The statistics that are listed here are the Day0 test. I.E. what are the results on the day that we acquire any binary and is tested. We also have included all the re-test results over the same calendar day. Each vendor should improve as they start detecting the older and more common malicious binaries.
Each of the vendor's update process is executed prior to each run to ensure that the latest virus signatures are loaded for our tests.
The tables on each page represent the results of the Anti-Virus tests against the malware that we collect each day. Each AV vendor has different capabilities and success in detecting malware that is collected. No single vendor detects 100%, nor can they ever. To expect complete protection will always be science-fiction.
That being said, you can see the different statistics of the different vendors in our charts. It can be confusing since each vendor uses a different name for each infection type and family. All tests are done with the same set of binaries for each vendor. We continue to test each of the binaries until each vendor is able to detect each piece of malware in our repository. Where ever possible we have attempted to contact the vendor for assistance with the command line options that we use. Otherwise we try different options to produce the highest detection rate available from the options.
In all cases the time periods listed for the charts are summarizations for that specific time period. So for the Re-Tests, the time period does not represent the interval for testing. ie, the weekly charts are for the last seven days of processing. The seven day Re-Test chart does not represent that the binaries were re-tested once in that period. It does represent a summarization of the processing and testing of the binaries in that time period.
It is difficult to not compare one vendor to the next due to how we have the data structured on the pages. It would be impossible not to try and derive conclusions from those results. While that is the case, our goal is not to create a real comparison site for everyone to try and compete to see which AV vendor is better than the next. There are a multitude of those already, each of which have their own sets of malware to test and rules that they follow for complete their testing. That is not our purpose. We do not have a specific set of malware to test. We instead gather in new malware daily and test it against the different vendors.
The versions of AV engines that we have are as new as the vendor can provide us and updated at least hourly if not more frequently. But they are gateway or fileserver products for the most part. We do have plans for using full consumer AV applications as well, but that will take time and much more in donations to allow us to build the back end for that. We will get to it, just not today.
The following Vendor tables show which of the AV vendors we are currently using as well as the engine and signature level of each application. In most cases we are using the command-line-interface versions, gateway versions, or file server versions. These are not the normal home user versions and in some cases are special versions for anti-virus test systems. The data within the tables is being pulled from the live systems and updated twice a day. The actual engines and signatures are attempted to be updated prior to each malware run whether it is from the day0 test or for a retry. So the applications should be as updated as possible before testing occurs.
The current list of AV tools that we use are as follows:
Linux Vendor List
|Authentium||4.6.5||201701042327||aiscan --nomem --nombr --noboot --all --pua|
|Avast||2.1.0||16121901||scan -b -f -u|
|AVG||13.0.3114||4477/13612||avgscan --heur --arc --macrow --pwdw --repok --pup|
|Avira||184.108.40.206||220.127.116.11||avscan --batch -noboot -nombr -s -rs --scan-in-archive --alltypes --allfiles --without-PCK -nomem --heur-level=3 --alert-action=none|
|BitDefender||7.2||Thu Apr 28 15:58:07 2016||bdc -arc -noclean|
|Clam||0.99.1||22836||clamscan --no-summary --detect-pua -r|
|DrWeb||6.0.0.02020||18.104.22.16860||drweb -ar -cn -ha -ok -path=$1|
|Eset||3.0.21||14691 (20161230)||esets_scan --adv-heur --adware --sfx --unsafe --unwanted|
|FProt||22.214.171.124||201612182114||fpscan --scanlevel=4 --heurlevel=4 --archive=99 --adware --report|
|FSecure||11.00 build 79||Wednesday, 4 January 2017_16||fsav --allfiles=yes --scanexecutables=yes --archive=yes --mime=yes --riskware=yes --virus-action1=report --riskware-action1=report --suspected-action1=report --auto=yes --list=yes|
|McAfee||5800.7501||8398 created Jan 4 2017||uvscan --recursive --noboot --program --mime --unzip --secure --!guru --!server|
|QuickHeal||11.00||02 January, 2017||qhscan -DNAScan -ARCHIVE -WARE -LIST -PACKED -REPORT=$tmp|
|Sophos||5.16.0||5.34||sweep -all -archive|
|TrendMicro||9.850-1008||Sunday, 18 December 2016||vscantmrh -S -NC -NM -NB|
Windows Vendor List
|AhnLab||Thursday, 5 January 2017.00||Thursday, 5 January 2017.00||v3tmedic.exe /scantype:all /cure:off|
|Authentium||5.4.11||201701042142||aiscan.exe --nomem --nombr --noboot --all --pua|
|Avast||command-line scanner||170104-0||ashcmd /_ /s /d /p /a /c /i /t=a /x=P /e=100 /r=report|
|AVG||10.0.4311||271/13203||avgscanx.exe /HEUR /ARC /MACROW /PWDW /REPOK /PUP|
|Avira||126.96.36.199||188.8.131.52||scancl --nombr /s /z /a --nomem --heurlevel=3|
|BitDefender||7.1||Thu Jan 5 01:02:53 2017||bdc.exe -arc -noclean|
|Clam||0.99||22836||clamscan --no-summary --detect-pua -r|
|Comodo||5.1||26392||cavscons /h2 /c|
|DrWeb||10.00.9.08310/7.00.26.12060||Wednesday, 28 December 2016 12:37||dwscancl /ar /ha /ok /sls- /sps-|
|eScan||14.0.241||Tue Dec 20 04:50:31 2016||mwavscan.com /subfolders /snoc /fs /self /nomutex /silent|
|Eset||184.108.40.206||14717 (20170104)||ecls /adv-heur /adware /sfx /unsafe /unwanted|
|Fortinet||5.4.233||41.913,||vscanner.exe -V -gALL|
|FProt||220.127.116.11||201701050007||bin64\\MS\\fpscan64.exe -i \\antivir.def --scanlevel=4 --heurlevel=4 --archive=99 --adware --report|
|FSecure||11.00.19100||Monday, 21 December 2015||fsav /ALL /ARCHIVE /NOBOOT /SPYWARE|
|GData||AVA 25.9971,GD 25.8552||04.01.2017,04.01.2017||avkcmd.exe /scan(e0):|
|McAfee||5800.7501||8398 created Jan 4 2017||scan.exe /RECURSIVE /NOBOOT /ALLOLE /MIME /PROGRAM /UNZIP /SECURE|
|Microsoft||1.13303||Wed Jan 04 09:18:51 2017||mpscanp.exe /report /rptall|
|QuickHeal||14.00||04 January, 2017||qhscan /DNAScan /ARCHIVE /WARE /LIST /PACKED|
|Sophos||3.61.0||5.34||sav32cli.exe -ndi -ns -nb -all -rec -nremove -eec -sc -f -tnef -mime -oe -pua -suspicious -archive -nmbr -nmem|
|Sunbelt||3.9.2557.2||54968||vscan /r /v|
|Symantec||Norton360 18.104.22.168||LiveUpdate||symscan.exe /defs|
|TrendMicro||9.850-1008||Wednesday, 4 January 2017||vscantm.exe /S /NM /NB /NC|
These reports are updated once a day.
If you are an AV vendor and would like to have your scanner added to our list, please email admin<at>shadowserver.org for that request. We will need a CLI version of the scanner for Linux or Windows (or both if you have them). We will need to know how to update the subscriptions and data files. We would also like to have the suggested running options for your scanner.
This chart is the total number of files processed by the AV test system.
These statistics are the result of AV testing over a 48-hour period and how many files were still not detected by any single vendor. There is a severe change in the results after 2011-07 which is when we added in the Windows AV scanners to our test suite. While on most days the results are not zero, the values are so low as to not be seen in the current chart.
<< | Statistics | >>