SlideShare a Scribd company logo
VIRUS and its
Countermeasures
Presented By,
G Pruthvi Raj
1041310102
System Security
Points to be discussed in the seminar
Let`s start!
1
2
3
4
Malicious Software
Viruses
Operation modes and Structure
Types Of Viruses
Real Time virus Attacks
Host and Independent
5
6
7
Virus Countermeasures
Prevention Of Viruses & Malicious Softwares
Digital Immune System
Emulation & virus detection
BEHAVIOURAL BLOCKING SOFTWARE
Antivirus Software programs
Conclusion
Thank you for your attention
Malicious Software
Viruses
• Virus - Vital Information Resources Under Seize
• A virus is a malware program that, when executed, replicates by
inserting copies of itself (possibly modified) into other computer
programs, data files, or the boot sector of the hard drive;
• when this replication succeeds, the affected areas are then said to be
"infected".
• A piece of self-replicating code attached to some other code
• both propagates itself & carries a payload
• carries code to make copies of itself
• as well as code to perform some covert task
• They executes secretly when host program is run
Virus Operation
• Virus phases:
• dormant – waiting on trigger event
• propagation – replicating to programs/disks
• triggering – by event to execute payload
• execution – of payload
• Details usually machine/OS specific
• exploiting features/weaknesses
Virus Structure
program V :=
{ goto main;
1234567;
subroutine infect-executable := {loop:
file := get-random-executable-file;
if (first-line-of-file = 1234567) then goto loop
else prepend V to file; }
subroutine do-damage := {whatever damage is to be done}
subroutine trigger-pulled := {return true if some condition holds}
main: main-program := {infect-executable;
if trigger-pulled then do-damage;
goto next;}
next:
}
Types of Virus
M
MR
Pol A2
P
Stealth Virus
Polymorhic Virus
Parasitic Virus
Residents in the memory for
longer time
Macro virus
macro code attached to some
data file
.
www.yourwebsite.comIDEA
Memory Resident Virus
Macro Virus
• macro code attached to some data file
• interpreted by program using file
• eg Word/Excel macros
• esp. using auto command & command macros
• code is now platform independent
• is a major source of new viral infections
• blurs distinction between data and program files making task of
detection much harder
• classic trade-off: "ease of use" vs "security"
Email Virus
• spread using email with attachment containing a macro virus
• cf Melissa
• triggered when user opens attachment
• or worse even when mail viewed by using scripting features in mail
agent
• usually targeted at Microsoft Outlook mail agent & Word/Excel
documents
Trojan Horse
• Program with hidden side-effects
• Which is usually superficially attractive
• eg game, s/w upgrade etc
• When run performs some additional tasks
• allows attacker to indirectly gain access they do not have directly
• Often used to propagate a virus/worm or install a backdoor
• or simply to destroy data
What Trojans can do?
Modification or deletion of files.
Data theft(e.g. retrieving username or postal code information)
Erasing or overwriting data on a computer.
Encrypting files in a crypto viral extortion attack.
Crashing the computer.
Corrupting files in a subtle way.
Setting up networks of zombie computers in order to launch Dodos
attacks or send spam.
Typical things that some current Personal
Computer (PC) viruses do
• Display a message.
• Erase files
• Scramble data on a hard disk
• Cause erratic screen behavior
• Halt the PC
• Many viruses do nothing obvious at all except spread!
Morris Worm
• best known classic worm
• released by Robert Morris in 1988
• targeted Unix systems
• using several propagation techniques
• simple password cracking of local pw file
• exploit bug in finger daemon
• exploit debug trapdoor in sendmail daemon
• if any attack succeeds then replicated self
Recent Malacious Attacks
• new spate of attacks from mid-2001
• Code Red
• exploited bug in MS IIS to penetrate & spread
• probes random IPs for systems running IIS
• had trigger time for denial-of-service attack
• 2nd wave infected 360000 servers in 14 hours
• Code Red 2
• had backdoor installed to allow remote control
• Nimda
• used multiple infection mechanisms
• email, shares, web client, IIS, Code Red 2 backdoor
Virus Countermeasures
• viral attacks exploit lack of integrity control on systems
• to defend need to add such controls
• typically by one or more of:
• prevention - block virus infection mechanism
• detection - of viruses in infected system
• reaction - restoring system to clean state
Virus removal techique
VIRUS DETECTION VIRUS IDENTIFICATION VIRUS REMOVAL
Advanced Anti-Virus Techniques
• generic decryption
• use CPU simulator to check program signature & behavior before actually
running it
• digital immune system (IBM)
• general purpose emulation & virus detection
• any virus entering org is captured, analyzed, detection/shielding created for it,
removed
DIGITAL IMMUNE SYSTEM
• Developed by IBM and refined by Symantec.
• Motivation: Internet based virus propagation.
• Antivirus was updated monthly.
• Two major trends in Internet technology have had an increasing
impact on rate of virus propagation:
• INTEGRATED MAIL SYSTEMS: Microsoft outlook, Lotus notes.
• MOBILE-PROGRAM SYSTEMS: JAVA and ActiveX.
Virus and its CounterMeasures                         -- Pruthvi Monarch
BEHAVIOURAL BLOCKING SOFTWARE
• It integrates with the operating system of host computer and
monitors program behavior in real-time for malicious actions.
• It blocks malicious actions before they affect the system.
• Monitored behavior may include:
• Attempts to open , view, delete or modify the files.
• To format disk drives.
• Modifications to the logic of executable files.
• Modifications to the startup settings.
• Scripting of e-mail.
CONCLUSION
In order to countermeasure the threats of virus , the user
should:
• Installing Anti-virus Applications.
• Often Get the data drive Scan and analyzed.
• Gaining basic knowledge about the way virus work.
• Installing Basic internet Security Applications.
CounterMeasures
V
T
03
04
Trojans
SandBoxing , Usage of
Firewalls
Adware
Anti-Malware Softwares
And
Browser Reset Techiques.
Worms
Firewalls , Antivirus and Spyware softwares.
VIRUS
Virus Detection, Prevention , Antivirus Softwares
www.yourwebsite.comIDEA
Difference Between Virus,Worms & Trojans
Definition
VIRUS
A computer
virus attaches
itself it travels
to a
program or file
enabling it to
spread from
one computer
to another,
leaving
infections
WORMS
A computer
WORM is a self-
contained
program (or set
of programs), that
is able to spread
functional copies
of itself or its
segments to
other computer
systems (usually
via network
connections).
TROJANS
A Trojan, is
software that
appears to
perform a
desirable
function for the
user prior to
run or install,
but steals
information or
harms the
system
TYPES
VIRUS
1.Trojan Horse
2.Worm
3.Macro
WORMS
1. “host
computer
worms” &
2.”network
worms”.
TROJANS
1.Remote
Access Trojans
2.Data Sending
Trojans
3.Destructive
Trojans
4.Proxy Trojans
5.FTP Trojans
6.security
software
disabler
Trojans
7.DoS Trojans
What they
do?
VIRUS
virus may exist on
your computer
but it actually
cannot infect your
computer unless
you run or open
the malicious
program
WORMS
the worm
consumes too
much system
memory (or
network
bandwidth),
causing Web
servers, network
servers and
individual
computers to stop
responding
TROJANS
cause serious
damage by
deleting files and
destroying
information on
your system.
EXISTENCE NOT
INDEPENDENT
NOT
INDEPENDENT
INDEPENDENT
SELF-
REPLICATION
VIRUS
. A virus attaches
itself to, and
becomes part of,
another
executable
program
WORMS
a worm is self-
contained and
does not need to
be part of
another program
to propagate
itself.
TROJANS
Unlike virus and
worms
Trojans do not
reproduce by
infecting other
files nor do they
self-replicate.
Propagation
VIRUS
virus does not
have a
propagation
vector. i.e., it
will only effect
one host and
does not
propagate to
other hosts.
WORMS
Worms propagate
and infect other
computers.
TROJANS
. Trojans are also
known to create
a backdoor on
your computer
that gives
malicious users
access to your
system, possibly
allowing
confidential or
personal
information to
be compromised
EXAMPLES
VIRUS
Melissa
WORMS
Nimda,
Code Red
TROJANS
I Love You
Thank
you!

More Related Content

PDF
Network security - OSI Security Architecture
PPT
Network security cryptography ppt
PDF
PDF
Web Security
PPT
Counter Measures Of Virus
PPT
3. distributed file system requirements
PPTX
Security threats and safety measures
PPTX
SHA- Secure hashing algorithm
Network security - OSI Security Architecture
Network security cryptography ppt
Web Security
Counter Measures Of Virus
3. distributed file system requirements
Security threats and safety measures
SHA- Secure hashing algorithm

What's hot (20)

PPTX
OSI Security Architecture
PPT
Intrusion detection system ppt
PPT
Secure Socket Layer
PDF
Network Security Fundamentals
PPT
Email Security : PGP & SMIME
PPTX
Program security
PDF
Malicious software
PPT
Authentication Protocols
PDF
Authentication techniques
PPTX
Substitution techniques
PPT
Keyloggers and Spywares
PPTX
Virtualization in cloud computing
PDF
IP Security
PPT
Network Security Threats and Solutions
PPTX
Operating system security
PPT
Cloud Security
PPTX
directory structure and file system mounting
PPTX
DoS or DDoS attack
PPTX
Cryptography and network security
OSI Security Architecture
Intrusion detection system ppt
Secure Socket Layer
Network Security Fundamentals
Email Security : PGP & SMIME
Program security
Malicious software
Authentication Protocols
Authentication techniques
Substitution techniques
Keyloggers and Spywares
Virtualization in cloud computing
IP Security
Network Security Threats and Solutions
Operating system security
Cloud Security
directory structure and file system mounting
DoS or DDoS attack
Cryptography and network security
Ad

Viewers also liked (20)

PPTX
Common malware and countermeasures
DOCX
Texto martha
PPTX
We see a silver lining for telecom bc
DOC
PDF
Antigona
PDF
Joseph nye
PPSX
Numeri primi
PDF
the-m1r4cle-of-th3ism-arguments-for-and-against-the-ex1stence-of-g0d-j-l-mackie
PDF
PDF
Black Hat Europe 2015 - Time and Position Spoofing with Open Source Projects
PDF
2014年HFD硬件自由日活动清华站-GNURadio x HackRF - 王康 / scateu
PDF
コワーキングスペースYou+の紹介 - PechaKucha資料 - こすぎの大学
PPTX
fishbone diagram
PDF
MR201504 Web Defacing Attacks Targeting WordPress
PDF
State of art T-50
PDF
Stealth
PPTX
Actividad unidad 3 herramientas TIC
DOCX
Documentos Conferencia Municipal Mogi das Cruzes
PPTX
Suomi1
DOCX
Regimento Interno 2016
Common malware and countermeasures
Texto martha
We see a silver lining for telecom bc
Antigona
Joseph nye
Numeri primi
the-m1r4cle-of-th3ism-arguments-for-and-against-the-ex1stence-of-g0d-j-l-mackie
Black Hat Europe 2015 - Time and Position Spoofing with Open Source Projects
2014年HFD硬件自由日活动清华站-GNURadio x HackRF - 王康 / scateu
コワーキングスペースYou+の紹介 - PechaKucha資料 - こすぎの大学
fishbone diagram
MR201504 Web Defacing Attacks Targeting WordPress
State of art T-50
Stealth
Actividad unidad 3 herramientas TIC
Documentos Conferencia Municipal Mogi das Cruzes
Suomi1
Regimento Interno 2016
Ad

Similar to Virus and its CounterMeasures -- Pruthvi Monarch (20)

PDF
Malicious software
PPTX
Final malacious softwares
PPTX
Presentation_malware_anti_malware.pptx
PPT
Virus project
PPTX
Viruses and virus countetmeasures
PPT
6unit1 virus and their types
PPT
PPT
Malicious
PPT
Unit - 5.ppt
PPT
Iss lecture 9
PPT
Computer Virus
ODP
Viruses andthreats@dharmesh
PPTX
Malware & Anti-Malware
PDF
malwareanti-malware-160630191004 (1).pdf
PPTX
Virus vs anti virus
PPTX
Virus and antivirus
PPT
About Malwares and how to avoide them. suitable for fundamentals of ICT.ppt
PPTX
Virus vs worms vs trojans
PPT
Computer virus
Malicious software
Final malacious softwares
Presentation_malware_anti_malware.pptx
Virus project
Viruses and virus countetmeasures
6unit1 virus and their types
Malicious
Unit - 5.ppt
Iss lecture 9
Computer Virus
Viruses andthreats@dharmesh
Malware & Anti-Malware
malwareanti-malware-160630191004 (1).pdf
Virus vs anti virus
Virus and antivirus
About Malwares and how to avoide them. suitable for fundamentals of ICT.ppt
Virus vs worms vs trojans
Computer virus

Recently uploaded (20)

PPTX
Cell Structure & Organelles in detailed.
PPTX
master seminar digital applications in india
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Cell Types and Its function , kingdom of life
PDF
Basic Mud Logging Guide for educational purpose
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Complications of Minimal Access Surgery at WLH
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
RMMM.pdf make it easy to upload and study
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Classroom Observation Tools for Teachers
PPTX
Institutional Correction lecture only . . .
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Business Ethics Teaching Materials for college
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Microbial diseases, their pathogenesis and prophylaxis
Cell Structure & Organelles in detailed.
master seminar digital applications in india
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Cell Types and Its function , kingdom of life
Basic Mud Logging Guide for educational purpose
PPH.pptx obstetrics and gynecology in nursing
Complications of Minimal Access Surgery at WLH
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
RMMM.pdf make it easy to upload and study
O7-L3 Supply Chain Operations - ICLT Program
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Classroom Observation Tools for Teachers
Institutional Correction lecture only . . .
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Business Ethics Teaching Materials for college
Supply Chain Operations Speaking Notes -ICLT Program
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Anesthesia in Laparoscopic Surgery in India
Final Presentation General Medicine 03-08-2024.pptx
Microbial diseases, their pathogenesis and prophylaxis

Virus and its CounterMeasures -- Pruthvi Monarch

  • 1. VIRUS and its Countermeasures Presented By, G Pruthvi Raj 1041310102
  • 2. System Security Points to be discussed in the seminar Let`s start!
  • 3. 1 2 3 4 Malicious Software Viruses Operation modes and Structure Types Of Viruses Real Time virus Attacks Host and Independent
  • 4. 5 6 7 Virus Countermeasures Prevention Of Viruses & Malicious Softwares Digital Immune System Emulation & virus detection BEHAVIOURAL BLOCKING SOFTWARE Antivirus Software programs Conclusion Thank you for your attention
  • 6. Viruses • Virus - Vital Information Resources Under Seize • A virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; • when this replication succeeds, the affected areas are then said to be "infected". • A piece of self-replicating code attached to some other code • both propagates itself & carries a payload • carries code to make copies of itself • as well as code to perform some covert task • They executes secretly when host program is run
  • 7. Virus Operation • Virus phases: • dormant – waiting on trigger event • propagation – replicating to programs/disks • triggering – by event to execute payload • execution – of payload • Details usually machine/OS specific • exploiting features/weaknesses
  • 8. Virus Structure program V := { goto main; 1234567; subroutine infect-executable := {loop: file := get-random-executable-file; if (first-line-of-file = 1234567) then goto loop else prepend V to file; } subroutine do-damage := {whatever damage is to be done} subroutine trigger-pulled := {return true if some condition holds} main: main-program := {infect-executable; if trigger-pulled then do-damage; goto next;} next: }
  • 9. Types of Virus M MR Pol A2 P Stealth Virus Polymorhic Virus Parasitic Virus Residents in the memory for longer time Macro virus macro code attached to some data file . www.yourwebsite.comIDEA Memory Resident Virus
  • 10. Macro Virus • macro code attached to some data file • interpreted by program using file • eg Word/Excel macros • esp. using auto command & command macros • code is now platform independent • is a major source of new viral infections • blurs distinction between data and program files making task of detection much harder • classic trade-off: "ease of use" vs "security"
  • 11. Email Virus • spread using email with attachment containing a macro virus • cf Melissa • triggered when user opens attachment • or worse even when mail viewed by using scripting features in mail agent • usually targeted at Microsoft Outlook mail agent & Word/Excel documents
  • 12. Trojan Horse • Program with hidden side-effects • Which is usually superficially attractive • eg game, s/w upgrade etc • When run performs some additional tasks • allows attacker to indirectly gain access they do not have directly • Often used to propagate a virus/worm or install a backdoor • or simply to destroy data
  • 13. What Trojans can do? Modification or deletion of files. Data theft(e.g. retrieving username or postal code information) Erasing or overwriting data on a computer. Encrypting files in a crypto viral extortion attack. Crashing the computer. Corrupting files in a subtle way. Setting up networks of zombie computers in order to launch Dodos attacks or send spam.
  • 14. Typical things that some current Personal Computer (PC) viruses do • Display a message. • Erase files • Scramble data on a hard disk • Cause erratic screen behavior • Halt the PC • Many viruses do nothing obvious at all except spread!
  • 15. Morris Worm • best known classic worm • released by Robert Morris in 1988 • targeted Unix systems • using several propagation techniques • simple password cracking of local pw file • exploit bug in finger daemon • exploit debug trapdoor in sendmail daemon • if any attack succeeds then replicated self
  • 16. Recent Malacious Attacks • new spate of attacks from mid-2001 • Code Red • exploited bug in MS IIS to penetrate & spread • probes random IPs for systems running IIS • had trigger time for denial-of-service attack • 2nd wave infected 360000 servers in 14 hours • Code Red 2 • had backdoor installed to allow remote control • Nimda • used multiple infection mechanisms • email, shares, web client, IIS, Code Red 2 backdoor
  • 17. Virus Countermeasures • viral attacks exploit lack of integrity control on systems • to defend need to add such controls • typically by one or more of: • prevention - block virus infection mechanism • detection - of viruses in infected system • reaction - restoring system to clean state
  • 18. Virus removal techique VIRUS DETECTION VIRUS IDENTIFICATION VIRUS REMOVAL
  • 19. Advanced Anti-Virus Techniques • generic decryption • use CPU simulator to check program signature & behavior before actually running it • digital immune system (IBM) • general purpose emulation & virus detection • any virus entering org is captured, analyzed, detection/shielding created for it, removed
  • 20. DIGITAL IMMUNE SYSTEM • Developed by IBM and refined by Symantec. • Motivation: Internet based virus propagation. • Antivirus was updated monthly. • Two major trends in Internet technology have had an increasing impact on rate of virus propagation: • INTEGRATED MAIL SYSTEMS: Microsoft outlook, Lotus notes. • MOBILE-PROGRAM SYSTEMS: JAVA and ActiveX.
  • 22. BEHAVIOURAL BLOCKING SOFTWARE • It integrates with the operating system of host computer and monitors program behavior in real-time for malicious actions. • It blocks malicious actions before they affect the system. • Monitored behavior may include: • Attempts to open , view, delete or modify the files. • To format disk drives. • Modifications to the logic of executable files. • Modifications to the startup settings. • Scripting of e-mail.
  • 23. CONCLUSION In order to countermeasure the threats of virus , the user should: • Installing Anti-virus Applications. • Often Get the data drive Scan and analyzed. • Gaining basic knowledge about the way virus work. • Installing Basic internet Security Applications.
  • 24. CounterMeasures V T 03 04 Trojans SandBoxing , Usage of Firewalls Adware Anti-Malware Softwares And Browser Reset Techiques. Worms Firewalls , Antivirus and Spyware softwares. VIRUS Virus Detection, Prevention , Antivirus Softwares www.yourwebsite.comIDEA
  • 25. Difference Between Virus,Worms & Trojans Definition VIRUS A computer virus attaches itself it travels to a program or file enabling it to spread from one computer to another, leaving infections WORMS A computer WORM is a self- contained program (or set of programs), that is able to spread functional copies of itself or its segments to other computer systems (usually via network connections). TROJANS A Trojan, is software that appears to perform a desirable function for the user prior to run or install, but steals information or harms the system
  • 26. TYPES VIRUS 1.Trojan Horse 2.Worm 3.Macro WORMS 1. “host computer worms” & 2.”network worms”. TROJANS 1.Remote Access Trojans 2.Data Sending Trojans 3.Destructive Trojans 4.Proxy Trojans 5.FTP Trojans 6.security software disabler Trojans 7.DoS Trojans
  • 27. What they do? VIRUS virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program WORMS the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding TROJANS cause serious damage by deleting files and destroying information on your system. EXISTENCE NOT INDEPENDENT NOT INDEPENDENT INDEPENDENT
  • 28. SELF- REPLICATION VIRUS . A virus attaches itself to, and becomes part of, another executable program WORMS a worm is self- contained and does not need to be part of another program to propagate itself. TROJANS Unlike virus and worms Trojans do not reproduce by infecting other files nor do they self-replicate.
  • 29. Propagation VIRUS virus does not have a propagation vector. i.e., it will only effect one host and does not propagate to other hosts. WORMS Worms propagate and infect other computers. TROJANS . Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised