Abstract: Systems and methods for an anti-virus detection module that can detect known undesired computer files in damaged archives that may be encrypted, compressed and/or password-protected are provided. According to one embodiment, a damaged archive file is received. And, without decrypting or decompressing the contents, an anti-virus detection module identifies a type and associated structure of the archive file by assuming each possible archive file type in turn and searching the archive file for descriptive information consistent with a current archive file type. Based thereon, descriptive information is obtained from the archive file describing one or more contained files within the archive file. Then, the descriptive information for each contained file is evaluated to determine if any contained files are malicious or undesired computer files. Finally, an attempt is made to prevent contained files determined to be a malicious or undesired computer file from being opened.
Type:
Application
Filed:
December 15, 2009
Publication date:
April 15, 2010
Applicant:
FORTINENT, Inc.
Inventors:
Steven Michael Fossen, Alexander Douglas MacDonald
Abstract: A method for managing network traffic flow is provided. The method includes receiving network traffic content, storing at least a portion of the network traffic content to a memory, sending a copy of the network traffic content to a processor, which determines whether the network traffic content contains content desired to be detected. Another method for managing network traffic flow includes receiving network traffic content, flagging the network traffic content, sending the flagged network traffic content to a module, which is configured to pass unflagged data to a user and prevent flagged data from being sent to the user, and sending a copy of the network traffic content to a processor, which determines whether the network traffic content contains content desired to be detected.