1 / 3

Foray Spotlight System

This Project "Foray spotlight system is used for protecting the Computer from Malware attacks. It is a real time project and system security software which is used to identify the malicious activities in a computer. Malwares are the main problem for computers. Once it enters into the computer it will corrupt the files. Foray spotlight system acts like an antivirus software. It detects malwares like other antivirus software's, but it has some more additional advantages. Malwares are easily spread over the computer at the time of connecting the external devices like Pen drive, Card reader, etc. and it has various steps to clear malwares. First it checks for a malware and asks the user whether to destroy or not. If the user chooses destroy option it will destroy file or else choose track option for tracking for malware. If it is able to track, then it will clear the malware. If it is unable to track, it will block the file. It has more graphical interface than the antivirus software's. Additional feature like auto boost technology increase the performance of the system. It identifies and removes the unwanted running programs. This Malwares detection method is more effective than other system protecting software. Mrs A. Nalini "Foray Spotlight System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: https://www.ijtsrd.com/papers/ijtsrd18811.pdf Paper URL: http://www.ijtsrd.com/computer-science/computer-security/18811/foray-spotlight-system/mrs-a-nalini<br>

ijtsrd
Download Presentation

Foray Spotlight System

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. International Journal of Trend in International Open Access Journal International Open Access Journal | www.ijtsrd.com International Journal of Trend in Scientific Research and Development (IJTSRD) Research and Development (IJTSRD) www.ijtsrd.com ISSN No: 2456 ISSN No: 2456 - 6470 | Volume - 2 | Issue – 6 | Sep 6 | Sep – Oct 2018 Foray Spotlight System Foray Spotlight System Mrs A. Nalini Lecturer (Senior Grade), Department of Computer Engineering, Nachimuthu Polytechnic College, Pollachi,Tamil Nadu, India Lecturer (Senior Grade), Nachimuthu Polytechnic College, rtment of Computer Engineering, ABSTRACT This Project “Foray spotlight system” is used for protecting the Computer from Malware attacks. It is a real time project and system security software which is used to identify the malicious activities in a computer. Malwares are the main problem for computers. Once it enters into the computer it will corrupt the files. Foray spotlight system acts like an antivirus software. It detects malwares like other antivirus software’s, but it has some more additional advantages. Malwares are easily spread over the computer at the time of connecting the external devices like Pen-drive, Card reader, etc. and it has various steps to clear malwares. First it checks for a malware and asks the user whether to destroy or not. If the user chooses destroy option it will destroy file or else choose track option for tracking for malware. If it is able to track, then it will clear the malware. If it is unable to track, it will block the file. It has more graphical interface than the antivirus software’s. Additional feature like auto boost technology increase the performance of the system. It identifies and removes the unwanted running programs. This Malwares detection method is more effective than other system protecting software. Keyword: Malvares, Threads, Pen drive, auto boost I. INTRODUCTION This project is used to detect and delete the virus in the system .It consists of 3 types of scans. They are customs scan, full scan and quick scan. This also has a special feature that it will automatically free up the memory in a particular drive. All these features are integrated within the project .The memory space required for this project is below 3MB.Spartans anti virus is user-friendly and the Graphical User Interface is also very clear and easy to use. Spartans have big database to identify and detect the various types of virus. Uploading and modifying the virus can be done in Spartans. It has boost up tool that detect the running virus and boost up the performance of the system. Most important function of any antivirus is virus scan engine. It scans the information and if the viruses are detected, it disinfects them. The information can be scanned in different ways. Size: it can easy detect if the file is infected or altered. Some viruses append their malicious code at the end of the file. An antivirus scanner (scan engine) scans it and compares it before and after sizes. If there is no modification done by the user so it suspects that there is some malicious activity running. Pattern Matching: every virus has a unique signature that they use to infect the files or computers. This signature could be some lines in assembly language that overwrite the stack pointer and then jump to the new line of code. An antivirus program compares the information with a virus database (virus signature). If information matches any of the virus signatures then antivirus shows that the file is infected by the virus. Heuristic: if any information being scanned is dangerous and without knowing that is it contains a virus or not? This method is known as heuristic scanning. It analyse that how an information acting and comparing it with the list of dangerous activities. For e.g. if an antivirus program notices that a program is trying to open every EXE file on your computer and infecting it by writing a copy of the origi into it. So an antivirus program detects this program and declares it a dangerous activity or unknown type of virus and sound the alarm. Then it is up to user weather the danger should be eliminated or not. system” is used for virus. Uploading and modifying the virus can be done in Spartans. It has boost up tool that detect the running virus and boost up the performance of the protecting the Computer from Malware attacks. It is a real time project and system security software which is used to identify the malicious activities in a computer. Malwares are the main problem for computer it will Most important function of any antivirus is virus scan cans the information and if the viruses are detected, it disinfects them. The information can be corrupt the files. Foray spotlight system acts like an antivirus software. It detects malwares like other antivirus software’s, but it has some more additional advantages. Malwares are easily spread over the ting the external it can easy detect if the file is infected or altered. Some viruses append their malicious code at the end tivirus scanner (scan engine) scans it and compares it before and after sizes. If there is no modification done by the user so it suspects that there is some malicious activity running. drive, Card reader, etc. and it has various steps to clear malwares. First it checks for a malware and asks the user whether to destroy or not. If the user chooses destroy option it will destroy file option for tracking for malware. If it is able to track, then it will clear the malware. If it is unable to track, it will block the file. It has more graphical interface than the antivirus software’s. Additional feature like auto boost technology increase the performance of the system. It identifies and removes the unwanted running programs. This Malwares detection method is more effective than every virus has a unique signature infect the files or computers. This signature could be some lines in assembly language that overwrite the stack pointer and then jump to the new line of code. An antivirus program compares the information with a virus database (virus signature). If ation matches any of the virus signatures then antivirus shows that the file is infected by the virus. drive, auto boost if any information being scanned is dangerous and without knowing that is it contains a virus or not? This method is known as heuristic ing. It analyse that how an information acting and comparing it with the list of dangerous activities. For e.g. if an antivirus program notices that a program is trying to open every EXE file on your computer and infecting it by writing a copy of the original program into it. So an antivirus program detects this program and declares it a dangerous activity or unknown type of virus and sound the alarm. Then it is up to user weather the danger should be eliminated or not. This project is used to detect and delete the virus in the system .It consists of 3 types of scans. They are customs scan, full scan and quick scan. This also has a special feature that it will automatically free up the ese features are integrated within the project .The memory space required for this project is below 3MB.Spartans anti- friendly and the Graphical User Interface is also very clear and easy to use. Spartans have big ect the various types of @ IJTSRD | Available Online @ www.ijtsrd.com www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 Oct 2018 Page: 1078

  2. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 These methods have their pros and con antivirus program uses virus signature mechanism then it must update it at least once a day because 15 new viruses we discovered every day. If an antivirus left for two or more days without updating it cause a serious danger. II. EXISTING SYSTEM Antivirus will identify the virus and detect the virus. But it doesn’t have a real time protection method. They do not delete the archive files. It doesn’t replace the deleted files from our computer. Lot of memory is required for Grafical user interface. Scanning time duration is high. It detects and delets corrupted files. Hidden files can’t get back. Some features need to be added for this. History of deleted virus lists are not stored. Antivirus cannot identify the newly created virus. These methods have their pros and cons. If the antivirus program uses virus signature mechanism then it must update it at least once a day because 15 new viruses we discovered every day. If an antivirus left for two or more days without updating it cause a method. If any unwanted malicious files is found or will alert the user. History of the virus are listed in the registry form. Every user must register their details to create an account. Each user has permission to update a new virus and give suggestions for developing security. It is an open easy to customize with Graphical user interface. Software does not require any framework application and is a simple installation process. The deleted files can be recovered in this project. If any virus enters the system, the antivirus report to user and block the virus. Corrupted files could be filtered and stored into drives. It supports all Hardware and software method. If any unwanted malicious files is found or installed means, it will alert the user. History of the virus are listed in the registry form. Every user must register their details to create an account. Each user has permission to update a new virus and give suggestions for developing security. It is an open source software, easy to customize with Graphical user interface. Software does not require any framework application and is a simple installation process. The deleted files can be recovered in this project. If any virus enters the system, the antivirus software will report to user and block the virus. Corrupted files could be filtered and stored into drives. It supports all Hardware and software components. IV. LIST OF MODULES ?Home page module. ?Quick scan module. ?Full scan module. ?Custom scan module. HOME PAGE MODULE Home page contains scan options like scan, custom scan options. User can select this options to scan the drives. Some settings are provided for the User. History of detected viruses is visible for the users and virus updatation is al Additional features available Tools, Advanced Protection, Real time protection. QUICK SCAN MODULE This module scans the drive very quickly. If any threat is found, it is automatically removed. All the memory files are scanned by this module. FULL SCAN MODULE Full scan method scans smoothly and slowly. It scans the whole system and if any threat is found, it is informed to the user. This method doesn’t delete the malicious files immediately. CUSTOM SCAN MODULE Custom scan method is advantage for the user. If user wants to scan any particular drive , it is possible by this method. Custom scan helps to delete the malicious file in particular disks or Removable drives. V. FUTURE ENHANCEMENT This software has full details and affecting methods of virus. Database has all kind of virus so it can block all type of viruses. If virus of virus so it can block all type of viruses. If virus Antivirus will identify the virus and detect the virus. But it doesn’t have a real time protection method. They do not delete the archive files. It doesn’t replace the deleted files from our computer. Lot of memory is ace. Scanning time duration is high. It detects and delets corrupted files. Hidden files can’t get back. Some features need to be added for this. History of deleted virus lists are not stored. Antivirus cannot identify the newly created LIST OF MODULES options like quick scan, full scan, custom scan options. User can select this options to scan the drives. Some settings are provided for the User. History of detected viruses is visible for the datation is also available. for users are Manage, Tools, Advanced Protection, Real time protection. FIG1. ANTIVIRUS MODULE ANTIVIRUS MODULE Types of Worms A few different types of worms are emailing worms, instant messaging worms, internet worms and file sharing networks worms. emailing worms are those in the attachments that are sometimes sent with emails. instant messaging worms usually infect a computer when an infected link is sent to a person and they open it. these also get into computers and automatically send to most if not all of the people on your buddy list. internet worms usually scan different computers and try to get into their systems. a lot of times they will try and be downloaded onto the computer by sending a request to be downloaded. file sharing networks worms usually copy itself in a shared file under a name that is not suspicious and will start to infect the computer as well as those in the same network. III. PROPOSED SYSTEM Spartans antiviruses have the custom scan method for scanning particular drives. It has real time protection scanning particular drives. It has real time protection This module scans the drive very quickly. If any threat is found, it is automatically removed. All the scanned by this module. A few different types of worms are emailing worms, instant messaging worms, internet worms and file- sharing networks worms. emailing worms are those in the attachments that are sometimes sent with emails. worms usually infect a computer when an infected link is sent to a person and they open it. these also get into computers and automatically send to most if not all of the people on your buddy list. internet worms usually scan different o get into their systems. a lot of times they will try and be downloaded onto the computer by sending a request to be downloaded. file- sharing networks worms usually copy itself in a shared file under a name that is not suspicious and the computer as well as those in the Full scan method scans smoothly and slowly. It scans the whole system and if any threat is found, it is informed to the user. This method doesn’t delete the CUSTOM SCAN MODULE tom scan method is advantage for the user. If user wants to scan any particular drive , it is possible by this method. Custom scan helps to delete the malicious file in particular disks or Removable drives. FUTURE ENHANCEMENT about all types of virus and affecting methods of virus. Database has all kind the custom scan method for @ IJTSRD | Available Online @ www.ijtsrd.com www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 Oct 2018 Page: 1079

  3. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 attacks the system at any time, real time protection security will scans automatically and delete the virus without permission of user. This software is supported in android mobile phones. It has restore point method for replacing the deleted files. VI. CONCLUSION Most of the antivirus does not have all kind of features. Every antivirus was created for a specific protection from virus. But Spartans antivirus otection from virus. But Spartans antivirus time protection developed for protecting the system in many methods. It helps the users to protect the system from virus not worry about the malicious activities in system because Spartans will defend l unwanted activities. developed for protecting the system in many methods. It helps the users to protect the system from virus attacks. Users do not worry about the malicious activities in system because Spartans will defend against all unwanted activities. REFERENCES 1.Jason N. Gaylord, Christian wenz. Professional ASP.net 4.5 C# and VB, Publisher :APRESS 2.Smadav (antivirus)-Graphical user interface Graphical user interface security will scans automatically and delete the virus ut permission of user. This software is supported in android mobile phones. It has restore point method Most of the antivirus does not have all kind of features. Every antivirus was created for a specific Jason N. Gaylord, Christian wenz. Professional , Publisher :APRESS @ IJTSRD | Available Online @ www.ijtsrd.com www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 Oct 2018 Page: 1080

More Related