ANTIVIRUS ANTIVIRUS Author: Somnath G. Kavalase Junior Software developer at PBWebvsion PVT.LTD.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

September,2012 Managing Files and Folders 4/23/2015 Compiled By:- Solomon W. Demissie 1.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
3 Section C: Installing Software and Upgrades  Web Apps  Mobile Apps  Local Applications  Portable Software  Software Upgrades and Updates  Uninstalling.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
LittleOrange Internet Security an Endpoint Security Appliance.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
By Hassan Abu daqen & montaser elsabe3 & Nidal Abu saif.
Project By Ben Woodard ISC 110 Professor: Dr. Elaine Wenderholm.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
No.24 Prerawat Denvutivorkarn M.2/2. Definition: "antivirus" is protective software designed to defend your computer against malicious software. Malicious.
GROUP MEMBERS ALI RAZA EHTASHAM ZAFAR SOHAIB AHMED BILAL HASSAN FAHAD ABDUL AZIZ.
Summary Notes TERM TWO BASIC SEVEN 7 Prepared by Sir Lexis Oppong Prepared by Sir Lexis Oppong ACADEMIC YEAR 2013/2014 ACADEMIC YEAR 2013/2014.
What is it, how does it work, and why is it important?
Beyond Anti-Virus by Dan Keller Fred Cohen- Computer Scientist “there is no algorithm that can perfectly detect all possible computer viruses”
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Hacker Zombie Computer Reflectors Target.
Virus & Anti-Virus Itthiwat Phiphopsukhawadee M.2/7 No.5 Saranpat Prasertthum M.2/7 No.17 Korakrit Laotrakul M.2/7 No.23 Pesan Kasemkitjanuwat M.2/7 No.25.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
Malware Adware Removal Best Free Malware Virus Protection Best Free Malware Adware Removal Service Best free Anti Spyware Removal Service Best free Trojan.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
Spyware, Viruses and Malware What the fuss is all about.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
By Alexander smart. What is a viruses ? A Computer Virus is a software program that is designed to copy itself over and over again. Viruses do NOT damage.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
信息处理技术 Technology of Information Processing 潘晟旻 Instructor: Pan Shengmin 潘晟旻 Computer Center. Kun Ming University of Science & Technology.
Return to the PC Security web page Lesson 5: Dealing with Malware.
For any query mail to or BITS Pilani Lecture # 1.
COMPUTER VIRUS.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
THIS powerPOINT Is ABOUT virus’s AND OTHER Harmful RISKS.
Malicious Logic and Defenses. Malicious Logic Trojan Horse – A Trojan horse is a program with an overt (documented or known) effect and covert (undocumented.
Submitted By :- Neeraj Kumar Singh Branch :Electronics&communication Topic : computer Viruses Submitted to :- Ms. Veena Gupta.
CONTENTS What is Virus ? Types of computer viruses.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Business Technology Applications What is Malware.
W elcome to our Presentation. Presentation Topic Virus.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Protecting Your PC. Malware Virus Trojan Spyware Worm Rootkit Browser Hijacker With or Without AV software, ALL computers that have access to the internet.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
Information Systems Design and Development Security Precautions Computing Science.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Protecting Computers From Viruses and Similarly Programmed Threats Ryan Gray COSC 316.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
bitdefender virus protection
Chapter Objectives In this chapter, you will learn:
Malicious Software There are various sources via whom a malicious software can enter a system most common of which is through internet sites not only this.
Chap 10 Malicious Software.
BASIC SOFTWARE MAINTENANCE
Chap 10 Malicious Software.
Malicious Program and Protection
Presentation transcript:

ANTIVIRUS ANTIVIRUS Author: Somnath G. Kavalase Junior Software developer at PBWebvsion PVT.LTD.

What is Virus ? Sources of virus Types of virus What is Antivirus ? Antivirus Features Virus Identification Methods  Signature Based Detection  Heuristic Based Detection

What is Virus ? We define a computer 'virus' as a program that can 'infect' other programs by modifying them to include a possibly evolved copy of itself Every program that gets infected may also act as a virus and thus the infection grows Viruses mostly corrupt data and interfere with the performance of hardware and software

Sources of virus? Flash Drive Floppy Disk CD/DVD Pirated Software Internet/FTP LAN/File Sharing

Types of Virus Boot viruses Program viruses Multipartite viruses Stealth viruses Polymorphic viruses Macro viruses Active X viruses Trojan / Trojan Horse – Back Orifice Worm – Red Code

What is Antivirus? computer software used to prevent, detect and remove malicious computer viruses Most software described as antivirus also works against other types of malware, such as malicious Browser Helper Objects (BHOs), browser hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious adware and spyware example of antivirus are Avast, BitDefender, AVG, Nod32, ZoneAlarm, and Kaspersky

Features of Antivirus Real time Scanner On-access Scanner On-Demand Scanner Heuristic Scanner Compressed File Scanner Scheduled Scans Script Blocking POP3 Scanning Webmail Protection Instant Messaging Protection Automatic Virus Updates Automatic Program Updates

Virus Identification Methods Signature Based Detection: ◦ uses key aspects of an examined file to create a static fingerprint of known malware ◦ To identify viruses and other malware, antivirus software compares the contents of a file to a dictionary of virus signatures ◦ A signature is an algorithm or hash (a number derived from a string of text) that uniquely identifies a specific virus ◦ Format: | 0095C3A4|STONED.LESZOP.A 0086C7BE|STONED.MARCH6.A

Signature based Scan Working Search Memory Search File Search Content Based Icon Based Registry Search

Database Design To store the virus signature a collection of flat file can used and the attributes are separated by each other using pipeline “ | ‘’ symbol Some Example are mentioned below, 5B110B72|DENZUK.E 5B0DE15C|PINGPONG.A 5BEB04FF|WIN95.TWINNY B807327|WIN32.BOLZANO B33914C|GENE.948 Where the first portion before ‘|’ (Pipeline), is used virus signature in CRC16 form and another portion is mentioned as virus code name

Limitations: A major limitation of signature-based detection is that, by itself, this method is unable to flag malicious files for which signatures have not yet been developed With this in mind, modern attackers frequently mutate their creations to retain malicious functionality by changing the file’s signature

Heuristic Based Detection Method A heuristic scan is used to detect new, unknown viruses in the system that have not yet been identified Heuristic analysis is an expert based analysis that determines the susceptibility of a system towards particular threat/risk using various decision rules or weighing methods Heuristic method identifies a general signature rather than a specific signature for a particular virus

Working of Heuristic based method Virus detection is based on recognition of a signature or string of code which identifies a certain virus to detect an unknown virus, a particular signature or recognized code does not yet exist. For this reason a heuristic scan is used Heuristic methods are based on the piece-by-piece examination of a virus, looking for a sequence or sequences of instructions that differentiate the virus from ‘normal’ programs.

Advantages and Limitations The principle advantage of this method is the ability to detect known and unknown viruses, based on common characteristics shared by different viruses Yet heuristic scans have their share of inconveniences, such as the length of time the scan takes, which is longer than other types Also, depending on data an increased number of false positives can occur

Conclusion o Virus are very dangerous which harm to the system and may crash the system or corrupt the data. So that the antivirus software must be dynamically changes its database as well as its detection methods to detect and remove it.