SlideShare a Scribd company logo
1 of 12
VIRUSES
AND
ANTI- VIRUSES
SUBMITTED BY : RISHABH BHARADWAJ
VIRUS
1. DEFINITION- WHAT EXACTLY IS A VIRUS?
2. TYPES OF VIRUSES :
1. FILE OR PROGRAM VIRUSES
2. BOOT SECTOR VIRUSES
3. MULTIPARTITE VIRUSES
4. STEALTH VIRUSES
5. POLYMORPHIC VIRUSES
6. MACRO VIRUSES
TOP 5 DESTRUCTIVE AND DANGEROUS VIRUSES
1. I LOVE YOU VIRUS (2000)
2. CODE RED VIRUS (2001)
3. SAPPHIRE (2003)
4. SASSER AND NETSKY (PRESENT)
5. STORMWORM NUWAR VIRUS (SINCE 2007 TO PRESENT)
FUNCTIONAL ELEMENTS OF A VIRUS
TWO BASIC PARTS :
1.SEARCH ROUTINE
2. “.COM” AND “.EXE” FILES
TOOLS NEEDED FOR WRITING VIRUS
ASSEMBLY LANGUAGE
VIRUSES - IN DETAIL
1. FILE OR PROGRAM VIRUSES
2. SIMPLE COM FILE INFECTOR
3. AN OUTLINE FOR A VIRUS – ITS TYPES :
1. AN EXECUTABLE VIRUS
2. BOOT SECTOR VIRUS
3. MULTIPARTITE VIRUSES
4. STEALTH VIRUSES
5. POLYMORPHIC VIRUSES
6. MACRO VIRUSES
ANTIVIRUS
1. DEFINITION
2. SIGNATURE BASED DETECTION
3. HEURISTICS ANALYSIS
4. ROOTKIT DETECTION
5. REALTIME PROTECTION
EFFECTIVENESS OF ANTIVIRUSES
1. STUDIES IN DECEMBER 2007
2. MAJOR VIRUS SCANNERS
3. NETWORK FIREWALL
4. SPECIALIST TOOLS
5. USAGE AND RISKS
DRAWBACKS
1. IMPAIRS COMPUTER’S PERFORMANCE
2. LULLED INTO A FALSE SENSE OF SECURITY
3. ON EMPLOYING HEURISTIC APPROACH, IT MUST BE
FINE TUNED
4. RUNS AT THE HIGHLY TRUSTED KERNEL LEVEL, THUS
CREATING A POTENTIAL AVENUE OF ATTACK
5. VARIOUS METHODS TO IDENTIFY MALWARE
NEW VIRUSES
1. ANTIVIRUS ARE NOT ALWAYS EFFECTIVE.
2. ARE PRETESTED BY THE VIRUS DESIGNERS
3. RANSOMWARE – USE POLYMORPHIC CODE TO AVOID
DETECTION
4. RESULT IN DAMAGED FILES.
5. FIRMWARE ISSUES – REQUIRE THE BIOS CHIP.
PROBLEMS CAUSED BY FALSE POSITIVE
1. DEFINATION OF "FALSE POSITIVE“.
2. A FALSE POSITIVE HAS ADVERSE EFFECT ON OPERATING
SYSTEM.
3. BAD CONDITION OCCUR FROM FAULTY VIRUSES IN PAST
YEAR.
4. PROBLEMS GENERATED DUE TO CONSCIENTIOUS ANTIVIRUS
IN YEAR 2010.
5. WINDOWS 7 DAMAGED DUE TO FAULTY UPDATE.
CONCLUSION
1. COMPUTER VIRUSES ARE NOT EVIL AND THAT PROGRAMMERS
HAVE A RIGHT TO CREATE THEM.
2. CARE SHOULD BE TAKEN ON CREATING A VIRUS, ELSE ONE CAN
WIPE OUT ONE’S OWN SYSTEM.
3. IT IS NECESSARY TO HAVE A DEEP KNOWLEDGE OF THE WAY IN
WHICH DIFFERENT VIRUSES EXPLOITS OUR SYSTEMS WEAKNESS.
4. IT IS ALSO IMPOSSIBLE TO CREATE ANTIVIRUS AGAINST A
PARTICULAR VIRUS.
THANKYOU…!!

More Related Content

Viewers also liked

Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemLee Ray
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentationshohrabkhan
 

Viewers also liked (7)

Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
Virus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer systemVirus and Antivirus Protect your Computer system
Virus and Antivirus Protect your Computer system
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
 

Similar to Virus and Antivirus

Advanced polymorphic techniques
Advanced polymorphic techniquesAdvanced polymorphic techniques
Advanced polymorphic techniquesUltraUploader
 
Advanced metamorphic techniques in computer viruses
Advanced metamorphic techniques in computer virusesAdvanced metamorphic techniques in computer viruses
Advanced metamorphic techniques in computer virusesUltraUploader
 
Computer viruses and anti viruses
Computer viruses and anti virusesComputer viruses and anti viruses
Computer viruses and anti virusesMohit Jaiswal
 
VIRUS AND ITS TYPES.pptx
VIRUS AND ITS TYPES.pptxVIRUS AND ITS TYPES.pptx
VIRUS AND ITS TYPES.pptxSiddeshGowda8
 
Computer viruses
Computer virusesComputer viruses
Computer virusesImran Khan
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virusProtik Roy
 
Automatic extraction of computer virus signatures
Automatic extraction of computer virus signaturesAutomatic extraction of computer virus signatures
Automatic extraction of computer virus signaturesUltraUploader
 
A history of computer viruses three special viruses
A history of computer viruses   three special virusesA history of computer viruses   three special viruses
A history of computer viruses three special virusesUltraUploader
 
Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention Pratimesh Pathak
 
Computer viruses
Computer virusesComputer viruses
Computer virusesshopnil786
 

Similar to Virus and Antivirus (20)

Advanced polymorphic techniques
Advanced polymorphic techniquesAdvanced polymorphic techniques
Advanced polymorphic techniques
 
Advanced metamorphic techniques in computer viruses
Advanced metamorphic techniques in computer virusesAdvanced metamorphic techniques in computer viruses
Advanced metamorphic techniques in computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses and anti viruses
Computer viruses and anti virusesComputer viruses and anti viruses
Computer viruses and anti viruses
 
Virus
VirusVirus
Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
VIRUS AND ITS TYPES.pptx
VIRUS AND ITS TYPES.pptxVIRUS AND ITS TYPES.pptx
VIRUS AND ITS TYPES.pptx
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Presentation on virus
Presentation on virusPresentation on virus
Presentation on virus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Iss lecture 9
Iss lecture 9Iss lecture 9
Iss lecture 9
 
Virus
Virus Virus
Virus
 
Malware
MalwareMalware
Malware
 
Automatic extraction of computer virus signatures
Automatic extraction of computer virus signaturesAutomatic extraction of computer virus signatures
Automatic extraction of computer virus signatures
 
radhika.pdf
radhika.pdfradhika.pdf
radhika.pdf
 
A history of computer viruses three special viruses
A history of computer viruses   three special virusesA history of computer viruses   three special viruses
A history of computer viruses three special viruses
 
Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention Computer warms viruses trojans and its prevention
Computer warms viruses trojans and its prevention
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

Recently uploaded

A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...HenryBriggs2
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...soginsider
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxnuruddin69
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stageAbc194748
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesRAJNEESHKUMAR341697
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086anil_gaur
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 

Recently uploaded (20)

A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stage
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 

Virus and Antivirus

  • 2. VIRUS 1. DEFINITION- WHAT EXACTLY IS A VIRUS? 2. TYPES OF VIRUSES : 1. FILE OR PROGRAM VIRUSES 2. BOOT SECTOR VIRUSES 3. MULTIPARTITE VIRUSES 4. STEALTH VIRUSES 5. POLYMORPHIC VIRUSES 6. MACRO VIRUSES
  • 3. TOP 5 DESTRUCTIVE AND DANGEROUS VIRUSES 1. I LOVE YOU VIRUS (2000) 2. CODE RED VIRUS (2001) 3. SAPPHIRE (2003) 4. SASSER AND NETSKY (PRESENT) 5. STORMWORM NUWAR VIRUS (SINCE 2007 TO PRESENT)
  • 4. FUNCTIONAL ELEMENTS OF A VIRUS TWO BASIC PARTS : 1.SEARCH ROUTINE 2. “.COM” AND “.EXE” FILES TOOLS NEEDED FOR WRITING VIRUS ASSEMBLY LANGUAGE
  • 5. VIRUSES - IN DETAIL 1. FILE OR PROGRAM VIRUSES 2. SIMPLE COM FILE INFECTOR 3. AN OUTLINE FOR A VIRUS – ITS TYPES : 1. AN EXECUTABLE VIRUS 2. BOOT SECTOR VIRUS 3. MULTIPARTITE VIRUSES 4. STEALTH VIRUSES 5. POLYMORPHIC VIRUSES 6. MACRO VIRUSES
  • 6. ANTIVIRUS 1. DEFINITION 2. SIGNATURE BASED DETECTION 3. HEURISTICS ANALYSIS 4. ROOTKIT DETECTION 5. REALTIME PROTECTION
  • 7. EFFECTIVENESS OF ANTIVIRUSES 1. STUDIES IN DECEMBER 2007 2. MAJOR VIRUS SCANNERS 3. NETWORK FIREWALL 4. SPECIALIST TOOLS 5. USAGE AND RISKS
  • 8. DRAWBACKS 1. IMPAIRS COMPUTER’S PERFORMANCE 2. LULLED INTO A FALSE SENSE OF SECURITY 3. ON EMPLOYING HEURISTIC APPROACH, IT MUST BE FINE TUNED 4. RUNS AT THE HIGHLY TRUSTED KERNEL LEVEL, THUS CREATING A POTENTIAL AVENUE OF ATTACK 5. VARIOUS METHODS TO IDENTIFY MALWARE
  • 9. NEW VIRUSES 1. ANTIVIRUS ARE NOT ALWAYS EFFECTIVE. 2. ARE PRETESTED BY THE VIRUS DESIGNERS 3. RANSOMWARE – USE POLYMORPHIC CODE TO AVOID DETECTION 4. RESULT IN DAMAGED FILES. 5. FIRMWARE ISSUES – REQUIRE THE BIOS CHIP.
  • 10. PROBLEMS CAUSED BY FALSE POSITIVE 1. DEFINATION OF "FALSE POSITIVE“. 2. A FALSE POSITIVE HAS ADVERSE EFFECT ON OPERATING SYSTEM. 3. BAD CONDITION OCCUR FROM FAULTY VIRUSES IN PAST YEAR. 4. PROBLEMS GENERATED DUE TO CONSCIENTIOUS ANTIVIRUS IN YEAR 2010. 5. WINDOWS 7 DAMAGED DUE TO FAULTY UPDATE.
  • 11. CONCLUSION 1. COMPUTER VIRUSES ARE NOT EVIL AND THAT PROGRAMMERS HAVE A RIGHT TO CREATE THEM. 2. CARE SHOULD BE TAKEN ON CREATING A VIRUS, ELSE ONE CAN WIPE OUT ONE’S OWN SYSTEM. 3. IT IS NECESSARY TO HAVE A DEEP KNOWLEDGE OF THE WAY IN WHICH DIFFERENT VIRUSES EXPLOITS OUR SYSTEMS WEAKNESS. 4. IT IS ALSO IMPOSSIBLE TO CREATE ANTIVIRUS AGAINST A PARTICULAR VIRUS.