@AI Varnell
Yes, I have plans to rewrite it from scratch.. you willing to join me ?:)

On 9 May 2017 at 13:08, Al Varnell <alvarn...@mac.com> wrote:

> On Tue, May 09, 2017 at 12:29 AM, crazy thinker wrote:
> >
> > Thanks for Reply.  How many Heuristic  Scan Engines ClamAV using Now?
>
> I only know of one.
>
> All the other heuristic approaches use the primary scanner along with
> signatures designed to detect suspicious patterns in file names or coding.
>
> > what
> > are extensions of db files used by ClamAV  Heurisitci Engine?
>
> As I told you on Friday...
> > There's a heuristics engine that uses data from the .pdb and .sfp
> sections of the database to detect messages from selected financial
> institutions that appear to be phishing attempts.
>
> > Can I
> > Increase Heuristic Scan Engine  Count ?
>
> I suspect you would have to write your own.
>
> -Al-
>
> > On 9 May 2017 at 12:21, Al Varnell wrote:
> >
> >> I already answered most of these questions before and after reading "My
> >> Understanding" which is totally wrong, it's obvious you have not read
> the
> >> signature.pdf documentation closely enough to understand an of this.
> >>
> >> The way you have chosen to classify signatures is completely wrong,
> which
> >> means the questions you've asked don't make any sense. All signatures in
> >> the database are static in that they only change when replaced by a more
> >> accurate signature. There is nothing dynamic about any of them.
> >>
> >> The signature based scanner uses both fixed and variable length
> signatures.
> >>
> >> As I told you before, the heuristics based scanner only checks a limited
> >> list of financial institutions for phishing attempts. That only
> represents
> >> a tiny fraction of what could be considered behavior based malware
> >> detection. And the database is used to define what financial
> institutions
> >> are included as well as the ability to whitelist certain behaviors that
> are
> >> known to not be a threat.
> >>
> >> On Mon, May 08, 2017 at 10:49 PM, crazy thinker wrote:
> >>>
> >>> Hi ClamAV Developers,Users
> >>>
> >>> As per My Understnading , Virus Signatures are Classified into two
> types
> >>>
> >>> 1.Static Virus Signatures(short/fixed  length virus signatures)
> >>> 2.Dynamic Virus Signatures(long length Signatures with Regular
> >> Expression)
> >>>
> >>> So  I guess, ClamAV performing both Signature Based Scanning and
> >> Heuristic
> >>> Based Scanning for Malware Detection Process
> >>>
> >>> Please find below questions that in my mind
> >>>
> >>> 1.Does Signature Based Scanner uses  only  Static Signatures (not
> Dynamic
> >>> Signatures)  ?
> >>> 2.Does  Heuristic Scanner uses only Dynamic Signatures for Malware
> >>> Detection?
> >>> 3. If Herusitc Scanner uses Behaviour Based Approach, why  Heuristic
> >>> Scanner needs Virus Database?
> >>> 4.To implement   Efficient AV Scanner, Can I go with Heuristic Scanning
> >>> Approach and Excluding Signature Based Scanning Approach?
> >>>
> >>> I would like to get help/suggestions from you guys...
> >>>
> >>>
> >>> Kindly waiting for your reply!!!!
> >>>
> >>>
> >>> Thanks,
> >>> Crazy Thinker, Inc
>
> _______________________________________________
> clamav-users mailing list
> clamav-users@lists.clamav.net
> http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users
>
>
> Help us build a comprehensive ClamAV guide:
> https://github.com/vrtadmin/clamav-faq
>
> http://www.clamav.net/contact.html#ml
>
_______________________________________________
clamav-users mailing list
clamav-users@lists.clamav.net
http://lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users


Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to