SlideShare a Scribd company logo
1 of 10
OVERVIEW OF VIRUSESOVERVIEW OF VIRUSES
BY:BY:
SAHITHI NARAPARAJUSAHITHI NARAPARAJU
VIRUS DEFINITIONVIRUS DEFINITION
 A virus is a program that can “infect” other programs by modifying them.A virus is a program that can “infect” other programs by modifying them.
 The modification includes a copy of the virus program which can go on to infectThe modification includes a copy of the virus program which can go on to infect
other programsother programs..
 A computer virus carries its instructional code for making perfect copies of itself.A computer virus carries its instructional code for making perfect copies of itself.
 Lodged in a host computer virus gains temporary control of computer’s diskLodged in a host computer virus gains temporary control of computer’s disk
operating system.operating system.
 Whenever the infected computer comes into contact with an uninfected piece ofWhenever the infected computer comes into contact with an uninfected piece of
software/computer, a fresh copy of virus passes into new program.software/computer, a fresh copy of virus passes into new program.
 Thus, virus can be spread from one computer to other.Thus, virus can be spread from one computer to other.
NATURE OF VIRUSESNATURE OF VIRUSES
 A virus can do anything that other programs do. The only difference is that itA virus can do anything that other programs do. The only difference is that it
attaches itself to another program and executes secretly when the host programattaches itself to another program and executes secretly when the host program
is run.is run.
 Once a virus is executing, it can perform any function, such as erasing files andOnce a virus is executing, it can perform any function, such as erasing files and
programs.programs.
 A virus goes through following four stages:A virus goes through following four stages:
1.1. DORMANT PHASE :DORMANT PHASE : In this phase virus is idle. The virus will eventuallyIn this phase virus is idle. The virus will eventually
activated by some event.activated by some event.
2.2. PROPAGATION PHASE:PROPAGATION PHASE: In this stage the virus places an identical copy ofIn this stage the virus places an identical copy of
itself into other programs or into certain system areas on disk.itself into other programs or into certain system areas on disk.
 Each infected program will contain a clone of virus, which will itself enter aEach infected program will contain a clone of virus, which will itself enter a
propagation phase..propagation phase..
3.3. TRIGGERING PHASE:TRIGGERING PHASE: The virus is activated to perform the function for which itThe virus is activated to perform the function for which it
was intended. Triggering phase can be caused by variety of system event.was intended. Triggering phase can be caused by variety of system event.
4.4. EXECUTION PHASE:EXECUTION PHASE: In this phase the function is performed . The function mayIn this phase the function is performed . The function may
be harmless, such as message on screen or damaging, such as the destruction ofbe harmless, such as message on screen or damaging, such as the destruction of
program and data files.program and data files.
Most viruses carry out their work in a manner that is specific to a particularMost viruses carry out their work in a manner that is specific to a particular
operating system and in some cases, specific to a particular hardware platform.operating system and in some cases, specific to a particular hardware platform.
Virus structureVirus structure
 A virus is prepended or postpended to an executable program or it can beA virus is prepended or postpended to an executable program or it can be
embedded in some other fashion.embedded in some other fashion.
 The key operation of virus that the infected program, when invoked, will firstThe key operation of virus that the infected program, when invoked, will first
execute the virus code and then execute the original code of the program.execute the virus code and then execute the original code of the program.
 An example of simple virus:An example of simple virus:
Program V : =Program V : =
{ go to main;{ go to main;
1234567;1234567;
Subroutine infect-executable :=Subroutine infect-executable :=
{ loop:{ loop:
file : = get-random-executable file;file : = get-random-executable file;
if (first-line-of-file =1234567)if (first-line-of-file =1234567)
then goto loopthen goto loop
else prepend V to file; }else prepend V to file; }
subroutine do-damage : ={whatever damage is to be done}subroutine do-damage : ={whatever damage is to be done}
Subroutine trigger-pulled :={return true if some condition holds}Subroutine trigger-pulled :={return true if some condition holds}
MainMain : main_program :={infect-executable;: main_program :={infect-executable;
if trigger-pulled then do-damage;if trigger-pulled then do-damage;
goto next; }goto next; }
next:next:
}}
 The first line of code jumps to main virus program.The first line of code jumps to main virus program.
 The second line is a special marker that is used by the virus to determine whetherThe second line is a special marker that is used by the virus to determine whether
or not potential victim program has been infected with this virus.or not potential victim program has been infected with this virus.
 When program is invoked control is immediately transferred to main virusWhen program is invoked control is immediately transferred to main virus
program.program.
 Virus seeks out uninfected executable files and infects them.Virus seeks out uninfected executable files and infects them.
 Next, the virus may perform some action, determined to the system.Next, the virus may perform some action, determined to the system.
 This action could be performed every time the program is invoked.This action could be performed every time the program is invoked.
 Finally, virus transfers the control to original program.Finally, virus transfers the control to original program.
 If the infection phase is reasonably rapid; a user can notice difference between theIf the infection phase is reasonably rapid; a user can notice difference between the
execution of infected and uninfected program.execution of infected and uninfected program.
TYPES OF VIRUSESTYPES OF VIRUSES
 Most significant types of viruses are :Most significant types of viruses are :
II Parasitic virus:Parasitic virus: A Parasitic virus attaches itself to executable files and replicates,A Parasitic virus attaches itself to executable files and replicates,
when the infected program is executed.when the infected program is executed.
IIII Memory-resident virus:Memory-resident virus: It lodges the main memory as part of a resident systemIt lodges the main memory as part of a resident system
program. Form that point virus infect every program that executes.program. Form that point virus infect every program that executes.
IIIIII Boot sector virus:Boot sector virus: Infects a master boot record or boot record and spreads when aInfects a master boot record or boot record and spreads when a
system is booted from the disk containing the virus.system is booted from the disk containing the virus.
IVIV Stealth virus:Stealth virus: A form of virus explicitly designed to hide itself from antivirusA form of virus explicitly designed to hide itself from antivirus
software.software.
VV Polymorphic virus:Polymorphic virus: A virus that mutates with every infection making detection byA virus that mutates with every infection making detection by
the “signature” of virus is impossible.the “signature” of virus is impossible.
 A polymorphic virus creates copies during replication that are functionallyA polymorphic virus creates copies during replication that are functionally
equivalent but have different bit patterns.equivalent but have different bit patterns.
 Signature of virus will vary with each copy. To achieve this variation the virus maySignature of virus will vary with each copy. To achieve this variation the virus may
randomly insert unnecessary instructions.randomly insert unnecessary instructions.
VV Polymorphic virus:Polymorphic virus: A virus that mutates with every infection making detection byA virus that mutates with every infection making detection by
the “signature” of virus is impossible.the “signature” of virus is impossible.
 A polymorphic virus creates copies during replication that are functionallyA polymorphic virus creates copies during replication that are functionally
equivalent but have different bit patterns.equivalent but have different bit patterns.
 Signature of virus will vary with each copy. To achieve this variation the virus maySignature of virus will vary with each copy. To achieve this variation the virus may
randomly insert unnecessary instructions.randomly insert unnecessary instructions.

More Related Content

What's hot

Why One Virus Engine is Not Enough
Why One Virus Engine is Not EnoughWhy One Virus Engine is Not Enough
Why One Virus Engine is Not EnoughGFI Software
 
Users’ Perception of the Effects of Viruses
Users’ Perception of the Effects of VirusesUsers’ Perception of the Effects of Viruses
Users’ Perception of the Effects of VirusesSolomon Sunday Oyelere
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirusPrem Sahu
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & preventionKhaleel Assadi
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUSSatyam Sangal
 
Computer viruses and anti viruses
Computer viruses and anti virusesComputer viruses and anti viruses
Computer viruses and anti virusesMohit Jaiswal
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threatSadaf Walliyani
 
Colby_Sawyer_white_paper final 2
Colby_Sawyer_white_paper final 2Colby_Sawyer_white_paper final 2
Colby_Sawyer_white_paper final 2Scott Brown
 
Fighting computer viruses
Fighting computer virusesFighting computer viruses
Fighting computer virusesNguyễn Anh
 
Virus & anti-virus
Virus & anti-virus Virus & anti-virus
Virus & anti-virus Jayesh Naik
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer supportbozzerapide
 

What's hot (19)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Why One Virus Engine is Not Enough
Why One Virus Engine is Not EnoughWhy One Virus Engine is Not Enough
Why One Virus Engine is Not Enough
 
Users’ Perception of the Effects of Viruses
Users’ Perception of the Effects of VirusesUsers’ Perception of the Effects of Viruses
Users’ Perception of the Effects of Viruses
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUS
 
Computer virus 2
Computer virus 2Computer virus 2
Computer virus 2
 
Computer viruses and anti viruses
Computer viruses and anti virusesComputer viruses and anti viruses
Computer viruses and anti viruses
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
 
Colby_Sawyer_white_paper final 2
Colby_Sawyer_white_paper final 2Colby_Sawyer_white_paper final 2
Colby_Sawyer_white_paper final 2
 
Fighting computer viruses
Fighting computer virusesFighting computer viruses
Fighting computer viruses
 
Virus & anti-virus
Virus & anti-virus Virus & anti-virus
Virus & anti-virus
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer support
 
Malware
MalwareMalware
Malware
 

Similar to over view of viruses

Similar to over view of viruses (20)

Malicious Software and Virus
Malicious Software and Virus Malicious Software and Virus
Malicious Software and Virus
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
Iss lecture 9
Iss lecture 9Iss lecture 9
Iss lecture 9
 
Viruses ppt
Viruses pptViruses ppt
Viruses ppt
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus
VirusVirus
Virus
 
Computer Viruses and Environmental Hazards
Computer Viruses and Environmental HazardsComputer Viruses and Environmental Hazards
Computer Viruses and Environmental Hazards
 
Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious software
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
 
Virus
VirusVirus
Virus
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Viruses
VirusesViruses
Viruses
 
Virus
VirusVirus
Virus
 
Virus ......................... Khatarn
Virus ......................... KhatarnVirus ......................... Khatarn
Virus ......................... Khatarn
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 

More from Sahithi Naraparaju

documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesSahithi Naraparaju
 
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...Sahithi Naraparaju
 
literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage Sahithi Naraparaju
 
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemesSahithi Naraparaju
 
Srs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSrs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSahithi Naraparaju
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)Sahithi Naraparaju
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSahithi Naraparaju
 
CONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN CCONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN CSahithi Naraparaju
 
constants, variables and datatypes in C
constants, variables and datatypes in Cconstants, variables and datatypes in C
constants, variables and datatypes in CSahithi Naraparaju
 
Steps for Developing a 'C' program
 Steps for Developing a 'C' program Steps for Developing a 'C' program
Steps for Developing a 'C' programSahithi Naraparaju
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSahithi Naraparaju
 
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...Sahithi Naraparaju
 

More from Sahithi Naraparaju (16)

PPT FOR IDBSDDS SCHEMES
PPT FOR IDBSDDS SCHEMESPPT FOR IDBSDDS SCHEMES
PPT FOR IDBSDDS SCHEMES
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
 
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
 
literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage
 
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemes
 
Srs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSrs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemes
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
 
OVERVIEW OF ‘C’ PROGRAM
OVERVIEW OF ‘C’ PROGRAMOVERVIEW OF ‘C’ PROGRAM
OVERVIEW OF ‘C’ PROGRAM
 
CONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN CCONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN C
 
constants, variables and datatypes in C
constants, variables and datatypes in Cconstants, variables and datatypes in C
constants, variables and datatypes in C
 
Steps for Developing a 'C' program
 Steps for Developing a 'C' program Steps for Developing a 'C' program
Steps for Developing a 'C' program
 
pre processor directives in C
pre processor directives in Cpre processor directives in C
pre processor directives in C
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
 
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
 
Haptic technology
Haptic technologyHaptic technology
Haptic technology
 

Recently uploaded

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Recently uploaded (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

over view of viruses

  • 1. OVERVIEW OF VIRUSESOVERVIEW OF VIRUSES BY:BY: SAHITHI NARAPARAJUSAHITHI NARAPARAJU
  • 2. VIRUS DEFINITIONVIRUS DEFINITION  A virus is a program that can “infect” other programs by modifying them.A virus is a program that can “infect” other programs by modifying them.  The modification includes a copy of the virus program which can go on to infectThe modification includes a copy of the virus program which can go on to infect other programsother programs..  A computer virus carries its instructional code for making perfect copies of itself.A computer virus carries its instructional code for making perfect copies of itself.  Lodged in a host computer virus gains temporary control of computer’s diskLodged in a host computer virus gains temporary control of computer’s disk operating system.operating system.  Whenever the infected computer comes into contact with an uninfected piece ofWhenever the infected computer comes into contact with an uninfected piece of software/computer, a fresh copy of virus passes into new program.software/computer, a fresh copy of virus passes into new program.  Thus, virus can be spread from one computer to other.Thus, virus can be spread from one computer to other.
  • 3. NATURE OF VIRUSESNATURE OF VIRUSES  A virus can do anything that other programs do. The only difference is that itA virus can do anything that other programs do. The only difference is that it attaches itself to another program and executes secretly when the host programattaches itself to another program and executes secretly when the host program is run.is run.  Once a virus is executing, it can perform any function, such as erasing files andOnce a virus is executing, it can perform any function, such as erasing files and programs.programs.  A virus goes through following four stages:A virus goes through following four stages: 1.1. DORMANT PHASE :DORMANT PHASE : In this phase virus is idle. The virus will eventuallyIn this phase virus is idle. The virus will eventually activated by some event.activated by some event. 2.2. PROPAGATION PHASE:PROPAGATION PHASE: In this stage the virus places an identical copy ofIn this stage the virus places an identical copy of itself into other programs or into certain system areas on disk.itself into other programs or into certain system areas on disk.
  • 4.  Each infected program will contain a clone of virus, which will itself enter aEach infected program will contain a clone of virus, which will itself enter a propagation phase..propagation phase.. 3.3. TRIGGERING PHASE:TRIGGERING PHASE: The virus is activated to perform the function for which itThe virus is activated to perform the function for which it was intended. Triggering phase can be caused by variety of system event.was intended. Triggering phase can be caused by variety of system event. 4.4. EXECUTION PHASE:EXECUTION PHASE: In this phase the function is performed . The function mayIn this phase the function is performed . The function may be harmless, such as message on screen or damaging, such as the destruction ofbe harmless, such as message on screen or damaging, such as the destruction of program and data files.program and data files. Most viruses carry out their work in a manner that is specific to a particularMost viruses carry out their work in a manner that is specific to a particular operating system and in some cases, specific to a particular hardware platform.operating system and in some cases, specific to a particular hardware platform.
  • 5. Virus structureVirus structure  A virus is prepended or postpended to an executable program or it can beA virus is prepended or postpended to an executable program or it can be embedded in some other fashion.embedded in some other fashion.  The key operation of virus that the infected program, when invoked, will firstThe key operation of virus that the infected program, when invoked, will first execute the virus code and then execute the original code of the program.execute the virus code and then execute the original code of the program.  An example of simple virus:An example of simple virus: Program V : =Program V : = { go to main;{ go to main; 1234567;1234567; Subroutine infect-executable :=Subroutine infect-executable := { loop:{ loop:
  • 6. file : = get-random-executable file;file : = get-random-executable file; if (first-line-of-file =1234567)if (first-line-of-file =1234567) then goto loopthen goto loop else prepend V to file; }else prepend V to file; } subroutine do-damage : ={whatever damage is to be done}subroutine do-damage : ={whatever damage is to be done} Subroutine trigger-pulled :={return true if some condition holds}Subroutine trigger-pulled :={return true if some condition holds} MainMain : main_program :={infect-executable;: main_program :={infect-executable; if trigger-pulled then do-damage;if trigger-pulled then do-damage; goto next; }goto next; } next:next: }}  The first line of code jumps to main virus program.The first line of code jumps to main virus program.  The second line is a special marker that is used by the virus to determine whetherThe second line is a special marker that is used by the virus to determine whether or not potential victim program has been infected with this virus.or not potential victim program has been infected with this virus.  When program is invoked control is immediately transferred to main virusWhen program is invoked control is immediately transferred to main virus program.program.  Virus seeks out uninfected executable files and infects them.Virus seeks out uninfected executable files and infects them.
  • 7.  Next, the virus may perform some action, determined to the system.Next, the virus may perform some action, determined to the system.  This action could be performed every time the program is invoked.This action could be performed every time the program is invoked.  Finally, virus transfers the control to original program.Finally, virus transfers the control to original program.  If the infection phase is reasonably rapid; a user can notice difference between theIf the infection phase is reasonably rapid; a user can notice difference between the execution of infected and uninfected program.execution of infected and uninfected program.
  • 8. TYPES OF VIRUSESTYPES OF VIRUSES  Most significant types of viruses are :Most significant types of viruses are : II Parasitic virus:Parasitic virus: A Parasitic virus attaches itself to executable files and replicates,A Parasitic virus attaches itself to executable files and replicates, when the infected program is executed.when the infected program is executed. IIII Memory-resident virus:Memory-resident virus: It lodges the main memory as part of a resident systemIt lodges the main memory as part of a resident system program. Form that point virus infect every program that executes.program. Form that point virus infect every program that executes. IIIIII Boot sector virus:Boot sector virus: Infects a master boot record or boot record and spreads when aInfects a master boot record or boot record and spreads when a system is booted from the disk containing the virus.system is booted from the disk containing the virus. IVIV Stealth virus:Stealth virus: A form of virus explicitly designed to hide itself from antivirusA form of virus explicitly designed to hide itself from antivirus software.software.
  • 9. VV Polymorphic virus:Polymorphic virus: A virus that mutates with every infection making detection byA virus that mutates with every infection making detection by the “signature” of virus is impossible.the “signature” of virus is impossible.  A polymorphic virus creates copies during replication that are functionallyA polymorphic virus creates copies during replication that are functionally equivalent but have different bit patterns.equivalent but have different bit patterns.  Signature of virus will vary with each copy. To achieve this variation the virus maySignature of virus will vary with each copy. To achieve this variation the virus may randomly insert unnecessary instructions.randomly insert unnecessary instructions.
  • 10. VV Polymorphic virus:Polymorphic virus: A virus that mutates with every infection making detection byA virus that mutates with every infection making detection by the “signature” of virus is impossible.the “signature” of virus is impossible.  A polymorphic virus creates copies during replication that are functionallyA polymorphic virus creates copies during replication that are functionally equivalent but have different bit patterns.equivalent but have different bit patterns.  Signature of virus will vary with each copy. To achieve this variation the virus maySignature of virus will vary with each copy. To achieve this variation the virus may randomly insert unnecessary instructions.randomly insert unnecessary instructions.