POWERPOINT
 PRESENTATION
      ON

ANTI-VIRUS ENGINE
SUBMITTED BY

      SHILPA C
      CP1117

    1st semester
Msc.ComputerScience
ANTI-VIRUS ENGINE
What is a Virus?

• A virus is basically an executable file is
  designed such that of all it should be infect
  documents, then it has to have the ability
  to survive by replicating itself and then it
  should also be avoid detection.
Basics about the virus……..

• Virus is program that self-replicate.
• Virus is not a data.
• You can only catch the virus by running a
  program.
• Your computer can run all kinds of programs.
• Most viruses are difficult to detect.
• Computer viruses not inherently destructive.
• Viruses are designed to corrupt or delete
  data on the hard disk.
Types of viruses

1. File or program virus.
2. Boot Sector Virus (MBR or Master Boot
  Record).
3. Multipartite Virus.
4. Stealth Virus.
5. Polymorphic Virus.
6. Macro Virus.
Functional elements of virus.

                              virus


                      Anti detection routines




                search                          copy




Fig 1.Functional diagram of a virus.
NOTES
• Every visible computer virus must have at
  least 2 basic parts (subroutine).
       1.A search routine
       2.A copy routine
       3.An anti-detection routine
Virus In Detail…..
1.File or program virus
         some programs are in disguise ,when
  they load the memory along with the
  program and perform some steps and
  infect the system. They infect the program
  files like
          .COM, .BIN, .DRV, .EXE AND .SYS.
sp
             Stack area                   FFFFH

           Uninitialized data




             COM file image




  ip                              100 H
                 PSP

                                   OH

cs=ds=es=ss
         • Fig 2. Memory map just before executing a COM file.
BEFORE                                  AFTER




                                                   mov dx,257H


                                                     Timed virus




             Uninfected host COM
             file
                                                  Infected host COM file




                                                 Jmp 154AH
100H       mov dx , 257 H                                                  100H


Fig 3.Replacing the first bytes in a COM file.
EXE File Header



                           Relocation pointer table




                              EXE Load module




Fig 4.The layout of an EXE File
2. Boot sector virus

• Boot sector virus can be the simplest or
  the most sophisticated of all computer
Viruses.
•Boot sector is the first code to gain
control after the ROM startup.
•It is very difficult to stop before it loads.
3.Multipartite virus

•A hybrid verity virus.
•Only infects files and boot sector.
•More destructive.
•More difficult to remove.
•Once it infect to the boot sector it never
stops.
•Example: invader,Flip.
4.Stealth virus
•They are stealth in nature.
•They have various methods to hide
themselves.
•They highly avoid detection.
•Sometimes they reduce the file size
sometimes increases.
•Though it try to avoid detection from
scanners.
•Example: whale virus.
5.Polymorphic virus

•They are the most difficult virus to detect.
•They have the ability to mutate.
•Anti viruses which look for the specific virus
code are not able to detect such viruses.
6.Macro virus

•A macro is an executable program
embedded in a word processing
document or other type of file.
•Once the macro is running it can copy to
other documents, deleting files etc.
•Example: Have a Nice Day, concept.
Anti-virus Engine
Anti-virus engine designed for detecting
Trojans, viruses, malware and other
malicious threats. It is the de facto
standard for mail gateway scanning. It
provides a high performance mutli-
threaded scanning daemon, command
line utilities for on demand file scanning,
and an intelligent tool for automatic
signature updates.
Anti-virus Approaches
• Detection

• Identification

• Removal
Anti-virus Techniques
• Scanars

• Monitors

• Integrity Checking
Basic virus defense
• Install antivirus softwares.
• Do not open e-mail attachments.
• Do not install new programs without first
  notifying IT.
• Install a firewall on your workstation.
• Scan your system regularly.
• Do not visit unauthorized web sites.
Thank You………

More Related Content

PPTX
Unix Operating System
PPT
Chapter 3
PPS
Shyam prajapat presentation virus
PPT
Unix lecture1
PPTX
UNIX Operating System
PDF
Booting & shut down,
PPT
Linux Device Driver Introduction
Unix Operating System
Chapter 3
Shyam prajapat presentation virus
Unix lecture1
UNIX Operating System
Booting & shut down,
Linux Device Driver Introduction

What's hot (20)

PPT
PPTX
WELCOME TO THE CORE OF UNIX OPERATING SYSTEM
PPTX
Android bootup process
PPTX
Booting Process OS
PPT
Windows V/S Linux OS - Comparison
PPTX
Boot process
PPTX
The Boot Process
PPTX
Introduction to computer lec (4)
PDF
MNSEC 2018 - Windows forensics
PPTX
Operating systems unix
ODP
5. boot process
PDF
Ubuntu OS Presentation
PPTX
Linux booting sequence
PPT
Ch1 linux basics
PDF
Ms dos boot process
PDF
Linux Kernel Exploitation
PPTX
Linux booting process - Linux System Administration
PPTX
Linux booting process!!
PDF
Unix shell programming intro-part-1
PPT
Presentation
WELCOME TO THE CORE OF UNIX OPERATING SYSTEM
Android bootup process
Booting Process OS
Windows V/S Linux OS - Comparison
Boot process
The Boot Process
Introduction to computer lec (4)
MNSEC 2018 - Windows forensics
Operating systems unix
5. boot process
Ubuntu OS Presentation
Linux booting sequence
Ch1 linux basics
Ms dos boot process
Linux Kernel Exploitation
Linux booting process - Linux System Administration
Linux booting process!!
Unix shell programming intro-part-1
Presentation
Ad

Viewers also liked (6)

DOCX
програма семінару
PDF
Learn BEM: CSS Naming Convention
PPTX
How to Build a Dynamic Social Media Plan
PDF
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
PDF
SEO: Getting Personal
PDF
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
програма семінару
Learn BEM: CSS Naming Convention
How to Build a Dynamic Social Media Plan
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
SEO: Getting Personal
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Ad

Similar to Antivirus engine (20)

PPT
Lecture 12 malicious software
PPTX
Viruses & worms
PPT
6unit1 virus and their types
PPT
Computer Virus
PPTX
Kinds of Viruses
PPTX
MALWARE UNIT 1 PPT.pptx...This covers about Malware Nomenclature and its types
PPTX
Virus vs worms vs trojans
PPT
Computer Virus
PPTX
Virus and Worms
PPT
Isys20261 lecture 05
PPT
Introduction to Malware - Part 1
PPTX
Virus and its CounterMeasures -- Pruthvi Monarch
PPT
Computer virus
PPTX
How do antivirus works
PPT
Computer virus_the_things_u_must_know_
PDF
Malicious software
PPS
Viruses and Anti-Viruses
PPSX
Computer viruses
Lecture 12 malicious software
Viruses & worms
6unit1 virus and their types
Computer Virus
Kinds of Viruses
MALWARE UNIT 1 PPT.pptx...This covers about Malware Nomenclature and its types
Virus vs worms vs trojans
Computer Virus
Virus and Worms
Isys20261 lecture 05
Introduction to Malware - Part 1
Virus and its CounterMeasures -- Pruthvi Monarch
Computer virus
How do antivirus works
Computer virus_the_things_u_must_know_
Malicious software
Viruses and Anti-Viruses
Computer viruses

Antivirus engine

  • 1. POWERPOINT PRESENTATION ON ANTI-VIRUS ENGINE
  • 2. SUBMITTED BY SHILPA C CP1117 1st semester Msc.ComputerScience
  • 4. What is a Virus? • A virus is basically an executable file is designed such that of all it should be infect documents, then it has to have the ability to survive by replicating itself and then it should also be avoid detection.
  • 5. Basics about the virus…….. • Virus is program that self-replicate. • Virus is not a data. • You can only catch the virus by running a program. • Your computer can run all kinds of programs. • Most viruses are difficult to detect. • Computer viruses not inherently destructive. • Viruses are designed to corrupt or delete data on the hard disk.
  • 6. Types of viruses 1. File or program virus. 2. Boot Sector Virus (MBR or Master Boot Record). 3. Multipartite Virus. 4. Stealth Virus. 5. Polymorphic Virus. 6. Macro Virus.
  • 7. Functional elements of virus. virus Anti detection routines search copy Fig 1.Functional diagram of a virus.
  • 8. NOTES • Every visible computer virus must have at least 2 basic parts (subroutine). 1.A search routine 2.A copy routine 3.An anti-detection routine
  • 9. Virus In Detail….. 1.File or program virus some programs are in disguise ,when they load the memory along with the program and perform some steps and infect the system. They infect the program files like .COM, .BIN, .DRV, .EXE AND .SYS.
  • 10. sp Stack area FFFFH Uninitialized data COM file image ip 100 H PSP OH cs=ds=es=ss • Fig 2. Memory map just before executing a COM file.
  • 11. BEFORE AFTER mov dx,257H Timed virus Uninfected host COM file Infected host COM file Jmp 154AH 100H mov dx , 257 H 100H Fig 3.Replacing the first bytes in a COM file.
  • 12. EXE File Header Relocation pointer table EXE Load module Fig 4.The layout of an EXE File
  • 13. 2. Boot sector virus • Boot sector virus can be the simplest or the most sophisticated of all computer Viruses. •Boot sector is the first code to gain control after the ROM startup. •It is very difficult to stop before it loads.
  • 14. 3.Multipartite virus •A hybrid verity virus. •Only infects files and boot sector. •More destructive. •More difficult to remove. •Once it infect to the boot sector it never stops. •Example: invader,Flip.
  • 15. 4.Stealth virus •They are stealth in nature. •They have various methods to hide themselves. •They highly avoid detection. •Sometimes they reduce the file size sometimes increases. •Though it try to avoid detection from scanners. •Example: whale virus.
  • 16. 5.Polymorphic virus •They are the most difficult virus to detect. •They have the ability to mutate. •Anti viruses which look for the specific virus code are not able to detect such viruses.
  • 17. 6.Macro virus •A macro is an executable program embedded in a word processing document or other type of file. •Once the macro is running it can copy to other documents, deleting files etc. •Example: Have a Nice Day, concept.
  • 18. Anti-virus Engine Anti-virus engine designed for detecting Trojans, viruses, malware and other malicious threats. It is the de facto standard for mail gateway scanning. It provides a high performance mutli- threaded scanning daemon, command line utilities for on demand file scanning, and an intelligent tool for automatic signature updates.
  • 19. Anti-virus Approaches • Detection • Identification • Removal
  • 20. Anti-virus Techniques • Scanars • Monitors • Integrity Checking
  • 21. Basic virus defense • Install antivirus softwares. • Do not open e-mail attachments. • Do not install new programs without first notifying IT. • Install a firewall on your workstation. • Scan your system regularly. • Do not visit unauthorized web sites.