Malicious Software Network security Master:Mr jangjou Presented by:Mohsen Najafi November 2011
Malware Propagation Concealment Virus Warm Trojans Root kit
Malware Types Root Kit Virus ADMIN Logic bomb Zombie Backdoor Warm Keylogger Spyware Trojan Virus
Root Kit ADMIN Power Privileged Access Least powerful Monitoring Open source and integrate with other malware Help to Trojan Attack with Kernel or User mode ADMIN Power
Logic bomb Behave like physical bomb Manual and Automatic Remove information in database
Warm Very Fast Spread Self Executable Carriage Other malware No change system and user file Propagation in Network connections
Keylogger Kernel base API base Form Grabbing base
Spyware Hidden form No self replicate Like adware A long with other software
Backdoor Remote Access Install with Worms Bypassing security
Zombie Connected to internet Under remote directions Active with spam Spammers controls Active with spam
Trojan Steal informations Low performance system Change configuration Crashing the computer Low performance system Install and work hiddenly
Viruses Boot sector File infector Macro virus Encrypted virus Stealth virus Polymorphic Metamorphic Oligomorphic
Symptoms of Malware System Crach always have Poor System Performance Your system has less available memory than it should Unusual messages or displays on your monitor Settings have changed and I can't change them back to the way they were Some of your files become corrupted or suddenly don't work properly
Antivirus How to work How to choose (Full of Free) (File server) (30% faster) (Multi core) (Wi-Fi network) (P2P file sharing) (Heuristic & Rootkit) (Script and warm) (Personal data & update) (Virus removal)