Examples of necessary resources are at least the processor, the working memory, the permanent memory (in other words, space on the hard disk) and the traffic capacity of the network。 By time is meant the time for performance of each method of antivirus checking, also including the time needed for data entry/output when accessing the hard disk of the host machine 110 or the time needed to exchange data on the network, for example, with the security service 195。
In one particular aspect, yet another criterion for prioritization is the effectiveness and reliability of each method of antivirus check. By effectiveness is meant the speed of performance of the antivirus check method along with the level of detection. The level of detection is the percentage of false alarm to a true verdict delivered by the methods.
After establishing the priorities for the methods, the control module 160 forms a queue of the selected methods of antivirus check that perform the task of the antivirus check。 A priority is formed according to the following criteria; the fewer resources and the less time spent on carrying out the corresponding check method and the greater the effectiveness of the antivirus check method, the higher the priority。 For example, two check methods have been determined: request to a security service 195 and the method of checking with the aid of a signature ysis。
The signature ysis requires continual accessing of the hard disk of the host machine 110 to check files and, consequently, it uses a labor-intensive operation of data entry/output from the hard disk, which also influences the productivity of the other VMs 150。 However, the request to the security service 195 requires minimal resource costs and, further, the speed of a response to the request is high。 Consequently, the priority for the method of checking by a request is higher than that for the method of checking by signatures。
本文来自电脑杂谈,转载请注明本文网址:
http://www.pc-fly.com/a/jisuanjixue/article-50822-14.html
美国要想占领时间长点
我们也希望为他筹多点钱去治疗
不过如果美国不是没完没了地纠缠