SlideShare a Scribd company logo
1 of 15
Malware
Menon Harishankar Krishnakumar
S6-CSE 13
Contents
O What is Malware?
O Brain Virus
O Morris Worm
O Code Red
O SQL Slammer
O Trojan
O Malware Detection
O Future of Malware
What is Malware?
O malicious software, such as a virus, which is
specifically designed to disrupt or damage a
computer system.
O The infecting style of different malware are
entirely different
O General Categories of malware
Trojan
Horse
RabbitTrapdoor
Malware
Virus Wor
m
Brain Virus
O First Virus introduced to world-1986.
O Not malicious - not harmful – annoying.
O Places itself in boot sector and other places.
O Screens all the disk access to maintain.
O On access it would reinstall itself.
Morris Worm
O An important attack occurred which changed
world security level.
O Infecting via e-mail exchange - designed by
students of Cornell university.
O Morris's worm failed – no rechecking.
O Main Three procedures of this worm
O Determine whether it could spread.
O Spread infection when possible.
O Remain undiscovered.
O Designed in C code which gave a nuclear attack
impact to internet of 1988.
Code Red
O July -2001 Affects 2.5lakhs in 10-15 hours.
O But only affected 7.5 lakh out of 60lakh
susceptible systems worldwide.
O Gained access via Microsoft server and
undergoes the “buffer overflow”.
O Working method Is based on days.
O Day 1-19:Spread
O Day 20-27: DDoS
O A copy cat version of code red-reboots the system
to flush all traces of the worm.
SQL Slammer
O Came in 2004- Affecting 2.5lakh in 10
minutes.
O Affects via browsing Internet sites.
O Attacks one internet site and inside that
site it randomly generates IP addresses
and spread
O Burns down the bandwidth.
O Worm code was small 376 byte as firewall
denies small packets.
Trojan Horse
O Came from mac- harmless but annoying.
O It’s a click launch application virus.
O Trojan visually looks like a simple file
(mp3,word,ppt etc..) but on click event launches
the “duplicating virus code”
O Trojan is simple to design and its strength can
be altered.
O Best example :Short cut virus a.k.a autorun
virus
Malware Detection
O Three main methods:-
O Signature Detection
O Change Detection
O Anomaly detection
O Signature Detection:
O Each virus of a particular type have some thing
common.
O Minimum burden for user.
O Problems:
O Can only detect known virus.
O May remove important files.
O Change Detection:
O A change in file which is unexpected shows
presence of virus.
O Hash function
O Advantages:
O Virtually no false negatives
O Detect previously known malware
O Dis Advantage:
O Many false positives
O Causes Heavy burden to user
O Anomaly Detection:
O Based on Intrusion Detection systems(IDs).
O Difficult part here is to make it realize what is
“normal”.
O It can detect previously unknown malware.
O A file can change its anomaly and enter.
O This detection is not stand alone always combines
with any one above.
Future of Malware
O New malwares are created by writers for
future security.
O Polymorphic virus:-
O Encrypted with different keys each time it
propagates.
O Used to mask a signature
O Decrypted is also masked
O Difficult to detect but not impossible
O Metamorphic Virus:-
O Mutates before infecting and spreads inside
the system
O Even If original virus/worm is detected the
mutated one still remains with different
signature
O Warhol Worm:-
O Similar like SQL Slammer but with reduced
bandwidth utility.
O Creates “hit list”
O Via each hit list sites are infected first and finds
vulnerable IP address.
O 507 209.235.136.112
O 467 37.59.87.162
O 312 212.122.222.32
O 268 88.191.116.184
O 245 216.69.224.11
O 236 184.171.241.132
O 225 94.23.230.97
O 207 216.75.35.176
O 207 209.235.136.116
O 196 67.228.195.2
O 178 176.31.124.28
O 142 46.105.99.187
O 133 88.198.164.237
O 128 176.31.239.45
O 126 200.98.137.215
O 112 209.235.136.113
O 108 193.34.131.144
O 107 64.9.215.134
O 102 201.47.74.114
O 101 72.32.123.95
O 98 74.63.216.3
O 94 77.79.121.92
O 93 94.73.156.146
O 93 72.47.192.128
O 93 1.234.4.69
O 85 95.163.15.34
58 194.88.212.212
58 188.165.249.102
57 92.114.87.156
57 37.59.42.18
56 219.83.123.173
55 79.99.133.138
55 50.97.215.122
55 213.171.37.206
55 119.110.97.142
54 83.143.81.242
54 203.217.172.52
52 121.125.79.179
51 177.12.161.31
50 189.38.90.45
49 208.116.60.43
48 67.218.96.160
47 207.210.231.42
46 24.35.157.72
46 204.232.204.219
45 109.104.76.142
44 80.82.116.51
44 216.18.193.140
43 77.109.127.41
42 210.127.253.245
42 205.186.132.28
41 91.121.68.33
41 90.198.87.118
41 83.169.39.233
40 203.201.173.150
39 70.32.83.233
39 200.98.147.111
39 176.9.21.235
38 91.121.161.131
38 31.210.113.232
37 91.195.214.12
36 80.91.80.242
36 64.34.166.146
36 188.165.254.104
35 31.210.48.34
35 200.98.149.187
35 184.106.130.234
34 72.232.194.50
34 216.218.208.130
34 207.250.111.6
34 188.132.228.146
33 87.253.155.151
33 188.165.212.9
33 188.121.54.44
33 184.106.150.41
32 87.106.109.97
32 148.241.188.18
31 75.149.34.188
28 178.63.60.83
27 94.23.39.53
27 94.124.120.40
27 81.196.196.141
27 79.121.103.71
27 72.32.115.16
27 37.58.64.66
27 222.122.45.146
27 213.85.69.7
27 213.188.134.17
27 212.67.205.187
26 89.18.182.140
26 46.254.17.117
26 210.127.253.231
26 207.99.28.140
26 205.186.152.222
26 200.98.141.45
26
108 193.34.131.144
107 64.9.215.134
102 201.47.74.114
101 72.32.123.95
98 74.63.216.3
94 77.79.121.92
93 94.73.156.146
Vulnerable IP Address generated
Today
Thank You

More Related Content

What's hot

Ransomware attack
Ransomware attackRansomware attack
Ransomware attackAmna
 
Malware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptxMalware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptxAlamgir Hossain
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on itWSO2
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testingNezar Alazzabi
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
SQL INJECTION
SQL INJECTIONSQL INJECTION
SQL INJECTIONAnoop T
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoorsGaurav Dalvi
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention systemNikhil Raj
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems Cleverence Kombe
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's typesAakash Baloch
 

What's hot (20)

Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Malware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptxMalware Detection Approaches using Data Mining Techniques.pptx
Malware Detection Approaches using Data Mining Techniques.pptx
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
SQL INJECTION
SQL INJECTIONSQL INJECTION
SQL INJECTION
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
System security
System securitySystem security
System security
 
Web Hacking
Web HackingWeb Hacking
Web Hacking
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Malware
MalwareMalware
Malware
 
Malware analysis
Malware analysisMalware analysis
Malware analysis
 
Incident response process
Incident response processIncident response process
Incident response process
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
Spyware
SpywareSpyware
Spyware
 

Viewers also liked

Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware AnalysisAndrew McNicol
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...Sam Bowne
 

Viewers also liked (7)

Malware
Malware Malware
Malware
 
Malware
MalwareMalware
Malware
 
Viruses andthreats@dharmesh
Viruses andthreats@dharmeshViruses andthreats@dharmesh
Viruses andthreats@dharmesh
 
Introduction to Malware Analysis
Introduction to Malware AnalysisIntroduction to Malware Analysis
Introduction to Malware Analysis
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 

Similar to Malware- Types, Detection and Future

IS project virus (1).pptx
IS project virus (1).pptxIS project virus (1).pptx
IS project virus (1).pptxNaveenK432671
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan100701982
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan100701982
 
Malware's Most Wanted: How to tell BADware from adware
Malware's Most Wanted: How to tell BADware from adwareMalware's Most Wanted: How to tell BADware from adware
Malware's Most Wanted: How to tell BADware from adwareCyphort
 
Worm Propagation Simulation Analysis
Worm Propagation Simulation AnalysisWorm Propagation Simulation Analysis
Worm Propagation Simulation Analysisallengalvan
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareTeodoro Cipresso
 
Ceh v8 labs module 07 viruses and worms
Ceh v8 labs module 07 viruses and wormsCeh v8 labs module 07 viruses and worms
Ceh v8 labs module 07 viruses and wormsMehrdad Jingoism
 
Viruses and Anti-Viruses
Viruses and Anti-VirusesViruses and Anti-Viruses
Viruses and Anti-VirusesAyman Hussein
 
Red teaming the CCDC
Red teaming the CCDCRed teaming the CCDC
Red teaming the CCDCscriptjunkie
 
What is Malware (Antivirus)
What is Malware (Antivirus)What is Malware (Antivirus)
What is Malware (Antivirus)Paras Intotech
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And AntivirusLokesh Kumar N
 

Similar to Malware- Types, Detection and Future (20)

virus
virusvirus
virus
 
IS project virus (1).pptx
IS project virus (1).pptxIS project virus (1).pptx
IS project virus (1).pptx
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
virus.ppt
virus.pptvirus.ppt
virus.ppt
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
Malware's Most Wanted: How to tell BADware from adware
Malware's Most Wanted: How to tell BADware from adwareMalware's Most Wanted: How to tell BADware from adware
Malware's Most Wanted: How to tell BADware from adware
 
Worm Propagation Simulation Analysis
Worm Propagation Simulation AnalysisWorm Propagation Simulation Analysis
Worm Propagation Simulation Analysis
 
Computer virus
Computer virusComputer virus
Computer virus
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting Malware
 
Zlob Trojan
Zlob TrojanZlob Trojan
Zlob Trojan
 
Ceh v8 labs module 07 viruses and worms
Ceh v8 labs module 07 viruses and wormsCeh v8 labs module 07 viruses and worms
Ceh v8 labs module 07 viruses and worms
 
Viruses and Anti-Viruses
Viruses and Anti-VirusesViruses and Anti-Viruses
Viruses and Anti-Viruses
 
Red teaming the CCDC
Red teaming the CCDCRed teaming the CCDC
Red teaming the CCDC
 
Virus
VirusVirus
Virus
 
Wanna cry
Wanna cryWanna cry
Wanna cry
 
Wannacry
WannacryWannacry
Wannacry
 
What is Malware (Antivirus)
What is Malware (Antivirus)What is Malware (Antivirus)
What is Malware (Antivirus)
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 

More from karanwayne

APE-Annotation Programming For Energy Eciency in Android
APE-Annotation Programming For Energy Eciency in AndroidAPE-Annotation Programming For Energy Eciency in Android
APE-Annotation Programming For Energy Eciency in Androidkaranwayne
 
Aardvark : Social Search Engine
Aardvark : Social Search EngineAardvark : Social Search Engine
Aardvark : Social Search Enginekaranwayne
 
Generic Solving Of Text Based Captcha
Generic Solving Of Text Based CaptchaGeneric Solving Of Text Based Captcha
Generic Solving Of Text Based Captchakaranwayne
 
Network Attacks and Countermeasures
Network Attacks and CountermeasuresNetwork Attacks and Countermeasures
Network Attacks and Countermeasureskaranwayne
 
Access Control Firewall
Access Control FirewallAccess Control Firewall
Access Control Firewallkaranwayne
 
Software based attacks
Software based attacksSoftware based attacks
Software based attackskaranwayne
 

More from karanwayne (6)

APE-Annotation Programming For Energy Eciency in Android
APE-Annotation Programming For Energy Eciency in AndroidAPE-Annotation Programming For Energy Eciency in Android
APE-Annotation Programming For Energy Eciency in Android
 
Aardvark : Social Search Engine
Aardvark : Social Search EngineAardvark : Social Search Engine
Aardvark : Social Search Engine
 
Generic Solving Of Text Based Captcha
Generic Solving Of Text Based CaptchaGeneric Solving Of Text Based Captcha
Generic Solving Of Text Based Captcha
 
Network Attacks and Countermeasures
Network Attacks and CountermeasuresNetwork Attacks and Countermeasures
Network Attacks and Countermeasures
 
Access Control Firewall
Access Control FirewallAccess Control Firewall
Access Control Firewall
 
Software based attacks
Software based attacksSoftware based attacks
Software based attacks
 

Recently uploaded

MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsPooky Knightsmith
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 

Recently uploaded (20)

MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young minds
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 

Malware- Types, Detection and Future

  • 2. Contents O What is Malware? O Brain Virus O Morris Worm O Code Red O SQL Slammer O Trojan O Malware Detection O Future of Malware
  • 3. What is Malware? O malicious software, such as a virus, which is specifically designed to disrupt or damage a computer system. O The infecting style of different malware are entirely different O General Categories of malware Trojan Horse RabbitTrapdoor Malware Virus Wor m
  • 4. Brain Virus O First Virus introduced to world-1986. O Not malicious - not harmful – annoying. O Places itself in boot sector and other places. O Screens all the disk access to maintain. O On access it would reinstall itself.
  • 5. Morris Worm O An important attack occurred which changed world security level. O Infecting via e-mail exchange - designed by students of Cornell university. O Morris's worm failed – no rechecking. O Main Three procedures of this worm O Determine whether it could spread. O Spread infection when possible. O Remain undiscovered. O Designed in C code which gave a nuclear attack impact to internet of 1988.
  • 6. Code Red O July -2001 Affects 2.5lakhs in 10-15 hours. O But only affected 7.5 lakh out of 60lakh susceptible systems worldwide. O Gained access via Microsoft server and undergoes the “buffer overflow”. O Working method Is based on days. O Day 1-19:Spread O Day 20-27: DDoS O A copy cat version of code red-reboots the system to flush all traces of the worm.
  • 7. SQL Slammer O Came in 2004- Affecting 2.5lakh in 10 minutes. O Affects via browsing Internet sites. O Attacks one internet site and inside that site it randomly generates IP addresses and spread O Burns down the bandwidth. O Worm code was small 376 byte as firewall denies small packets.
  • 8. Trojan Horse O Came from mac- harmless but annoying. O It’s a click launch application virus. O Trojan visually looks like a simple file (mp3,word,ppt etc..) but on click event launches the “duplicating virus code” O Trojan is simple to design and its strength can be altered. O Best example :Short cut virus a.k.a autorun virus
  • 9. Malware Detection O Three main methods:- O Signature Detection O Change Detection O Anomaly detection O Signature Detection: O Each virus of a particular type have some thing common. O Minimum burden for user. O Problems: O Can only detect known virus. O May remove important files.
  • 10. O Change Detection: O A change in file which is unexpected shows presence of virus. O Hash function O Advantages: O Virtually no false negatives O Detect previously known malware O Dis Advantage: O Many false positives O Causes Heavy burden to user
  • 11. O Anomaly Detection: O Based on Intrusion Detection systems(IDs). O Difficult part here is to make it realize what is “normal”. O It can detect previously unknown malware. O A file can change its anomaly and enter. O This detection is not stand alone always combines with any one above.
  • 12. Future of Malware O New malwares are created by writers for future security. O Polymorphic virus:- O Encrypted with different keys each time it propagates. O Used to mask a signature O Decrypted is also masked O Difficult to detect but not impossible
  • 13. O Metamorphic Virus:- O Mutates before infecting and spreads inside the system O Even If original virus/worm is detected the mutated one still remains with different signature O Warhol Worm:- O Similar like SQL Slammer but with reduced bandwidth utility. O Creates “hit list” O Via each hit list sites are infected first and finds vulnerable IP address.
  • 14. O 507 209.235.136.112 O 467 37.59.87.162 O 312 212.122.222.32 O 268 88.191.116.184 O 245 216.69.224.11 O 236 184.171.241.132 O 225 94.23.230.97 O 207 216.75.35.176 O 207 209.235.136.116 O 196 67.228.195.2 O 178 176.31.124.28 O 142 46.105.99.187 O 133 88.198.164.237 O 128 176.31.239.45 O 126 200.98.137.215 O 112 209.235.136.113 O 108 193.34.131.144 O 107 64.9.215.134 O 102 201.47.74.114 O 101 72.32.123.95 O 98 74.63.216.3 O 94 77.79.121.92 O 93 94.73.156.146 O 93 72.47.192.128 O 93 1.234.4.69 O 85 95.163.15.34 58 194.88.212.212 58 188.165.249.102 57 92.114.87.156 57 37.59.42.18 56 219.83.123.173 55 79.99.133.138 55 50.97.215.122 55 213.171.37.206 55 119.110.97.142 54 83.143.81.242 54 203.217.172.52 52 121.125.79.179 51 177.12.161.31 50 189.38.90.45 49 208.116.60.43 48 67.218.96.160 47 207.210.231.42 46 24.35.157.72 46 204.232.204.219 45 109.104.76.142 44 80.82.116.51 44 216.18.193.140 43 77.109.127.41 42 210.127.253.245 42 205.186.132.28 41 91.121.68.33 41 90.198.87.118 41 83.169.39.233 40 203.201.173.150 39 70.32.83.233 39 200.98.147.111 39 176.9.21.235 38 91.121.161.131 38 31.210.113.232 37 91.195.214.12 36 80.91.80.242 36 64.34.166.146 36 188.165.254.104 35 31.210.48.34 35 200.98.149.187 35 184.106.130.234 34 72.232.194.50 34 216.218.208.130 34 207.250.111.6 34 188.132.228.146 33 87.253.155.151 33 188.165.212.9 33 188.121.54.44 33 184.106.150.41 32 87.106.109.97 32 148.241.188.18 31 75.149.34.188 28 178.63.60.83 27 94.23.39.53 27 94.124.120.40 27 81.196.196.141 27 79.121.103.71 27 72.32.115.16 27 37.58.64.66 27 222.122.45.146 27 213.85.69.7 27 213.188.134.17 27 212.67.205.187 26 89.18.182.140 26 46.254.17.117 26 210.127.253.231 26 207.99.28.140 26 205.186.152.222 26 200.98.141.45 26 108 193.34.131.144 107 64.9.215.134 102 201.47.74.114 101 72.32.123.95 98 74.63.216.3 94 77.79.121.92 93 94.73.156.146 Vulnerable IP Address generated Today