SEMINAR ON COMPUTER VIRUSES
310 likes | 1.18k Views
SEMINAR ON COMPUTER VIRUSES. Presented By: Sritam Maikap Roll No -101056 CSE-1,Group-3. Guided By: Er.Syed Amidul Islam Er.Prasanta Ku Dash. Introduction. Computer virus have become today’s headline news With the increasing use of the Internet, it has become easier for virus to spread
SEMINAR ON COMPUTER VIRUSES
E N D
Presentation Transcript
SEMINAR ONCOMPUTERVIRUSES Presented By: Sritam MaikapRoll No -101056CSE-1,Group-3 Guided By:Er.SyedAmidul IslamEr.Prasanta Ku Dash
Introduction • Computer virus have become today’s headline news • With the increasing use of the Internet, it has become easier for virus to spread • Virus show us loopholes in software • Most virus are targeted at the MS Windows OS
Definition of Virus • A virus is a small piece of software that piggybacks on real programs in order to get executed • Once it’s running, it spreads by inserting copies of itself into other executable code or documents
Computer Virus Timeline • 1949:- Theories for first replicating program • 1999 The Melissa Virus • 2003 The Slammer Worm. • 2012:Trojan.Flame.A (May) • 1981:-Apple Viruses 1, 2, & 3 • 2000 The I Love You Virus • 2004 MyDoom • 2012:Rootkit.Sirefef.Gen (Nov)
Virus Languages • ANSI COBOL • C/C++ • VBA • Unix Shell Scripts • JavaScript • Basically any language that works on the system that is the target
Symptoms of Virus Attack • Display a message • Computer runs slower than usual • Computer no longer boots up • Screen sometimes flicker • PC speaker beeps periodically • System crashes for no reason • Files/directories sometimes disappear • Many viruses do nothing obvious at all except spread!
Classification of Virus • Trojan Horse • Worms • Boot sector virus • Macro Virus • Memory Resident Virus • Logic/Time Bombs
Trojan Horse • Appearance of having useful & desired Function • Neither replicates nor copies itself • Damage computer / Data destruction • Compromises the security of the computer • Gain access by another computer • Bypassing normal access control Example: • W32/Fesber.worm.gen!DE3D23CE2E52 • Trojan.Flame.A(May 28,2012)
WORMS • Makes and facilitates distribution of copies itself • From one disk drive to another • Spread through Email & Networks • First worm (Morris Worm) released on Nov 2, 1988 by Robert Tappan Morris • Eg:-Bubbleboy • Mapson • Lovgate Protection : Install an update version of antivirus
MACRO • uses computer networks and security holes to replicate itself • copies itself to the new machine using the security hole • to exploit the file transmission capabilities • hide in documents that are shared via e-mail or networks • avoid opening e-mails from unknown senders • Examples: Relax, Melissa.A
Boot Sector Viruses • Traditional Virus • infect the boot sector on floppy disks and hard disks • By putting its code in the boot sector, a virus can guarantee it gets executed • load itself into memory immediately, and it is able to run whenever the computer is on
Executable Viruses • Traditional Viruses • pieces of code attached to a legitimate program • run when the legitimate program gets executed • loads itself into memory and looks around to see if it can find any other programs on the disk
E-mail Viruses • Moves around in e-mail messages • Replicates itself by automatically mailing itself to dozens of people in the victim’s e-mail address book • Example: Melissa virus, ILOVEYOU virus
Virus Lifecycle Modification Birth Release Proliferation Elimination Trigger Activation Detection
CURRENT ACTIVE VIRUSES Rootkit.Sirefef.Gen Spreading : MediumDamage : HighSymptoms:->Presence of unwanted popups on the infected machine->Control Handled By the AttackerTechnical Description:>kernel mode rootkit>achieved by loading a clean copy of the FlashPlayer installer>Windows Firewall is turned OffTry to disable a series of security subsystem like Windows Defender Service Windows Security Center Service Proxy Auto Discovery Service Removal Tool: http://download.bitdefender.com/removal_tools/RemovalToolUnifiedLauncher_sirefef.exe
Trojan.Flame.A Spreading: Medium Damage: Very High • Multi Component Malware • able to spy, leak data, download/execute other components You can also download theremoval tool: • http://labs.bitdefender.com/2012/05/cyber-espionage-reaches-new-levels-with-flamer/ • Symptoms:Presence of the following files%windir%\\system32\\commgr32.dll%windir%\\system32\\comspol32.dll%windir%\\system32\\comspol32.ocx%windir%\\system32\\indsvc32.dll%windir%\\system32\\indsvc32.ocx%windir%\\system32\\modevga.com%windir%\\system32\\mssui.drv%windir%\\system32\\scaud32.exe%windir%\\system32\\sdclt32.exe%windir%\\system32\\watchxb.sys%windir%\\system32\\winconf32.ocx • Presence of this directory:%COMMONPROGRAMFILES%\\Microsoft Shared\\MSSecurityMgr\\
Trojan.Ransom.IcePol • Spreading : Medium • Damage : Medium • Symptoms>desktop is locked by a message claiming to be from the local law enforcement agency.>The same message demands that the user pays a fine via uKash. • The presence of the following files:%USERPROFILE%\\Start Menu\\Programs\\Startup\\<reveton_filename>.dll.lnk (Windows XP)%USERPROFILE%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\<reveton_filename>dll.lnk (Windows 7) • Download the Removal Toolhttp://download.bitdefender.com/removal_tools/BDRemoval_Trojan_Ransom_IcePol.exe
Ways computer viruses are spread • Email attachments • Rogue websites • Networks • Phishing Schemes • Infected Software • Hackers • Instant Messaging • Fake Anti Virus Software • Friends & Relatives
Ways to Prevent Computer Viruses • Knowledge • Install a reliable Anti-virus Program • Install Anti-spyware • Avoid Suspicious Web Sites • Install a Firewall • Stay away from cracked Software • Keep operating system and all software updated/patched • Don’t believe “SECURITY ALLERTS” that you are sent • Don’t open an attachment if you are not sure
REFERENCES • http://www.bitdefender.com/resourcecenter/virus-encyclopedia/ • http://home.mcafee.com/virusinfo/threat-activity • http://antivirus-software.topchoicereviews.com/types-of-viruses.html • http://www.mapcon.com/timeline-of-computer-viruses
FUNNY VIRUS PROGRAMS • Lets develop some Funny and Dangerous Virus Programs Using BATCH file • Fore More virus Programs You can Visit My Web Sitewww.chintu.comuf.com
CONCLUSION • Computer viruses are not evil • programmers have a right to create them, posses them and experiment with them • we should never support those people who writing viruses with destructive nature • If you do create a virus, though, be careful with ityou may wipe out your own. system by accident