AV-Comparatives | Heuristic Behavioral protection test released!

Discussion in 'other anti-virus software' started by toxinon12345, Jul 24, 2012.

Thread Status:
Not open for further replies.
  1. paniccom

    paniccom Registered Member

    Joined:
    Jul 23, 2006
    Posts:
    100
    That's what I get for trusting my memory instead of checking first. Just remembered reading about Vipre engine in Kingsoft thread. BTW, any idea what engine KS uses--or their own? They're not in any tests I've seen yet.
     
  2. roger_m

    roger_m Registered Member

    Joined:
    Jan 25, 2009
    Posts:
    8,629
    They use their own engine.
     
  3. LunarWolf

    LunarWolf Registered Member

    Joined:
    Jan 4, 2011
    Posts:
    203
    Location:
    Malaysia
    I am surprise at avast. All this while their heuristics is always below 50%, now they are at 70%. Not bad. Not bad.

    I am also shock with Avira's heuristics. They have always maintain among like top 3 when it come to heuristics. But look like they slip.

    On whole, most vendor improve their heuristic detection.
     
  4. Brandonn2010

    Brandonn2010 Registered Member

    Joined:
    Jan 10, 2011
    Posts:
    1,854
    Hmm. I think I can conclude from all the real-world tests and this one that PCTools relies too much on the user making decisions. If all user-dependent situations were taken away they would score much higher in these tests.
     
  5. Stefan Kurtzhals

    Stefan Kurtzhals AV Expert

    Joined:
    Sep 30, 2003
    Posts:
    702
    Check the details of the test, it covers only samples of one day. Too bad that the test was not performed over a longer peroid, testing the samples from previous day. The scores could be entirely different one day later.
     
  6. Macstorm

    Macstorm Registered Member

    Joined:
    Mar 7, 2005
    Posts:
    2,642
    Location:
    Sneffels volcano
    True.
    I wonder which day av-c chose to test :rolleyes:
     
  7. toxinon12345

    toxinon12345 Registered Member

    Joined:
    Sep 8, 2010
    Posts:
    1,200
    Location:
    Managua, Nicaragua
    you mean the samples appeared after the frozen database (aka zero day) e.g. Day +1, +2, +3, etc
     
  8. Stefan Kurtzhals

    Stefan Kurtzhals AV Expert

    Joined:
    Sep 30, 2003
    Posts:
    702
    Yes, the test is a 1 day freeze, so on the 3rd day, the product updates/detection definitions would be from day 2 and so on. Watching a larger period would make the test more reliable as the detection fluctuates every day.
     
  9. toxinon12345

    toxinon12345 Registered Member

    Joined:
    Sep 8, 2010
    Posts:
    1,200
    Location:
    Managua, Nicaragua

    Then I have to admit I dont understand the next statement...
     
    Last edited: Jul 25, 2012
  10. Romagnolo1973

    Romagnolo1973 Registered Member

    Joined:
    Feb 17, 2009
    Posts:
    565
    Location:
    Italy - Ravenna
    yes, but If I am infected with a 0 day not detected, it makes no difference if Avira prompt me the day after, simply I'm infected !
    Once again I agree with AV-C in their test metodology. A Heurstic test must see Av against 0 days virus and not 1 day or 2-3 days virus

    Someone knows if test machine Operative System was a 32 or 64bit? Because Avira Proactive seems useless (see page 7), it does not help avira increasing detect %, and I know it does not work on 64bit systems
     
  11. khanyash

    khanyash Registered Member

    Joined:
    Apr 4, 2011
    Posts:
    2,429
    Can any one tell me how does Avast report if its heuristics detects a malware i.e Comodo if detects malware with heuristics the detection name contains the word "Heur", "Suspicious" so you know its an heur detection.

    How does Avast detects with heur? I mean any way to identify if its an heur detection.
     
  12. IBK

    IBK AV Expert

    Joined:
    Dec 22, 2003
    Posts:
    1,886
    Location:
    Innsbruck (Austria)
    32-bit.

    btw, the sentence "This test turned off signature protection" said in a post above by an user is wrong. Also generic signatures can catch new malware.
     
  13. Romagnolo1973

    Romagnolo1973 Registered Member

    Joined:
    Feb 17, 2009
    Posts:
    565
    Location:
    Italy - Ravenna
    Thanks Mr. Clementi
     
  14. STV0726

    STV0726 Registered Member

    Joined:
    Jul 29, 2010
    Posts:
    900
    I said that...

    How can you test a product's heuristics specifically while leaving their signature components on as well? How do you know what's detecting what?

    The whole point of specific type tests like this (aka non-whole product) is to test different aspects of products and their ability to function without other components of the product on.
     
  15. RJK3

    RJK3 Registered Member

    Joined:
    Apr 4, 2011
    Posts:
    862
    Generic signatures that are designed to catch future variants from the same family... ...frozen database from a time before the sample was first seen. Generic signatures can surely be thought of as 'heuristics', as they are using previous experiences to solve the problem of future malware.

    From 100,000 unique malware samples, the best most of us could do would be to make 100,000 signatures i.e. detection based purely on hashes. Talented AV/AM teams are able to get the total number of signatures much lower than this with generic signatures that catch a lot of known samples - as well as detecting future samples as well.
     
  16. atomomega

    atomomega Registered Member

    Joined:
    Jul 27, 2010
    Posts:
    1,292
    The test looks OK. At least from my experience with some of the contestants.
    BTW, it's a shame about GFI and what they did to VIPRE...
     
  17. Stefan Kurtzhals

    Stefan Kurtzhals AV Expert

    Joined:
    Sep 30, 2003
    Posts:
    702
    The whole idea of retrospective tests is somewhat outdated, as detection methods you can freeze for such tests are only a fraction of protection methods todays av software does offer. The malware updates incredibly fast, if you want to test the real protection level, you need to reflect that. That's why I like the dynamic/real world test more, it includes all protection methods - if the test reflects how malware really infects systems (exploits etc.).

    But even the dynamic/real world test has a speed problem: how long it took the tester to get the new malware sample, new URL? There is a time window of some hours (minutes?) between the malware initial release and the moment, the tester runs the test. Is the malware really zero day/minute or is it just new to the tester and in reality, was released days ago? Of course, how many users catch a new malware in the very moment it is released?


    Because you cannot test the updated AV product from today against tomorrows malware (unless you have a time machine ;-) ), the idea of a retrospective test is to test today's malware against an old update of an AV product, in this case 1 day. It tries to simulate if your AV would catch the malware from one day in the future.
     
  18. toxinon12345

    toxinon12345 Registered Member

    Joined:
    Sep 8, 2010
    Posts:
    1,200
    Location:
    Managua, Nicaragua
    it is impossible to detect <malware newer than update> using typical signatures.

    Detection methods used for catching new samples in this test are proactive, such as heuristics, generic signatures, behavior blockers
     
    Last edited: Jul 26, 2012
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.