SlideShare a Scribd company logo
1 of 21
BY,
SHUSRUSHA BEZUGAM,
III Year IT-B.
CONTENTS
•INTRODUCTION.
•ANTIVIRUS APPROACHES.
•GENERATIONS OF ANITIVIRUS SOFTWARES.
•ADVANCED ANTIVIRUS TECHNIQUES.
•CONCLUSION.
INTRODUCTION
•DON’T ALLOW VIRUS OR BLOCK THE VIRUS.
•The key to protecting your computer against
infection from viruses, is understanding how
they spread.
ANTIVIRUS APPROACHES
•PREVENTION
•GOAL
•BEST APPROACH
BEST APPROACHES:
• DETECTION: Determine the infection and locate the virus.
• IDENTIFICATION: Determine the specific virus that has infected a
program.
• REMOVAL: Remove the traces of virus and restore the original file.
VIRUS DETECTION VIRUS IDENTIFICATION VIRUS REMOVAL
GENERATIONS OF ANITIVIRUS SOFTWARES
• Antivirus software's depend on virus.
• Previously, virus attacks were simple so antivirus packages used to treat
them were also simple.
• As, the virus arms race evolved, antivirus software’s have grown more
complex and sophisticated.
• There are 4 generations of antivirus software:
1.First Generation: simple scanners(record of program lengths).
2.Second Generation: heuristic scanners(integrity checking with
checksums).
3.Third Generation: activity traps(memory resident , detect infected
actions).
4.Fourth Generation: full-featured protection(access control capability).
First
Generation
• These anti-virus software
programs were called as
simple scanners.
• They needed a virus signature
to identify a virus.
• A variation of such programs
kept a watch on the length of
programs and looked for
changes so as to possibly
identify a virus attack.
Second
Generation
• These antivirus software
programs did not rely on simple
virus signatures.
• Rather, they used some rules to
look for possible virus attacks.
• The basic idea was to look for
code blocks that were commonly
associated with viruses.
• Another variation of these anti-
virus programs used to store
some identification about the file
to detect changes in the contents
of the file.
Third
Generation
• These anti-virus software
programs were memory
resident.
• They watched for viruses
based on their actions, rather
than their structure.
• Thus, it is not necessary to
maintain a large database of
virus signatures.
• Instead, focus on keeping a
watch on a small number of
suspect actions
Fourth
Generation
• These anti-virus software
programs package many
anti-virus techniques
together(example
scanning, monitoring,
filtering).
• They also contain access
control features, thus
defeating the attempts of a
virus to infect the files.
ADVANCED ANTIVIRUS TECHNIQUES
•More sophisticated antivirus approaches.
•GENERIC DECRYPTION.
•DIGITAL IMMUNE SYSTEM.
•BEHAVIOURAL BLOCKING SOFTWARE.
GENERIC DECRYPTION
• Easily detects even most complex polymorphic virus.
• It maintains fast scanning speeds.
• No damage to the personal computer.
• Contains following elements:
• CPU emulator – software based virtual computer.
• Virus signature scanner – scans target code for known signatures.
• Emulation control module – control execution of target code.
• DISADVANTAGES: We can’t determine how long to run each
interpretation and degradation of system performance.
CPU EMULATOR
DIGITAL IMMUNE SYSTEM
• Developed by IBM and refined by Symantec.
• Motivation: Internet based virus propagation.
• Antivirus was updated monthly.
• Two major trends in Internet technology have had an increasing
impact on rate of virus propagation:
• INTEGRATED MAIL SYSTEMS: Microsoft outlook, Lotus notes.
• MOBILE-PROGRAM SYSTEMS: JAVA and ActiveX.
BEHAVIOURAL BLOCKING
SOFTWARE
• It integrates with the operating system of host computer and
monitors program behavior in real-time for malicious actions.
• It blocks malicious actions before they affect the system.
• Monitored behavior may include:
• Attempts to open , view, delete or modify the files.
• To format disk drives.
• Modifications to the logic of executable files.
• Modifications to the startup settings.
• Scripting of e-mail.
CONCLUSION
In order to countermeasure the threats of virus , the user
should:
• Installing Anti-virus Applications.
• Often Get the data drive Scan and analyzed.
• Gaining basic knowledge about the way virus work.
• Installing Basic internet Security Applications.
THANK YOU

More Related Content

What's hot

What's hot (20)

Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Chapter 2 Presentation
Chapter 2 PresentationChapter 2 Presentation
Chapter 2 Presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Malicious Software
Malicious SoftwareMalicious Software
Malicious Software
 
Introduction to cyber security i
Introduction to cyber security iIntroduction to cyber security i
Introduction to cyber security i
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Chapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering AttacksChapter 2 Malware and Social Engineering Attacks
Chapter 2 Malware and Social Engineering Attacks
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 

Viewers also liked

Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threats
wardjo
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
Anuj Pawar
 
Antivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaAntivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by Ilakia
ILAKIA
 
Walt disney ppt
Walt disney pptWalt disney ppt
Walt disney ppt
shusrusha
 

Viewers also liked (20)

Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
MR201504 Web Defacing Attacks Targeting WordPress
MR201504 Web Defacing Attacks Targeting WordPressMR201504 Web Defacing Attacks Targeting WordPress
MR201504 Web Defacing Attacks Targeting WordPress
 
いただきます。
いただきます。いただきます。
いただきます。
 
Viruses & security threats
Viruses & security threatsViruses & security threats
Viruses & security threats
 
Antivirus programs
Antivirus programsAntivirus programs
Antivirus programs
 
Password Management
Password ManagementPassword Management
Password Management
 
Virus y antivirus
Virus y antivirusVirus y antivirus
Virus y antivirus
 
Password management
Password managementPassword management
Password management
 
Virus y-antivirus-ppt leonardo
Virus y-antivirus-ppt leonardoVirus y-antivirus-ppt leonardo
Virus y-antivirus-ppt leonardo
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
 
Collateral damage in cyberwarfare
Collateral damage in cyberwarfareCollateral damage in cyberwarfare
Collateral damage in cyberwarfare
 
Computer Viruses and Protections
Computer Viruses and ProtectionsComputer Viruses and Protections
Computer Viruses and Protections
 
Password management
Password managementPassword management
Password management
 
Antivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by IlakiaAntivirus programs and Security Teams in E-Commerce by Ilakia
Antivirus programs and Security Teams in E-Commerce by Ilakia
 
Aes
AesAes
Aes
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Walt disney ppt
Walt disney pptWalt disney ppt
Walt disney ppt
 
block ciphers
block ciphersblock ciphers
block ciphers
 

Similar to Counter Measures Of Virus

Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
Neetu Jain
 

Similar to Counter Measures Of Virus (20)

ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Antiviruses and how they work
Antiviruses and how they workAntiviruses and how they work
Antiviruses and how they work
 
Computer Virus_Athi-1.pdf
Computer Virus_Athi-1.pdfComputer Virus_Athi-1.pdf
Computer Virus_Athi-1.pdf
 
Viruses and virus countetmeasures
Viruses and virus countetmeasuresViruses and virus countetmeasures
Viruses and virus countetmeasures
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
anti_virus
anti_virusanti_virus
anti_virus
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Isas
IsasIsas
Isas
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
Rajul computer presentation
Rajul computer presentationRajul computer presentation
Rajul computer presentation
 
Malware Detection By Machine Learning Presentation.pptx
Malware Detection By Machine Learning  Presentation.pptxMalware Detection By Machine Learning  Presentation.pptx
Malware Detection By Machine Learning Presentation.pptx
 
Anti Virus Software
Anti Virus SoftwareAnti Virus Software
Anti Virus Software
 
information about virus
information about virusinformation about virus
information about virus
 
Virus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti VirusVirus and Anti Virus - Types of Virus and Anti Virus
Virus and Anti Virus - Types of Virus and Anti Virus
 
Virussss.pdf
Virussss.pdfVirussss.pdf
Virussss.pdf
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus works
 
Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxVirus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptx
 

Recently uploaded

Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 

Recently uploaded (20)

BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 

Counter Measures Of Virus

  • 2.
  • 3. CONTENTS •INTRODUCTION. •ANTIVIRUS APPROACHES. •GENERATIONS OF ANITIVIRUS SOFTWARES. •ADVANCED ANTIVIRUS TECHNIQUES. •CONCLUSION.
  • 4. INTRODUCTION •DON’T ALLOW VIRUS OR BLOCK THE VIRUS. •The key to protecting your computer against infection from viruses, is understanding how they spread.
  • 6. BEST APPROACHES: • DETECTION: Determine the infection and locate the virus. • IDENTIFICATION: Determine the specific virus that has infected a program. • REMOVAL: Remove the traces of virus and restore the original file.
  • 7. VIRUS DETECTION VIRUS IDENTIFICATION VIRUS REMOVAL
  • 8. GENERATIONS OF ANITIVIRUS SOFTWARES • Antivirus software's depend on virus. • Previously, virus attacks were simple so antivirus packages used to treat them were also simple. • As, the virus arms race evolved, antivirus software’s have grown more complex and sophisticated. • There are 4 generations of antivirus software: 1.First Generation: simple scanners(record of program lengths). 2.Second Generation: heuristic scanners(integrity checking with checksums). 3.Third Generation: activity traps(memory resident , detect infected actions). 4.Fourth Generation: full-featured protection(access control capability).
  • 9. First Generation • These anti-virus software programs were called as simple scanners. • They needed a virus signature to identify a virus. • A variation of such programs kept a watch on the length of programs and looked for changes so as to possibly identify a virus attack.
  • 10. Second Generation • These antivirus software programs did not rely on simple virus signatures. • Rather, they used some rules to look for possible virus attacks. • The basic idea was to look for code blocks that were commonly associated with viruses. • Another variation of these anti- virus programs used to store some identification about the file to detect changes in the contents of the file.
  • 11. Third Generation • These anti-virus software programs were memory resident. • They watched for viruses based on their actions, rather than their structure. • Thus, it is not necessary to maintain a large database of virus signatures. • Instead, focus on keeping a watch on a small number of suspect actions
  • 12. Fourth Generation • These anti-virus software programs package many anti-virus techniques together(example scanning, monitoring, filtering). • They also contain access control features, thus defeating the attempts of a virus to infect the files.
  • 13. ADVANCED ANTIVIRUS TECHNIQUES •More sophisticated antivirus approaches. •GENERIC DECRYPTION. •DIGITAL IMMUNE SYSTEM. •BEHAVIOURAL BLOCKING SOFTWARE.
  • 14. GENERIC DECRYPTION • Easily detects even most complex polymorphic virus. • It maintains fast scanning speeds. • No damage to the personal computer. • Contains following elements: • CPU emulator – software based virtual computer. • Virus signature scanner – scans target code for known signatures. • Emulation control module – control execution of target code. • DISADVANTAGES: We can’t determine how long to run each interpretation and degradation of system performance.
  • 16. DIGITAL IMMUNE SYSTEM • Developed by IBM and refined by Symantec. • Motivation: Internet based virus propagation. • Antivirus was updated monthly. • Two major trends in Internet technology have had an increasing impact on rate of virus propagation: • INTEGRATED MAIL SYSTEMS: Microsoft outlook, Lotus notes. • MOBILE-PROGRAM SYSTEMS: JAVA and ActiveX.
  • 17.
  • 18. BEHAVIOURAL BLOCKING SOFTWARE • It integrates with the operating system of host computer and monitors program behavior in real-time for malicious actions. • It blocks malicious actions before they affect the system. • Monitored behavior may include: • Attempts to open , view, delete or modify the files. • To format disk drives. • Modifications to the logic of executable files. • Modifications to the startup settings. • Scripting of e-mail.
  • 19.
  • 20. CONCLUSION In order to countermeasure the threats of virus , the user should: • Installing Anti-virus Applications. • Often Get the data drive Scan and analyzed. • Gaining basic knowledge about the way virus work. • Installing Basic internet Security Applications.