Download presentation
Presentation is loading. Please wait.
1
Metamorphic Viruses Pat Walpole
2
Introduction What are metamorphic viruses Why they are dangerous Defenses against them
3
Virus Camouflage Types None Encrypted Polymorphic Metamorphic
4
No Camouflage Myles Jordan [1]
5
Encrypted Myles Jordan [1]
6
Polymorphic Myles Jordan [1]
7
Metamorphic Myles Jordan [1]
8
Why Metamorphism is a Problem Provides excellent camouflage for the virus code Difficult for anti-virus programs to detect Difficult for an IDS to detect
9
General Virus Defenses Do not run or install software from an untrusted source Do not open email attachments unless you are 100% sure they are from a trusted source Use a good antivirus program and keep it updated
10
Anti Virus Program Techniques Run suspected files in an emulator Perform heuristic analysis on the behaviors of the program –False positives –May not find viruses that are event based
11
Conclusion Virus writers will always find ways to beat anti-virus protection Metamorphism is a very effective camouflage technique Keep your computer protected and practice safe computing
12
References [1] Jordan, Myles. Anti-Virus Research Dealing with Metamorphism. http://www3.ca.com/securityadvisor/newsinfo/collateral.aspx?cid=48051 http://www3.ca.com/securityadvisor/newsinfo/collateral.aspx?cid=48051
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.