Definition

antivirus software (antivirus program)

What is antivirus software (antivirus program)?

Antivirus software (antivirus program) is a security program designed to prevent, detect, search and remove viruses and other types of malware from computers, networks and other devices. Often included as part of a security package, antivirus software can also be purchased as a standalone option.

Typically installed on a computer as a proactive approach to cybersecurity, an antivirus program can help mitigate a variety of cyber threats, including keyloggers, browser hijackers, Trojan horses, worms, rootkits, spyware, adware, botnets, phishing attempts and ransomware attacks.

Due to the constantly evolving nature of cybercrimes and new versions of malware being released daily, including zero-day attacks, no antivirus program can offer detection and protection against all threat vectors.

Chart of malware examples
A virus is just one of the many types of malware that antivirus software is designed to prevent, detect, search and remove.

How antivirus software works

Antivirus software typically runs as a background process, scanning computers, servers or mobile devices to detect and restrict the spread of malware. Many antivirus software programs include real-time threat detection and protection to guard against potential vulnerabilities and perform system scans that monitor device and system files, looking for possible risks.

Antivirus software usually performs the following basic functions:

  • Scans directories or specific files against a library of known malicious signatures to detect abnormal patterns indicating the presence of malicious software.
  • Enables users to schedule scans so they run automatically.
  • Lets users initiate new scans at any time.
  • Removes any malicious software it detects either automatically in the background or notifies users of infections and prompts them to clean the files.

To scan systems comprehensively, antivirus software must generally be given privileged access to the entire system. This makes antivirus software itself a common target for attackers, and researchers have discovered remote code execution and other serious vulnerabilities in antivirus software products in recent years.

Benefits of antivirus software

The purpose of antivirus software isn't only to defend a system against security threats and vulnerabilities, but also to provide real-time protection through automated vulnerability scans.

Antivirus software provides the following benefits:

  • Virus and malware protection. The main benefit of antivirus software is to protect against malicious viruses, such as malware and spyware. Most cyber threats today present themselves as multipronged threat vectors that can attack system data, steal confidential information, spy on system resources and degrade system performance simultaneously. Therefore, having reliable antivirus software running at all times is imperative.
  • Protection against spam and pop-ups. One of the most common ways viruses infiltrate and infect a system is through pop-up advertisements and spam-based webpages. Antivirus software keeps the system secure by automatically blocking pop-ups and spam coming from malicious websites.
  • Web protection. Antivirus software helps protect against scam websites threat actors use to gather credit card and bank information from unsuspecting users. By restricting access to harmful websites, a reliable antivirus program can prevent users from accessing unauthorized networks.
  • Real-time protection. Antivirus software acts as a real-time shield that scans each inbound file and program. Depending on the settings of the antivirus program, once an infected file or program is detected, it's either automatically deleted or moved to a quarantine folder for further analysis. A quarantined file is prevented from interacting with the rest of the machine and its programs to mitigate damage.
  • Boot-scan command. Sophisticated viruses can often duplicate themselves while the system is active. However, an antivirus program can prevent a virus from self-replicating by invoking a boot-scan command. This command shuts down the operating system (OS), restarts the computer and scans the entire hard drive for viruses and malware. During the scan, the virus is detected and doesn't get a chance to self-replicate due to the deactivation of the OS.
  • Dark web scanning. Data from most data breaches, such as ransomware attacks, is often leaked on the dark web. Many antivirus tools can help organizations discover if their sensitive data is leaked on the dark web. For example, if they find an associated email address or account number on the dark web, they can notify the user and update the password to a new and more complex one.
  • Protection from external devices. Most people regularly plug in external devices, such as hard drives and USB adapters, to their computers. Antivirus software scans all attached devices and peripherals to thwart potential viruses from entering the system through external sources.

Types of antivirus programs

Antivirus software is distributed in several forms, including standalone antivirus scanners, machine learning and cloud-based programs, malware signatures and internet security software suites that offer antivirus protection, along with firewalls, privacy controls and other security protections. Popular providers of both free and commercial antivirus products include AVG Technologies, Kaspersky, Malwarebytes, McAfee, Norton and Trend Micro.

Some antivirus software vendors offer basic versions of their products at no charge. These free versions generally offer basic antivirus and spyware protection, but more advanced features and protections are usually available only to paying customers.

While some OSes are targeted more frequently by virus developers, antivirus software is available for most OSes:

  • Windows antivirus software. Most antivirus software vendors offer several levels of Windows products at different price points, starting with free versions offering only basic protection. Users must perform scans and updates manually, and typically, free versions of antivirus software won't protect against links to malicious websites or malicious code and attachments in emails. Premium versions of antivirus software often include suites of endpoint security tools that provide secure online storage, ad blockers and file encryption. Since 2004, Microsoft has been offering free antivirus software as part of the Windows OS, generally under the name Windows Defender, though the software was mostly limited to detecting spyware before 2006. Microsoft now offers Microsoft Defender Antivirus as part of its Microsoft 365 Defender portal, which is available for Windows 10, Windows 11 and some versions of Windows Server.
  • MacOS antivirus software. Although Apple macOS viruses exist, they're less common than Windows viruses, so antivirus products for Mac-based devices are less standardized than those for Windows. There are several free and paid products available, providing on-demand tools to protect against potential malware threats through full-system malware scans and the ability to sift through specific email threads, attachments and various web activities.
  • Android antivirus software. Android is the world's most popular mobile OS and is installed on more mobile devices than any other OS. Because most mobile malware targets Android, experts recommend all Android device users install antivirus software on their devices. Vendors offer a variety of basic free and paid premium versions of their Android antivirus software, including antitheft and remote-locating features. Some run automatic scans and actively try to stop malicious webpages and files from being opened or downloaded. Play Protect is Google's built-in malware protection for Android, which was first released with Android 8.0 Oreo, and now comes with every Android device that has Google Play services version 11 or newer installed on it.

Virus detection techniques

Antivirus software uses a variety of virus detection techniques. The following are six common types:

  1. Signature-based detection. Antivirus programs typically depend on stored virus signatures -- unique strings of data that are characteristic of known malware to flag malicious software. The antivirus software uses these signatures to identify viruses it encounters that security experts have already identified and analyzed.
  2. Heuristic-based detection. This type of detection uses an algorithm to compare the signatures of known viruses against potential threats. With heuristic-based detection, antivirus software can detect viruses that haven't been discovered yet, as well as existing viruses that have been disguised or modified and released as new viruses. However, this method can also generate false-positive matches when antivirus software detects a program behaving similarly to a malicious program and incorrectly identifies it as a virus.
  3. Behavior-based detection. Antivirus software can also use behavior-based detection to analyze an object's behavior or potential behavior for suspicious activities and infers malicious intent based on those observations. For example, code that attempts to perform unauthorized or abnormal actions would indicate the object is malicious or, at least, suspicious. Some examples of behaviors that potentially signal danger include modifying or deleting large numbers of files, monitoring keystrokes, changing settings of other programs and remotely connecting to computers.
  4. Cloud analysis. According to Atlas VPN, on average, hackers produced more than 316,000 malware threats daily in 2022. Since it's impossible for any antivirus program to combat the vast number of rapidly appearing malware variants, antivirus companies now provide cloud analysis as part of their antivirus offerings. Cloud analysis is a modern way of performing malware analysis, as it's done on the cloud using the antivirus vendor's servers. This way, if a malicious file or program is detected by the antivirus program, it's sent to the vendor's labs, where it's tested. If it's confirmed to be malicious, a signature is created for it, which blocks it from all the other devices where it's detected.
  5. Sandbox analysis. This detection technique runs a program or file in a virtual sandbox environment to analyze its behavior before permitting it into the system. Using this technique, antivirus software only permits a file to execute in the real environment if the sandbox analysis confirms it to be safe. This feature is also used for running files that the antivirus program is unable to allowlist or denylist. Since the files are executed in an isolated environment, even if they end up being malicious, no harm is done to the system, as they're only executed in a virtual sandbox container.
  6. Host intrusion prevention system (HIPS). Security and antivirus software commonly uses this technology to detect potentially malicious activities in a program using signature-based detection. A HIPS continuously monitors each activity and instantly notifies users by presenting them with authorization options, such as Allow and Block.

Challenges facing antivirus software

According to CyberCrime Magazine, 90% of the world's population, ages 6 and older, will be connected to the internet by 2030. This exponential growth in internet connections is also responsible for the significant rise in viruses and cyber attacks.

While antivirus programs were originally developed to combat viruses and cyber threats, they do come with a few limitations.

The following highlights the current and future challenges of antivirus software:

  • Antivirus software that uses only signature-based detection can't expose new types of malware, including variants of existing malware. Signature-based detection can only detect new viruses when the definition file is updated with information about the new virus. With the number of new malware signatures increasing rapidly, making antimalware software based solely on signatures is impractical. However, signature-based detection doesn't usually produce false-positive matches.
  • Even the best antivirus software can sometimes erroneously identify a secure piece of a program or file as malware, which can lead to a legitimate and important file or program getting quarantined or deleted by the antivirus. Free antivirus options are typically more prone to false positives than paid services, as they don't often provide enterprise-level scanning and detection of attacks and threat vectors.
  • Antivirus software can sometimes interfere with system updates by either preventing them from happening or halting them in the middle. In most cases, the user must take the extra step of disabling a firewall before attempting to install system updates or firmware upgrades.
  • Antivirus software runs quietly in the background and is barely noticeable, but it can consume a lot of system resources, including memory and disk space, causing a device's performance to slow down. The antivirus scanning feature can also cause noticeable lags within the network.
  • Regular antivirus software provides just one layer of virus protection. For comprehensive protection, most organizations must invest in a multilayered approach, such as both hardware- and software-based firewalls or a complete internet security suite that includes antivirus options.

Ever-evolving trends in technology, including metaverse, Web3, fintech and autonomous vehicles, make it more challenging to get the right antivirus protection. With so many endpoints to secure -- from crypto wallets to virtual reality devices -- there are times that antivirus software could fall short. Most traditional antivirus technologies can't detect modern fileless attacks that use trusted systems, such as PowerShell, to carry out the attacks.

While antivirus software can mitigate certain ransomware attacks, it can't stop or remove ransomware once it's taken control of a system. Here's a step-by-step guide on how to remove ransomware and minimize its effect.

This was last updated in March 2023

Continue Reading About antivirus software (antivirus program)

Dig Deeper on Data security and privacy

Networking
CIO
Enterprise Desktop
Cloud Computing
ComputerWeekly.com
Close