malware
TRANSCRIPT
![Page 1: Malware](https://reader036.vdocuments.mx/reader036/viewer/2022062523/58ed320a1a28ab122a8b4575/html5/thumbnails/1.jpg)
Abhinit Kumar Sharma
![Page 2: Malware](https://reader036.vdocuments.mx/reader036/viewer/2022062523/58ed320a1a28ab122a8b4575/html5/thumbnails/2.jpg)
INTRODUCTION
The basics of computer Virus Summarizing what they are ? How they attack ? What we can do to protect our selves ?
![Page 3: Malware](https://reader036.vdocuments.mx/reader036/viewer/2022062523/58ed320a1a28ab122a8b4575/html5/thumbnails/3.jpg)
What is Computer Virus ?
A comp. Virus is a coded program that is written in Assembly or System programming language to modify existing program and perform a series of action without user consent.
![Page 4: Malware](https://reader036.vdocuments.mx/reader036/viewer/2022062523/58ed320a1a28ab122a8b4575/html5/thumbnails/4.jpg)
HISTORY OF COMPUTER VIRUSES
The Pre-Historic PeriodThe Early TimesThe Middle AgesThe Current PictureThe Emerging Scenario
![Page 5: Malware](https://reader036.vdocuments.mx/reader036/viewer/2022062523/58ed320a1a28ab122a8b4575/html5/thumbnails/5.jpg)
CLASSIFICATION OF VIRUSES
General Classification Of Viruses
Behavioral Classification of Viruses
![Page 6: Malware](https://reader036.vdocuments.mx/reader036/viewer/2022062523/58ed320a1a28ab122a8b4575/html5/thumbnails/6.jpg)
General Classification Of Virus
Viruses
Boot Sector
Viruses
Directory Viruses
Floppy Disk Boot
Sector Viruses
Hard Disk Master Boot
Record (MBR)/ Partition
Table Viruses
Macro Virus
Parasitic Virus
File Viruses
![Page 7: Malware](https://reader036.vdocuments.mx/reader036/viewer/2022062523/58ed320a1a28ab122a8b4575/html5/thumbnails/7.jpg)
Behavioral Classification of Virus
Nature Of Attack
Deception Techniques Employed
Frequency of Infection
![Page 8: Malware](https://reader036.vdocuments.mx/reader036/viewer/2022062523/58ed320a1a28ab122a8b4575/html5/thumbnails/8.jpg)
Nature Of Attack
Viruses
Direct Action Viruses
Resident Virus
![Page 9: Malware](https://reader036.vdocuments.mx/reader036/viewer/2022062523/58ed320a1a28ab122a8b4575/html5/thumbnails/9.jpg)
Deception Techniques Employed
Viruses
Stealth Virus
Batch File Virus
Multipartite Viruses
PolymorphicVirus
Cavity Virus
Tunneling Virus
Camouflage Viruses
Armored Viruses
Companion Viruses
![Page 10: Malware](https://reader036.vdocuments.mx/reader036/viewer/2022062523/58ed320a1a28ab122a8b4575/html5/thumbnails/10.jpg)
Frequency of Infection
Fast Infector Virus
Slow Infector Viruses
Sparse Infector Viruses
Viruses
![Page 11: Malware](https://reader036.vdocuments.mx/reader036/viewer/2022062523/58ed320a1a28ab122a8b4575/html5/thumbnails/11.jpg)
Discovery
Assimilation
Eradication
Gestation
The propagated virus is activated
Users become aware of
the virus and isolate it
Vaccine for the virus is developed
When the use of vaccine become
widespread the virus is eradicated
The same or a diff. developer develops a diff. strain of a new virus and the
progress begins afresh
The virus spreads to other systems
Activation
Propagation
STAGE - 1
STAGE - 2
STAGE - 3
STAGE - 4
STAGE - 5
STAGE - 7
The created virus is released to the
outside world
STAGE - 6
Creation
LIFE CYCLE OF A VIRUS
![Page 12: Malware](https://reader036.vdocuments.mx/reader036/viewer/2022062523/58ed320a1a28ab122a8b4575/html5/thumbnails/12.jpg)
QUALITIES OF A VIRUS
A virus must incorporate a replicating routine. A virus should be able to install itself in the RAM. A virus has a trademark trigger routine. Some viruses have an encryption routine. Most viruses are designed to exhibit some sort of stealth characteristics to avoid detection.
![Page 13: Malware](https://reader036.vdocuments.mx/reader036/viewer/2022062523/58ed320a1a28ab122a8b4575/html5/thumbnails/13.jpg)
HOW DOES VIRUS WORKS
Enter by email,downloads,floppy disk or hacking
Then make copies of itself to spread.
They will wait for the signal for being activated.
![Page 14: Malware](https://reader036.vdocuments.mx/reader036/viewer/2022062523/58ed320a1a28ab122a8b4575/html5/thumbnails/14.jpg)
SYMPTOMS OF A VIRUS INFECTION
Graphics and unusual text will appear. Music will play for no reason. Program and data file suddenly corrupted. Disk volume is changed. Files and directories have been changed suddenly. Your computer goes slowdown. System memory have been changed. Hardware devices begin to exhibit unusual behavour. Interrupt vector have been changed.
![Page 15: Malware](https://reader036.vdocuments.mx/reader036/viewer/2022062523/58ed320a1a28ab122a8b4575/html5/thumbnails/15.jpg)
HOW VIRUSES SPREAD SO QUICKLY ?
The larger amount of spreading the virus is user base, the more widespread and quicker the infection. The level of piracy is also influence to spread.The complexity & characteristics of the virus code helps a virus to spread effectively. Internet is also cause to spread the virus quickly.
![Page 16: Malware](https://reader036.vdocuments.mx/reader036/viewer/2022062523/58ed320a1a28ab122a8b4575/html5/thumbnails/16.jpg)
POSITIVE VIRUS A virus is ‘bad’ or ‘good’ depends on the virus developer. Virus is made of two parts.
Propagation mechanism. Payload.
Propagation mechanism Spreads comp. To comp. It is a technical challenge that lets fun of designing it. Propagated virus automatically spreading until halted. Entire meaning is easy to get and hard to recover. Ex. If a virus which acts as anti-virus that detect the negative virus and remove from the system.
![Page 17: Malware](https://reader036.vdocuments.mx/reader036/viewer/2022062523/58ed320a1a28ab122a8b4575/html5/thumbnails/17.jpg)
“I LOVE YOU” VIRUS A love letter which is win32 based on e-mail attachments. HOW DO I GET IT ? Attachment named : LOVE-LETTER-FOR YOU.TXT The warning is protect.vbs. When it opened virus infects to the system. Unless you are sure that the doc. Is free from virus. If you are unsure than ask to the sender to confirm. Difficult to open .mp2 , .mp3 , .midi , .wav Etc. Difficult to open .jpg , .bmp , .gif etc
![Page 18: Malware](https://reader036.vdocuments.mx/reader036/viewer/2022062523/58ed320a1a28ab122a8b4575/html5/thumbnails/18.jpg)
What is Anti-Virus
Anti-Virus is a specialized utility program which is used to detect , eradicate and prevent viruses.
![Page 19: Malware](https://reader036.vdocuments.mx/reader036/viewer/2022062523/58ed320a1a28ab122a8b4575/html5/thumbnails/19.jpg)
DIFFERENT ANTI-VIRUS TECHNOLOGY
Hook Driver It provides databases in notes.
Extension ManagerIt allows a program to be run
natively.
![Page 20: Malware](https://reader036.vdocuments.mx/reader036/viewer/2022062523/58ed320a1a28ab122a8b4575/html5/thumbnails/20.jpg)
HOW EFFECTIVE IS AN ANTI-VIRUS S\W IS ?
Methodology of detecting, and incorporate anti-virus.They have their own database to compare string of virus string to detect. An intelligent virus may breakdown your anti-virus s\w.Timely and regularly upgrade the anti-virus s\wIf more than one user use one computer ,always check all local drives after download any data.
![Page 21: Malware](https://reader036.vdocuments.mx/reader036/viewer/2022062523/58ed320a1a28ab122a8b4575/html5/thumbnails/21.jpg)
COULD ANTI-VIRUS PROGRAM ITSELF BE INFECTED?
Clever virus may infect the anti-virus s\w. Parallel you might be use the another corporate anti-virus. If one fails than the other might be detect. The developer make an anti-virus s\w after confirmation.
![Page 22: Malware](https://reader036.vdocuments.mx/reader036/viewer/2022062523/58ed320a1a28ab122a8b4575/html5/thumbnails/22.jpg)
QUALITIES OF AN ANTI-VIRUS S\W.
Directly it remove to your system memory. Example of virus which is same as cancer cells.Two ways of virus detection. Signature based like polymorphic virus. Rule based like genetic in nature. Cat and mouse game bet’n developer and writers.
![Page 23: Malware](https://reader036.vdocuments.mx/reader036/viewer/2022062523/58ed320a1a28ab122a8b4575/html5/thumbnails/23.jpg)
LIMITATIONS OF ANTI-VIRUS PROGRAMS
Limited database virus strings. old version can’t detect. Directly not work on on-line services. Restricted coverage area for an anti-virus s\w
![Page 24: Malware](https://reader036.vdocuments.mx/reader036/viewer/2022062523/58ed320a1a28ab122a8b4575/html5/thumbnails/24.jpg)
CONCLUSION
While using diff. External Data storage devices like cd’s,
floppy disk
scan all the system with the help of upgrade anti-virus
soft-ware.
The hazard ness cause by the virus to our system for which we have to take care.
“PREVENTION IS ALLWAYES BETTER THAN CURE”.
![Page 25: Malware](https://reader036.vdocuments.mx/reader036/viewer/2022062523/58ed320a1a28ab122a8b4575/html5/thumbnails/25.jpg)
Thank You !!!