Protecting Computers From Viruses and Similarly Programmed Threats Ryan Gray COSC 316.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

September,2012 Managing Files and Folders 4/23/2015 Compiled By:- Solomon W. Demissie 1.
Lecture: Malicious Code CIS 3360 Ratan K. Guha. Malicious Code2 Overview and Reading Assignments Defining malicious logic Types Action by Viruses Reading.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Project By Ben Woodard ISC 110 Professor: Dr. Elaine Wenderholm.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
GROUP MEMBERS ALI RAZA EHTASHAM ZAFAR SOHAIB AHMED BILAL HASSAN FAHAD ABDUL AZIZ.
Chapter Nine Maintaining a Computer Part III: Malware.
Antivirus Software Detects malware (not just viruses) May eliminate malware as well Often sold with firewalls Two approaches: Dictionary-based - Compares.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Newport Photography Club Ryan Erwin PC MAINTENANCE & SECURITY.
Video Following is a video of what can happen if you don’t update your security settings! security.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 7 – Malicious Software.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Computer Viruses Preetha Annamalai Niranjan Potnis.
Hacker Zombie Computer Reflectors Target.
Virus & Anti-Virus Itthiwat Phiphopsukhawadee M.2/7 No.5 Saranpat Prasertthum M.2/7 No.17 Korakrit Laotrakul M.2/7 No.23 Pesan Kasemkitjanuwat M.2/7 No.25.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
BY ANDREA ALMEIDA T.E COMP DON BOSCO COLLEGE OF ENGINEERING.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
D. Beecroft Fremont High School VIRUSES.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
Spyware, Viruses and Malware What the fuss is all about.
 a crime committed on a computer network, esp. the Internet.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Viruses a piece of self-replicating code attached to some other code – cf biological virus both propagates itself & carries a payload – carries code to.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
W elcome to our Presentation. Presentation Topic Virus.
SYSTEM SECURITY & ANTIVIRUS Chapter Dr. BALAMURUGAN MUTHURAMAN.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
1 3 Computing System Fundamentals 3.7 Utility Software.
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
Dogaong, Charlie L. BSIT The Department of Justice categorizes computer crime in three ways: The computer as a target – attacking the computers of others.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Network Protection Against: Worms, Viruses, and Root Kits Ryan Del Vecchio Cosc. 352 October 1, 2008.
Antivirus Software Troy Behmer. Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
ANTIVIRUS ANTIVIRUS Author: Somnath G. Kavalase Junior Software developer at PBWebvsion PVT.LTD.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
By Thomas Pantone Cosc 380.  A virus is a type of malware that self replicates after being executed and inserts itself into other programs, data files,
Computer Security Keeping you and your computer safe in the digital world.
Virus, Spyware & Trojan Removal By 1Akal 1Akal – Technology Services for Home & Business.
SYSTEM SECURITY & ANTIVIRUS Chapter - 4 1Dr. BALAMURUGAN MUTHURAMAN.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
Computer Virus’s.
SEMINAR ON PC SECURITY FROM VIRUSES
Chap 10 Malicious Software.
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Chap 10 Malicious Software.
Introduction to Internet Worm
Presentation transcript:

Protecting Computers From Viruses and Similarly Programmed Threats Ryan Gray COSC 316

Contents  Early virus protection software  Common malicious software  Notable viruses  Identification and deletion techniques  Pitfalls of each

Virus Protection Software  Used to prevent, detect, and remove malicious software  Began in 1980’s in research fields  BITNET/EARN network led to first open discussion of viruses  Mailing list included John McAfee and Eugene Kaspersky

Early Viruses  Malicious code spread through infected floppy disks  Exploited boot sectors of hard drives and executables  Windows Autorun  Limited in scope  Could only damage the host system  No replication  Mostly macros

Internet Age  As the internet became popular, malicious software evolved  Often infected Windows and Microsoft products  Outlook  Word  Malicious software becomes self-replicating and mobile  Infected s and attachments  Zero-day exploits

Common Malicious Software  Today malicious software has many names based on behavior  Malware, spyware, viruses, trojans, keyloggers, backdoors, rootkits, worms, adware

Notable Viruses and Worms  Elk Cloner infected Apple II systems  ILOVEYOU infects millions of Windows systems Worldwide  Mylife first virus to send infected s to all Outlook contacts  2003 – SQL Slammer jams internet traffic worldwide by exploiting SQL Server  2004 – Sasser exploits LSASS Windows service blocking internet traffic to government agencies and private corporations.

Elk Cloner

ILOVEYOU

Mylife

SQL Slammer

Sasser

Notable Continued  Anti Spyware appears as a legitimate program but forces users to pay for removal  CryptoLocker trojan encrypts an important file on a computer and forces users to pay a ransom

Anti Spyware

CryptoLocker

Identification and Deletion  Multiple techniques exist to identify and delete malicious software  In 1987, Fredrick Cohen demonstrates no algorithm is perfect to remove all malicious software  Signature-Based detection  Heuristics  Rootkit  Real-time Protection/Shield

Signature-Based  AVG’s and Avast! Methods  Constantly refresh virus definitions on host systems  Scan contents of files looking for known signatures  Quarantine or encrypt those files to render them inoperable

Signature-Based Example  Signatures are pieces of code stripped from known malicious software and stored for cross-referencing on host systems  AVG and Avast! maintain their own virus definitions

Signature-Based Example  Simplistic Example  Malicious software with these lines of code  int[] example = new int[1000]  int counter = 500  while(counter>0)  example[counter] = someGenericGet()

Signature-Based Example  Anti-Virus software will (hopefully) identify this malicious code and take proper action  This technique is simple, efficient, and effective for most malicious code  Most, meaning it is easily defeated by modern metamorphic viruses

Signature-Based Example  Metamorphic viruses redefine themselves to avoid detection  int[] newExample = new int[1000]  int newCounter = 500  while(newCounter>0)  newExample[counter] = evenMoreGenericGet()

Signature-Based Example  The relationship between signature-based detection and false-positives inversely proportional  More strict and descriptive signatures throw more false-positives  Less strict signatures fail to detect known malicious code  Does not work on new malicious software as the signature does not yet exist in anti-virus definitions  Definitions must be constantly updated

Signature-Based

Real-Time Detection  To use Avast! as an example, uses multiple techniques to provide protection while the system is being used  On-access scanner  Real-Time shields and sandboxing  Firewalls

Realtime in Avast!

Scanners  Similar detection techniques previously mentioned  Signature-based, assuming a real-time shield failed  Sandboxing an executable  Analyze and/or disassemble program code to search for malicious modification of system files

Common Fallacies of Scanners  Scanning does NOT run every program on your drive and look for malicious intent  Scanners can only detect known viruses from definitions  If detected, viruses are not often deleted  Encrypted or moved  Memory/Flash scans are not reliable

Scanners

Sandboxing  Sandboxes are common in more fields than just security  For Windows compatible anti-virus programs  Emulate the OS with many of the same components  Addressable memory  OS Kernels  Restricted network kernel that points to nowhere or is limited  Mock system registry

Sandboxing Pitfalls  As with other methods, sandboxing has downsides  Memory heavy  CPU heavy  False-positives  Delayed execution of new programs  Installation hang-ups and errors

Sandboxing

Conclusion  Early virus protection software  Common malicious software  Notable viruses  Identification and deletion techniques  Pitfalls of each