1 / 22

SEMINAR ON COMPUTER VIRUSES

SEMINAR ON COMPUTER VIRUSES. Presented By: Sritam Maikap Roll No -101056 CSE-1,Group-3. Guided By: Er.Syed Amidul Islam Er.Prasanta Ku Dash. Introduction. Computer virus have become today’s headline news With the increasing use of the Internet, it has become easier for virus to spread

nan
Télécharger la présentation

SEMINAR ON COMPUTER VIRUSES

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SEMINAR ONCOMPUTERVIRUSES Presented By: Sritam MaikapRoll No -101056CSE-1,Group-3 Guided By:Er.SyedAmidul IslamEr.Prasanta Ku Dash

  2. Introduction • Computer virus have become today’s headline news • With the increasing use of the Internet, it has become easier for virus to spread • Virus show us loopholes in software • Most virus are targeted at the MS Windows OS

  3. Definition of Virus • A virus is a small piece of software that piggybacks on real programs in order to get executed • Once it’s running, it spreads by inserting copies of itself into other executable code or documents

  4. Computer Virus Timeline • 1949:- Theories for first replicating program • 1999 The Melissa Virus • 2003 The Slammer Worm. • 2012:Trojan.Flame.A (May) • 1981:-Apple Viruses 1, 2, & 3 • 2000 The I Love You Virus • 2004 MyDoom • 2012:Rootkit.Sirefef.Gen (Nov)

  5. Virus Languages • ANSI COBOL • C/C++ • VBA • Unix Shell Scripts • JavaScript • Basically any language that works on the system that is the target

  6. Symptoms of Virus Attack • Display a message • Computer runs slower than usual • Computer no longer boots up • Screen sometimes flicker • PC speaker beeps periodically • System crashes for no reason • Files/directories sometimes disappear • Many viruses do nothing obvious at all except spread!

  7. Classification of Virus • Trojan Horse • Worms • Boot sector virus • Macro Virus • Memory Resident Virus • Logic/Time Bombs

  8. Trojan Horse • Appearance of having useful & desired Function • Neither replicates nor copies itself • Damage computer / Data destruction • Compromises the security of the computer • Gain access by another computer • Bypassing normal access control Example: • W32/Fesber.worm.gen!DE3D23CE2E52 • Trojan.Flame.A(May 28,2012)

  9. WORMS • Makes and facilitates distribution of copies itself • From one disk drive to another • Spread through Email & Networks • First worm (Morris Worm) released on Nov 2, 1988 by Robert Tappan Morris • Eg:-Bubbleboy • Mapson • Lovgate Protection : Install an update version of antivirus

  10. MACRO • uses computer networks and security holes to replicate itself • copies itself to the new machine using the security hole • to exploit the file transmission capabilities • hide in documents that are shared via e-mail or networks • avoid opening e-mails from unknown senders • Examples: Relax, Melissa.A

  11. Boot Sector Viruses • Traditional Virus • infect the boot sector on floppy disks and hard disks • By putting its code in the boot sector, a virus can guarantee it gets executed • load itself into memory immediately, and it is able to run whenever the computer is on

  12. Executable Viruses • Traditional Viruses • pieces of code attached to a legitimate program • run when the legitimate program gets executed • loads itself into memory and looks around to see if it can find any other programs on the disk

  13. E-mail Viruses • Moves around in e-mail messages • Replicates itself by automatically mailing itself to dozens of people in the victim’s e-mail address book • Example: Melissa virus, ILOVEYOU virus

  14. Virus Lifecycle Modification Birth Release Proliferation Elimination Trigger Activation Detection

  15. CURRENT ACTIVE VIRUSES Rootkit.Sirefef.Gen Spreading : MediumDamage : HighSymptoms:->Presence of unwanted popups on the infected machine->Control Handled By the AttackerTechnical Description:>kernel mode rootkit>achieved by loading a clean copy of the FlashPlayer installer>Windows Firewall is turned OffTry to disable a series of security subsystem like Windows Defender Service Windows Security Center Service Proxy Auto Discovery Service Removal Tool: http://download.bitdefender.com/removal_tools/RemovalToolUnifiedLauncher_sirefef.exe

  16. Trojan.Flame.A Spreading: Medium Damage: Very High • Multi Component Malware • able to spy, leak data, download/execute other components You can also download theremoval tool: • http://labs.bitdefender.com/2012/05/cyber-espionage-reaches-new-levels-with-flamer/ • Symptoms:Presence of the following files%windir%\\system32\\commgr32.dll%windir%\\system32\\comspol32.dll%windir%\\system32\\comspol32.ocx%windir%\\system32\\indsvc32.dll%windir%\\system32\\indsvc32.ocx%windir%\\system32\\modevga.com%windir%\\system32\\mssui.drv%windir%\\system32\\scaud32.exe%windir%\\system32\\sdclt32.exe%windir%\\system32\\watchxb.sys%windir%\\system32\\winconf32.ocx • Presence of this directory:%COMMONPROGRAMFILES%\\Microsoft Shared\\MSSecurityMgr\\

  17. Trojan.Ransom.IcePol • Spreading : Medium • Damage : Medium • Symptoms>desktop is locked by a message claiming to be from the local law enforcement agency.>The same message demands that the user pays a fine via uKash. • The presence of the following files:%USERPROFILE%\\Start Menu\\Programs\\Startup\\<reveton_filename>.dll.lnk (Windows XP)%USERPROFILE%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\<reveton_filename>dll.lnk (Windows 7) • Download the Removal Toolhttp://download.bitdefender.com/removal_tools/BDRemoval_Trojan_Ransom_IcePol.exe

  18. Ways computer viruses are spread • Email attachments • Rogue websites • Networks • Phishing Schemes • Infected Software • Hackers • Instant Messaging • Fake Anti Virus Software • Friends & Relatives

  19. Ways to Prevent Computer Viruses • Knowledge • Install a reliable Anti-virus Program • Install Anti-spyware • Avoid Suspicious Web Sites • Install a Firewall • Stay away from cracked Software • Keep operating system and all software updated/patched • Don’t believe “SECURITY ALLERTS” that you are sent • Don’t open an attachment if you are not sure

  20. REFERENCES • http://www.bitdefender.com/resourcecenter/virus-encyclopedia/ • http://home.mcafee.com/virusinfo/threat-activity • http://antivirus-software.topchoicereviews.com/types-of-viruses.html • http://www.mapcon.com/timeline-of-computer-viruses

  21. FUNNY VIRUS PROGRAMS • Lets develop some Funny and Dangerous Virus Programs Using BATCH file • Fore More virus Programs You can Visit My Web Sitewww.chintu.comuf.com

  22. CONCLUSION • Computer viruses are not evil • programmers have a right to create them, posses them and experiment with them • we should never support those people who writing viruses with destructive nature • If you do create a virus, though, be careful with ityou may wipe out your own. system by accident

More Related