Therefore, the control module 160 may make a decision to send the antivirus checking task to the agent 170 of another virtual machine 150 which is idle at that moment or has unused computing resources。
The control module 160 during the distribution of the antivirus checking task, more precisely, the distribution of requests to perform certain antivirus check methods, may send the performance of the methods to any one particular component, as well as to all at once。 For example, it has been determined that three check methods need to be implemented, namely, a signature ysis, a checking of an application on the basis of monitoring rules (in other words, application control), and a check based on emulation of the source code。kaspersky lab zao
The control module 160 formulates a queue of these according to the prioritization criteria and selects the modules according to the previously described conditions。 Consequently, the tasks to perform a signature ysis and a check based on emulation of the source code is sent to the antivirus module 180, while the application check is sent to the antivirus agent 170。 Furthermore, if the antivirus module 180 has access to an external network, the scheng module 290 forms a queue for the performance of these tasks and the signature ysis might be done remotely, instead of by the ysis module 270, i。
e。, by requesting data on the object under ysis from the external network 190, more precisely, from a remote server。 After this, the allocated methods are carried out and the results are sent to the corresponding agent 170 for making a final decision on the harmfulness of the object。
本文来自电脑杂谈,转载请注明本文网址:
http://www.pc-fly.com/a/jisuanjixue/article-50822-17.html
择机升级应该是选项了