Date post: | 09-Apr-2018 |
Category: |
Documents |
Upload: | hitesh-singh |
View: | 215 times |
Download: | 0 times |
of 14
8/7/2019 Comp Virus Cs
1/14
BHABANI SHANKAR KAR CS200117153NA
TION
ALIN
STITUTEOFS
CIEN
CE&
TEC
HNOL
OGY
[1]
TECHNICAL SEMINAR PRESENTATION
COMPUTER VIRUSES AND ANTIVIRUSES :
AN INSIGHT
by
BHABANI SHANKAR KAR
ROLL NO. CS200117153
under the guidance of
Mr.DUTIKRUSHNA PANDADepartment of Computer science, NIST,Berhampur.
8/7/2019 Comp Virus Cs
2/14
BHABANI SHANKAR KAR CS200117153NA
TION
ALIN
STITUTEOFS
CIEN
CE&
TEC
HNOL
OGY
[2]
TECHNICAL SEMINAR PRESENTATION
TYPES OF INFECTANTS:
1. VIRUSES: Small piece of software that piggybacks on real programs
2. WORMS: Computer program that copies itself from machine to machine
3. E-MAIL VIRUSES :Moves around in e-mail messages
4. TROJAN HORSES: Claims to do one thing, but does something else
VIRUS: WORKING PHASES
1. INFECTION PHASE: The file is infected
2. ATTACK PHASE: The infected file is run, and virus shows its action
8/7/2019 Comp Virus Cs
3/14
BHABANI SHANKAR KAR CS200117153NA
TION
ALIN
STITUTEOFS
CIEN
CE&
TEC
HNOL
OGY
[3]
TECHNICAL SEMINAR PRESENTATION
VIRUSES: WHAT THEY INFECT
1. System Sector Viruses :DOS boot sector or the Master Boot Record
2. File Viruses :Program (COM and EXE) files
3. Macro Viruses :Data fileshaving macro programs
4. Companion Viruses : EXE files by installing a same-named COM file
5. Cluster Viruses :Changes the DOS directory information so that directory entriespoint to the virus code instead of the actual program
6. Batch File Viruses :batch files
7. Source Code Viruses : Source code, by adding Trojan code to it
8. Visual Basic Worms : Visual Basic Scripts
8/7/2019 Comp Virus Cs
4/14
BHABANI SHANKAR KAR CS200117153NA
TION
ALIN
STITUTEOFS
CIEN
CE&
TEC
HNOL
OGY
[4]
TECHNICAL SEMINAR PRESENTATION
VIRUSES: HOW THEY INFECT
1. Polymorphic Viruses :change their characteristics as they infect.
2. Stealth Viruses:hide themselves from antivirus or system software
3. Fast and Slow Infectors: infect in a particular way
4. Sparse Infectors: Viruses that don't infect very often.
5. Armored Viruses : programmed to make disassembly difficult
6. Multipartite Viruses: Fall into more than one of the top classes.
7. Cavity (Space filler) Viruses: attempt to maintain a constant file size
8. Tunneling Viruses "tunnel" under anti-virus software while infecting.
9. Camouflage Viruses :appear as a benign program to scanners.
10. NTFS ADS Viruses: ride on the alternate data streams in the NT File System
11. Virus Droppers: runs and installs (or "drop") a virus onto your system
8/7/2019 Comp Virus Cs
5/14
BHABANI SHANKAR KAR CS200117153NA
TION
ALIN
STITUTEOFS
CIEN
CE&
TEC
HNOL
OGY
[5]
TECHNICAL SEMINAR PRESENTATION
VIRUSES AND THE INTERNET
Comparatively small role in the spread of viruses
Only when someone mails an infected document to someone else OR
makes one available on web site
Anonymous posting
Huge role in future
GOODVIRUSES
The "Anti-Virus" Virus: locate other (presumably malicious) computer viruses and
remove them.
The "File Compressor" Virus :compress the files it infects
The "Disk Encryptor" Virus:ensures the privacy of the user's data.
The "Maintenance" Virus :performs some maintenance tasks
8/7/2019 Comp Virus Cs
6/14
BHABANI SHANKAR KAR CS200117153NA
TION
ALIN
STITUTEOFS
CIEN
CE&
TEC
HNOL
OGY
[6]
TECHNICAL SEMINAR PRESENTATION
ANTI-VIRUS SOFTWARE: Software that detects and removes viruses
PROTECTION FROM VIRUSES
Scanning: scanning programs that look for telltale code (signature strings)
characteristic of the virus
Integrity checking : recording integrity data that acts as a signature for the
files and system sectors
Interception: monitors operating system requests and intercepts user on
finding threatening activity
Anti-virus product use guidelines:proper use and updation of AV software
Watch out for dangerous file extensions : avoid dangerous extensions
Safe computing practices(safehex) : safe and careful use and practise
8/7/2019 Comp Virus Cs
7/14
BHABANI SHANKAR KAR CS200117153NA
TION
ALIN
STITUTEOFS
CIEN
CE&
TEC
HNOL
OGY
[7]
TECHNICAL SEMINAR PRESENTATION
SAFE COMPUTING PRACTICES(SAFEHEX)Update AV software
Safe boot disk
Hard disk boot
Don't open attachments
Turn off preview
Disable scripting
Show extensions
Protect floppies
Keep up with the latest security patchesGet info
TAKE BACKUPS!!!
8/7/2019 Comp Virus Cs
8/14
BHABANI SHANKAR KAR CS200117153NA
TION
ALIN
STITUTEOFS
CIEN
CE&
TEC
HNOL
OGY
[8]
TECHNICAL SEMINAR PRESENTATION
APPROACHES TO DETECT VIRUSES
1. THE SIGNATURE APPROACH
8/7/2019 Comp Virus Cs
9/14
BHABANI SHANKAR KAR
CS200117153NA
TION
ALIN
STITUTEOFS
CIEN
CE&
TEC
HNOL
OGY
[9]
TECHNICAL SEMINAR PRESENTATION
2.THE SANDBOX APPROACH
8/7/2019 Comp Virus Cs
10/14
BHABANI SHANKAR KAR
CS200117153NA
TION
ALIN
STITUTEOFS
CIEN
CE&
TEC
HNOL
OGY
[10]
TECHNICAL SEMINAR PRESENTATION
3.THE HEURISTIC APPROACH
8/7/2019 Comp Virus Cs
11/14
BHABANI SHANKAR KAR
CS200117153NA
TION
ALIN
STITUTEOFS
CIEN
CE&
TEC
HNOL
OGY
[11]
TECHNICAL SEMINAR PRESENTATION
REMOVING AN INFECTED FILE
8/7/2019 Comp Virus Cs
12/14
BHABANI SHANKAR KAR
CS200117153NA
TION
ALIN
STITUTEOFS
CIEN
CE&
TEC
HNOL
OGY
[12]
TECHNICAL SEMINAR PRESENTATION
ANTI- VIRUS RESEARCH
IBM has been preparing a defense against fast spreading viruses
Built the first commercial-grade immune system
Can find, analyze and cure previously unknown viruses
Analysis center can analyze most viruses automatically
Greater speed and precision than human analysts can
Runs the viruses in a virtual environment
End-to-end security of the system allows the safe
submission of virus samples and ensures
authentication of new virus definitions.
IBM VIRUS ANALYSIS CENTER
8/7/2019 Comp Virus Cs
13/14
BHABANI SHANKAR KAR
CS200117153NA
TION
ALIN
STITUTEOFS
CIEN
CE&
TEC
HNOL
OGY
[13]
TECHNICAL SEMINAR PRESENTATION
CONCLUSION
VIRUSES HAVE STIMULATED SCIENTIFIC THINKING AND IDEAS
SOME IDEAS CAN ALSO BE EXPORTED INTO MEDICAL SCIENCE
SCOPE FOR FURTHER IMPROVEMENT AND RESEARCH
VIRUSES CAN ALSO BE PUT TO CONSTRUCTIVE USE(GOOD
VIRUSES)
EACH USER MUST REALIZE THE GRAVE DANGER POSED BY
VIRUSES
TAKE STEPS TO PREVENT INFECTION, AND IN CASE OF
INFECTION, PROPER AND SAFE WAYS OF DEALING WITH THE
INFECTION
THANK YOU!!!!
8/7/2019 Comp Virus Cs
14/14
BHABANI SHANKAR KAR
CS200117153NA
TION
ALIN
STITUTEOFS
CIEN
CE&
TEC
HNOL
OGY
[14]
TECHNICAL SEMINAR PRESENTATION
QUERIES PLEASE!!!