Metamorphic Viruses Pat Walpole. Introduction What are metamorphic viruses Why they are dangerous Defenses against them.

Slides:



Advertisements
Similar presentations
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
Advertisements

The Internet = A World of Opportunities
Presented by Justin Bode CS 450 – Computer Security February 17, 2010.
Computer Viruses and Worms By Rafael Albuernes What is a Virus? What is a Virus? What is a Worm? What is a Worm? Types of Infections Types of Infections.
Removing Spyware Cleaning Up Your Computer. Pin Point the Problem Is Your Computer Not Running Properly? Are You Sure That the Problem is Spyware? Observe.
Polymorphism in Computer Viruses CS265 Security Engineering Term Project Puneet Mishra.
Computer Viruses. History Malicious software – 1970’s Programs distributed over exchange servers speeds spread of viruses Brain sparks term: Virus.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Anti Virus Techniques Jordan & Ryan Use of Checksum The Binary for key files is added up to a number especially in the boot files When these files are.
No.24 Prerawat Denvutivorkarn M.2/2. Definition: "antivirus" is protective software designed to defend your computer against malicious software. Malicious.
1 Computer Security: Protect your PC and Protect Yourself.
What is it, how does it work, and why is it important?
Antivirus Software Detects malware (not just viruses) May eliminate malware as well Often sold with firewalls Two approaches: Dictionary-based - Compares.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Video Following is a video of what can happen if you don’t update your security settings! security.
CISC Machine Learning for Solving Systems Problems Presented by: Akanksha Kaul Dept of Computer & Information Sciences University of Delaware SBMDS:
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
To Protect What Matters!! Protection Against Computer Virus Unit portfolio presentation by Saira Imtiaz.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
National Energy Research Scientific Computing Center (NERSC) Computer Security – The New Threats Stephen Lau NERSC Center Division, LBNL June 24, 2004.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Malware Adware Removal Best Free Malware Virus Protection Best Free Malware Adware Removal Service Best free Anti Spyware Removal Service Best free Trojan.
Internet Safety By Adam T Introduction  This PowerPoint will show give you advice on how to stay safe on the internet.  You will be told how to stay.
Windows PE files Infections and Heuristic Detection Nicolas BRULEZ / Digital River PACSEC '04.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Higher Computing Topic 8: Supporting Software Updated
Computer project – computer virus 1D Christy Chan (9) Patricia Cheung (14)
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
Files are at risk from loss if your computer breaks or if you get a virus. Files can also become corrupted. Solutions: Make regular back ups of files Use.
Ms. Park.  Q&A: What are some Internet safety tips you already know?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Homework #2 John Bach IST 110 Section 031 JMB6824 9/15/2012.
ICT Functional Skills Viruses and other malware. What is malware? software which is specifically designed to disrupt or damage a computer system – Viruses,
HIPS Host-Based Intrusion Prevention System By Ali Adlavaran & Mahdi Mohamad Pour (M.A. Team) Life’s Live in Code Life.
Phillip Dinh, Fofanova, 1301, UH Internet Security By Phillip Dinh 1301 Spring 2007 University of Houston.
Dealing with Malware By: Brandon Payne Image source: TechTips.com.
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
Hackers And Hacking.
Submitted By :- Neeraj Kumar Singh Branch :Electronics&communication Topic : computer Viruses Submitted to :- Ms. Veena Gupta.
Firewall firewalls Is a program on your computer to protect your computer from all types of threats and if you have a server and you wasn’t to protect.
Antivirus software.
Virus Scan Software.  Every computer should have virus scan software to protect it from the increasing number of bad files that are installed on computer’s.
CONTENTS What is Virus ? Types of computer viruses.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
Viruses. Learning Objectives: At the end of this lesson you should be able to:
Cyber Safety Jamie Salazar.
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
Virus. What is a virus ? A virus is a programme that is loaded onto your computer without your knowledge. Most viruses ‘infect’ other programmes by modifying.
W elcome to our Presentation. Presentation Topic Virus.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
2/11/ Dela Cruz.  Trojan Horses  Worms  Viruses  Piggyback software  Attachments with viruses 2/11/2016 Dela Cruz 2.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Computer virus (W). A virus is a piece of software or programming that can be extremely harmful to computer. It damages your computer by taking over your.
What is virus? §A computer virus is an irregular, human- made program designed to infect computers.
Writing an message Finish off your slide on recommendations of how to write an .
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Protecting Computers From Viruses and Similarly Programmed Threats Ryan Gray COSC 316.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
NCENTRIC SYSTEMS.  If you have a computer, you’ve got something valuable to protect against viruses. The ideal way to guard your computer against viruses.
What are the Limitations of Kaspersky Anti-Virus 2015? | Contact Kaspersky
What is Information Security?
Malware and how to defend against it
Presentation transcript:

Metamorphic Viruses Pat Walpole

Introduction What are metamorphic viruses Why they are dangerous Defenses against them

Virus Camouflage Types None Encrypted Polymorphic Metamorphic

No Camouflage Myles Jordan [1]

Encrypted Myles Jordan [1]

Polymorphic Myles Jordan [1]

Metamorphic Myles Jordan [1]

Why Metamorphism is a Problem Provides excellent camouflage for the virus code Difficult for anti-virus programs to detect Difficult for an IDS to detect

General Virus Defenses Do not run or install software from an untrusted source Do not open attachments unless you are 100% sure they are from a trusted source Use a good antivirus program and keep it updated

Anti Virus Program Techniques Run suspected files in an emulator Perform heuristic analysis on the behaviors of the program –False positives –May not find viruses that are event based

Conclusion Virus writers will always find ways to beat anti-virus protection Metamorphism is a very effective camouflage technique Keep your computer protected and practice safe computing

References [1] Jordan, Myles. Anti-Virus Research Dealing with Metamorphism.