SlideShare a Scribd company logo
1 of 10
OVERVIEW OF VIRUSESOVERVIEW OF VIRUSES
BY:BY:
SAHITHI NARAPARAJUSAHITHI NARAPARAJU
VIRUS DEFINITIONVIRUS DEFINITION
 A virus is a program that can “infect” other programs by modifying them.A virus is a program that can “infect” other programs by modifying them.
 The modification includes a copy of the virus program which can go on to infectThe modification includes a copy of the virus program which can go on to infect
other programsother programs..
 A computer virus carries its instructional code for making perfect copies of itself.A computer virus carries its instructional code for making perfect copies of itself.
 Lodged in a host computer virus gains temporary control of computer’s diskLodged in a host computer virus gains temporary control of computer’s disk
operating system.operating system.
 Whenever the infected computer comes into contact with an uninfected piece ofWhenever the infected computer comes into contact with an uninfected piece of
software/computer, a fresh copy of virus passes into new program.software/computer, a fresh copy of virus passes into new program.
 Thus, virus can be spread from one computer to other.Thus, virus can be spread from one computer to other.
NATURE OF VIRUSESNATURE OF VIRUSES
 A virus can do anything that other programs do. The only difference is that itA virus can do anything that other programs do. The only difference is that it
attaches itself to another program and executes secretly when the host programattaches itself to another program and executes secretly when the host program
is run.is run.
 Once a virus is executing, it can perform any function, such as erasing files andOnce a virus is executing, it can perform any function, such as erasing files and
programs.programs.
 A virus goes through following four stages:A virus goes through following four stages:
1.1. DORMANT PHASE :DORMANT PHASE : In this phase virus is idle. The virus will eventuallyIn this phase virus is idle. The virus will eventually
activated by some event.activated by some event.
2.2. PROPAGATION PHASE:PROPAGATION PHASE: In this stage the virus places an identical copy ofIn this stage the virus places an identical copy of
itself into other programs or into certain system areas on disk.itself into other programs or into certain system areas on disk.
 Each infected program will contain a clone of virus, which will itself enter aEach infected program will contain a clone of virus, which will itself enter a
propagation phase..propagation phase..
3.3. TRIGGERING PHASE:TRIGGERING PHASE: The virus is activated to perform the function for which itThe virus is activated to perform the function for which it
was intended. Triggering phase can be caused by variety of system event.was intended. Triggering phase can be caused by variety of system event.
4.4. EXECUTION PHASE:EXECUTION PHASE: In this phase the function is performed . The function mayIn this phase the function is performed . The function may
be harmless, such as message on screen or damaging, such as the destruction ofbe harmless, such as message on screen or damaging, such as the destruction of
program and data files.program and data files.
Most viruses carry out their work in a manner that is specific to a particularMost viruses carry out their work in a manner that is specific to a particular
operating system and in some cases, specific to a particular hardware platform.operating system and in some cases, specific to a particular hardware platform.
Virus structureVirus structure
 A virus is prepended or postpended to an executable program or it can beA virus is prepended or postpended to an executable program or it can be
embedded in some other fashion.embedded in some other fashion.
 The key operation of virus that the infected program, when invoked, will firstThe key operation of virus that the infected program, when invoked, will first
execute the virus code and then execute the original code of the program.execute the virus code and then execute the original code of the program.
 An example of simple virus:An example of simple virus:
Program V : =Program V : =
{ go to main;{ go to main;
1234567;1234567;
Subroutine infect-executable :=Subroutine infect-executable :=
{ loop:{ loop:
file : = get-random-executable file;file : = get-random-executable file;
if (first-line-of-file =1234567)if (first-line-of-file =1234567)
then goto loopthen goto loop
else prepend V to file; }else prepend V to file; }
subroutine do-damage : ={whatever damage is to be done}subroutine do-damage : ={whatever damage is to be done}
Subroutine trigger-pulled :={return true if some condition holds}Subroutine trigger-pulled :={return true if some condition holds}
MainMain : main_program :={infect-executable;: main_program :={infect-executable;
if trigger-pulled then do-damage;if trigger-pulled then do-damage;
goto next; }goto next; }
next:next:
}}
 The first line of code jumps to main virus program.The first line of code jumps to main virus program.
 The second line is a special marker that is used by the virus to determine whetherThe second line is a special marker that is used by the virus to determine whether
or not potential victim program has been infected with this virus.or not potential victim program has been infected with this virus.
 When program is invoked control is immediately transferred to main virusWhen program is invoked control is immediately transferred to main virus
program.program.
 Virus seeks out uninfected executable files and infects them.Virus seeks out uninfected executable files and infects them.
 Next, the virus may perform some action, determined to the system.Next, the virus may perform some action, determined to the system.
 This action could be performed every time the program is invoked.This action could be performed every time the program is invoked.
 Finally, virus transfers the control to original program.Finally, virus transfers the control to original program.
 If the infection phase is reasonably rapid; a user can notice difference between theIf the infection phase is reasonably rapid; a user can notice difference between the
execution of infected and uninfected program.execution of infected and uninfected program.
TYPES OF VIRUSESTYPES OF VIRUSES
 Most significant types of viruses are :Most significant types of viruses are :
II Parasitic virus:Parasitic virus: A Parasitic virus attaches itself to executable files and replicates,A Parasitic virus attaches itself to executable files and replicates,
when the infected program is executed.when the infected program is executed.
IIII Memory-resident virus:Memory-resident virus: It lodges the main memory as part of a resident systemIt lodges the main memory as part of a resident system
program. Form that point virus infect every program that executes.program. Form that point virus infect every program that executes.
IIIIII Boot sector virus:Boot sector virus: Infects a master boot record or boot record and spreads when aInfects a master boot record or boot record and spreads when a
system is booted from the disk containing the virus.system is booted from the disk containing the virus.
IVIV Stealth virus:Stealth virus: A form of virus explicitly designed to hide itself from antivirusA form of virus explicitly designed to hide itself from antivirus
software.software.
VV Polymorphic virus:Polymorphic virus: A virus that mutates with every infection making detection byA virus that mutates with every infection making detection by
the “signature” of virus is impossible.the “signature” of virus is impossible.
 A polymorphic virus creates copies during replication that are functionallyA polymorphic virus creates copies during replication that are functionally
equivalent but have different bit patterns.equivalent but have different bit patterns.
 Signature of virus will vary with each copy. To achieve this variation the virus maySignature of virus will vary with each copy. To achieve this variation the virus may
randomly insert unnecessary instructions.randomly insert unnecessary instructions.
VV Polymorphic virus:Polymorphic virus: A virus that mutates with every infection making detection byA virus that mutates with every infection making detection by
the “signature” of virus is impossible.the “signature” of virus is impossible.
 A polymorphic virus creates copies during replication that are functionallyA polymorphic virus creates copies during replication that are functionally
equivalent but have different bit patterns.equivalent but have different bit patterns.
 Signature of virus will vary with each copy. To achieve this variation the virus maySignature of virus will vary with each copy. To achieve this variation the virus may
randomly insert unnecessary instructions.randomly insert unnecessary instructions.

More Related Content

What's hot

Why One Virus Engine is Not Enough
Why One Virus Engine is Not EnoughWhy One Virus Engine is Not Enough
Why One Virus Engine is Not EnoughGFI Software
 
Users’ Perception of the Effects of Viruses
Users’ Perception of the Effects of VirusesUsers’ Perception of the Effects of Viruses
Users’ Perception of the Effects of VirusesSolomon Sunday Oyelere
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirusPrem Sahu
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & preventionKhaleel Assadi
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUSSatyam Sangal
 
Computer viruses and anti viruses
Computer viruses and anti virusesComputer viruses and anti viruses
Computer viruses and anti virusesMohit Jaiswal
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threatSadaf Walliyani
 
Colby_Sawyer_white_paper final 2
Colby_Sawyer_white_paper final 2Colby_Sawyer_white_paper final 2
Colby_Sawyer_white_paper final 2Scott Brown
 
Fighting computer viruses
Fighting computer virusesFighting computer viruses
Fighting computer virusesNguyễn Anh
 
Virus & anti-virus
Virus & anti-virus Virus & anti-virus
Virus & anti-virus Jayesh Naik
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer supportbozzerapide
 

What's hot (19)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Why One Virus Engine is Not Enough
Why One Virus Engine is Not EnoughWhy One Virus Engine is Not Enough
Why One Virus Engine is Not Enough
 
Users’ Perception of the Effects of Viruses
Users’ Perception of the Effects of VirusesUsers’ Perception of the Effects of Viruses
Users’ Perception of the Effects of Viruses
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUS
 
Computer virus 2
Computer virus 2Computer virus 2
Computer virus 2
 
Computer viruses and anti viruses
Computer viruses and anti virusesComputer viruses and anti viruses
Computer viruses and anti viruses
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
 
Colby_Sawyer_white_paper final 2
Colby_Sawyer_white_paper final 2Colby_Sawyer_white_paper final 2
Colby_Sawyer_white_paper final 2
 
Fighting computer viruses
Fighting computer virusesFighting computer viruses
Fighting computer viruses
 
Virus & anti-virus
Virus & anti-virus Virus & anti-virus
Virus & anti-virus
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer support
 
Malware
MalwareMalware
Malware
 

Similar to over view of viruses

Similar to over view of viruses (20)

Malicious Software and Virus
Malicious Software and Virus Malicious Software and Virus
Malicious Software and Virus
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
Iss lecture 9
Iss lecture 9Iss lecture 9
Iss lecture 9
 
Viruses ppt
Viruses pptViruses ppt
Viruses ppt
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus
VirusVirus
Virus
 
Computer Viruses and Environmental Hazards
Computer Viruses and Environmental HazardsComputer Viruses and Environmental Hazards
Computer Viruses and Environmental Hazards
 
Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious software
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
 
Virus
VirusVirus
Virus
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Viruses
VirusesViruses
Viruses
 
Virus
VirusVirus
Virus
 
Virus ......................... Khatarn
Virus ......................... KhatarnVirus ......................... Khatarn
Virus ......................... Khatarn
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 

More from Sahithi Naraparaju

documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesSahithi Naraparaju
 
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...Sahithi Naraparaju
 
literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage Sahithi Naraparaju
 
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemesSahithi Naraparaju
 
Srs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSrs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSahithi Naraparaju
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)Sahithi Naraparaju
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSahithi Naraparaju
 
CONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN CCONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN CSahithi Naraparaju
 
constants, variables and datatypes in C
constants, variables and datatypes in Cconstants, variables and datatypes in C
constants, variables and datatypes in CSahithi Naraparaju
 
Steps for Developing a 'C' program
 Steps for Developing a 'C' program Steps for Developing a 'C' program
Steps for Developing a 'C' programSahithi Naraparaju
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSahithi Naraparaju
 
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...Sahithi Naraparaju
 

More from Sahithi Naraparaju (16)

PPT FOR IDBSDDS SCHEMES
PPT FOR IDBSDDS SCHEMESPPT FOR IDBSDDS SCHEMES
PPT FOR IDBSDDS SCHEMES
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
 
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
 
literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage
 
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemes
 
Srs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSrs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemes
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
 
OVERVIEW OF ‘C’ PROGRAM
OVERVIEW OF ‘C’ PROGRAMOVERVIEW OF ‘C’ PROGRAM
OVERVIEW OF ‘C’ PROGRAM
 
CONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN CCONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN C
 
constants, variables and datatypes in C
constants, variables and datatypes in Cconstants, variables and datatypes in C
constants, variables and datatypes in C
 
Steps for Developing a 'C' program
 Steps for Developing a 'C' program Steps for Developing a 'C' program
Steps for Developing a 'C' program
 
pre processor directives in C
pre processor directives in Cpre processor directives in C
pre processor directives in C
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
 
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
 
Haptic technology
Haptic technologyHaptic technology
Haptic technology
 

Recently uploaded

Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

over view of viruses

  • 1. OVERVIEW OF VIRUSESOVERVIEW OF VIRUSES BY:BY: SAHITHI NARAPARAJUSAHITHI NARAPARAJU
  • 2. VIRUS DEFINITIONVIRUS DEFINITION  A virus is a program that can “infect” other programs by modifying them.A virus is a program that can “infect” other programs by modifying them.  The modification includes a copy of the virus program which can go on to infectThe modification includes a copy of the virus program which can go on to infect other programsother programs..  A computer virus carries its instructional code for making perfect copies of itself.A computer virus carries its instructional code for making perfect copies of itself.  Lodged in a host computer virus gains temporary control of computer’s diskLodged in a host computer virus gains temporary control of computer’s disk operating system.operating system.  Whenever the infected computer comes into contact with an uninfected piece ofWhenever the infected computer comes into contact with an uninfected piece of software/computer, a fresh copy of virus passes into new program.software/computer, a fresh copy of virus passes into new program.  Thus, virus can be spread from one computer to other.Thus, virus can be spread from one computer to other.
  • 3. NATURE OF VIRUSESNATURE OF VIRUSES  A virus can do anything that other programs do. The only difference is that itA virus can do anything that other programs do. The only difference is that it attaches itself to another program and executes secretly when the host programattaches itself to another program and executes secretly when the host program is run.is run.  Once a virus is executing, it can perform any function, such as erasing files andOnce a virus is executing, it can perform any function, such as erasing files and programs.programs.  A virus goes through following four stages:A virus goes through following four stages: 1.1. DORMANT PHASE :DORMANT PHASE : In this phase virus is idle. The virus will eventuallyIn this phase virus is idle. The virus will eventually activated by some event.activated by some event. 2.2. PROPAGATION PHASE:PROPAGATION PHASE: In this stage the virus places an identical copy ofIn this stage the virus places an identical copy of itself into other programs or into certain system areas on disk.itself into other programs or into certain system areas on disk.
  • 4.  Each infected program will contain a clone of virus, which will itself enter aEach infected program will contain a clone of virus, which will itself enter a propagation phase..propagation phase.. 3.3. TRIGGERING PHASE:TRIGGERING PHASE: The virus is activated to perform the function for which itThe virus is activated to perform the function for which it was intended. Triggering phase can be caused by variety of system event.was intended. Triggering phase can be caused by variety of system event. 4.4. EXECUTION PHASE:EXECUTION PHASE: In this phase the function is performed . The function mayIn this phase the function is performed . The function may be harmless, such as message on screen or damaging, such as the destruction ofbe harmless, such as message on screen or damaging, such as the destruction of program and data files.program and data files. Most viruses carry out their work in a manner that is specific to a particularMost viruses carry out their work in a manner that is specific to a particular operating system and in some cases, specific to a particular hardware platform.operating system and in some cases, specific to a particular hardware platform.
  • 5. Virus structureVirus structure  A virus is prepended or postpended to an executable program or it can beA virus is prepended or postpended to an executable program or it can be embedded in some other fashion.embedded in some other fashion.  The key operation of virus that the infected program, when invoked, will firstThe key operation of virus that the infected program, when invoked, will first execute the virus code and then execute the original code of the program.execute the virus code and then execute the original code of the program.  An example of simple virus:An example of simple virus: Program V : =Program V : = { go to main;{ go to main; 1234567;1234567; Subroutine infect-executable :=Subroutine infect-executable := { loop:{ loop:
  • 6. file : = get-random-executable file;file : = get-random-executable file; if (first-line-of-file =1234567)if (first-line-of-file =1234567) then goto loopthen goto loop else prepend V to file; }else prepend V to file; } subroutine do-damage : ={whatever damage is to be done}subroutine do-damage : ={whatever damage is to be done} Subroutine trigger-pulled :={return true if some condition holds}Subroutine trigger-pulled :={return true if some condition holds} MainMain : main_program :={infect-executable;: main_program :={infect-executable; if trigger-pulled then do-damage;if trigger-pulled then do-damage; goto next; }goto next; } next:next: }}  The first line of code jumps to main virus program.The first line of code jumps to main virus program.  The second line is a special marker that is used by the virus to determine whetherThe second line is a special marker that is used by the virus to determine whether or not potential victim program has been infected with this virus.or not potential victim program has been infected with this virus.  When program is invoked control is immediately transferred to main virusWhen program is invoked control is immediately transferred to main virus program.program.  Virus seeks out uninfected executable files and infects them.Virus seeks out uninfected executable files and infects them.
  • 7.  Next, the virus may perform some action, determined to the system.Next, the virus may perform some action, determined to the system.  This action could be performed every time the program is invoked.This action could be performed every time the program is invoked.  Finally, virus transfers the control to original program.Finally, virus transfers the control to original program.  If the infection phase is reasonably rapid; a user can notice difference between theIf the infection phase is reasonably rapid; a user can notice difference between the execution of infected and uninfected program.execution of infected and uninfected program.
  • 8. TYPES OF VIRUSESTYPES OF VIRUSES  Most significant types of viruses are :Most significant types of viruses are : II Parasitic virus:Parasitic virus: A Parasitic virus attaches itself to executable files and replicates,A Parasitic virus attaches itself to executable files and replicates, when the infected program is executed.when the infected program is executed. IIII Memory-resident virus:Memory-resident virus: It lodges the main memory as part of a resident systemIt lodges the main memory as part of a resident system program. Form that point virus infect every program that executes.program. Form that point virus infect every program that executes. IIIIII Boot sector virus:Boot sector virus: Infects a master boot record or boot record and spreads when aInfects a master boot record or boot record and spreads when a system is booted from the disk containing the virus.system is booted from the disk containing the virus. IVIV Stealth virus:Stealth virus: A form of virus explicitly designed to hide itself from antivirusA form of virus explicitly designed to hide itself from antivirus software.software.
  • 9. VV Polymorphic virus:Polymorphic virus: A virus that mutates with every infection making detection byA virus that mutates with every infection making detection by the “signature” of virus is impossible.the “signature” of virus is impossible.  A polymorphic virus creates copies during replication that are functionallyA polymorphic virus creates copies during replication that are functionally equivalent but have different bit patterns.equivalent but have different bit patterns.  Signature of virus will vary with each copy. To achieve this variation the virus maySignature of virus will vary with each copy. To achieve this variation the virus may randomly insert unnecessary instructions.randomly insert unnecessary instructions.
  • 10. VV Polymorphic virus:Polymorphic virus: A virus that mutates with every infection making detection byA virus that mutates with every infection making detection by the “signature” of virus is impossible.the “signature” of virus is impossible.  A polymorphic virus creates copies during replication that are functionallyA polymorphic virus creates copies during replication that are functionally equivalent but have different bit patterns.equivalent but have different bit patterns.  Signature of virus will vary with each copy. To achieve this variation the virus maySignature of virus will vary with each copy. To achieve this variation the virus may randomly insert unnecessary instructions.randomly insert unnecessary instructions.