By Thomas Pantone Cosc 380.  A virus is a type of malware that self replicates after being executed and inserts itself into other programs, data files,

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Protect your PC virus, worm, Trojan horse, phishing, spam, botnet and zombies, spoofing, social engineering, identity theft, spyware, rootkits Click.
Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
By: Jason Boylan and Jeff George. Table of Contents  Definition  History  Vulnerability  How it works  Types of viruses  Virus Removal  Summary.
Computer Viruses.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Chapter Nine Maintaining a Computer Part III: Malware.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
Introduction to Honeypot, Botnet, and Security Measurement
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Network and Internet Security SYSTEM SECURITY. Virus Countermeasures Antivirus approach ◦Ideal solution: Prevention ◦Not allowing the virus to infect.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Malware Fighting Spyware, Viruses, and Malware Ch 4.
D. Beecroft Fremont High School VIRUSES.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
MyDoom By: Philippe Bissohong. Background ► MyDoom  Novarg, Mimail.R and Shimgapi ► Computer worm, unlike a virus it attacks a network.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Types of Electronic Infection
Return to the PC Security web page Lesson 5: Dealing with Malware.
Recent Internet Viruses & Worms By Doppalapudi Raghu.
Presented by: Maha, Marina and Aleks Viruses,Wormsand Trojans.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Viruses a piece of self-replicating code attached to some other code – cf biological virus both propagates itself & carries a payload – carries code to.
Malicious Software.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Open Malicious Source Symantec Security Response Kaoru Hayashi.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
MyDoom ☉ Ian Axelrod ☉ Chris Mungol ☉ Antonio Silva ☉ Joshua Sole ☉ Somnath Banerjee Group 5 CS4235/8803.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
Understand Malware LESSON Security Fundamentals.
W elcome to our Presentation. Presentation Topic Virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Computer virus Done: Aaesha Mohammed ID: H
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
 Mal icious soft ware  Programs that violate one (or more) of the IA pillars  Does not (generally) refer to unintentional program bugs that violate.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Week-14 (Lecture-1) Malicious software and antivirus: 1. Malware A user can be tricked or forced into downloading malware comes in many forms, Ex. viruses,
Protecting Computers From Viruses and Similarly Programmed Threats Ryan Gray COSC 316.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
Computer Virus’s.
By Quentin Lively Notorious Viruses.
Viruses and Other Malicious Content
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Chap 10 Malicious Software.
Viruses and Virus Protection
Chap 10 Malicious Software.
Presentation transcript:

By Thomas Pantone Cosc 380

 A virus is a type of malware that self replicates after being executed and inserts itself into other programs, data files, and/or the boot sector of the hard disk  Upon Infection the virus performs malicious activities that include corrupting data, logging keystrokes, stealing personal and any number of other damaging actions.  The two key points of a computer virus are it is program that makes unauthorized changes to the system when it is executed and a virus will not do anything until the file is opened or executed.

 10. Melissa: This virus rapidly spread due being from an attachment that once run took over the victim’s and sent copies of itself to everyone in the victim’s address book. This caused servers to crash from overload.  9. ILOVEYOU: This Virus is more of a worm but it is similar to Meilissa in it’s spread by but this was more malignant. ILOVEYOU copied itself into the victim’s system, replaced files with copies of itself, downloaded another executable that stole the victim’s information and relayed it to the original hacker.  8.Klez Virus: This Virus spread via hijacking address books bit it spread faster by spoofing changing the from field of the to circumvent address blocking and trick victim’s with a trusted identity.  7.Code Red and Code II: Exploited an OS vulnerability in Windows 2000 and WindowNT, a buffer overflow issue which meant when the computers received more info than the buffers could handle the adjacent memory would be overwritten. Creating a backdoor to take over the system all part of a plan for a DDoS attack on the Whitehouse.  6.The Nimda worm created a backdoor into the victim's operating system. It allowed the person behind the attack to access the same level of functions as whatever account was logged into the machine currently. In other words, if a user with limited privileges activated the worm on a computer, the attacker would also have limited access to the computer's functions. On the other hand, if the victim was the administrator for the machine, the attacker would have full control.

 5.SQL SLAMMER:The worm exploited the buffer overflow vulnerability in the Microsoft SQL server. It is a small piece of code that does little other than generate random IP addresses and send itself out to those addresses. If a selected address happens to belong to a host that is running an unpatched copy of Microsoft SQL Server Resolution Service, the host immediately becomes infected and begins spraying the Internet with more copies of the worm program. This caused server crashes and global internet slowdowns.  4. The MyDoom (or Novarg) virus is another worm that can create a backdoor in the victim computer's operating system. The original MyDoom virus -- there have been several variants -- had two triggers. One trigger caused the virus to begin a DoS attack starting Feb. 1, The second trigger commanded the virus to stop distributing itself on Feb. 12, Even after the virus stopped spreading, the backdoors created during the initial infections remained active. This also spread by spoofing s  3. The Sasser worm attacked computers through a Microsoft Windows vulnerability. Unlike other worms, it didn't spread through . Instead, once the virus infected a computer, it looked for other vulnerable systems. It contacted those systems and instructed them to download the virus. The virus would scan random IP addresses to find potential victims. The virus also altered the victim's operating system in a way that made it difficult to shut down the computer without cutting off power to the system.  2.The Netsky virus moves through s and Windows networks. It spoofs addresses and propagates through a 22,016-byte file attachment As it spreads, it can cause DoS attack as systems collapse while trying to handle all the Internet traffic. At one time, security experts at Sophos believed Netsky and its variants accounted for 25 percent of all computer viruses on the Internet

 1. The Storm Worm is a Trojan horse program. Its payload is another program, though not always the same one. Some versions of the Storm Worm turn computers into zombies or bots. As computers become infected, they become vulnerable to remote control by the person behind the attack. Some hackers use the Storm Worm to create a botnet and use it to send spam mail across the Internet. Although the Storm Worm is widespread, it's not the most difficult virus to detect or remove from a computer system. If you keep your antivirus software up to date and remember to use caution when you receive s from unfamiliar people or see strange links, you'll save yourself some major headaches.

There are Three main methods of Virus Detection  Signature Based Detection: This is the standard method used by anti-virus software, using a dictionary of virus/malware signatures each file is scanned in its entirety for a match if there is a match the software takes actions. The flaw of this method is viruses without definitions are undetectable by the software.  Heuristics: This method searches for Viruses using generic signatures to detect the various mutations of viruses and it can detect viral behaviors in files and respond to them. The issue with this method it takes time and is donw by the Anti-virus firm not the indvidual users.  Real Time Protection: This applies the above two methods in real time every time a file is opened/executed or new files enter the system.  Also according to Fredrick B. Cohen’s 1987 Demonstration there is no algorithm that can detect all possible viruses.

 When an infected file is detected the anti-virus software quarantines the file before it spreads. Next it removes the file from the system and asks the user to shutdown and reboot the system. After the reboot the virus may still exist in the system which indicates it’s severity.  There are some viruses that are not detected until they have thoroughly corrupted the system. In this case they have taken control of the system, disabled the anti-virus, and generally ruining the system.  At this point the only course of action would be to completely wipe the system clean and reinstall the Operating System.

 Vaccine is a colloquial term to describe the solution to a computer virus. Creating a vaccine involves analyzing a previously unknown virus using several methods.  Code Analysis which involves reading the machine code of the file without executing it to detect and malware behaviors. This method is limited by the complexity of the file as some are designed to counter this method.  Emulation which creates a virtual machine that can safely run portions of the file to determine the results without infecting the machine in use. This is faster than Code Analysis  Generic Signatures from preexisting viruses can be applied to newer ones as most new viruses are redesigns of older viruses completely new viruses are rare. Logically counter-measures to older versions could be applied to new versions.  Logically after finding solutions they are distributed to the clients of Anti-virus programs in the form of updates.  In some cases special Virus Removal Tools are created to deal with the more severe viruses that cannot be attached to a simple update.

 Computer Viruses are self-replicating files that once executed make unauthorized malicious changes to the system  Over the decades there have been dozens of dangerous viruses  Viruses are detected with three main methods Signature Based Detections, Heuristics, and Real time protections.  Viruses are usually quarantined and removed by anti- virus software but more damaging viruses require more drastic measure to resolve  Vaccines are created after the Virus goes through Code Analysis, Emulation and Generic Signature then distributed once solutions are found.

  computer-viruses.htm#page=1 computer-viruses.htm#page=1  e#Issues_of_concern e#Issues_of_concern   to-tech/how-to-remove-computer-virus.htm to-tech/how-to-remove-computer-virus.htm