VIRUSES - Janhavi Naik. Overview Structure Classification Categories.

Slides:



Advertisements
Similar presentations
Computer Security Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Chapters 14 and 15 Operating Systems: Internals and Design Principles,
Advertisements

30/04/2015Tim S Roberts COIT13152 Operating Systems T1, 2008 Tim S Roberts.
Lecture 13 Malicious Software modified from slides of Lawrie Brown.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Computer Viruses Theory and Experiments By Dr. Frederick B. Cohen Presented by Jose Andre Morales.
Network Security Philadelphia UniversitylAhmad Al-Ghoul Module 5 Program Security  MModified by :Ahmad Al Ghoul  PPhiladelphia University.
Chapter 14 Computer Security Threats
Cryptography and Network Security Malicious Software Third Edition by William Stallings Lecturer: Dr. Saleem Alzoubi.
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
Malicious Software programs exploiting system vulnerabilities known as malicious software or malware program fragments that need a host program e.g. viruses,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
1 Computer Viruses (and other “Malicious Programs) Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
1 Malicious Logic CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 25, 2004.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
Hofstra University – Network Security Course, CSC290A
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 7 – Malicious Software.
Malicious Software Malicious Software Han Zhang & Ruochen Sun.
1 Ola Flygt Växjö University, Sweden Malicious Software.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
1. 2 What is security? Computer Security deals with the prevention and detection of, and the reaction to, unauthorized actions by users of a computer.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
Computer Viruses -Theory and Experiments Dr. Frederick B. Cohen DOD/NBS 7 th Conference on Computer Security Copyright©,1984,Fred Cohen Presented by Swetha.
The Code of Life: A Look at Emerging Artificial Life The Virus AGCGTGGCAGC ATCCTACGACT GCACGATCCTC GATCGACGTGA CGTGACGTAGC GGGACTCGATC
D. Beecroft Fremont High School VIRUSES.
CLASSIFICATION OF VIRUSES By the end of our presentation you will know all about  File viruses  Boot sector virus  Marco virus.
Data Security and Encryption (CSE348) 1. Lecture # 27 2.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
Structure Classifications &
1 Chapter 19: Malicious Software Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal, U of Kentucky)
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Chapter 11 Malicious Software
Viruses and Related Threats. 2 Summary  have considered:  various malicious programs  trapdoor, logic bomb, trojan horse, zombie  viruses  worms.
Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
30.1 Lecture 30 Security II Based on Silberschatz & Galvin’s slides And Stallings’ slides.
For any query mail to or BITS Pilani Lecture # 1.
CIS 442: Chapter 2 Viruses. Malewares Maleware classifications and types Viruses Logical and time bombs Trojan horses and backdoors Worms Spam Spyware.
Telecommunications Networking II Lecture 41f Viruses and Worms.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Malicious Logic and Defenses. Malicious Logic Trojan Horse – A Trojan horse is a program with an overt (documented or known) effect and covert (undocumented.
Submitted By :- Neeraj Kumar Singh Branch :Electronics&communication Topic : computer Viruses Submitted to :- Ms. Veena Gupta.
Viruses a piece of self-replicating code attached to some other code – cf biological virus both propagates itself & carries a payload – carries code to.
Malicious Software.
Chapter 19 – Malicious Software What is the concept of defense: The parrying of a blow. What is its characteristic feature: Awaiting the blow. —On War,
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
METAMORPHIC VIRUS NGUYEN LE VAN.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Computer virus Done: Aaesha Mohammed ID: H
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
MALICIOUS SOFTWARE Rishu sihotra TE Computer
Malicious Programs (1) Viruses have the ability to replicate themselves Other Malicious programs may be installed by hand on a single machine. They may.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
Company LOGO Malicious SW By Dr. Shadi Masadeh 1.
Computer Viruses Author: Alyse Allen.
Chapter Objectives In this chapter, you will learn:
Viruses and Other Malicious Content
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Malicious Program and Protection
Presentation transcript:

VIRUSES - Janhavi Naik

Overview Structure Classification Categories

VIRUS:- STRUCTURE ( page no s) Virus can be prepended, postpended or embedded to an executable program. The infected program when invoked will first invoke the virus code and then execute the original code of the program.

Depiction of virus structure ( page no-653) Program v := (go to main; ; subroutine infect-executable := { loop: file :=get-random-executable file; if (first-line-of-file= ) then goto loop

Cont.. Else prepend v to file; } Subroutine do-damage := {whatever damage is to be done} Subroutine trigger-pulled := { return true if some condition holds} Main: main-program:= { infect-executable ;

Cont.. If trigger-pulled then do-damage; Goto next;} Next: }

program invoked The following steps:- For uninfected file,the virus first compresses that file. Copy of virus is prepended to compressed program.

Cont.. The compressed version of infected program is uncompressed. The uncompressed original program is executed.

Compression logic (page no-654 s) Program cv:= (go to main; ; subroutine infect-executable := { loop:file :=get-random- executable file; if (first-line-of-file= ) then goto loop;

Cont.. (1) compress file; (2) prepend cv to file; } Main: main-program {if ask permission then infect executable; (3) uncompress rest-of-file; (4) run compressed file;} }

Virus classification (page no-655 s) Based upon following : Type of target virus tries to infect Method the virus uses to conceal itself from detection by users and antivirus softwares.

CLASSIFICATION BY TARGET (page no-655 s) Boot Sector Infector :- infects a master boot record or boot record and spreads when a system is booted from the disk containing virus. File Infector :- infects the file that the OS or shell consider to be executable

Cont.. Macro Virus :- infects files with macro code that is interpreted by an application. Infect a document or template rather than executable code. Can infect at different points during a file’s use.

CLASSIFICATION BY CONCEALMENT STRATERGY (page no-655,666) Encrpted virus :- It creates random encryption key and decrypts the remainder of virus. When infected program is invoked,virus uses stored random key to decrypt the virus.

Cont.. When virus replicates,different random key is selected because bulk of virus is encrypted with different key for each instance. Stealth virus:- Its designed to hide itself from detection by antivirus software.

Cont.. Polymorphic virus:- Its mutates with every infection,making detection by “ signature ” of virus. It insert superflous instructions or interchange order of instructions. Metamorphic virus:- It mutates with every infection but at each iteration rewrite itself completely increasing difficulty of detection.

Example of stealth virus (page no-655) Virus uses compression so that infected and uninfected program are of same length. Virus places intercept logic in I/o routine when we attempt to read suspected portion of virus,present back uninfected program.

Points to remember (page no-666) Strategy of encryption virus where portion of virus is responsible for generating keys performing encryption or decryption is referred as “ mutation engine ”. Virus kits enable to create number of different viruses and create problem for antivirus schemas.

Macro viruses (page no-666) It infects ms word document or ms office. It infects documents,information introduced onto computer in form of document. It easily spreads.(electronic mail) Traditonal file system acess controls of limited use in preventing spread.

viruses (page no-656,657) First rapidly spreading virus is “ Melissa ” (made of ms word macro embedded in attachment). The virus sends itself to everyone on mailing list in user’s package. It does local damage on users system.

Cont.. Powerful version of virus appeared in 1999 that can be activated by opening rather than attachment that used scripting language.

Questions What is virus?Explain different phases of virus.Also with help of symbolic code explain virus structure. (7 mks) Write short notes on viruses.(4 mks) Explain nature of viruses and different types of viruses. (10 mks) Write short notes on computer viruses. (6 mks)

Any questions ?

Thank you