Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • virus

    1. 1. By Vinod V S (081006056)
    2. 2. Introduction to Virus <ul><li>A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the user. </li></ul><ul><li>On one hand, viruses show us how vulnerable we are, disrupting productivity and doing billions of dollars in damages. On the other hand, they show us how sophisticated and interconnected human beings have become. </li></ul><ul><li>Computer viruses are called viruses because they share some of the traits of biological viruses. A computer virus passes from computer to computer like a biological virus passes from person to person . </li></ul><ul><li>VIRUS- Vital Information Resources Under Seige </li></ul>
    3. 3. How can a simple virus effect us ? <ul><li>Mydoom worm infected approximately a quarter-million computers in a single day in January 2004 </li></ul><ul><li>In March 1999, the Melissa virus was so powerful that it forced Microsoft and a number of other very large companies to completely turn off their e-mail systems until the virus could be contained. </li></ul><ul><li>The ILOVEYOU virus in 2000 had a similarly devastating effect. In January 2007, a worm called Storm appeared -- by October, experts believed up to 50 million computers were infected . </li></ul>Virus Year Estimated Damage CIH 1998 20M to 80M $ Melissa 1999 300M to 600M $ Code Red 2001 2.6B $ SQL Slammer 2003 shut down South Korea's online capacity for 12 hours Blaster 2003 2B to 10B $ Sobig.F 2003 5B to 10B $ MyDoom 2004 At its peak, slowed global Internet performance by 10 percent and Web load times by up to 50 percent Sasser 2004 Tens of millions of dollars
    4. 4. How Does a Virus Work??? Trouble Prepender Virus Program Start End
    5. 5. How Does a Virus Work??? Appender PE Infector Overwriter
    6. 6. Why does one write virus programs ? <ul><li>This can be broadly categorized into 4 reasons </li></ul><ul><li>The first is the same psychology that drives vandals </li></ul><ul><li>The second reason has to do with the thrill of watching things blow up. </li></ul><ul><li>The third reason involves bragging rights, or the thrill of doing it. Sort of like conquering Mount Everest </li></ul><ul><li>The fourth reason is cyber terrorism that’s is taking place now </li></ul>
    7. 7. Types of electronic infections <ul><li>Viruses </li></ul><ul><li>Trojan horses </li></ul><ul><li>Worms </li></ul><ul><li>Logic bombs </li></ul><ul><li>Malware </li></ul><ul><li>Adware </li></ul><ul><li>Spyware </li></ul>
    8. 8. Virus <ul><li>A virus is a small piece of software that piggybacks on real programs. These are the types </li></ul><ul><li>Boot Sector Virus </li></ul><ul><li>Parasitic virus </li></ul><ul><li>Memory-resident virus </li></ul><ul><li>Stealth Virus </li></ul><ul><li>Polymorphic virus </li></ul>
    9. 9. A simple virus <ul><li>#include< stdio.h > #include< stdlib.h> void main() { while(1) { system(&quot;dir>>â•ša.exe&quot;); } } </li></ul>
    10. 10. Trojan horses <ul><li>In order for a Trojan to infect your machine, you have to install the server side of the application. </li></ul><ul><li>The author of the Trojan horse has to convince you to download the application. </li></ul><ul><li>This is why it is called a Trojan horse , you have to consciously or unconsciously run the .exe file to install the program ,it doesn't propagate on its own like a virus </li></ul><ul><li>Trojan Horse payloads are Remote access, data destruction, disable security software, DoS attacks </li></ul><ul><li>Ex: Waterfalls.scr </li></ul>
    11. 11. Worms <ul><li>It uses a network to send copies of itself to other nodes (computers on the network). </li></ul><ul><li>Unlike a virus, it does not need to attach itself to an existing program. </li></ul><ul><li>Worms almost always cause at least some harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer. </li></ul><ul><li>The Nachi family of worms, tried to download and install patches from Microsoft's website to fix vulnerabilities in the host system ,by exploiting those same vulnerabilities </li></ul>
    12. 12. Logic Bombs , Malware , Spyware & Adware <ul><li>A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. </li></ul><ul><li>&quot;Malware&quot; is short for mal icious soft ware and is typically used as a catch-all term to refer to any software designed to cause damage to a single computer, server, or computer network, whether it's a virus, spyware. </li></ul><ul><li>The term spyware suggests software that secretly monitors the user's behaviour, the functions of spyware extend well beyond simple monitoring. </li></ul><ul><li>Adware or advertising-supported software is any software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used. </li></ul>
    13. 13. Different Phases of Virus <ul><li>During its lifetime, a typical virus goes through the following four phases: </li></ul><ul><ul><li>Dormant Phase </li></ul></ul><ul><ul><ul><li>The virus is idle and eventually activated by some event. </li></ul></ul></ul><ul><ul><li>Propagation Phase </li></ul></ul><ul><ul><ul><li>The virus places an identical copy of itself into other programs or into certain system areas on the disk. </li></ul></ul></ul><ul><ul><li>Triggering phase </li></ul></ul><ul><ul><ul><li>The virus is activated to perform the function for which it was intended. </li></ul></ul></ul><ul><ul><li>Execution Phase </li></ul></ul><ul><ul><ul><li>The function is performed . </li></ul></ul></ul>
    14. 14. Other Mean Programs <ul><li>Key Loggers </li></ul><ul><li>Phishing </li></ul><ul><li>Pharming </li></ul><ul><li>Hoaxes </li></ul><ul><li>Jokes </li></ul>
    15. 15. How Does Anti-virus Work? <ul><li>Pattern recognition – find what I know. </li></ul><ul><li>Passive Heuristics – look at behaviors and guess. </li></ul><ul><li>Active Heuristics (emulation) – run the file and watch </li></ul><ul><li>Behavior blockers – you can’t do that! </li></ul><ul><li>Integrity checkers – have you changed? </li></ul>
    16. 16. Signature Based Detection <ul><li>Recognizes patterns </li></ul><ul><li>The computer sees: </li></ul><ul><li>111001110000110101000110011110… </li></ul><ul><li>The trick is in the pattern!!! </li></ul><ul><li>Can you find the word “VIRUS”? </li></ul><ul><li>How about QUART? </li></ul><ul><li>Maybe MCIS ? </li></ul><ul><li>A word you don’t know? </li></ul><ul><li>If I told you there was a word “WVIL” now you could find it! </li></ul>ABMCISVCEYWOU TXNDRUSLWINTQ URPLKXUIXNHSQ ARNQUARTLPOLL PWNMAZIWALNOI BVARKLVOWELSV WESETNODHEREW
    17. 17. Problems with Signatures <ul><li>New threats are not detected until signatures are generated </li></ul><ul><li>You may be vulnerable for hours, days, or weeks </li></ul><ul><li>If a threat slows down the internet it may be difficult to obtain signatures (Slammer worm) </li></ul><ul><li>In corporate environments signatures may need testing, further delaying protection </li></ul><ul><li>Compressing files hides malware </li></ul>
    18. 18. Understanding Compression and Encryption <ul><li>Symbols can be used to represent patterns. </li></ul><ul><li>Example: = 1,2,3,4, and 5 </li></ul><ul><li>This is the “file” we need to compress. </li></ul><ul><li>0000 0000 0111 0111 0111 0110 0010 0010 0010 0010 0010 0001 0001 0001 </li></ul><ul><li>We have 14 sets of 4 numbers or 4 * 14 = 56 characters. </li></ul><ul><li>How can we say the same thing with fewer characters? </li></ul><ul><li>Code Key : 0000=0 0001=1 0010=2 0011=3 0100=4 0101=5 0110=6 </li></ul><ul><li>0111=7 1000=8 1001=9 </li></ul><ul><li>20 means 2 sets of pattern 0000 </li></ul><ul><li>20 = 0000 0000 </li></ul><ul><li>37 means 3 sets of the pattern 0111 </li></ul><ul><li>37 = 0111 0111 0111 </li></ul>
    19. 19. Contd….. <ul><li>Look up table: 0=0000 1=0001 2=0010 6=0110 7=0111 </li></ul><ul><li>|-----20----| |-------37---------| |-16-| |-----------------52--------------| |--------31---------| </li></ul><ul><li>0000 0000 0111 0111 0111 0110 0010 0010 0010 0010 0010 0001 0001 0001 </li></ul><ul><li>20 37 16 52 31 - 10 characters represent 56 characters! </li></ul><ul><li>Now go find 0111 0010 in 20 37 16 52 31 </li></ul><ul><li>You need to “decompress” 20 37 16 52 31 to find the pattern. </li></ul><ul><li>To find a virus in a compressed file it must be decompressed. </li></ul><ul><li>For a virus to execute (infect) it also must be decompressed. </li></ul><ul><li>A virus in an archive cannot infect. </li></ul>
    20. 20. Understanding Polymorphism <ul><li>Polymorphic software does the same thing each time, but looks different each time. </li></ul><ul><li>5=5 </li></ul><ul><li>2+3=5 </li></ul><ul><li>1-3+9*(1037/32*(32/1037))+(11-33)+(10*2)=5 </li></ul><ul><li>Run 5 minutes, rest 10 minutes, walk 3 minutes. </li></ul><ul><li>Run 5 minutes, rest 5 minutes, rest 5 minutes, walk 3 minutes. </li></ul>
    21. 21. Understanding Heuristics <ul><li>Heuristics are used to detect unknown threats </li></ul><ul><li>Heuristics are used to defeat compression, encryption and polymorphism. </li></ul><ul><li>Heuristics are used detect brand new malicious software </li></ul><ul><li>Heuristics are used to detect attempts to exploit vulnerabilities </li></ul><ul><li>Heuristics = ZERO day - ZERO hour Protection </li></ul>
    22. 22. False Positives <ul><li>False positives occur when an anti-virus program calls a good program bad. It’s like arresting the wrong person. </li></ul><ul><li>False positives are expensive </li></ul><ul><ul><li>AV doesn’t search for the entire virus, just a portion of it. </li></ul></ul><ul><ul><li>Search Google for “elephant” and you get over 58 million hits. You just need to find a specific elephant. Searching for “rude elephant” narrows the results to 1.73 million. A search for “very rude elephant” finds us “Rudy, the very rude elephant.” </li></ul></ul>
    23. 23. Front Door Attacks <ul><li>What do many of these attacks (through email, web browsing or downloads) have in common? </li></ul><ul><ul><li>They all require the actions of a legitimate user. </li></ul></ul><ul><li>They can be considered “front door” attacks because a user is tricked into opening the door for the attack through their action. </li></ul><ul><li>The key to understanding front door attacks is that when you run a program it runs with *all* your rights and privileges. </li></ul><ul><li>This includes any program you run even accidentally by opening an email attachment or clicking on web link. </li></ul>
    24. 24. Back Door Attacks <ul><li>Not all attacks require action by a legitimate user. </li></ul><ul><li>“ Back door” attacks target vulnerabilities in server software that is running on your computer. </li></ul><ul><li>Server software is software that listens for requests that arrive over the network and attempts to satisfy these requests. </li></ul><ul><ul><li>A web server is an example of server software. </li></ul></ul>
    25. 25. Conclusion <ul><li>The problem of DOS viruses continues to get slowly worse around the world </li></ul><ul><li>Increased use of 32-bit operating systems, such as OS/2 and Windows, is likely to cause a decrease in the prevalence of all current DOS viruses. </li></ul><ul><li>All in all it ends in a vicious circle with the programmers creating the worms and other programmers trying to destroy or stop the growth of worms. </li></ul>
    26. 26. References <ul><li> </li></ul><ul><li> </li></ul><ul><li> </li></ul><ul><li>    </li></ul><ul><li>Norman book on computer viruses </li></ul><ul><li>Virus-specific&quot; Antivirus Products - Common Questions - With Answers by Andrew J Lee </li></ul>
    27. 27. Questions ????????????