditions may again come in handy when the current
breed of worm writers subsides and gives way to file infectors being
written by the more skilled coders.
The only value these
claims of total number of viruses detected have are to the marketing
department, where it helps to bolster the claims of the big-name
products at the expense of newcomers that are not "in the loop" for the
exchange of virus samples.
So you DO see the lack of definitions (or detections) as relating to a
lack of submitted samples?
Do the commercial AV developers pass new
virus samples to the Clam / Open AV people, like they allegedly do with
each other?
A good question - the answer to which I hope is 'yes'. In addition I
would hope that older samples of the more AV evasive viruses were also
shared so a new AV could attempt to determine a way to reliably detect a
mutation engine that only works successfully a small percentage of the
time in an emulated environment and only a small amount better in a
'real' one.
If I have three viruses and I use the same mutation engine on all three,
it would be sufficient for an AV (OysterAV v1) to detect the engine and
call the detections three instances of the same virus (and block them
using one definition) - but for identification (and possible removal or
'healing') more would be needed and stating that the engine now
identifies three viruses (which happen to use the same mutation engine)
would change the number of viruses now detected to three (OysterAV v2).
A general purpose scanner should be more ... general. ClamAV is being
presented (at least here) as a good AV for, specifically, e-mail vector
malware - plus some capability outside that specific application.
Slapping a gui on it and using it as a GP on-demand or on-access scanner
does not mean it will be as impressive. If ClamWin is using that engine
and definition pool I still think that 30,000 shows a lack - especially
when the pool of malware is virus/worm/trojan.