+ All Categories
Home > Documents > Comp Virus Cs

Comp Virus Cs

Date post: 09-Apr-2018
Category:
Upload: hitesh-singh
View: 215 times
Download: 0 times
Share this document with a friend

of 14

Transcript
  • 8/7/2019 Comp Virus Cs

    1/14

    BHABANI SHANKAR KAR CS200117153NA

    TION

    ALIN

    STITUTEOFS

    CIEN

    CE&

    TEC

    HNOL

    OGY

    [1]

    TECHNICAL SEMINAR PRESENTATION

    COMPUTER VIRUSES AND ANTIVIRUSES :

    AN INSIGHT

    by

    BHABANI SHANKAR KAR

    ROLL NO. CS200117153

    under the guidance of

    Mr.DUTIKRUSHNA PANDADepartment of Computer science, NIST,Berhampur.

  • 8/7/2019 Comp Virus Cs

    2/14

    BHABANI SHANKAR KAR CS200117153NA

    TION

    ALIN

    STITUTEOFS

    CIEN

    CE&

    TEC

    HNOL

    OGY

    [2]

    TECHNICAL SEMINAR PRESENTATION

    TYPES OF INFECTANTS:

    1. VIRUSES: Small piece of software that piggybacks on real programs

    2. WORMS: Computer program that copies itself from machine to machine

    3. E-MAIL VIRUSES :Moves around in e-mail messages

    4. TROJAN HORSES: Claims to do one thing, but does something else

    VIRUS: WORKING PHASES

    1. INFECTION PHASE: The file is infected

    2. ATTACK PHASE: The infected file is run, and virus shows its action

  • 8/7/2019 Comp Virus Cs

    3/14

    BHABANI SHANKAR KAR CS200117153NA

    TION

    ALIN

    STITUTEOFS

    CIEN

    CE&

    TEC

    HNOL

    OGY

    [3]

    TECHNICAL SEMINAR PRESENTATION

    VIRUSES: WHAT THEY INFECT

    1. System Sector Viruses :DOS boot sector or the Master Boot Record

    2. File Viruses :Program (COM and EXE) files

    3. Macro Viruses :Data fileshaving macro programs

    4. Companion Viruses : EXE files by installing a same-named COM file

    5. Cluster Viruses :Changes the DOS directory information so that directory entriespoint to the virus code instead of the actual program

    6. Batch File Viruses :batch files

    7. Source Code Viruses : Source code, by adding Trojan code to it

    8. Visual Basic Worms : Visual Basic Scripts

  • 8/7/2019 Comp Virus Cs

    4/14

    BHABANI SHANKAR KAR CS200117153NA

    TION

    ALIN

    STITUTEOFS

    CIEN

    CE&

    TEC

    HNOL

    OGY

    [4]

    TECHNICAL SEMINAR PRESENTATION

    VIRUSES: HOW THEY INFECT

    1. Polymorphic Viruses :change their characteristics as they infect.

    2. Stealth Viruses:hide themselves from antivirus or system software

    3. Fast and Slow Infectors: infect in a particular way

    4. Sparse Infectors: Viruses that don't infect very often.

    5. Armored Viruses : programmed to make disassembly difficult

    6. Multipartite Viruses: Fall into more than one of the top classes.

    7. Cavity (Space filler) Viruses: attempt to maintain a constant file size

    8. Tunneling Viruses "tunnel" under anti-virus software while infecting.

    9. Camouflage Viruses :appear as a benign program to scanners.

    10. NTFS ADS Viruses: ride on the alternate data streams in the NT File System

    11. Virus Droppers: runs and installs (or "drop") a virus onto your system

  • 8/7/2019 Comp Virus Cs

    5/14

    BHABANI SHANKAR KAR CS200117153NA

    TION

    ALIN

    STITUTEOFS

    CIEN

    CE&

    TEC

    HNOL

    OGY

    [5]

    TECHNICAL SEMINAR PRESENTATION

    VIRUSES AND THE INTERNET

    Comparatively small role in the spread of viruses

    Only when someone mails an infected document to someone else OR

    makes one available on web site

    Anonymous posting

    Huge role in future

    GOODVIRUSES

    The "Anti-Virus" Virus: locate other (presumably malicious) computer viruses and

    remove them.

    The "File Compressor" Virus :compress the files it infects

    The "Disk Encryptor" Virus:ensures the privacy of the user's data.

    The "Maintenance" Virus :performs some maintenance tasks

  • 8/7/2019 Comp Virus Cs

    6/14

    BHABANI SHANKAR KAR CS200117153NA

    TION

    ALIN

    STITUTEOFS

    CIEN

    CE&

    TEC

    HNOL

    OGY

    [6]

    TECHNICAL SEMINAR PRESENTATION

    ANTI-VIRUS SOFTWARE: Software that detects and removes viruses

    PROTECTION FROM VIRUSES

    Scanning: scanning programs that look for telltale code (signature strings)

    characteristic of the virus

    Integrity checking : recording integrity data that acts as a signature for the

    files and system sectors

    Interception: monitors operating system requests and intercepts user on

    finding threatening activity

    Anti-virus product use guidelines:proper use and updation of AV software

    Watch out for dangerous file extensions : avoid dangerous extensions

    Safe computing practices(safehex) : safe and careful use and practise

  • 8/7/2019 Comp Virus Cs

    7/14

    BHABANI SHANKAR KAR CS200117153NA

    TION

    ALIN

    STITUTEOFS

    CIEN

    CE&

    TEC

    HNOL

    OGY

    [7]

    TECHNICAL SEMINAR PRESENTATION

    SAFE COMPUTING PRACTICES(SAFEHEX)Update AV software

    Safe boot disk

    Hard disk boot

    Don't open attachments

    Turn off preview

    Disable scripting

    Show extensions

    Protect floppies

    Keep up with the latest security patchesGet info

    TAKE BACKUPS!!!

  • 8/7/2019 Comp Virus Cs

    8/14

    BHABANI SHANKAR KAR CS200117153NA

    TION

    ALIN

    STITUTEOFS

    CIEN

    CE&

    TEC

    HNOL

    OGY

    [8]

    TECHNICAL SEMINAR PRESENTATION

    APPROACHES TO DETECT VIRUSES

    1. THE SIGNATURE APPROACH

  • 8/7/2019 Comp Virus Cs

    9/14

    BHABANI SHANKAR KAR

    CS200117153NA

    TION

    ALIN

    STITUTEOFS

    CIEN

    CE&

    TEC

    HNOL

    OGY

    [9]

    TECHNICAL SEMINAR PRESENTATION

    2.THE SANDBOX APPROACH

  • 8/7/2019 Comp Virus Cs

    10/14

    BHABANI SHANKAR KAR

    CS200117153NA

    TION

    ALIN

    STITUTEOFS

    CIEN

    CE&

    TEC

    HNOL

    OGY

    [10]

    TECHNICAL SEMINAR PRESENTATION

    3.THE HEURISTIC APPROACH

  • 8/7/2019 Comp Virus Cs

    11/14

    BHABANI SHANKAR KAR

    CS200117153NA

    TION

    ALIN

    STITUTEOFS

    CIEN

    CE&

    TEC

    HNOL

    OGY

    [11]

    TECHNICAL SEMINAR PRESENTATION

    REMOVING AN INFECTED FILE

  • 8/7/2019 Comp Virus Cs

    12/14

    BHABANI SHANKAR KAR

    CS200117153NA

    TION

    ALIN

    STITUTEOFS

    CIEN

    CE&

    TEC

    HNOL

    OGY

    [12]

    TECHNICAL SEMINAR PRESENTATION

    ANTI- VIRUS RESEARCH

    IBM has been preparing a defense against fast spreading viruses

    Built the first commercial-grade immune system

    Can find, analyze and cure previously unknown viruses

    Analysis center can analyze most viruses automatically

    Greater speed and precision than human analysts can

    Runs the viruses in a virtual environment

    End-to-end security of the system allows the safe

    submission of virus samples and ensures

    authentication of new virus definitions.

    IBM VIRUS ANALYSIS CENTER

  • 8/7/2019 Comp Virus Cs

    13/14

    BHABANI SHANKAR KAR

    CS200117153NA

    TION

    ALIN

    STITUTEOFS

    CIEN

    CE&

    TEC

    HNOL

    OGY

    [13]

    TECHNICAL SEMINAR PRESENTATION

    CONCLUSION

    VIRUSES HAVE STIMULATED SCIENTIFIC THINKING AND IDEAS

    SOME IDEAS CAN ALSO BE EXPORTED INTO MEDICAL SCIENCE

    SCOPE FOR FURTHER IMPROVEMENT AND RESEARCH

    VIRUSES CAN ALSO BE PUT TO CONSTRUCTIVE USE(GOOD

    VIRUSES)

    EACH USER MUST REALIZE THE GRAVE DANGER POSED BY

    VIRUSES

    TAKE STEPS TO PREVENT INFECTION, AND IN CASE OF

    INFECTION, PROPER AND SAFE WAYS OF DEALING WITH THE

    INFECTION

    THANK YOU!!!!

  • 8/7/2019 Comp Virus Cs

    14/14

    BHABANI SHANKAR KAR

    CS200117153NA

    TION

    ALIN

    STITUTEOFS

    CIEN

    CE&

    TEC

    HNOL

    OGY

    [14]

    TECHNICAL SEMINAR PRESENTATION

    QUERIES PLEASE!!!


Recommended