Do Virus Scanners Slow Down Your System?

Page 7 - Seeking answers? Join the Tom's Hardware community: where nearly two million members share solutions and discuss the latest tech.
Status
Not open for further replies.

zoenphlux

Distinguished
Oct 3, 2008
111
0
18,690
On my wifes core 2 duo laptop t6600 2.2ghz with 3gb ram (its a dell that came with 3 years mcafee) when i first used it I was very unimpressed with its performance on almost everything. My old Pentium M 1.6 was just as fast opening programs and IE and all. I was very disappointed, but then i remembered the Mcafee was running 24/7..i turned it off and it was like i just over clocked the laptop. It made a HUGE difference on this laptop. And it was brand new. So I agree that it all depends on the system and hard drive. I believe this is a 5400 rpm drive.
 
G

Guest

Guest
LOL

What can I say. Just don't use WinCrap.
Virus software is written to keep all the WinCrap users safer than there usual unsafe state.
Just Upgrade to Unix.. pick a flavour [Suse, Mac-Os, Red-hat, Ubuntu.. and the list goes on.. problem solved.
 
G

Guest

Guest
how about trying to run an infected program and seeing how long it takes them to respond to what they are for?
 
G

Guest

Guest
The ginormous killer is when the antivirus software wants to update its virus definitions. On a Win7 platform it becomes unusable for a minute or two as megafiles are downloaded and processed. There must be a way to do a differential load.
 

Astara

Distinguished
Feb 3, 2009
21
0
18,510
[citation][nom]Cleeve[/nom]As a writer I don't really have any contact with the advertising side. I chose scanners that data indicated have a widespread user base. AVG has a free version, by the way.I'm not sure why some people assume that a free AV scanner might perform wildly different than a paid-for AV scanner.[/citation]

I wouldn't assume there would be a drastic difference in performance between a paid-for vs. a free version, but might expect a difference in features. The difference in features might lead to a difference in performance as a side effect. Certainly some anti-mal companies might try to differentiate free from non-free by performance, but I think the scrutiny applied to anti-mal products would tend to minimize any overt differences in performance that wouldn't be explainable by a difference in features.

[citation]Actually, I try to avoid assumptions and test even things that I might not consider possible. Assumptions are often incorrect. Often this attitude leads us to interesting discoveries. Case in point: the single-core internet page load time was significantly longer with the AVG security suite compared to the AVG virus scanner, but only when a single-core CPU is used. But if nothing else, such tests can support a hypothesis and dispel myths.[/citation]

That would depend on what browser you used as well -- browsers like Firefox and older versions of IE are single-threaded, while Chrome, maybe Opera and maybe newer IE might be multi-threaded. However, multi-threaded browsers would show more harm being constrained on a single core than browsers that are already constrained to 1 core but optimized for 1 core (like FF, though, optimize they may try, it's still a poor substitute for a multi-threaded browser). I assume (?) that you simulate some of your single-core testing by using process affinity on the active processes? While doing so is a great short-cut, it is important to note that it will differ from a true single-core machine, in that limiting a duel core processor to 1 process will give faster performance on that 1 core than if a real 1 core machine was used for 1, possibly 2 reasons: 1) most dual core machines list 2ndary Cache on a /CPU basis, but most modern multi-core machines allow cache sharing, so that if 1 core is kept inactive, the other core will get double the cache memory, and 2ndly, on modern Intel chips, reducing the number of active cores will usually allow the other cores to operate at a faster frequency.

That could explain the differences in speed you noted on the single-core internet page load time when there was really only 1 underlying CPU -- when there were multiple underlying cpu's, the active core would, at least, have gotten more cache. If it was a dual core machine with a 2nd core disabled in the BIOS, then that can allow the speed bump. I seem to remember reading that even if a 2nd core wasn't disabled in the bios, if a 2nd core was idle, a single core might execute faster because it still operated within the allowed Thermal Design Power (TDP).

Another factor would be whether or not the browser(s) tested have hooks to allow an antivirus to scan incoming data. Another would be whether or not the browser stores the data in memory using it's own cache system (thus avoiding any anti-virus hooks in the file system that might scan data written by a browser, or scan on reads). There's a bunch of factors that can affect how an anti-virus product might affect things.

And yet another factor that could be in play -- when IE operatates in protected mode, it writes internet data to the 'local-low' cache, where normal user and system level processes (like a virus scanner) are unable to read or execute it it. This would prevent virus scanning of such items (because normal user level processes cannot read or execute such files, AND files that are executed at that level and running with 'low' integrity cannot write to any object (file or process) of 'normal integrity) -- though they can read, if permitted by the DACL's. The integrity controls are mandatory, and cannot be overridden by normal users. It is difficult for even Administrators to override mandatory labels. (Just try reading or setting the process priority of AudioDG.exe!).

I would strongly suggest you test Microsoft's Security Essentials -- it might not show up under the normal market usage studies because it is a free product. But also, because it is a free product from microsoft, it would be very instructive to know how it affects performance in your suite of tests.

To beef up your peformance testing, the easiest tool(s) would be to load the Cygwin (cygwin.com) tools (FREE!). They provide most of the linux-utilities and allow a great deal of flexibility in testing that isn't available under standard windows. Some examples:

For network testing to a remote file system, one can get very distinct performance tests that allow eliminating many random factors. For example, to time maximum write throughput to a server, first create
a file on the server of the size you wish to test. On a Gigabit network you will want to test writing
multiple Gigabytes of data, using ~16MB chunks. So create a file maybe 1GB long on the server by using 'dd':

dd if=/dev/zero of=localfile bs=1M count=1024
Then use the sysinternals util 'contig' to defrag that file & make sure it is contiguous. Then on the target, use:

dd if=/dev/zero of=//server/share/localfile bs=16M count=64 conv=notrunc oflag=direct

If you install the docs, "man dd" will explain the options. the notrunc option will prevent dd from
destroying the file that's already there, so it will start writing over the top of the existing
file -- you want this so that you won't be timing the time it takes to delete and reallocate space,
as well as ensuring you are writing the the area you have already defragmented! The oflag=direct will prevent the write from using the local buffers -- the only thing you won't get is a guarantee that the other end has been written to disk. The only way to do that (due to server optimizations) is to write enough data to exceed the memory size on the remote system. So, for example, writing 24G on an 8G system will give you a good idea of actual write-to-disk speed. You can compare it to a smaller write that would fit in the remote system's memory.

If your remote system is a linux machine, then you can make the file you write to a link to /dev/null to test raw network write speed without the disk getting in the way. On a 1GB network, with appropriate memory tuning, you can get 125MB/s raw write speeds -- EVEN to disk, if you have a fast RAID (verified with a linux server and Win7-64 client).

Doing similar, but in reverse:

dd if=//server/share/localfile of=/dev/null bs=16M count=64

you can get up to around 119MB/s raw reads from memory on the server, and about 112MB/s from disk.

----
More pertinent to the virus scanning, you can do various types of file accessing.
A simple 'find' will look for filenames (though it also 'opens' each file to determine file sizes and other file data), or and ls -R for a simple name listing without file opens,

or probably the most anti-virus intensive -- tree copies:

cp -r /source /dest...

Since it has to read and write each, you'll see if there is any penalty for simple reads/writes of a file.

To test execution impact, be sure to load up the 'gcc' compiler suite, so you can create a trivial 'c' program (you could use a shell or batch script, but that would invoke more overhead of the interpreters).

I tried a simple test of a null program: "main() {}" compiled with -Os, and striped, binary size 6k.
Doing a 1000 iterations of executing it with or without the on-access scanning turned on, showed no noticeable impact. I tried making 1000 differently named copies of the file as well -- still no difference (~79-80 seconds). Maybe if I varied the file and added a unique string to each of the files it might make a difference, since the scanner may realize that even though they were different names, it can do the checksum so quickly, that it makes no difference.

But Using those tools you could create arbitrarily large executables with non-compressable random strings in each and time that to check for scan times. It would give you a large tool set to do benchmarking with, where you can measure specific aspects of system performance.

I hope you test the ms-security essentials, since I'd really be interested to know how it stacks up in your tests -- and judging from the other comments, several other readers would be interested as well.

Astara

 

mariushm

Distinguished
Feb 15, 2009
45
0
18,530
I see some of the most popular/better performing antivirus programs are missing... like F-Secure Antivirus, Eset NOD32, Avira, Microsoft's software... you have also two pairs of software that basically have the same antivirus engine (AVP/Kasperski)

I would have expected the most noticeable effect to be when compressing or decompressing things but with a 334 MB folder, just a few files would actually be scanned on access from it by most antivirus programs (dll, exe etc) so the difference would be minimum.

Try again with a bigger folder, for example the Windows folder, compress it and see what happens.

Try inserting a DVD with a popular game and run the setup - you'll see there how antivirus programs interact with the DVD reads and the disk writes and slow down the system.

Install Steam, buy a big game (Grand Theft Auto 4 for example at about 16GB), then try to make a backup of the game somewhere, see how much the antivirus slows down the process (because GTA4 has lots of small files with various extensions)

Overall, really a crappy article. Hardly demonstrates anything except author's lack of knowledge.
 
G

Guest

Guest
The real problem is when the full hard drive virus scan is going and the user doesn't realize 50% of their cpu is being used all day.
btw isn't it time to kick iTunes to the curb and get EJukebox for Windows?
 

pandemonium_ctp

Distinguished
Dec 31, 2009
105
0
18,690
[citation][nom]pandemonium_ctp[/nom]Meh. Overrated and not conducive to gamers while in game. I'd like to see FPS differences while in games for this review to be noteworthy.I find active virus protection (resident shield) dropped me a few FPS - nothing major - but I don't need active protection while I'm in game; even if I do browse websites and multi-task. Also, file scanning while in game is really bad, regardless of the software or your computer's power. You always get lag - even if it's only a little - and it's always noticeable. I don't know how it affects SDD instead of HDD, but so far every HDD I've played on gets reduced framerates when the protection software is actively scanning files (and I use higher performance HDDs).Err, ya. Don't be so dismissively smug. I haven't had any major virus problems since Nimda was spread (and that was when I had Norton; big mistake trusting them): I update OS critical patches every 3-6 months (not very often); I've used my primary and sole user account (no seperation); I've used IE the entire time; obviously activeX and pop-ups are disabled.The whole hate for IE is ridiculous. I've seen as many problems with Firefox as IE. It's not 2002 any more. You're not cool because you use Firefox because it's "not as well known" or "not rampantly targeted by trojans". Those reasons are absolutely not true any more.I have resident shield off, no internet security, scan weekly with AVG Free (and usually cancel it after system files are scanned) and apparently I'm either extremely lucky or I just have a knack for not clicking where I shouldn't.Oh, Norton is garbage. Not only does it fight with Windows to run your system and interrupt kernel processes, their resolve processes are crap as well. Also, everyone I've known that used or uses Norton has mentioned problems with it, regardless of being savvy or not.[/citation]

WTB Tom's to have no vote down, and therefor hide, option.

Really, what did I say that was so off-topic I wonder?
 

srinir

Distinguished
Dec 1, 2010
1
0
18,510
I would like you to do some research on application startups too, which are the more irking points for me. I've use AVG, Norton and Kaspersky Internet Security Suites in the past, and all of them seem to increase the time between clicking an icon on the taskbar and the application starting up. Please update with the relevant information if you can to see if your tests match my experience. Otherwise, I haven't found any major performance degradation by the use of Antivirus or Internet Security Suites. I use Microsoft Security Essentials and ThreatFire together on a Windows 7 system using 4GB of RAM with Intel Core 2 Duo E7500, btw, and have no malware infections at all.
 

edec

Distinguished
Nov 18, 2009
7
0
18,510
Great article and certainly surprised me. I have a bit of a 'but' to mention...

After helping countless friends and family with bad performing machines a common thread in improving what they have (i.e. excluding hardware upgrades) is to reduce what their anti-virus suite is doing, especially Norton 360 and it’s BHO, well at least from what I’ve seen.

I'm not bashing Norton but more I think the example goes like this: Say the parents want a PC, they are likely to buy a cheap one as they say they will just use if for internet and mail... a year later their bundled AV subscription runs out, so they cough up the money and get a free upgrade at the same time. Unfortunately the spec of their machine is not like that of Toms, it is likely to be a cheap processor, 2GB RAM, 5400RPM hard-disk. (you know it happens). So aside from the bloat they have accumulated using the internet for a year and ‘trying this and that’ their machine is not cut out for the latest software.

By the way, I’d say my example of a year old machine is a very generous. I was at my grandmothers last weekend and she has an old Vaio desktop from 2006 running XP and Norton 360 and using it felt like everything was being streamed over a 22kbps modem from Russia, I swear I lost a chunk of my life.
 

one_aceracer

Distinguished
Dec 1, 2010
1
0
18,510
So where is Microsoft Security Essentials? Spybot Search & Destroy? Malwarebytes? AVAST? Spyware Blaster? etc, etc, etc. I would like to see a report with less details and more products included.

But HEY,,, that's just ME!!!
 

neiroatopelcc

Distinguished
Oct 3, 2006
3,078
0
20,810
[citation][nom]Article[/nom]Today's personal computers are much more powerful than they were a few years ago, so perhaps the notion that an anti-virus application will still have a debilitating effect on performance is obsolete.[/citation]

Haven't read the article, yet anyway, but already I nkow the answer to this part.
Last summer we replaced a fourth of our computer park (465 systems) with new dual core ones, because we changed from CA ITM (horrible) to F-secure 8 (less horrible) which killed off the old single core systems which otherwise ran adequately with 512 or 768mb memory. So at least with some vendors, you still need to sacrifice performance for security. And in fact until a few months ago we had our realtime scanner disabled on print servers, as they'd otherwise grind to a halt no matter how many processors and how much ram we'd assign to them (vmware esx)
 

sandmanwn

Distinguished
Dec 1, 2006
915
0
18,990
Biggest test not included, OS load times.

The article seems really incomplete. Missing a few key antivirus programs. Then just drops off to one for half the tests. Would have been nice to see laptop performance comparisons. They always seem to take a larger hit with AV performance.
 

neiroatopelcc

Distinguished
Oct 3, 2006
3,078
0
20,810
[citation][nom]Article[/nom]I’m very happy to report that my preconceptions have no place in today’s PC world, as even single-core processors are able to demonstrate comparable performance with or without modern security software installed.[/citation]

Cleeve can you repeat some of the tests with 512mb, 1gb and 2gb of memory installed? In the world of abundant cpu cycles, the difference seen in real world performance is more likely the result of memory usage by those antivirus programs. Some have huge signature databases to keep in active memory at all times.
 

gmuser

Distinguished
Feb 19, 2010
20
0
18,510
I use Norton 360, and used Norton Internet Security 2010 before, and they both have one major performance issue:

When you try to copy file from remote disk/share (like other PC or NAS), Norton scans file before it lets it be copied, resulting in data being moved over network TWICE - once for scan, 2nd time for copy, which is very annoying/slowing on large files.
 

neiroatopelcc

Distinguished
Oct 3, 2006
3,078
0
20,810
[citation][nom]spectrewind[/nom]I have seen an updated copy of Norton & McAfee ( current engine and current definitions ) be unable to detect viral code appended to a small .JPG file as an NTFS alternate data stream, basically filename.jpg:ADS_code_goes_here.The only way to clear the problem was to copy the file to a FAT32 partion (shedding support for ADS), and then back to the NTFS drive.[/citation]
ADS spy can remove that for you, saving you the trouble to locate a fat 32 partition (which wouldn't be able to store a large file like a dvdr9 image anyway)
 
G

Guest

Guest
You're obviously not a developer. Try working on a J2EE project, building JAR/WAR/EAR files (they're basically archives like ZIP) all the time, and having a lame AV software like McAffee.
This article may apply to "normal" office users, or even gamers, but certainly not developers.
 
G

Guest

Guest
I'd really like to see Sunbelt's Vipre thrown in the mix. Been using them for a couple of years, and they claim to be one of the lightest AV scanners.
 
G

Guest

Guest
As a software developer with a company-enforced policy that causes McAffee to scan all of my generated .class and .jar files each time I do a build, I can tell you it has a far more significant impact than you have been able to demonstrate here.
For example, rhe WinRAR compress test is the wrong way around - I'd like to see what happens when you *uncompress* lots of files with significant extensions from that archive and it has to scan them all...
 
Status
Not open for further replies.