1 / 28

SEMINAR ON COMPUTER VIRUS

SEMINAR ON COMPUTER VIRUS . PREPARED BY Harsh dhruv sreejit. Introduction of Virus. Len Adleman – Give the name “Virus” Definition Two types of Virus : Computer Virus Mobile Virus . Virus. A virus is a small piece of software that piggybacks on real programs.

Télécharger la présentation

SEMINAR ON COMPUTER VIRUS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SEMINAR ONCOMPUTER VIRUS PREPARED BY Harsh dhruv sreejit

  2. Introduction of Virus • Len Adleman – Give the name “Virus” • Definition • Two types of Virus : • Computer Virus • Mobile Virus

  3. Virus • A virus is a small piece of software that piggybacks on real programs

  4. E-mail viruses • An e-mail virus moves around in e-mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book. • EXAMPLE • I Love You Virus in 4-May,2000

  5. Worms • A worm is a small piece of software that uses computer networks and security holes to replicate itself. • Example • Code Red in 19 july ,2000 • It Slows Down the internet traffic while replicate itself

  6. Trojan horses • A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically. • Examples: Net Bus and Back Orifice, Sub seven

  7. Boot Sector Viruses • The boot sector is a small program that is the first part of the operating system that the computer loads. • The boot sector contains a tiny program that tells the computer how to load the rest of the operating system.

  8. Program viruses • These infect executable program files, such as those with extensions like .BIN, .COM, .EXE, .OVL, .DRV (driver) and .SYS Multipartite viruses • A hybrid of Boot and Program viruses • Examples: Invader, Flip, and Tequila

  9. Stealth viruses • These viruses use certain techniques to avoid detection • Examples: Frodo, Joshi, Whale Polymorphic viruses • These viruses are more difficult to detect.Examples: Involuntary, Stimulate, Cascade, Phoenix, Evil, Proud, Virus 101

  10. Macro Viruses • A macro virus is a new type of computer virus that infects the macros within a document or template. When you open a word processing or spreadsheet document, the macro virus is activated and it infects the Normal template (Normal. dot)-a general purpose file that stores default document formatting settings.

  11. List Of Different Viruses • 1981-First Virus in the wild • 1983-First Documental virus • 1986-Brain,PC-Write Trojan & Virden • 1987-File Infectors,Lehigh,Christmas worm • 1988-MacMag,Scores,Internet Worm • 1989-AIDS Trojan • 1990-VX BBS,Little Black Book • 1991-Tequila • 1992-Michelangelo,DAME

  12. List Of Different Viruses • 1995-Year Of Hacker • 1996-Boza,Laroux,Stog • 1998-Strange Brew, Back Orifice • 1999-Melissa,Corner,Tristate,Bubbleboy • 2000-DDos,Love Letter,Timofonica,Liberty • 2001-Gnuman,LogoLogic-A and many more… • 2002-LFM-926,Sharp-A,SQL spider etc.. • 2003-Sobig,Lovegate,Fizzer,Blaster • Trojan.Xombe,MP3Concept,Symb/Cabir-A and many more

  13. 2003,Slammer,sobig,Lovgate,Fizzer,Blaster/ Welchia/mimail • A Worm that carried its own SMTP mail program and used windows network shares to spread started year. • South Korea was eliminating from the network

  14. 2004-Trojan.Xombe,Randex,Bizex,Mp3Concept,Sasser,Mac Os X,W64.Rugrat.3344,Symb/Cabir-A,WCE/Duts,W32/Amus-A,Jpeg Weakness • Trojan.Xombe was sent out to a wide audience. It posed as a message from Microsoft Windows Update asking you to run the attached revision to XP Service Pack 1. • MP3Concept turned out to be nothing more than a bad proof-of-concept that never made it into the wild.

  15. 2004 • The proof-of-concept Worm W64.Rugrat.3344 showed up the end of May. This is claimed to be the first malware that specifically attacks 64-bit Windows files only • Symb/Cabir-A appeared to infect Nokia Series 60 mobile phones • Microsoft common .DLL file that processes the image file type and has a buffer overrun error that could allow someone to add malicious code to a JPEG image which can then open holes in an attacked system

  16. Execution Of Virus • Code attached to a common Program • Run when legitimate program gets executed • Infection phase – Replication,Floppy,Specific date • Compromise or Loss of Data • Loss of Productivity • Denial of Service • Data Manipulation • Loss of Credibility • Loss of Revenue • Embarrassment

  17. Impact and Effects • Nuisance • Spoofing • Denial of Service • Overwriting and Data diddling • Destruction • Psychological • “Netspionage” • Siphoning data • Exposing vulnerabilities • Compromise or Loss of Data • Loss of Productivity • Denial of Service • Data Manipulation • Loss of Credibility • Loss of Revenue • Embarrassment

  18. Protection Against Virus • Operating System – UNIX • Virus Protection Software • Macro Virus Protection • Précising use of Internet, Email-attachment

  19. WAP Threats • The use of WAP-enabled mobile phones is booming. Cellular phones with support for WAP (Wireless Application Protocol) allow users to access a wide variety of services. • WAP enables users to do on-line banking, monitor stock markets, use email, access the Internet – all from their mobile phones

  20. CABIR • First Mobile phone Virus • Discovered by French Arm of Jaspers Labs • Developed by Global group “No Technology is reliable and safe from their attack” • Nokia,Siemens,Sony Erickson

  21. CABIR • How it works? • Symbian OS • Caribe.sys • Bluetooth • No harmful Effect

  22. Motives • Curiosity • Challenge • To gain wide attention

  23. Virus Action • Three Logical Components of WAP Network • The WAP Client(Mobile Terminal) • The WAP Gateway • The Origin Server • More Functionality means more risk • Making phone calls • Accessing & Modifying Phone Book Data • Sending SMS • Restart phones

  24. Protection Against Virus • Antivirus Software : F-Secure Web Site • Nokia 6670 – First mobile with Virus Protection • Estimated Retail Price $613 • Two Tri-Band • Optimized for GAM Networks in the EMEA • Pricing plan for F-Secure Antivirus Protection • Protection License - $3.62 per month • Nokia offer additional Security • VPN & SSL

  25. Protection Against Virus • Shutting the Stable Door • Gateway Level Solution • WML Script Scanner • Detect and Remove malicious code • Requiring no client software

  26. Anti-virus vendors NIPC and other CERTShttp://www.nipc.gov http://www.cert.org http://www.fedcirc.govhttp://www.sans.org Virus Bulletinhttp://www.virusbtn.com The Wildlist Organizationhttp://www.wildlist.org Virus Hoax Web Sitehttp://www.vmyths.com European Institute for Computer Anti-Virus Research (EICAR)http://www.eicar.org Anti-Virus Information Exchange Network (AVIEN)http://www.avien.net Some Information Resources

  27. Additional Resources • “The Generic Virus Writer” and other papers by Sarah Gordonhttp://www.badguys.org/ • Short Course on Computer Viruses, 2nd Edition by Fred Cohen • “Free Macro Protection Techniques” by Chengi Jimmy Kuo, Network Associateshttp://download.nai.com/products/media/vil/pdf/free_AV_tips_techniques.pdf • Computer Viruses Demystifiedhttp://www.sophos.com/sophos/docs/eng/refguide/viru_ben.pdf • Viruses Revealed by Robert Slade, David Harley, et al.

  28. End of Presentation THANK YOU

More Related