SlideShare a Scribd company logo
1 of 22
Download to read offline
NETWORK SECURITY
Name of the Staff : M.FLORENCE DAYANA M.C.A.,M.Phil.,(Ph.D).,
Head, Dept. of CA
Bon Secours College For Women
Thanjavur.
Class : II MSc., CS
Semester : III
Unit : V
Topic : Malicious Software(Malware)
2/15/2019 1
Malicious Software
“Malicious software," malware refers to
software programs designed to damage or do
other unwanted actions on a computer
system.
Common examples of malware include
viruses,worms,trojan horses and spyware.
Terminology of malicious programme
Virus- attaches itself to a program and propogates copies of
itself to to other programs
Worm-program that propogates copies of itself to other
computers
Logic bomb-triggers when conditions occured
Trojan horse – program that contains unexpected additional
funcitionality
Kit(virus generator)-set of tools for generating new virus
automatically
Spammer-used to send large volumes of unwanted e-mail
Malicious programs
.
Independent –
Worm: automatic
propagation without
human assistance
• Host program–
Virus: human-
assisted propagation
(e.g., open email
attachment) –
Trojan: provides
desirable functionality
but hides malicious
Backdoor or Trapdoor
 Is a secret entry point into a program
 • A backdoor, which is also sometimes called a trapdoor, is a
hidden feature or command in a program that allows a user to
perform actions he or she would not normally be allowed to
do.
 • When used in a normal way, this program performs
completely as expected and advertised.
 • But if the hidden feature is activated, the program does
something unexpected, often in violation of security policies
 • example: Easter Eggs in DVDs and software ( is a hidden
message feature in an interactive work such as a computer
program, video game or DVD menu screen.
Logic Bomb
A logic bomb is a program that performs a
malicious action as a result of a certain logic
condition.
 •
Trojan Horse
 A Trojan horse is a useful program or
command procedure containing
hidden code when invoked some
unwanted function
 which is usually superficially
attractive
 eg game, s/w upgrade etc
• Crashing the computer or device.
• Modification or deletion of files.
• Data corruption.
• Formatting disks, destroying all
contents.
• Spreading malware across the
network.
• Spying on user activities and access
sensitive information
Zombie
 A zombie computer virus is a computer
that's been infected by a computer
virus or compromised by a hacker. It can
be controlled under remote direction to
perform criminal tasks, as well as infect
other computers with viruses.
often used to launch distributed denial of
service (DDoS) attacks being planted on
hundreds of computers belonging to
unsuspecting third parties, and then used
to overwhelm the target Web site by
launching an Internet traffic
Nature of Viruses
Virus is a piece of software that can “infect”
other programs by modifying them
the modification includes a copy of the virus
program, which can then go on to infect other
programs. It can be compared to biological
viruses,
carries code to make copies of itself
as well as code to perform some covert task
Once a virus is executing, it can perform any function,
such as erasing files and programs.
Virus Operation-four phases or life cycle of
virus
• • Dormant phase: virus is idle, waiting
for trigger event (eg date, program or
file , disk capacity). Not all viruses have
this stage
• • Propagation phase: virus places a
copy of itself into other programs /
certrain system areas on the disk
• • Triggering phase: virus is activated by
some trigger event to perform
intended function (ie) counting no. of
times)
• • Execution phase: desired function
such as messages on the screen,
damaging the programs and data files.
A Compression virus
Virus Structure
A virus can be preponded or postponded to an
executable program or it can be embedded
with some other fashion.
program V := // the first line is main virus program
{goto main;
1234567;
subroutine infect-executable := {loop:
file := get-random-executable-
file;
if (first-line-of-file = 1234567)
then goto loop
else prepend V to file; }
subroutine do-damage := {whatever damage is to
be done}
subroutine trigger-pulled := {return true if
condition holds}
main: main-program := {infect-executable;
if trigger-
pulled then do-damage;
goto next;}
next:
}
The second line is a special
marker for infected programs.
The main virus program first
seeks out uninfected
executable files and infects
them.
Finally, the virus transfers
control to the original program
This type of virus can be
detected because the length
of the program changes.
More sophisticated variants
attempt to hide their presence
better, by for example,
compressing the original
program.
Types of Viruses
• Parasitic virus: traditional and still most common form of virus, it attaches itself to
executable files and replicates when the infected program is executed
• • Memory-resident virus: Lodges in main memory as part of a resident system
program, and infects every program that executes
• • Boot sector virus: Infects a master boot record and spreads when a system is
booted from the disk containing the virus
• • Stealth virus: a virus explicitly designed to hide itself from detection by antivirus
software
• • Polymorphic virus: mutates with every infection, making detection by the
“signature”of the virus impossible.
• • Metamorphic virus: mutates with every infection, rewriting itself completely at
each iteration changing behavior and/or appearance, increasing the difficulty of
detection.
Macro Virus
 macro virus attached to some data file
 interpreted by program using file
 eg Word/Excel macros
 esp. using auto command & command macros
 This is platform independent
 Macro viruses take advantage of the macro feature
found in Word and other office applications.
 A macro is an executable program embedded in a
word processing document or other type of file
 have improving security in Word etc
Email Virus
 spread using email with attachment containing a
macro virus
 The first rapidly spreading e-mail viruses
 or worse even when mail viewed by using scripting
features in mail agent
 usually targeted at Microsoft Outlook mail agent &
Word/Excel documents
 need better O/S & application security
Worms
 A worm is a program that can replicate itself and
send copies from computer to computer across
network connections.
 using users distributed privileges or by exploiting
system vulnerabilities
 a network worm can behave as a computer virus or
bacteria, or it could implant Trojan horse programs
or perform any number of disruptive or destructive
actions.
Virus, Worm and Trojan - Differentiation
• A computer virus attaches itself to program or file enabling it to
spread from one computer to another, leaving infections as it
travels.
• A worm is similar to a virus by design and is considered to be a
sub-class of a virus. Worms spread from computer to computer,
but unlike a virus, it has the capability to travel without any
human action.
• A Trojan Horse is full of as much trickery as the mythological
Trojan Horse it was named after. The Trojan Horse, at first glance
will appear to be useful software but will actually do damage
once installed or run on your computer.
Morris Worm
best known classic worm
released by Robert Morris in 1988
targeted Unix systems
using several propagation techniques
simple password cracking of local pw file
exploit bug in finger protocol
exploit debug trapdoor in send mail
Worm Technology
• •Multiplatform: not limited to Windows, can attack a variety
of O/S’s, esp UNIX.
• • Multiexploit: penetrate systems in a variety of ways that
exploits like web browsers, web servers, file sharing
• • Ultrafast spreading: using prior internet connection scan to get
addresses of vulnerable machines
• • Polymorphic: skip past filters and foil real time analysis
• • Metamorphic: change both appearance & behavior patterns
• • Transport vehicles: to spread other distributed attack tools, eg
zombies
• • Zero-day exploit: exploit general network community
Anti-Virus Software
 first-generation
 Simple scanner uses virus signature to identify virus
 or change in length of programs
 second-generation
 uses heuristic scanner rules to spot viral infection
 or uses crypto hash of program to spot changes
 third-generation
 memory-resident programs identify virus by actions rather
than a structure
 fourth-generation
 Full featured protection using packages with a variety of
antivirus techniques
 arms race continues- a more comprehensive defense strategy
is employed
Advanced Anti-Virus Techniques
 Generic Decryption (GD) technology enables the
antivirus program to easily detect even the most
complex polymorphic viruses, while maintaining fast
scanning speeds, using a CPU simulator to scan
program for virus signatures & to monitor its
behavior before actually running
 There are three elements:
1. CPU emulator -a s/w based virtual computer
2. Virus signature scanner-scan the virus signature
3. Emulation control module-control the execution
Digital Immune System
typical steps in digital immune system operation:
1. A monitoring program on each PC uses a
variety of heuristics based on system behavior,
suspicious changes to programs, or family
signature to infer that a virus may be present, &
forwards infected programs to an
administrative machine
2. The administrative machine encrypts the
sample and sends it to a central virus analysis
machine
3. This machine creates an environment in which
the infected program can be safely run for
analysis to produces a prescription for
identifying and removing the virus
4. The resulting prescription is sent back to the
administrative machine
5. The administrative machine forwards the
prescription to the infected client
6. The prescription is also forwarded to other
clients in the organization
7. Subscribers around the world receive regular
antivirus updates that protect them from the

More Related Content

What's hot

Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesDr.Florence Dayana
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication CodesDarshanPatil82
 
Buffer overflow attacks
Buffer overflow attacksBuffer overflow attacks
Buffer overflow attacksJoe McCarthy
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniquesvinitha96
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionCAS
 
Malicious software
Malicious softwareMalicious software
Malicious softwaremsdeepika
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5AfiqEfendy Zaen
 
Message authentication
Message authenticationMessage authentication
Message authenticationCAS
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithmSunita Kharayat
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanismsRajapriya82
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 

What's hot (20)

Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
 
Elgamal digital signature
Elgamal digital signatureElgamal digital signature
Elgamal digital signature
 
Digital Signature ppt
Digital Signature pptDigital Signature ppt
Digital Signature ppt
 
Email security
Email securityEmail security
Email security
 
Buffer overflow attacks
Buffer overflow attacksBuffer overflow attacks
Buffer overflow attacks
 
S/MIME
S/MIMES/MIME
S/MIME
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniques
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Email security
Email securityEmail security
Email security
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
Message authentication
Message authenticationMessage authentication
Message authentication
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 

Similar to Malicious software

Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & preventionKhaleel Assadi
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch Pruthvi Monarch
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2Saud G
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and WormsGrittyCC
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System ThreatsReddhi Basu
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Pranjal Vyas
 
Presentation24190
Presentation24190Presentation24190
Presentation24190KRT395
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 

Similar to Malicious software (20)

Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Ch19
Ch19Ch19
Ch19
 
Ch19
Ch19Ch19
Ch19
 
Mitppt
MitpptMitppt
Mitppt
 
Unit - 5.ppt
Unit - 5.pptUnit - 5.ppt
Unit - 5.ppt
 
Malicious
MaliciousMalicious
Malicious
 
Presentation2
Presentation2Presentation2
Presentation2
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Malicious
MaliciousMalicious
Malicious
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System Threats
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

More from Dr.Florence Dayana

Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdfDr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdfDr.Florence Dayana
 
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdfDr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdfDr.Florence Dayana
 
M. Florence Dayana - Hadoop Foundation for Analytics.pptx
M. Florence Dayana - Hadoop Foundation for Analytics.pptxM. Florence Dayana - Hadoop Foundation for Analytics.pptx
M. Florence Dayana - Hadoop Foundation for Analytics.pptxDr.Florence Dayana
 
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdf
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdfM. FLORENCE DAYANA/unit - II logic gates and circuits.pdf
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdfDr.Florence Dayana
 
M.FLORENCE DAYANA/electronic mail security.pdf
M.FLORENCE DAYANA/electronic mail security.pdfM.FLORENCE DAYANA/electronic mail security.pdf
M.FLORENCE DAYANA/electronic mail security.pdfDr.Florence Dayana
 
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdf
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdfM. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdf
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdfDr.Florence Dayana
 
Professional English - Reading
Professional English - ReadingProfessional English - Reading
Professional English - ReadingDr.Florence Dayana
 
Professional English - Speaking
Professional English - SpeakingProfessional English - Speaking
Professional English - SpeakingDr.Florence Dayana
 
Professional English - Listening
Professional English - ListeningProfessional English - Listening
Professional English - ListeningDr.Florence Dayana
 
Network Security- Secure Socket Layer
Network Security- Secure Socket LayerNetwork Security- Secure Socket Layer
Network Security- Secure Socket LayerDr.Florence Dayana
 
M.florence dayana dream weaver
M.florence dayana   dream weaverM.florence dayana   dream weaver
M.florence dayana dream weaverDr.Florence Dayana
 
M.florence dayana computer networks transport layer
M.florence dayana   computer networks transport layerM.florence dayana   computer networks transport layer
M.florence dayana computer networks transport layerDr.Florence Dayana
 
M.Florence Dayana Computer Networks Types
M.Florence Dayana  Computer Networks TypesM.Florence Dayana  Computer Networks Types
M.Florence Dayana Computer Networks TypesDr.Florence Dayana
 
M.Florence Dayana Computer Networks Introduction
M.Florence Dayana   Computer Networks IntroductionM.Florence Dayana   Computer Networks Introduction
M.Florence Dayana Computer Networks IntroductionDr.Florence Dayana
 
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEMM. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEMDr.Florence Dayana
 
M.Florence Dayana / Basics of C Language
M.Florence Dayana / Basics of C LanguageM.Florence Dayana / Basics of C Language
M.Florence Dayana / Basics of C LanguageDr.Florence Dayana
 
M.Florence Dayana/Cryptography and Network security
M.Florence Dayana/Cryptography and Network securityM.Florence Dayana/Cryptography and Network security
M.Florence Dayana/Cryptography and Network securityDr.Florence Dayana
 

More from Dr.Florence Dayana (20)

Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdfDr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
 
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdfDr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
 
M. Florence Dayana - Hadoop Foundation for Analytics.pptx
M. Florence Dayana - Hadoop Foundation for Analytics.pptxM. Florence Dayana - Hadoop Foundation for Analytics.pptx
M. Florence Dayana - Hadoop Foundation for Analytics.pptx
 
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdf
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdfM. FLORENCE DAYANA/unit - II logic gates and circuits.pdf
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdf
 
M.FLORENCE DAYANA/electronic mail security.pdf
M.FLORENCE DAYANA/electronic mail security.pdfM.FLORENCE DAYANA/electronic mail security.pdf
M.FLORENCE DAYANA/electronic mail security.pdf
 
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdf
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdfM. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdf
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdf
 
Professional English - Reading
Professional English - ReadingProfessional English - Reading
Professional English - Reading
 
Professional English - Speaking
Professional English - SpeakingProfessional English - Speaking
Professional English - Speaking
 
Professional English - Listening
Professional English - ListeningProfessional English - Listening
Professional English - Listening
 
INPUT AND OUTPUT DEVICES.pdf
INPUT  AND OUTPUT DEVICES.pdfINPUT  AND OUTPUT DEVICES.pdf
INPUT AND OUTPUT DEVICES.pdf
 
NETWORK SECURITY-SET.pptx
NETWORK SECURITY-SET.pptxNETWORK SECURITY-SET.pptx
NETWORK SECURITY-SET.pptx
 
Network Security- Secure Socket Layer
Network Security- Secure Socket LayerNetwork Security- Secure Socket Layer
Network Security- Secure Socket Layer
 
M.florence dayana dream weaver
M.florence dayana   dream weaverM.florence dayana   dream weaver
M.florence dayana dream weaver
 
M.florence dayana computer networks transport layer
M.florence dayana   computer networks transport layerM.florence dayana   computer networks transport layer
M.florence dayana computer networks transport layer
 
M.Florence Dayana Computer Networks Types
M.Florence Dayana  Computer Networks TypesM.Florence Dayana  Computer Networks Types
M.Florence Dayana Computer Networks Types
 
M.Florence Dayana Computer Networks Introduction
M.Florence Dayana   Computer Networks IntroductionM.Florence Dayana   Computer Networks Introduction
M.Florence Dayana Computer Networks Introduction
 
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEMM. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
 
M.Florence Dayana
M.Florence DayanaM.Florence Dayana
M.Florence Dayana
 
M.Florence Dayana / Basics of C Language
M.Florence Dayana / Basics of C LanguageM.Florence Dayana / Basics of C Language
M.Florence Dayana / Basics of C Language
 
M.Florence Dayana/Cryptography and Network security
M.Florence Dayana/Cryptography and Network securityM.Florence Dayana/Cryptography and Network security
M.Florence Dayana/Cryptography and Network security
 

Recently uploaded

Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonhttgc7rh9c
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17Celine George
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of PlayPooky Knightsmith
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 

Recently uploaded (20)

Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 

Malicious software

  • 1. NETWORK SECURITY Name of the Staff : M.FLORENCE DAYANA M.C.A.,M.Phil.,(Ph.D)., Head, Dept. of CA Bon Secours College For Women Thanjavur. Class : II MSc., CS Semester : III Unit : V Topic : Malicious Software(Malware) 2/15/2019 1
  • 2. Malicious Software “Malicious software," malware refers to software programs designed to damage or do other unwanted actions on a computer system. Common examples of malware include viruses,worms,trojan horses and spyware.
  • 3. Terminology of malicious programme Virus- attaches itself to a program and propogates copies of itself to to other programs Worm-program that propogates copies of itself to other computers Logic bomb-triggers when conditions occured Trojan horse – program that contains unexpected additional funcitionality Kit(virus generator)-set of tools for generating new virus automatically Spammer-used to send large volumes of unwanted e-mail
  • 4. Malicious programs . Independent – Worm: automatic propagation without human assistance • Host program– Virus: human- assisted propagation (e.g., open email attachment) – Trojan: provides desirable functionality but hides malicious
  • 5. Backdoor or Trapdoor  Is a secret entry point into a program  • A backdoor, which is also sometimes called a trapdoor, is a hidden feature or command in a program that allows a user to perform actions he or she would not normally be allowed to do.  • When used in a normal way, this program performs completely as expected and advertised.  • But if the hidden feature is activated, the program does something unexpected, often in violation of security policies  • example: Easter Eggs in DVDs and software ( is a hidden message feature in an interactive work such as a computer program, video game or DVD menu screen.
  • 6. Logic Bomb A logic bomb is a program that performs a malicious action as a result of a certain logic condition.  •
  • 7. Trojan Horse  A Trojan horse is a useful program or command procedure containing hidden code when invoked some unwanted function  which is usually superficially attractive  eg game, s/w upgrade etc • Crashing the computer or device. • Modification or deletion of files. • Data corruption. • Formatting disks, destroying all contents. • Spreading malware across the network. • Spying on user activities and access sensitive information
  • 8. Zombie  A zombie computer virus is a computer that's been infected by a computer virus or compromised by a hacker. It can be controlled under remote direction to perform criminal tasks, as well as infect other computers with viruses. often used to launch distributed denial of service (DDoS) attacks being planted on hundreds of computers belonging to unsuspecting third parties, and then used to overwhelm the target Web site by launching an Internet traffic
  • 9. Nature of Viruses Virus is a piece of software that can “infect” other programs by modifying them the modification includes a copy of the virus program, which can then go on to infect other programs. It can be compared to biological viruses, carries code to make copies of itself as well as code to perform some covert task Once a virus is executing, it can perform any function, such as erasing files and programs.
  • 10. Virus Operation-four phases or life cycle of virus • • Dormant phase: virus is idle, waiting for trigger event (eg date, program or file , disk capacity). Not all viruses have this stage • • Propagation phase: virus places a copy of itself into other programs / certrain system areas on the disk • • Triggering phase: virus is activated by some trigger event to perform intended function (ie) counting no. of times) • • Execution phase: desired function such as messages on the screen, damaging the programs and data files.
  • 12. Virus Structure A virus can be preponded or postponded to an executable program or it can be embedded with some other fashion. program V := // the first line is main virus program {goto main; 1234567; subroutine infect-executable := {loop: file := get-random-executable- file; if (first-line-of-file = 1234567) then goto loop else prepend V to file; } subroutine do-damage := {whatever damage is to be done} subroutine trigger-pulled := {return true if condition holds} main: main-program := {infect-executable; if trigger- pulled then do-damage; goto next;} next: } The second line is a special marker for infected programs. The main virus program first seeks out uninfected executable files and infects them. Finally, the virus transfers control to the original program This type of virus can be detected because the length of the program changes. More sophisticated variants attempt to hide their presence better, by for example, compressing the original program.
  • 13. Types of Viruses • Parasitic virus: traditional and still most common form of virus, it attaches itself to executable files and replicates when the infected program is executed • • Memory-resident virus: Lodges in main memory as part of a resident system program, and infects every program that executes • • Boot sector virus: Infects a master boot record and spreads when a system is booted from the disk containing the virus • • Stealth virus: a virus explicitly designed to hide itself from detection by antivirus software • • Polymorphic virus: mutates with every infection, making detection by the “signature”of the virus impossible. • • Metamorphic virus: mutates with every infection, rewriting itself completely at each iteration changing behavior and/or appearance, increasing the difficulty of detection.
  • 14. Macro Virus  macro virus attached to some data file  interpreted by program using file  eg Word/Excel macros  esp. using auto command & command macros  This is platform independent  Macro viruses take advantage of the macro feature found in Word and other office applications.  A macro is an executable program embedded in a word processing document or other type of file  have improving security in Word etc
  • 15. Email Virus  spread using email with attachment containing a macro virus  The first rapidly spreading e-mail viruses  or worse even when mail viewed by using scripting features in mail agent  usually targeted at Microsoft Outlook mail agent & Word/Excel documents  need better O/S & application security
  • 16. Worms  A worm is a program that can replicate itself and send copies from computer to computer across network connections.  using users distributed privileges or by exploiting system vulnerabilities  a network worm can behave as a computer virus or bacteria, or it could implant Trojan horse programs or perform any number of disruptive or destructive actions.
  • 17. Virus, Worm and Trojan - Differentiation • A computer virus attaches itself to program or file enabling it to spread from one computer to another, leaving infections as it travels. • A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. • A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer.
  • 18. Morris Worm best known classic worm released by Robert Morris in 1988 targeted Unix systems using several propagation techniques simple password cracking of local pw file exploit bug in finger protocol exploit debug trapdoor in send mail
  • 19. Worm Technology • •Multiplatform: not limited to Windows, can attack a variety of O/S’s, esp UNIX. • • Multiexploit: penetrate systems in a variety of ways that exploits like web browsers, web servers, file sharing • • Ultrafast spreading: using prior internet connection scan to get addresses of vulnerable machines • • Polymorphic: skip past filters and foil real time analysis • • Metamorphic: change both appearance & behavior patterns • • Transport vehicles: to spread other distributed attack tools, eg zombies • • Zero-day exploit: exploit general network community
  • 20. Anti-Virus Software  first-generation  Simple scanner uses virus signature to identify virus  or change in length of programs  second-generation  uses heuristic scanner rules to spot viral infection  or uses crypto hash of program to spot changes  third-generation  memory-resident programs identify virus by actions rather than a structure  fourth-generation  Full featured protection using packages with a variety of antivirus techniques  arms race continues- a more comprehensive defense strategy is employed
  • 21. Advanced Anti-Virus Techniques  Generic Decryption (GD) technology enables the antivirus program to easily detect even the most complex polymorphic viruses, while maintaining fast scanning speeds, using a CPU simulator to scan program for virus signatures & to monitor its behavior before actually running  There are three elements: 1. CPU emulator -a s/w based virtual computer 2. Virus signature scanner-scan the virus signature 3. Emulation control module-control the execution
  • 22. Digital Immune System typical steps in digital immune system operation: 1. A monitoring program on each PC uses a variety of heuristics based on system behavior, suspicious changes to programs, or family signature to infer that a virus may be present, & forwards infected programs to an administrative machine 2. The administrative machine encrypts the sample and sends it to a central virus analysis machine 3. This machine creates an environment in which the infected program can be safely run for analysis to produces a prescription for identifying and removing the virus 4. The resulting prescription is sent back to the administrative machine 5. The administrative machine forwards the prescription to the infected client 6. The prescription is also forwarded to other clients in the organization 7. Subscribers around the world receive regular antivirus updates that protect them from the