SlideShare a Scribd company logo
1 of 22
Download to read offline
NETWORK SECURITY
Name of the Staff : M.FLORENCE DAYANA M.C.A.,M.Phil.,(Ph.D).,
Head, Dept. of CA
Bon Secours College For Women
Thanjavur.
Class : II MSc., CS
Semester : III
Unit : V
Topic : Malicious Software(Malware)
2/15/2019 1
Malicious Software
“Malicious software," malware refers to
software programs designed to damage or do
other unwanted actions on a computer
system.
Common examples of malware include
viruses,worms,trojan horses and spyware.
Terminology of malicious programme
Virus- attaches itself to a program and propogates copies of
itself to to other programs
Worm-program that propogates copies of itself to other
computers
Logic bomb-triggers when conditions occured
Trojan horse – program that contains unexpected additional
funcitionality
Kit(virus generator)-set of tools for generating new virus
automatically
Spammer-used to send large volumes of unwanted e-mail
Malicious programs
.
Independent –
Worm: automatic
propagation without
human assistance
• Host program–
Virus: human-
assisted propagation
(e.g., open email
attachment) –
Trojan: provides
desirable functionality
but hides malicious
Backdoor or Trapdoor
 Is a secret entry point into a program
 • A backdoor, which is also sometimes called a trapdoor, is a
hidden feature or command in a program that allows a user to
perform actions he or she would not normally be allowed to
do.
 • When used in a normal way, this program performs
completely as expected and advertised.
 • But if the hidden feature is activated, the program does
something unexpected, often in violation of security policies
 • example: Easter Eggs in DVDs and software ( is a hidden
message feature in an interactive work such as a computer
program, video game or DVD menu screen.
Logic Bomb
A logic bomb is a program that performs a
malicious action as a result of a certain logic
condition.
 •
Trojan Horse
 A Trojan horse is a useful program or
command procedure containing
hidden code when invoked some
unwanted function
 which is usually superficially
attractive
 eg game, s/w upgrade etc
• Crashing the computer or device.
• Modification or deletion of files.
• Data corruption.
• Formatting disks, destroying all
contents.
• Spreading malware across the
network.
• Spying on user activities and access
sensitive information
Zombie
 A zombie computer virus is a computer
that's been infected by a computer
virus or compromised by a hacker. It can
be controlled under remote direction to
perform criminal tasks, as well as infect
other computers with viruses.
often used to launch distributed denial of
service (DDoS) attacks being planted on
hundreds of computers belonging to
unsuspecting third parties, and then used
to overwhelm the target Web site by
launching an Internet traffic
Nature of Viruses
Virus is a piece of software that can “infect”
other programs by modifying them
the modification includes a copy of the virus
program, which can then go on to infect other
programs. It can be compared to biological
viruses,
carries code to make copies of itself
as well as code to perform some covert task
Once a virus is executing, it can perform any function,
such as erasing files and programs.
Virus Operation-four phases or life cycle of
virus
• • Dormant phase: virus is idle, waiting
for trigger event (eg date, program or
file , disk capacity). Not all viruses have
this stage
• • Propagation phase: virus places a
copy of itself into other programs /
certrain system areas on the disk
• • Triggering phase: virus is activated by
some trigger event to perform
intended function (ie) counting no. of
times)
• • Execution phase: desired function
such as messages on the screen,
damaging the programs and data files.
A Compression virus
Virus Structure
A virus can be preponded or postponded to an
executable program or it can be embedded
with some other fashion.
program V := // the first line is main virus program
{goto main;
1234567;
subroutine infect-executable := {loop:
file := get-random-executable-
file;
if (first-line-of-file = 1234567)
then goto loop
else prepend V to file; }
subroutine do-damage := {whatever damage is to
be done}
subroutine trigger-pulled := {return true if
condition holds}
main: main-program := {infect-executable;
if trigger-
pulled then do-damage;
goto next;}
next:
}
The second line is a special
marker for infected programs.
The main virus program first
seeks out uninfected
executable files and infects
them.
Finally, the virus transfers
control to the original program
This type of virus can be
detected because the length
of the program changes.
More sophisticated variants
attempt to hide their presence
better, by for example,
compressing the original
program.
Types of Viruses
• Parasitic virus: traditional and still most common form of virus, it attaches itself to
executable files and replicates when the infected program is executed
• • Memory-resident virus: Lodges in main memory as part of a resident system
program, and infects every program that executes
• • Boot sector virus: Infects a master boot record and spreads when a system is
booted from the disk containing the virus
• • Stealth virus: a virus explicitly designed to hide itself from detection by antivirus
software
• • Polymorphic virus: mutates with every infection, making detection by the
“signature”of the virus impossible.
• • Metamorphic virus: mutates with every infection, rewriting itself completely at
each iteration changing behavior and/or appearance, increasing the difficulty of
detection.
Macro Virus
 macro virus attached to some data file
 interpreted by program using file
 eg Word/Excel macros
 esp. using auto command & command macros
 This is platform independent
 Macro viruses take advantage of the macro feature
found in Word and other office applications.
 A macro is an executable program embedded in a
word processing document or other type of file
 have improving security in Word etc
Email Virus
 spread using email with attachment containing a
macro virus
 The first rapidly spreading e-mail viruses
 or worse even when mail viewed by using scripting
features in mail agent
 usually targeted at Microsoft Outlook mail agent &
Word/Excel documents
 need better O/S & application security
Worms
 A worm is a program that can replicate itself and
send copies from computer to computer across
network connections.
 using users distributed privileges or by exploiting
system vulnerabilities
 a network worm can behave as a computer virus or
bacteria, or it could implant Trojan horse programs
or perform any number of disruptive or destructive
actions.
Virus, Worm and Trojan - Differentiation
• A computer virus attaches itself to program or file enabling it to
spread from one computer to another, leaving infections as it
travels.
• A worm is similar to a virus by design and is considered to be a
sub-class of a virus. Worms spread from computer to computer,
but unlike a virus, it has the capability to travel without any
human action.
• A Trojan Horse is full of as much trickery as the mythological
Trojan Horse it was named after. The Trojan Horse, at first glance
will appear to be useful software but will actually do damage
once installed or run on your computer.
Morris Worm
best known classic worm
released by Robert Morris in 1988
targeted Unix systems
using several propagation techniques
simple password cracking of local pw file
exploit bug in finger protocol
exploit debug trapdoor in send mail
Worm Technology
• •Multiplatform: not limited to Windows, can attack a variety
of O/S’s, esp UNIX.
• • Multiexploit: penetrate systems in a variety of ways that
exploits like web browsers, web servers, file sharing
• • Ultrafast spreading: using prior internet connection scan to get
addresses of vulnerable machines
• • Polymorphic: skip past filters and foil real time analysis
• • Metamorphic: change both appearance & behavior patterns
• • Transport vehicles: to spread other distributed attack tools, eg
zombies
• • Zero-day exploit: exploit general network community
Anti-Virus Software
 first-generation
 Simple scanner uses virus signature to identify virus
 or change in length of programs
 second-generation
 uses heuristic scanner rules to spot viral infection
 or uses crypto hash of program to spot changes
 third-generation
 memory-resident programs identify virus by actions rather
than a structure
 fourth-generation
 Full featured protection using packages with a variety of
antivirus techniques
 arms race continues- a more comprehensive defense strategy
is employed
Advanced Anti-Virus Techniques
 Generic Decryption (GD) technology enables the
antivirus program to easily detect even the most
complex polymorphic viruses, while maintaining fast
scanning speeds, using a CPU simulator to scan
program for virus signatures & to monitor its
behavior before actually running
 There are three elements:
1. CPU emulator -a s/w based virtual computer
2. Virus signature scanner-scan the virus signature
3. Emulation control module-control the execution
Digital Immune System
typical steps in digital immune system operation:
1. A monitoring program on each PC uses a
variety of heuristics based on system behavior,
suspicious changes to programs, or family
signature to infer that a virus may be present, &
forwards infected programs to an
administrative machine
2. The administrative machine encrypts the
sample and sends it to a central virus analysis
machine
3. This machine creates an environment in which
the infected program can be safely run for
analysis to produces a prescription for
identifying and removing the virus
4. The resulting prescription is sent back to the
administrative machine
5. The administrative machine forwards the
prescription to the infected client
6. The prescription is also forwarded to other
clients in the organization
7. Subscribers around the world receive regular
antivirus updates that protect them from the

More Related Content

What's hot

Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating systemAbou Bakr Ashraf
 
Protection and security
Protection and securityProtection and security
Protection and securitymbadhi
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 
Operating system security
Operating system securityOperating system security
Operating system securityRamesh Ogania
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentationikmal91
 
distributed shared memory
 distributed shared memory distributed shared memory
distributed shared memoryAshish Kumar
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle AttackDeepak Upadhyay
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software securityG Prachi
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
 
Cia security model
Cia security modelCia security model
Cia security modelImran Ahmed
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Protection and Security in Operating Systems
Protection and Security in Operating SystemsProtection and Security in Operating Systems
Protection and Security in Operating Systemsvampugani
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9koolkampus
 

What's hot (20)

Security & protection in operating system
Security & protection in operating systemSecurity & protection in operating system
Security & protection in operating system
 
Protection and security
Protection and securityProtection and security
Protection and security
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Trojan Horse Presentation
Trojan Horse PresentationTrojan Horse Presentation
Trojan Horse Presentation
 
distributed shared memory
 distributed shared memory distributed shared memory
distributed shared memory
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Web Security
Web SecurityWeb Security
Web Security
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle Attack
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Malicious
MaliciousMalicious
Malicious
 
Cia security model
Cia security modelCia security model
Cia security model
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Cryptography
CryptographyCryptography
Cryptography
 
Protection and Security in Operating Systems
Protection and Security in Operating SystemsProtection and Security in Operating Systems
Protection and Security in Operating Systems
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
 

Similar to Malicious software

Malicious software
Malicious softwareMalicious software
Malicious softwaremsdeepika
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & preventionKhaleel Assadi
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch Pruthvi Monarch
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2Saud G
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and WormsGrittyCC
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System ThreatsReddhi Basu
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakrabortysankhadeep
 
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Pranjal Vyas
 
Presentation24190
Presentation24190Presentation24190
Presentation24190KRT395
 
Computer viruses
Computer virusesComputer viruses
Computer virusesSimiAttri
 

Similar to Malicious software (20)

Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Ch19
Ch19Ch19
Ch19
 
Ch19
Ch19Ch19
Ch19
 
Mitppt
MitpptMitppt
Mitppt
 
Unit - 5.ppt
Unit - 5.pptUnit - 5.ppt
Unit - 5.ppt
 
Malicious
MaliciousMalicious
Malicious
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Presentation2
Presentation2Presentation2
Presentation2
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System Threats
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

More from Dr.Florence Dayana

Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdfDr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdfDr.Florence Dayana
 
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdfDr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdfDr.Florence Dayana
 
M. Florence Dayana - Hadoop Foundation for Analytics.pptx
M. Florence Dayana - Hadoop Foundation for Analytics.pptxM. Florence Dayana - Hadoop Foundation for Analytics.pptx
M. Florence Dayana - Hadoop Foundation for Analytics.pptxDr.Florence Dayana
 
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdf
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdfM. FLORENCE DAYANA/unit - II logic gates and circuits.pdf
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdfDr.Florence Dayana
 
M.FLORENCE DAYANA/electronic mail security.pdf
M.FLORENCE DAYANA/electronic mail security.pdfM.FLORENCE DAYANA/electronic mail security.pdf
M.FLORENCE DAYANA/electronic mail security.pdfDr.Florence Dayana
 
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdf
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdfM. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdf
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdfDr.Florence Dayana
 
Professional English - Reading
Professional English - ReadingProfessional English - Reading
Professional English - ReadingDr.Florence Dayana
 
Professional English - Speaking
Professional English - SpeakingProfessional English - Speaking
Professional English - SpeakingDr.Florence Dayana
 
Professional English - Listening
Professional English - ListeningProfessional English - Listening
Professional English - ListeningDr.Florence Dayana
 
Network Security- Secure Socket Layer
Network Security- Secure Socket LayerNetwork Security- Secure Socket Layer
Network Security- Secure Socket LayerDr.Florence Dayana
 
M.florence dayana dream weaver
M.florence dayana   dream weaverM.florence dayana   dream weaver
M.florence dayana dream weaverDr.Florence Dayana
 
M.florence dayana computer networks transport layer
M.florence dayana   computer networks transport layerM.florence dayana   computer networks transport layer
M.florence dayana computer networks transport layerDr.Florence Dayana
 
M.Florence Dayana Computer Networks Types
M.Florence Dayana  Computer Networks TypesM.Florence Dayana  Computer Networks Types
M.Florence Dayana Computer Networks TypesDr.Florence Dayana
 
M.Florence Dayana Computer Networks Introduction
M.Florence Dayana   Computer Networks IntroductionM.Florence Dayana   Computer Networks Introduction
M.Florence Dayana Computer Networks IntroductionDr.Florence Dayana
 
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEMM. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEMDr.Florence Dayana
 
M.Florence Dayana / Basics of C Language
M.Florence Dayana / Basics of C LanguageM.Florence Dayana / Basics of C Language
M.Florence Dayana / Basics of C LanguageDr.Florence Dayana
 
M.Florence Dayana/Cryptography and Network security
M.Florence Dayana/Cryptography and Network securityM.Florence Dayana/Cryptography and Network security
M.Florence Dayana/Cryptography and Network securityDr.Florence Dayana
 

More from Dr.Florence Dayana (20)

Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdfDr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
Dr.M.Florence Dayana-Cloud Computing-unit - 4.pdf
 
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdfDr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
Dr.M.Florence Dayana-Cloud Computing-Unit - 1.pdf
 
M. Florence Dayana - Hadoop Foundation for Analytics.pptx
M. Florence Dayana - Hadoop Foundation for Analytics.pptxM. Florence Dayana - Hadoop Foundation for Analytics.pptx
M. Florence Dayana - Hadoop Foundation for Analytics.pptx
 
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdf
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdfM. FLORENCE DAYANA/unit - II logic gates and circuits.pdf
M. FLORENCE DAYANA/unit - II logic gates and circuits.pdf
 
M.FLORENCE DAYANA/electronic mail security.pdf
M.FLORENCE DAYANA/electronic mail security.pdfM.FLORENCE DAYANA/electronic mail security.pdf
M.FLORENCE DAYANA/electronic mail security.pdf
 
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdf
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdfM. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdf
M. FLORENCE DAYANA - INPUT & OUTPUT DEVICES.pdf
 
Professional English - Reading
Professional English - ReadingProfessional English - Reading
Professional English - Reading
 
Professional English - Speaking
Professional English - SpeakingProfessional English - Speaking
Professional English - Speaking
 
Professional English - Listening
Professional English - ListeningProfessional English - Listening
Professional English - Listening
 
INPUT AND OUTPUT DEVICES.pdf
INPUT  AND OUTPUT DEVICES.pdfINPUT  AND OUTPUT DEVICES.pdf
INPUT AND OUTPUT DEVICES.pdf
 
NETWORK SECURITY-SET.pptx
NETWORK SECURITY-SET.pptxNETWORK SECURITY-SET.pptx
NETWORK SECURITY-SET.pptx
 
Network Security- Secure Socket Layer
Network Security- Secure Socket LayerNetwork Security- Secure Socket Layer
Network Security- Secure Socket Layer
 
M.florence dayana dream weaver
M.florence dayana   dream weaverM.florence dayana   dream weaver
M.florence dayana dream weaver
 
M.florence dayana computer networks transport layer
M.florence dayana   computer networks transport layerM.florence dayana   computer networks transport layer
M.florence dayana computer networks transport layer
 
M.Florence Dayana Computer Networks Types
M.Florence Dayana  Computer Networks TypesM.Florence Dayana  Computer Networks Types
M.Florence Dayana Computer Networks Types
 
M.Florence Dayana Computer Networks Introduction
M.Florence Dayana   Computer Networks IntroductionM.Florence Dayana   Computer Networks Introduction
M.Florence Dayana Computer Networks Introduction
 
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEMM. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
M. FLORENCE DAYANA/DATABASE MANAGEMENT SYSYTEM
 
M.Florence Dayana
M.Florence DayanaM.Florence Dayana
M.Florence Dayana
 
M.Florence Dayana / Basics of C Language
M.Florence Dayana / Basics of C LanguageM.Florence Dayana / Basics of C Language
M.Florence Dayana / Basics of C Language
 
M.Florence Dayana/Cryptography and Network security
M.Florence Dayana/Cryptography and Network securityM.Florence Dayana/Cryptography and Network security
M.Florence Dayana/Cryptography and Network security
 

Recently uploaded

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 

Recently uploaded (20)

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 

Malicious software

  • 1. NETWORK SECURITY Name of the Staff : M.FLORENCE DAYANA M.C.A.,M.Phil.,(Ph.D)., Head, Dept. of CA Bon Secours College For Women Thanjavur. Class : II MSc., CS Semester : III Unit : V Topic : Malicious Software(Malware) 2/15/2019 1
  • 2. Malicious Software “Malicious software," malware refers to software programs designed to damage or do other unwanted actions on a computer system. Common examples of malware include viruses,worms,trojan horses and spyware.
  • 3. Terminology of malicious programme Virus- attaches itself to a program and propogates copies of itself to to other programs Worm-program that propogates copies of itself to other computers Logic bomb-triggers when conditions occured Trojan horse – program that contains unexpected additional funcitionality Kit(virus generator)-set of tools for generating new virus automatically Spammer-used to send large volumes of unwanted e-mail
  • 4. Malicious programs . Independent – Worm: automatic propagation without human assistance • Host program– Virus: human- assisted propagation (e.g., open email attachment) – Trojan: provides desirable functionality but hides malicious
  • 5. Backdoor or Trapdoor  Is a secret entry point into a program  • A backdoor, which is also sometimes called a trapdoor, is a hidden feature or command in a program that allows a user to perform actions he or she would not normally be allowed to do.  • When used in a normal way, this program performs completely as expected and advertised.  • But if the hidden feature is activated, the program does something unexpected, often in violation of security policies  • example: Easter Eggs in DVDs and software ( is a hidden message feature in an interactive work such as a computer program, video game or DVD menu screen.
  • 6. Logic Bomb A logic bomb is a program that performs a malicious action as a result of a certain logic condition.  •
  • 7. Trojan Horse  A Trojan horse is a useful program or command procedure containing hidden code when invoked some unwanted function  which is usually superficially attractive  eg game, s/w upgrade etc • Crashing the computer or device. • Modification or deletion of files. • Data corruption. • Formatting disks, destroying all contents. • Spreading malware across the network. • Spying on user activities and access sensitive information
  • 8. Zombie  A zombie computer virus is a computer that's been infected by a computer virus or compromised by a hacker. It can be controlled under remote direction to perform criminal tasks, as well as infect other computers with viruses. often used to launch distributed denial of service (DDoS) attacks being planted on hundreds of computers belonging to unsuspecting third parties, and then used to overwhelm the target Web site by launching an Internet traffic
  • 9. Nature of Viruses Virus is a piece of software that can “infect” other programs by modifying them the modification includes a copy of the virus program, which can then go on to infect other programs. It can be compared to biological viruses, carries code to make copies of itself as well as code to perform some covert task Once a virus is executing, it can perform any function, such as erasing files and programs.
  • 10. Virus Operation-four phases or life cycle of virus • • Dormant phase: virus is idle, waiting for trigger event (eg date, program or file , disk capacity). Not all viruses have this stage • • Propagation phase: virus places a copy of itself into other programs / certrain system areas on the disk • • Triggering phase: virus is activated by some trigger event to perform intended function (ie) counting no. of times) • • Execution phase: desired function such as messages on the screen, damaging the programs and data files.
  • 12. Virus Structure A virus can be preponded or postponded to an executable program or it can be embedded with some other fashion. program V := // the first line is main virus program {goto main; 1234567; subroutine infect-executable := {loop: file := get-random-executable- file; if (first-line-of-file = 1234567) then goto loop else prepend V to file; } subroutine do-damage := {whatever damage is to be done} subroutine trigger-pulled := {return true if condition holds} main: main-program := {infect-executable; if trigger- pulled then do-damage; goto next;} next: } The second line is a special marker for infected programs. The main virus program first seeks out uninfected executable files and infects them. Finally, the virus transfers control to the original program This type of virus can be detected because the length of the program changes. More sophisticated variants attempt to hide their presence better, by for example, compressing the original program.
  • 13. Types of Viruses • Parasitic virus: traditional and still most common form of virus, it attaches itself to executable files and replicates when the infected program is executed • • Memory-resident virus: Lodges in main memory as part of a resident system program, and infects every program that executes • • Boot sector virus: Infects a master boot record and spreads when a system is booted from the disk containing the virus • • Stealth virus: a virus explicitly designed to hide itself from detection by antivirus software • • Polymorphic virus: mutates with every infection, making detection by the “signature”of the virus impossible. • • Metamorphic virus: mutates with every infection, rewriting itself completely at each iteration changing behavior and/or appearance, increasing the difficulty of detection.
  • 14. Macro Virus  macro virus attached to some data file  interpreted by program using file  eg Word/Excel macros  esp. using auto command & command macros  This is platform independent  Macro viruses take advantage of the macro feature found in Word and other office applications.  A macro is an executable program embedded in a word processing document or other type of file  have improving security in Word etc
  • 15. Email Virus  spread using email with attachment containing a macro virus  The first rapidly spreading e-mail viruses  or worse even when mail viewed by using scripting features in mail agent  usually targeted at Microsoft Outlook mail agent & Word/Excel documents  need better O/S & application security
  • 16. Worms  A worm is a program that can replicate itself and send copies from computer to computer across network connections.  using users distributed privileges or by exploiting system vulnerabilities  a network worm can behave as a computer virus or bacteria, or it could implant Trojan horse programs or perform any number of disruptive or destructive actions.
  • 17. Virus, Worm and Trojan - Differentiation • A computer virus attaches itself to program or file enabling it to spread from one computer to another, leaving infections as it travels. • A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. • A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer.
  • 18. Morris Worm best known classic worm released by Robert Morris in 1988 targeted Unix systems using several propagation techniques simple password cracking of local pw file exploit bug in finger protocol exploit debug trapdoor in send mail
  • 19. Worm Technology • •Multiplatform: not limited to Windows, can attack a variety of O/S’s, esp UNIX. • • Multiexploit: penetrate systems in a variety of ways that exploits like web browsers, web servers, file sharing • • Ultrafast spreading: using prior internet connection scan to get addresses of vulnerable machines • • Polymorphic: skip past filters and foil real time analysis • • Metamorphic: change both appearance & behavior patterns • • Transport vehicles: to spread other distributed attack tools, eg zombies • • Zero-day exploit: exploit general network community
  • 20. Anti-Virus Software  first-generation  Simple scanner uses virus signature to identify virus  or change in length of programs  second-generation  uses heuristic scanner rules to spot viral infection  or uses crypto hash of program to spot changes  third-generation  memory-resident programs identify virus by actions rather than a structure  fourth-generation  Full featured protection using packages with a variety of antivirus techniques  arms race continues- a more comprehensive defense strategy is employed
  • 21. Advanced Anti-Virus Techniques  Generic Decryption (GD) technology enables the antivirus program to easily detect even the most complex polymorphic viruses, while maintaining fast scanning speeds, using a CPU simulator to scan program for virus signatures & to monitor its behavior before actually running  There are three elements: 1. CPU emulator -a s/w based virtual computer 2. Virus signature scanner-scan the virus signature 3. Emulation control module-control the execution
  • 22. Digital Immune System typical steps in digital immune system operation: 1. A monitoring program on each PC uses a variety of heuristics based on system behavior, suspicious changes to programs, or family signature to infer that a virus may be present, & forwards infected programs to an administrative machine 2. The administrative machine encrypts the sample and sends it to a central virus analysis machine 3. This machine creates an environment in which the infected program can be safely run for analysis to produces a prescription for identifying and removing the virus 4. The resulting prescription is sent back to the administrative machine 5. The administrative machine forwards the prescription to the infected client 6. The prescription is also forwarded to other clients in the organization 7. Subscribers around the world receive regular antivirus updates that protect them from the