11-18 virus technology

24
GUIDED BY MR. G.T.CHAVAN SUBMITTED BY NANDISH DESAI KALOLA AMIT C.U.SHAH COLLEGE OF ENGG. & TECH. W ADHW AN-3 63 030

Upload: mitesh-rathod

Post on 08-Apr-2018

219 views

Category:

Documents


0 download

TRANSCRIPT

8/7/2019 11-18 Virus Technology

http://slidepdf.com/reader/full/11-18-virus-technology 1/24

8/7/2019 11-18 Virus Technology

http://slidepdf.com/reader/full/11-18-virus-technology 2/24

INTRODUCTION The basics of computer Virus

Summarizing what they are ?

How they attack ?

What we can do to protect our selves ?

8/7/2019 11-18 Virus Technology

http://slidepdf.com/reader/full/11-18-virus-technology 3/24

What is Computer Virus ?

A comp. Virus is a coded program that is

written in Assembly or System

 programming language to gain entry into

host system and modify existing program

and perform a series of action without user 

consent

8/7/2019 11-18 Virus Technology

http://slidepdf.com/reader/full/11-18-virus-technology 4/24

HISTORY OF COMPUTER VIRUSES

The Pre-Historic Period

The Early Times

The Middle Ages

The Current Picture

The Emerging Scenario

8/7/2019 11-18 Virus Technology

http://slidepdf.com/reader/full/11-18-virus-technology 5/24

CLASSIFICATION OF VIRUSES

General Classification Of Viruses

Behavioral Classification of Viruses

8/7/2019 11-18 Virus Technology

http://slidepdf.com/reader/full/11-18-virus-technology 6/24

General Classification Of Virus

Viruses

BootSector 

Viruses

Directory

Viruses

Floppy

Disk Boot

Sector 

Viruses

Hard Disk 

Master 

Boot

Record

(MBR)/

Partition

TableViruses

Macro

Virus

Parasitic

Virus

File

Viruses

8/7/2019 11-18 Virus Technology

http://slidepdf.com/reader/full/11-18-virus-technology 7/24

Behavioral Classification of Virus

 Nature Of Attack 

Deception Techniques Employed

Frequency of Infection

 Next

8/7/2019 11-18 Virus Technology

http://slidepdf.com/reader/full/11-18-virus-technology 8/24

 Nature Of Attack 

Viruses

Direct

ActionViruses

Resident

Virus

Back 

8/7/2019 11-18 Virus Technology

http://slidepdf.com/reader/full/11-18-virus-technology 9/24

Deception Techniques Employed

Viruses

Stealth

Virus

Batch FileVirus

Multipartite

Viruses

Polymorphic

Virus

Cavity

Virus

Tunneling

Virus

CamouflageViruses

ArmoredViruses

CompanionViruses

Back 

8/7/2019 11-18 Virus Technology

http://slidepdf.com/reader/full/11-18-virus-technology 10/24

Frequency of Infection

Fast

Infector 

Virus

Slow

Infector 

Viruses

Sparse

Infector 

Viruses

Viruses

Back 

8/7/2019 11-18 Virus Technology

http://slidepdf.com/reader/full/11-18-virus-technology 11/24

Discover

y

Assimilation

Eradicatio

n

Gestation

The propagated

virus is activated

Users become aware of 

the virus and isolate it

Vaccine for the virus

is developed

When the use of vaccine become

widespread the virus is eradicated

The same or a

diff. developer 

develops a diff.

strain of a new

virus and the

 progress begins

afresh

The virus spreads

to other systems

Activation

Propagation

STAGE - 1

STAGE - 2

STAGE - 3

STAGE - 4

STAGE - 5

STAGE - 7

The created virus

is released to the

outside world

STAGE - 6

Creation

LIFE CYCLE OF A VIRUS

8/7/2019 11-18 Virus Technology

http://slidepdf.com/reader/full/11-18-virus-technology 12/24

QUALITIES OF A VIRUS

A virus must incorporate a replicating routine.

A virus should be able to install itself in the RAM.

A virus has a trademark trigger routine.

Some viruses have an encryption routine.

Most viruses are designed to exhibit some sort of stealth characteristics to avoid detection.

8/7/2019 11-18 Virus Technology

http://slidepdf.com/reader/full/11-18-virus-technology 13/24

HOW DOES VIRUS WORKS

Enter by email,downloads,floppy disk or hacking

Then make copies of itself to spread.

They will wait for the signal for being activated.

8/7/2019 11-18 Virus Technology

http://slidepdf.com/reader/full/11-18-virus-technology 14/24

SYMPTOMS OF A VIRUS

INFECTION Graphics and unusual text will appear.

Music will play for no reason.

Program and data file suddenly corrupted.

Disk volume is changed.

Files and directories have been changed suddenly.

Your computer goes slowdown.

System memory have been changed.

Hardware devices begin to exhibit unusual behavour.

Interrupt vector have been changed.

8/7/2019 11-18 Virus Technology

http://slidepdf.com/reader/full/11-18-virus-technology 15/24

HOW VIRUSES SPREAD

SO QUICKLY ? The larger amount of spreading the virus is user base, the

more widespread and quicker the infection.

The level of piracy is also influence to spread.

The complexity & characteristics of the virus code helps a

virus to spread effectively.

Internet is also cause to spread the virus quickly.

8/7/2019 11-18 Virus Technology

http://slidepdf.com/reader/full/11-18-virus-technology 16/24

POSITIVE VIRUS

A virus is µbad¶ or µgood¶ depends on the virus develope

Virus is made of two parts.

Propagation mechanism.

Payload. Propagation mechanism Spreads comp. To comp.

It is a technical challenge that lets fun of designing it.

Propagated virus automatically spreading until halted.

Entire meaning is easy to get and hard to recover.

Ex. If a virus which acts as anti-virus that detect the

negative virus and remove from the system.

8/7/2019 11-18 Virus Technology

http://slidepdf.com/reader/full/11-18-virus-technology 17/24

³I LOVE YOU´ VIRUS

A love letter which is win32 based on e-mail

attachments.

HOW DO I GET IT ?

Attachment named : LOVE-LETTER-FOR YOU.TXT The warning is protect.vbs.

When it opened virus infects to the system.

Unless you are sure that the doc. Is free from virus.

If you are unsure than ask to the sender to confirm.

Difficult to open .mp2 , .mp3 , .midi , .wav Etc.

Difficult to open .jpg , .bmp , .gif etc

8/7/2019 11-18 Virus Technology

http://slidepdf.com/reader/full/11-18-virus-technology 18/24

What is Anti-Virus

Anti-Virus is a specialized utility

 program which is used to detect , eradicate

and prevent viruses.

8/7/2019 11-18 Virus Technology

http://slidepdf.com/reader/full/11-18-virus-technology 19/24

DIFFERENT ANTI-VIRUS TECHNOLOGY

Hook Driver 

It provides databases in notes.

Extension Manager 

It allows a program to be run

natively.

8/7/2019 11-18 Virus Technology

http://slidepdf.com/reader/full/11-18-virus-technology 20/24

HOW EFFECTIVE IS AN ANTI-

VIRUS S\W IS ?Methodology of detecting, and incorporate anti-virus.

They have their own database to compare string of virus

string to detect.

An intelligent virus may breakdown your anti-virus s\w.

Timely and regularly upgrade the anti-virus s\w

If more than one user use one computer ,always check 

all local drives after download any data.

 NEXT

8/7/2019 11-18 Virus Technology

http://slidepdf.com/reader/full/11-18-virus-technology 21/24

COULD ANTI-VIRUS

PROGRAM ITSELF BE INFECTED?

Clever virus may infect the anti-virus s\w.

Parallel you might be use the another corporate anti-virus.

If one fails than the other might be detect.

The developer make an anti-virus s\w after confirmation.

 NEXT

8/7/2019 11-18 Virus Technology

http://slidepdf.com/reader/full/11-18-virus-technology 22/24

QUALITIES OF AN ANTI-VIRUS

S\W. Directly it remove to your system memory.

Example of virus which is same as cancer cells.

Two ways of virus detection. Signature based like polymorphic virus.

Rule based like genetic in nature.

Cat and mouse game bet¶n developer and writers.

 NEXT

8/7/2019 11-18 Virus Technology

http://slidepdf.com/reader/full/11-18-virus-technology 23/24

LIMITATIONS OF ANTI-VIRUS

PROGRAMS Limited database virus strings.

old version can¶t detect.

Directly not work on on-line services.

Restricted coverage area for an anti-virus s\w

 NEXT

8/7/2019 11-18 Virus Technology

http://slidepdf.com/reader/full/11-18-virus-technology 24/24

CONCLUSION

While using diff. External Data storage devices like cd¶s,

floppy disk 

scan all the system with the help of upgrade anti-virus

soft-ware.

The hazard ness cause by the virus to our system for which we have to take care.

³PREVENTION IS ALLWAYES BETTER THAN

CURE´.