malware

25
Abhinit Kumar Sharma

Upload: abhinit-kumar-sharma

Post on 12-Apr-2017

229 views

Category:

Internet


0 download

TRANSCRIPT

Page 1: Malware

Abhinit Kumar Sharma

Page 2: Malware

INTRODUCTION

The basics of computer Virus Summarizing what they are ? How they attack ? What we can do to protect our selves ?

Page 3: Malware

What is Computer Virus ?

A comp. Virus is a coded program that is written in Assembly or System programming language to modify existing program and perform a series of action without user consent.

Page 4: Malware

HISTORY OF COMPUTER VIRUSES

The Pre-Historic PeriodThe Early TimesThe Middle AgesThe Current PictureThe Emerging Scenario

Page 5: Malware

CLASSIFICATION OF VIRUSES

General Classification Of Viruses

Behavioral Classification of Viruses

Page 6: Malware

General Classification Of Virus

Viruses

Boot Sector

Viruses

Directory Viruses

Floppy Disk Boot

Sector Viruses

Hard Disk Master Boot

Record (MBR)/ Partition

Table Viruses

Macro Virus

Parasitic Virus

File Viruses

Page 7: Malware

Behavioral Classification of Virus

Nature Of Attack

Deception Techniques Employed

Frequency of Infection

Page 8: Malware

Nature Of Attack

Viruses

Direct Action Viruses

Resident Virus

Page 9: Malware

Deception Techniques Employed

Viruses

Stealth Virus

Batch File Virus

Multipartite Viruses

PolymorphicVirus

Cavity Virus

Tunneling Virus

Camouflage Viruses

Armored Viruses

Companion Viruses

Page 10: Malware

Frequency of Infection

Fast Infector Virus

Slow Infector Viruses

Sparse Infector Viruses

Viruses

Page 11: Malware

Discovery

Assimilation

Eradication

Gestation

The propagated virus is activated

Users become aware of

the virus and isolate it

Vaccine for the virus is developed

When the use of vaccine become

widespread the virus is eradicated

The same or a diff. developer develops a diff. strain of a new virus and the

progress begins afresh

The virus spreads to other systems

Activation

Propagation

STAGE - 1

STAGE - 2

STAGE - 3

STAGE - 4

STAGE - 5

STAGE - 7

The created virus is released to the

outside world

STAGE - 6

Creation

LIFE CYCLE OF A VIRUS

Page 12: Malware

QUALITIES OF A VIRUS

A virus must incorporate a replicating routine. A virus should be able to install itself in the RAM. A virus has a trademark trigger routine. Some viruses have an encryption routine. Most viruses are designed to exhibit some sort of stealth characteristics to avoid detection.

Page 13: Malware

HOW DOES VIRUS WORKS

Enter by email,downloads,floppy disk or hacking

Then make copies of itself to spread.

They will wait for the signal for being activated.

Page 14: Malware

SYMPTOMS OF A VIRUS INFECTION

Graphics and unusual text will appear. Music will play for no reason. Program and data file suddenly corrupted. Disk volume is changed. Files and directories have been changed suddenly. Your computer goes slowdown. System memory have been changed. Hardware devices begin to exhibit unusual behavour. Interrupt vector have been changed.

Page 15: Malware

HOW VIRUSES SPREAD SO QUICKLY ?

The larger amount of spreading the virus is user base, the more widespread and quicker the infection. The level of piracy is also influence to spread.The complexity & characteristics of the virus code helps a virus to spread effectively. Internet is also cause to spread the virus quickly.

Page 16: Malware

POSITIVE VIRUS A virus is ‘bad’ or ‘good’ depends on the virus developer. Virus is made of two parts.

Propagation mechanism. Payload.

Propagation mechanism Spreads comp. To comp. It is a technical challenge that lets fun of designing it. Propagated virus automatically spreading until halted. Entire meaning is easy to get and hard to recover. Ex. If a virus which acts as anti-virus that detect the negative virus and remove from the system.

Page 17: Malware

“I LOVE YOU” VIRUS A love letter which is win32 based on e-mail attachments. HOW DO I GET IT ? Attachment named : LOVE-LETTER-FOR YOU.TXT The warning is protect.vbs. When it opened virus infects to the system. Unless you are sure that the doc. Is free from virus. If you are unsure than ask to the sender to confirm. Difficult to open .mp2 , .mp3 , .midi , .wav Etc. Difficult to open .jpg , .bmp , .gif etc

Page 18: Malware

What is Anti-Virus

Anti-Virus is a specialized utility program which is used to detect , eradicate and prevent viruses.

Page 19: Malware

DIFFERENT ANTI-VIRUS TECHNOLOGY

Hook Driver It provides databases in notes.

Extension ManagerIt allows a program to be run

natively.

Page 20: Malware

HOW EFFECTIVE IS AN ANTI-VIRUS S\W IS ?

Methodology of detecting, and incorporate anti-virus.They have their own database to compare string of virus string to detect. An intelligent virus may breakdown your anti-virus s\w.Timely and regularly upgrade the anti-virus s\wIf more than one user use one computer ,always check all local drives after download any data.

Page 21: Malware

COULD ANTI-VIRUS PROGRAM ITSELF BE INFECTED?

Clever virus may infect the anti-virus s\w. Parallel you might be use the another corporate anti-virus. If one fails than the other might be detect. The developer make an anti-virus s\w after confirmation.

Page 22: Malware

QUALITIES OF AN ANTI-VIRUS S\W.

Directly it remove to your system memory. Example of virus which is same as cancer cells.Two ways of virus detection. Signature based like polymorphic virus. Rule based like genetic in nature. Cat and mouse game bet’n developer and writers.

Page 23: Malware

LIMITATIONS OF ANTI-VIRUS PROGRAMS

Limited database virus strings. old version can’t detect. Directly not work on on-line services. Restricted coverage area for an anti-virus s\w

Page 24: Malware

CONCLUSION

While using diff. External Data storage devices like cd’s,

floppy disk

scan all the system with the help of upgrade anti-virus

soft-ware.

The hazard ness cause by the virus to our system for which we have to take care.

“PREVENTION IS ALLWAYES BETTER THAN CURE”.

Page 25: Malware

Thank You !!!