Computer Viruses and Worms Dragan Lojpur Zhu Fang.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Lecture: Malicious Code CIS 3360 Ratan K. Guha. Malicious Code2 Overview and Reading Assignments Defining malicious logic Types Action by Viruses Reading.
Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Compiled by : S. Agarwal, Lecturer & Systems Incharge, St. Xavier's Computer Centre, Kolkata : Compiled By : S. Agarwal, S. Agarwal, Lecturer.
By: Jason Boylan and Jeff George. Table of Contents  Definition  History  Vulnerability  How it works  Types of viruses  Virus Removal  Summary.
Computer Viruses.
Computer Viruses and Worms By Rafael Albuernes What is a Virus? What is a Virus? What is a Worm? What is a Worm? Types of Infections Types of Infections.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
CSE331: Introduction to Networks and Security Lecture 31 Fall 2002.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Unit 2 - Hardware Computer Security.
VIRUSES and DESTRUCTIVE PROGRAMS
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The History and Details of Computer Viruses With Chuck Easttom
1 ISA 662 Information System Security 20 Years Of PC Viruses.
D. Beecroft Fremont High School VIRUSES.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
MyDoom By: Philippe Bissohong. Background ► MyDoom  Novarg, Mimail.R and Shimgapi ► Computer worm, unlike a virus it attacks a network.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011 Presentation Point Compiled By & Designed : Presentation Point(
Administrative: Objective: –Tutorial on Risks –Phoenix recovery Outline for today.
Everything you wanted to know about Computer Viruses.
Viruses. A virus is a computer program that operates by piggybacking on other programs. Any time the other program is run, the virus is activated and.
This Is A PowerPoint Presentation On Computer Viruses. This Presentation Will Show You What Can Be Done To Deal With The Viruses. Mr Owen 10C.
Malicious Code By Diana Peng. What is Malicious Code? Unanticipated or undesired effects in programs/program parts, caused by an agent with damaging intentions.
By Michael Carlisle CpSc 420 December 6, Worms – A Definition!  Worm – a program that copies itself from one computer to another.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 47 How Viruses Work.
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
Presented by: Maha, Marina and Aleks Viruses,Wormsand Trojans.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Technology Competency Computer Infestations Mr. Locke.
Computer Viruses By: Eyad Al-Hazmi. Roadmap Introduction : Computer Viruses in brief Danger of Virus attacks Virus Attacks and Ethics Economic Impact.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
Computer Virus: “A program that can infect other programs by modifying them to include a version of itself” -- Dr Fred Cohen Compare to an office clerk.
VIRUS.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Virus. What is a virus ? A virus is a programme that is loaded onto your computer without your knowledge. Most viruses ‘infect’ other programmes by modifying.
W elcome to our Presentation. Presentation Topic Virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
 Chances of contracting a Virus › Every time you download software › Every time you accept attachments.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Computer virus Done: Aaesha Mohammed ID: H
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
Dogaong, Charlie L. BSIT The Department of Justice categorizes computer crime in three ways: The computer as a target – attacking the computers of others.
Take a tour around my slideshow to learn more about viruses.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Computer Viruses and Worms. WHAT IS VIRUS? Computer viruses are small software programs that are designed to spread from one computer to another and to.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Chapter SOFTWARE Are the programs which are written by different programming languages. These programs are: a series of instruction that tells.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
By Thomas Pantone Cosc 380.  A virus is a type of malware that self replicates after being executed and inserts itself into other programs, data files,
Evolution of Computer Viruses A Technical Presentation by: Logan Kallop.
Chapter 12: Social Implications of IT
Chap 10 Malicious Software.
Computer Viruses Standard A-4 (Safety Unit)
Chap 10 Malicious Software.
Presentation transcript:

Computer Viruses and Worms Dragan Lojpur Zhu Fang

Definition of Virus A virus is a small piece of software that piggybacks on real programs in order to get executed A virus is a small piece of software that piggybacks on real programs in order to get executed Once it ’ s running, it spreads by inserting copies of itself into other executable code or documents Once it ’ s running, it spreads by inserting copies of itself into other executable code or documents

Computer Virus Timeline Theories for self-replicating programs are first developed Apple Viruses 1, 2, and 3 are some of the first viruses “in the wild,” or in the public domain. Found on the Apple II operating system, the viruses spread through Texas A&M via pirated computer games Fred Cohen, while working on his dissertation, formally defines a computer virus as “a computer program that can affect other computer programs by modifying them in such a way as to include a (possibly evolved) copy of itself.” Two programmers named Basit and Amjad replace the executable code in the boot sector of a floppy disk with their own code designed to infect each 360kb floppy accessed on any drive. Infected floppies had “© Brain” for a volume label The Lehigh virus, one of the first file viruses, infects command.com files One of the most common viruses, Jerusalem, is unleashed. Activated every Friday the 13th, the virus affects both.exe and.com files and deletes any programs run on that day. MacMag and the Scores virus cause the first major Macintosh outbreaks. …

Worms Worm - is a self-replicating program, similar to a computer virus. A virus attaches itself to, and becomes part of, another executable program; however, a worm is self-contained and does not need to be part of another program to propagate itself. Worm - is a self-replicating program, similar to a computer virus. A virus attaches itself to, and becomes part of, another executable program; however, a worm is self-contained and does not need to be part of another program to propagate itself.

History of Worms The first worm to attract wide attention, the Morris worm, was written by Robert Tappan Morris, who at the time was a graduate student at Cornell University. The first worm to attract wide attention, the Morris worm, was written by Robert Tappan Morris, who at the time was a graduate student at Cornell University. It was released on November 2, 1988 It was released on November 2, 1988 Morris himself was convicted under the US Computer Crime and Abuse Act and received three years probation, community service and a fine in excess of $10,000. Morris himself was convicted under the US Computer Crime and Abuse Act and received three years probation, community service and a fine in excess of $10,000. Xerox PARC Xerox PARC

Worms… Worms – is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well. Worms – is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well. They are often designed to exploit the file transmission capabilities found on many computers. They are often designed to exploit the file transmission capabilities found on many computers.

Zombies Infected computers — mostly Windows machines — are now the major delivery method of spam. Infected computers — mostly Windows machines — are now the major delivery method of spam. Zombies have been used extensively to send spam; between 50% to 80% of all spam worldwide is now sent by zombie computers Zombies have been used extensively to send spam; between 50% to 80% of all spam worldwide is now sent by zombie computers

Money flow Pay per click Pay per click

Typical things that some current Personal Computer (PC) viruses do Display a message Display a message

Typical things that some current Personal Computer (PC) viruses do Erase files Erase files Scramble data on a hard disk Scramble data on a hard disk Cause erratic screen behavior Cause erratic screen behavior Halt the PC Halt the PC Many viruses do nothing obvious at all except spread! Many viruses do nothing obvious at all except spread! Display a message Display a message

Distributed Denial of Service A denial-of-service attack is an attack that causes a loss of service to users, typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational resources of the victim system. A denial-of-service attack is an attack that causes a loss of service to users, typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational resources of the victim system.

How it works? The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users. Victim's IP address. Victim's IP address. Victim's port number. Victim's port number. Attacking packet size. Attacking packet size. Attacking interpacket delay. Attacking interpacket delay. Duration of attack. Duration of attack. MyDoom – SCO Group MyDoom – SCO Group

DDoS

MyDoom 26 January 2004: The Mydoom virus is first identified around 8am. Computer security companies report that Mydoom is responsible for approximately one in ten e- mail messages at this time. Slows overall internet performance by approximately ten percent and average web page load times by approximately fifty percent 26 January 2004: The Mydoom virus is first identified around 8am. Computer security companies report that Mydoom is responsible for approximately one in ten e- mail messages at this time. Slows overall internet performance by approximately ten percent and average web page load times by approximately fifty percent

MyDoom… 27 January: SCO Group offers a US $250,000 reward for information leading to the arrest of the worm's creator. 27 January: SCO Group offers a US $250,000 reward for information leading to the arrest of the worm's creator. 1 February: An estimated one million computers around the world infected with Mydoom begin the virus's massive distributed denial of service attack—the largest such attack to date. 1 February: An estimated one million computers around the world infected with Mydoom begin the virus's massive distributed denial of service attack—the largest such attack to date. 2 February: The SCO Group moves its site to 2 February: The SCO Group moves its site to

Executable Viruses Traditional Viruses Traditional Viruses pieces of code attached to a legitimate program pieces of code attached to a legitimate program run when the legitimate program gets executed run when the legitimate program gets executed loads itself into memory and looks around to see if it can find any other programs on the disk loads itself into memory and looks around to see if it can find any other programs on the disk

Boot Sector Viruses Traditional Virus Traditional Virus infect the boot sector on floppy disks and hard disks infect the boot sector on floppy disks and hard disks By putting its code in the boot sector, a virus can guarantee it gets executed By putting its code in the boot sector, a virus can guarantee it gets executed load itself into memory immediately, and it is able to run whenever the computer is on load itself into memory immediately, and it is able to run whenever the computer is on

Decline of traditional viruses Reasons: Reasons: –Huge size of today’s programs storing on a compact disk –Operating systmes now protect the boot sector

Viruses Moves around in messages Moves around in messages Replicates itself by automatically mailing itself to dozens of people in the victim ’ s e- mail address book Replicates itself by automatically mailing itself to dozens of people in the victim ’ s e- mail address book Example: Melissa virus, ILOVEYOU virus Example: Melissa virus, ILOVEYOU virus

Melissa virus March 1999 March 1999 the Melissa virus was the fastest-spreading virus ever seen the Melissa virus was the fastest-spreading virus ever seen Someone created the virus as a Word document uploaded to an Internet newsgroup Someone created the virus as a Word document uploaded to an Internet newsgroupInternet newsgroupInternet newsgroup People who downloaded the document and opened it would trigger the virus People who downloaded the document and opened it would trigger the virus The virus would then send the document in an e- mail message to the first 50 people in the person's address book The virus would then send the document in an e- mail message to the first 50 people in the person's address book

Melissa virus Took advantage of the programming language built into Microsoft Word called VBA (Visual Basic for Applications) Took advantage of the programming language built into Microsoft Word called VBA (Visual Basic for Applications)

Prevention Updates Updates Anti-Viruses Anti-Viruses More secure operating systems More secure operating systems e.g. UNIX

Reference