Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

September,2012 Managing Files and Folders 4/23/2015 Compiled By:- Solomon W. Demissie 1.
30/04/2015Tim S Roberts COIT13152 Operating Systems T1, 2008 Tim S Roberts.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Multipartite Viruses Wendy Bowman ETEC 562 General Information Payload Activation Hidden Transmission Removal.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Malware Ge Zhang Karlstad Univeristy. Focus What malware are Types of malware How do they propagate How do they hide How to detect them.
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
1 Computer Viruses (and other “Malicious Programs) Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
Chapter Nine Maintaining a Computer Part III: Malware.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
VIRUSES and DESTRUCTIVE PROGRAMS
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
CSCE 201 Attacks on Desktop Computers: Malicious Code Hardware attacks.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
Structure Classifications &
VIRUS Is a computer program that can copy itself and infect a computer without permission or knowledge of the user or is a program or piece of code that.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
Administrative: Objective: –Tutorial on Risks –Phoenix recovery Outline for today.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Malicious Code By Diana Peng. What is Malicious Code? Unanticipated or undesired effects in programs/program parts, caused by an agent with damaging intentions.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
For more notes and topics visit: eITnotes.com.
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
30.1 Lecture 30 Security II Based on Silberschatz & Galvin’s slides And Stallings’ slides.
For any query mail to or BITS Pilani Lecture # 1.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Topic 5: Basic Security.
Submitted By :- Neeraj Kumar Singh Branch :Electronics&communication Topic : computer Viruses Submitted to :- Ms. Veena Gupta.
CONTENTS What is Virus ? Types of computer viruses.
Malicious Software.
VIRUS.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
MALICIOUS SOFTWARE Rishu sihotra TE Computer
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Malicious Programs (1) Viruses have the ability to replicate themselves Other Malicious programs may be installed by hand on a single machine. They may.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari Hazira Hamiza
Chapter Objectives In this chapter, you will learn:
3.6 Fundamentals of cyber security
computer virus infection & symptoms
Chap 10 Malicious Software.
Stay Safe While Using The Internet
Chap 10 Malicious Software.
Presentation transcript:

Computer virus Speaker : 蔡尚倫

 Introduction  Infection target  Infection techniques Outline

 A malware  Need permission( by accident ) to execute  Will replicate, spread  May have destruction Computer virus - definition

 Stealing hard disk space or CPU time  Accessing private information  Corrupting data  Displaying political or humorous messages  Spamming their contacts  Logging their keystrokes Purpose

Tools, like language, tool kits Design Spread, how to extend Replication Active, what to do Launch Evade, try not be found Detection Elimination Lifetime of a virus

 System sector  Network  Source code  File  Macro Infection target

 Two type of system sector:  DBR (DOS Boot Record; DBS, DOS Boot sector)  MBR (Master Boot Record; Partition sectors)  Booting process:  Boot computer → BIOS → POST → DBR → MBR → Boot Sector → OS  Medium:  Floppy disk  Bootable CD-ROM System sector

 Replicate by commands or protocols of network  Remote-controllable  Results:  Degrade the performance of a network  Disable critical devices  Network connections  Stealing personnel data Network

 Different compiler, different source code  Make modifications to source code  Rare Source code

 Executable file  files with.BAT,.COM,.EXE,.BIN and so on  May be partially or completely overwritten  Infected files can spread across the system, network Files

Macro  Input sequence(short) map to output sequence(long)  A piece of code executes if a certain event occurs  Blur the line between executable files and data files

 Stealth  Polymorphic  Metamorphic  Cavity  Tunneling  Camouflage  Bootable CD-ROM Infection techniques

 Intercept requests  Return a uninfected file  Hide the modified file Stealth Anti-virus program Infected file OS Request: Ask a file Return another file

 To confuse anti-virus programs  Change characteristics with each infection  By Encryption/decryption module  But keep the algorithm intact  Insert junk instructions  Exchange independent instructions  Change the start address Polymorphic

 Will reprogram itself  Can translate into a temporary code  Then converted back to normal code  Avoid pattern recognition of anti-virus program Metamorphic Virus (original) Virus (temporary code ) Translate Convert back Mutate

 Also known as space-fillers  Maintain a constant file-size  Overwrite empty part of a target file with its code  Limit on small number of host, it is hard to write  Means rare Cavity Null Null Null Some info…. code code ….code code ….code code …. Some info…. Fill the empty part Original fileInfected file

 One way to detect virus is intercepting interrupts:  Look for specific action that may signify the presence of a virus  Intercepting interrupt from the OS directly to avoid anti-virus program use them Tunneling

Normal Program send interrupt requests Anti-virus software Intercepting the request and check it Operation system Give it the permission Tunneling - cont’d Infected program Back trace to the directory of DOS and BIOS interrupt handlers Install itself beneath this interrupt handlers Contact with OS directly

 Pretend itself as a normal program  Usage of anti-virus program’s ignore logic  Thanks to advanced virus detection, it’s rare Camouflage

 Through infected CD-ROM  If system is booted by the CD-ROM, the hard disk must be destroyed  No anti-virus program can stop it Bootable CD-ROM

 Worms  A special type of virus that can replicate itself and use memory, but it cannot attach itself to other executable codes  Trojans  A small destructive program that runs hidden on an infected computer Other malware

 Characteristics  Standalone malware  Propagation for spread from machine to machine  Do not attach themselves to an existing program  Infection techniques  Aim at security failures  Via network, usually with attachment of Worms

Gathering information Location, port, configuration, identification Infecting target Send itself to the target machine Payload Create back door, alter or destroy files, transmit psw.. Any action other than spreading itself Network propagation Select the next target by choosing randomly or others Worms - infecting phases

 Characteristics  Non-self-replicating  Do not attach themselves into files or propagate  Infection techniques (always associated with network)  with malicious programs or drive-by download  Normally down by social engineering  Running  Automatically run after being installed  Hiding in background, and create a backdoor(s), usually Trojans

 Destruction  Password thievery  Remote control  Key logger  DoS attack  Zombie  FTP Trojan Trojans - purposes

Thanks for listening