SlideShare a Scribd company logo
1 of 23
Computer Viruses and Worms
Dragan Lojpur
Zhu Fang
Definition of Virus
 A virus is a small piece of software that
piggybacks on real programs in order to get
executed
 Once it’s running, it spreads by inserting
copies of itself into other executable code or
documents
Computer Virus Timeline
 1949
Theories for self-replicating programs are first developed.
 1981
Apple Viruses 1, 2, and 3 are some of the first viruses “in the wild,” or in the public domain. Found on
the Apple II operating system, the viruses spread through Texas A&M via pirated computer games.
 1983
Fred Cohen, while working on his dissertation, formally defines a computer virus as “a computer
program that can affect other computer programs by modifying them in such a way as to include a
(possibly evolved) copy of itself.”
 1986
Two programmers named Basit and Amjad replace the executable code in the boot sector of a floppy
disk with their own code designed to infect each 360kb floppy accessed on any drive. Infected floppies
had “© Brain” for a volume label.
 1987
The Lehigh virus, one of the first file viruses, infects command.com files.
 1988
One of the most common viruses, Jerusalem, is unleashed. Activated every Friday the 13th, the virus
affects both .exe and .com files and deletes any programs run on that day.
MacMag and the Scores virus cause the first major Macintosh outbreaks.
 …
Worms
 Worm - is a self-replicating program,
similar to a computer virus. A virus
attaches itself to, and becomes part of,
another executable program; however,
a worm is self-contained and does not
need to be part of another program to
propagate itself.
History of Worms
 The first worm to attract wide attention, the
Morris worm, was written by Robert Tappan
Morris, who at the time was a graduate
student at Cornell University.
 It was released on November 2, 1988
 Morris himself was convicted under the US
Computer Crime and Abuse Act and received
three years probation, community service and
a fine in excess of $10,000.
 Xerox PARC
Worms…
 Worms – is a small piece of software that
uses computer networks and security holes to
replicate itself. A copy of the worm scans the
network for another machine that has a
specific security hole. It copies itself to the
new machine using the security hole, and
then starts replicating from there, as well.
 They are often designed to exploit the file
transmission capabilities found on many
computers.
Zombies
 Infected computers — mostly Windows
machines — are now the major delivery
method of spam.
 Zombies have been used extensively to
send e-mail spam; between 50% to
80% of all spam worldwide is now sent
by zombie computers
Money flow
 Pay per click
Typical things that some current
Personal Computer (PC) viruses do
 Display a message
Typical things that some current
Personal Computer (PC) viruses do
 Erase files
 Scramble data on a hard disk
 Cause erratic screen behavior
 Halt the PC
 Many viruses do nothing obvious at all
except spread!
 Display a message
Distributed Denial of
Service
 A denial-of-service attack is an attack that
causes a loss of service to users, typically
the loss of network connectivity and
services by consuming the bandwidth of the
victim network or overloading the
computational resources of the victim
system.
How it works?
 The flood of incoming messages to the target
system essentially forces it to shut down, thereby
denying service to the system to legitimate users.
 Victim's IP address.
 Victim's port number.
 Attacking packet size.
 Attacking interpacket delay.
 Duration of attack.
 MyDoom – SCO Group
DDoS
MyDoom
 26 January 2004: The Mydoom virus is
first identified around 8am. Computer
security companies report that Mydoom is
responsible for approximately one in ten e-
mail messages at this time. Slows overall
internet performance by approximately ten
percent and average web page load times by
approximately fifty percent
MyDoom…
 27 January: SCO Group offers a US $250,000
reward for information leading to the arrest of the
worm's creator.
 1 February: An estimated one million computers
around the world infected with Mydoom begin the
virus's massive distributed denial of service
attack—the largest such attack to date.
 2 February: The SCO Group moves its site to
www.thescogroup.com.
Executable Viruses
 Traditional Viruses
 pieces of code attached to a legitimate
program
 run when the legitimate program gets
executed
 loads itself into memory and looks around
to see if it can find any other programs on
the disk
Boot Sector Viruses
 Traditional Virus
 infect the boot sector on floppy disks and
hard disks
 By putting its code in the boot sector, a
virus can guarantee it gets executed
 load itself into memory immediately, and it
is able to run whenever the computer is on
Decline of traditional viruses
 Reasons:
– Huge size of today’s programs storing on a
compact disk
– Operating systmes now protect the boot sector
E-mail Viruses
 Moves around in e-mail messages
 Replicates itself by automatically mailing
itself to dozens of people in the victim’s e-
mail address book
 Example: Melissa virus, ILOVEYOU virus
Melissa virus
 March 1999
 the Melissa virus was the fastest-spreading virus
ever seen
 Someone created the virus as a Word document
uploaded to an Internet newsgroup
 People who downloaded the document and opened
it would trigger the virus
 The virus would then send the document in an e-
mail message to the first 50 people in the person's
address book
Melissa virus
 Took advantage of the programming
language built into Microsoft Word called
VBA (Visual Basic for Applications)
Prevention
 Updates
 Anti-Viruses
 More secure operating systems
e.g. UNIX
Reference
 http://mirror.aarnet.edu.au/pub/code-red/newframes-small-log.gif
 http://www.factmonster.com/ipka/A0872842.html
http://www.faqs.org/faqs/computer-virus/new-users/
 http://www.mines.edu/academic/computer/viri-sysadmin.htm

More Related Content

Similar to Viruses (1).ppt (20)

computer virus with full detail
computer virus with full detail computer virus with full detail
computer virus with full detail
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
W 12 computer viruses
W 12 computer virusesW 12 computer viruses
W 12 computer viruses
 
εργασια
εργασιαεργασια
εργασια
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses by joy chakraborty
Computer viruses by joy chakrabortyComputer viruses by joy chakraborty
Computer viruses by joy chakraborty
 
Computer virus
Computer virusComputer virus
Computer virus
 
radhika.pdf
radhika.pdfradhika.pdf
radhika.pdf
 
Historyofviruses
HistoryofvirusesHistoryofviruses
Historyofviruses
 
New Wordpad Document
New Wordpad DocumentNew Wordpad Document
New Wordpad Document
 
Virus
VirusVirus
Virus
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer worm
Computer wormComputer worm
Computer worm
 
Computer worm
Computer wormComputer worm
Computer worm
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 

More from LadyChristianneCalic (16)

software
softwaresoftware
software
 
KWENTONG_BAYAN.pptx
KWENTONG_BAYAN.pptxKWENTONG_BAYAN.pptx
KWENTONG_BAYAN.pptx
 
OS-20210426203801.ppt
OS-20210426203801.pptOS-20210426203801.ppt
OS-20210426203801.ppt
 
chapter_14au.ppt
chapter_14au.pptchapter_14au.ppt
chapter_14au.ppt
 
Hardware Concepts.ppt
Hardware Concepts.pptHardware Concepts.ppt
Hardware Concepts.ppt
 
DIFFERENT TYPES OF COMPUTERS.pptx
DIFFERENT TYPES OF COMPUTERS.pptxDIFFERENT TYPES OF COMPUTERS.pptx
DIFFERENT TYPES OF COMPUTERS.pptx
 
module10-11-lecture (1).pptx
module10-11-lecture (1).pptxmodule10-11-lecture (1).pptx
module10-11-lecture (1).pptx
 
Climate-Change.pptx
Climate-Change.pptxClimate-Change.pptx
Climate-Change.pptx
 
FORM-86-NEW.doc
FORM-86-NEW.docFORM-86-NEW.doc
FORM-86-NEW.doc
 
13_TRANSFER-DATA-USING-COMPUTER-SOFTWARE.pptx
13_TRANSFER-DATA-USING-COMPUTER-SOFTWARE.pptx13_TRANSFER-DATA-USING-COMPUTER-SOFTWARE.pptx
13_TRANSFER-DATA-USING-COMPUTER-SOFTWARE.pptx
 
maikling-kwento.ppt
maikling-kwento.pptmaikling-kwento.ppt
maikling-kwento.ppt
 
5_ Troubleshooting and Diagnosing Network.pptx
5_ Troubleshooting and Diagnosing Network.pptx5_ Troubleshooting and Diagnosing Network.pptx
5_ Troubleshooting and Diagnosing Network.pptx
 
bungaatsanhilesson1-211021050034.pptx
bungaatsanhilesson1-211021050034.pptxbungaatsanhilesson1-211021050034.pptx
bungaatsanhilesson1-211021050034.pptx
 
Grade 10_QUARTER 1_WEEK 1-2.pptx
Grade 10_QUARTER 1_WEEK 1-2.pptxGrade 10_QUARTER 1_WEEK 1-2.pptx
Grade 10_QUARTER 1_WEEK 1-2.pptx
 
Kaligirang_Pangkasaysayan_ng_Pabula.ppt
Kaligirang_Pangkasaysayan_ng_Pabula.pptKaligirang_Pangkasaysayan_ng_Pabula.ppt
Kaligirang_Pangkasaysayan_ng_Pabula.ppt
 
File and printer sharing.pptx
File and printer sharing.pptxFile and printer sharing.pptx
File and printer sharing.pptx
 

Recently uploaded

Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 

Recently uploaded (20)

Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 

Viruses (1).ppt

  • 1. Computer Viruses and Worms Dragan Lojpur Zhu Fang
  • 2. Definition of Virus  A virus is a small piece of software that piggybacks on real programs in order to get executed  Once it’s running, it spreads by inserting copies of itself into other executable code or documents
  • 3. Computer Virus Timeline  1949 Theories for self-replicating programs are first developed.  1981 Apple Viruses 1, 2, and 3 are some of the first viruses “in the wild,” or in the public domain. Found on the Apple II operating system, the viruses spread through Texas A&M via pirated computer games.  1983 Fred Cohen, while working on his dissertation, formally defines a computer virus as “a computer program that can affect other computer programs by modifying them in such a way as to include a (possibly evolved) copy of itself.”  1986 Two programmers named Basit and Amjad replace the executable code in the boot sector of a floppy disk with their own code designed to infect each 360kb floppy accessed on any drive. Infected floppies had “© Brain” for a volume label.  1987 The Lehigh virus, one of the first file viruses, infects command.com files.  1988 One of the most common viruses, Jerusalem, is unleashed. Activated every Friday the 13th, the virus affects both .exe and .com files and deletes any programs run on that day. MacMag and the Scores virus cause the first major Macintosh outbreaks.  …
  • 4. Worms  Worm - is a self-replicating program, similar to a computer virus. A virus attaches itself to, and becomes part of, another executable program; however, a worm is self-contained and does not need to be part of another program to propagate itself.
  • 5. History of Worms  The first worm to attract wide attention, the Morris worm, was written by Robert Tappan Morris, who at the time was a graduate student at Cornell University.  It was released on November 2, 1988  Morris himself was convicted under the US Computer Crime and Abuse Act and received three years probation, community service and a fine in excess of $10,000.  Xerox PARC
  • 6. Worms…  Worms – is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.  They are often designed to exploit the file transmission capabilities found on many computers.
  • 7. Zombies  Infected computers — mostly Windows machines — are now the major delivery method of spam.  Zombies have been used extensively to send e-mail spam; between 50% to 80% of all spam worldwide is now sent by zombie computers
  • 8. Money flow  Pay per click
  • 9. Typical things that some current Personal Computer (PC) viruses do  Display a message
  • 10. Typical things that some current Personal Computer (PC) viruses do  Erase files  Scramble data on a hard disk  Cause erratic screen behavior  Halt the PC  Many viruses do nothing obvious at all except spread!  Display a message
  • 11. Distributed Denial of Service  A denial-of-service attack is an attack that causes a loss of service to users, typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational resources of the victim system.
  • 12. How it works?  The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.  Victim's IP address.  Victim's port number.  Attacking packet size.  Attacking interpacket delay.  Duration of attack.  MyDoom – SCO Group
  • 13. DDoS
  • 14. MyDoom  26 January 2004: The Mydoom virus is first identified around 8am. Computer security companies report that Mydoom is responsible for approximately one in ten e- mail messages at this time. Slows overall internet performance by approximately ten percent and average web page load times by approximately fifty percent
  • 15. MyDoom…  27 January: SCO Group offers a US $250,000 reward for information leading to the arrest of the worm's creator.  1 February: An estimated one million computers around the world infected with Mydoom begin the virus's massive distributed denial of service attack—the largest such attack to date.  2 February: The SCO Group moves its site to www.thescogroup.com.
  • 16. Executable Viruses  Traditional Viruses  pieces of code attached to a legitimate program  run when the legitimate program gets executed  loads itself into memory and looks around to see if it can find any other programs on the disk
  • 17. Boot Sector Viruses  Traditional Virus  infect the boot sector on floppy disks and hard disks  By putting its code in the boot sector, a virus can guarantee it gets executed  load itself into memory immediately, and it is able to run whenever the computer is on
  • 18. Decline of traditional viruses  Reasons: – Huge size of today’s programs storing on a compact disk – Operating systmes now protect the boot sector
  • 19. E-mail Viruses  Moves around in e-mail messages  Replicates itself by automatically mailing itself to dozens of people in the victim’s e- mail address book  Example: Melissa virus, ILOVEYOU virus
  • 20. Melissa virus  March 1999  the Melissa virus was the fastest-spreading virus ever seen  Someone created the virus as a Word document uploaded to an Internet newsgroup  People who downloaded the document and opened it would trigger the virus  The virus would then send the document in an e- mail message to the first 50 people in the person's address book
  • 21. Melissa virus  Took advantage of the programming language built into Microsoft Word called VBA (Visual Basic for Applications)
  • 22. Prevention  Updates  Anti-Viruses  More secure operating systems e.g. UNIX