Computer Viruses - Analysis of Detection Techniques and their Limitations

Authors(1) :-Harjit Singh

Viruses are designed to run helter-skelter through our computer and caused actual, intentional damage to the computer itself. This can be in the form of corrupting files on our computer, damaging our personal documents, photos, music track, and more to rendering the computer completely unusable. Viruses usually don't have an ulterior motive like spyware programs do, they are made to maliciously damage our computer and cause us problems. Like human viruses, computer viruses also replicate themselves, and spread by embedding into email attachments and other shared files. There are various detection techniques available and used by antivirus software to identify virus infected files and mark those files as infected and also try to clean them if possible. These techniques are successful to detect some specific category of viruses but may fail to detect other category of viruses. Some of the main categories of virus detection techniques are Static Signature Scanning Technique, Generic Signature Scanning Technique, Heuristic Analysis Technique and Integrity Checking Technique. But each of these techniques has its own limitations and the techniques fail to detect viruses with properties beyond the scope of the technique used. So, each antivirus software uses mixed set of techniques to detect virus infections in files. This paper discusses various types of virus threats and analyses various detection techniques in view of their limitations.

Authors and Affiliations

Harjit Singh
Department of Computer Science, Punjabi University, Neighbourhood Campus, Dehla Seehan (Sangrur), Punjab, India

Virus, Virus History, Types of Virus, Life Cycle of Virus, Virus Detection Techniques, Static Signature Scanning Technique, Generic Signature Scanning Technique, Heuristic Analysis Technique and Integrity Checking Technique.

  1. Wing Wong, Analysis and Detection of Metamorphic Computer Viruses, San Jose State University SJSU ScholarWorks, May, 2006
  2. Sulaiman Al Amro, Ali Alkhalifah, A Comparative Study of Virus Detection Techniques, International Journal of Computer, Electrical, Automation, Control and Information Engineering Vol:9, No:6, 2015
  3. Computer Associates Virus Information Center (
  4. Essam Al Daoud, Iqbal H. Jebril, Belal Zaqaibeh, Computer Virus Strategies and Detection Methods, Int. J. Open Problems Compt. Math., Vol. 1, No. 2, September 2008
  5. Computer Security Resource Center Virus Information (
  6. Prabhat K. Singh, Arun Lakhotia, Analysis and Detection of Computer Viruses and Worms: An Annotated Bibliography, ACM SIGPLAN Notices 29 V. 37(2) February 2002
  7. F-Secure Security Information Center (
  8. Umakant Mishra, Methods of virus detection And their limitations,
  9. IBM Antivirus Research Project (
  10. McAfee AVERT (
  11. Anita Thengade, Aishwarya Khaire, Devaj Mitra, Alok Goyal, Virus Detection Techniques and Their Limitations, International Journal of Scientific & Engineering Research, Volume 5, Issue 10, October-2014 ISSN 2229-5518
  12. Sophos Virus Analyses (
  13. Symantec Security Response (
  14. What You Can Do About Computer Viruses 17.
  15. Trend Micro Virus Information Center (
  16. Virus Bulletin (
  17. com (
  18. The WildList Organization International (

Publication Details

Published in : Volume 1 | Issue 6 | November-December 2015
Date of Publication : 2015-12-25
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 498-504
Manuscript Number : IJSRSET151628
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Harjit Singh, " Computer Viruses - Analysis of Detection Techniques and their Limitations, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 6, pp.498-504, November-December-2015.
Journal URL :

Article Preview

Follow Us

Contact Us