360 Security guard vs Shell Trojan Kill

Source: Internet
Author: User
Tags comparison resource

"Cloud security" we are no longer unfamiliar, with 360 security guards 6.0, Jinshan Shell 1.0, we have officially entered the "cloud security" era.   Then these manufacturers blown marvellous "cloud killing", whether really can replace the traditional anti-virus software, I believe the following article will bring you the answer. In fact, the industry does not have a uniform standard for the definition of "cloud security". In general, foreign manufacturers often through the "cloud" (ie, the Internet) server group, the personal computer certification process, it looks more like an intelligent "white list." Domestic manufacturers, however, tend to make the client a "cloud security" of a member, through them to the computer in the exception file collection, reporting to the Cloud (server group) again row summary. Not only allows each user to share the latest virus library features, but also to the new Trojan recognition has reached a higher level.

First, the interface and the comparison of cloud killing

1.360 Security Defender 6.0

With the development of these years, 360 security guards have been where ball for a collection of Trojan killing, Garbage clean-up, rogue software removal, real-time protection in one integrated protection software, a variety of popular security protection features can be found here. In the interface design, 360 security guards used the most common two-layer tag architecture, the different functions are neatly divided into different labels, the use of special convenience.

Figure 1 360 Security Defender 6.0

In the 360 security guards, Trojan kill using the latest "cloud security" design. The same as the traditional killing interface, "cloud killing" also provides a "fast", "overall", "custom" three groups of scanning programs. The right side of the panel is a simple setting for the cloud to check, in addition to being able to view the latest recent killing, allowing users to increase their daily scan speed (that is, programs that are set to trust are no longer scanned) through the privacy/settings → "List of trusted programs".

Figure 2 Cloud selection box computer common sense

In addition, in order to prevent Trojan intrusion after blocking the network and affect the operation of the cloud killing, 360 security guards will also regularly download a "Standby Trojan Horse Library." So that in any case, the machine can be effectively scanned.

Figure 3 See the "Backup Trojan Horse"?

2. Jinshan Shell 1.0

Compared with 360 security guards, Jinshan Shell 1.0 seems to be more like a Kill tool, and its function is limited only in Trojan killing and timing scanning. From the interface, Jinshan Shell only provides a "quick scan" and "Custom directory scanning" two scanning programs, and can not directly to the entire computer killing. In the scanning process, the software will dynamically display the "Trust file", "No Threat File", "Unknown File", "Trojan/virus" The number of comparisons, although cool but not high practicality. Click "View Details" to see the specific scan record.

Figure 4 Jinshan Shell 1.0

Figure 5 in the process of cloud killing

Second, scanning speed comparison

According to the definition of "cloud security", most of the calculations in the scanning process are done by the server group (cloud). Therefore, the "cloud killing" for the user's own computing capacity requirements are not high, the normal scanning speed should have a good performance, then what will be the reality? Since Jinshan shells do not support sweeping scans, we have chosen a more complex set of system partitions (Total Capacity: 10GB) by customizing the scan pattern. Used space: 4.47GB, through the stopwatch to measure the scanning time, in order to be more close to the real use of the environment.

Figure 6 Scan when contrast (unit: Second column chart shorter the better)

"Summary" due to the addition of file fingerprint function, so the first scan and again scan the speed is not consistent. Through the final test, Jinshan shells obviously in the scanning speed more than a chip, especially its two times scan, speed up unexpectedly up to 72%, in this point obviously better than each other.

Third, the latest Trojan sample killing

"Cloud security" is the core of the Trojan killing, so in the face of real threats, these so-called "cloud security" tool is really as strong as the introduction? In order to facilitate comparison, we have in advance from a well-known security forum to obtain a group of the latest Trojan samples. Then the custom killing method, two times to scan it.

Figure 7 The latest Trojan Killing contrast (unit: The higher the clearance rate is better)

"Summary" Overall two software Trojan killing results are not good, although compared to 360 security guards in the comprehensive killing rate is better. However, the effective removal rate of 70%~75%, compared with the professional software is still much inferior. Of course, as cloud security is established for some time, we cannot judge their "lifetime" by just one test. But to replace the existing anti-virus software, it seems that still need to wait for some time yo!

Four, memory footprint comparison

Since the feature library pattern is no longer used, the cloud security tool does not in principle require large amounts of memory, so is the fact really so? In this section of the test, we intercepted two software in the idle state and the scanning process of the resource screenshot.

As you can see from the table, 360 security guards obviously have to take up more resources because of different component designs. And from the CPU curve, 360 security guards are likely to provide a deeper level of shelling, so that the Core 2 CPU curve is high. But from the actual experience, the scanning process has not caused too much impact on the day-to-day work, the two groups of systems overall response speed is also very normal. Compared to the professional antivirus software, the advantage is still very obvious!

Figure 8 Memory Footprint Contrast (Task Manager)

Figure 9 Comparison of CPU curves during scanning

Written in the last

It is clear that in the face of a series of real tests, the manufacturers are propaganda marvellous "cloud killing" can not let us rest easy. Although compared with traditional anti-virus software, cloud killing in the resource occupancy, scanning speed does have more advantages, but to replace the anti-virus software, obviously there is a long way to go.

However, there is still a point to be happy, although the cloud to kill the proposed only two months, but the Trojan killing rate has reached an acceptable level, I believe that with the future of the system to improve, "cloud security" must be able to become an important part of the local defense system!

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.