SlideShare a Scribd company logo
1 of 22
POWERPOINT
 PRESENTATION
      ON

ANTI-VIRUS ENGINE
SUBMITTED BY

      SHILPA C
      CP1117

    1st semester
Msc.ComputerScience
ANTI-VIRUS ENGINE
What is a Virus?

• A virus is basically an executable file is
  designed such that of all it should be infect
  documents, then it has to have the ability
  to survive by replicating itself and then it
  should also be avoid detection.
Basics about the virus……..

• Virus is program that self-replicate.
• Virus is not a data.
• You can only catch the virus by running a
  program.
• Your computer can run all kinds of programs.
• Most viruses are difficult to detect.
• Computer viruses not inherently destructive.
• Viruses are designed to corrupt or delete
  data on the hard disk.
Types of viruses

1. File or program virus.
2. Boot Sector Virus (MBR or Master Boot
  Record).
3. Multipartite Virus.
4. Stealth Virus.
5. Polymorphic Virus.
6. Macro Virus.
Functional elements of virus.

                              virus


                      Anti detection routines




                search                          copy




Fig 1.Functional diagram of a virus.
NOTES
• Every visible computer virus must have at
  least 2 basic parts (subroutine).
       1.A search routine
       2.A copy routine
       3.An anti-detection routine
Virus In Detail…..
1.File or program virus
         some programs are in disguise ,when
  they load the memory along with the
  program and perform some steps and
  infect the system. They infect the program
  files like
          .COM, .BIN, .DRV, .EXE AND .SYS.
sp
             Stack area                   FFFFH

           Uninitialized data




             COM file image




  ip                              100 H
                 PSP

                                   OH

cs=ds=es=ss
         • Fig 2. Memory map just before executing a COM file.
BEFORE                                  AFTER




                                                   mov dx,257H


                                                     Timed virus




             Uninfected host COM
             file
                                                  Infected host COM file




                                                 Jmp 154AH
100H       mov dx , 257 H                                                  100H


Fig 3.Replacing the first bytes in a COM file.
EXE File Header



                           Relocation pointer table




                              EXE Load module




Fig 4.The layout of an EXE File
2. Boot sector virus

• Boot sector virus can be the simplest or
  the most sophisticated of all computer
Viruses.
•Boot sector is the first code to gain
control after the ROM startup.
•It is very difficult to stop before it loads.
3.Multipartite virus

•A hybrid verity virus.
•Only infects files and boot sector.
•More destructive.
•More difficult to remove.
•Once it infect to the boot sector it never
stops.
•Example: invader,Flip.
4.Stealth virus
•They are stealth in nature.
•They have various methods to hide
themselves.
•They highly avoid detection.
•Sometimes they reduce the file size
sometimes increases.
•Though it try to avoid detection from
scanners.
•Example: whale virus.
5.Polymorphic virus

•They are the most difficult virus to detect.
•They have the ability to mutate.
•Anti viruses which look for the specific virus
code are not able to detect such viruses.
6.Macro virus

•A macro is an executable program
embedded in a word processing
document or other type of file.
•Once the macro is running it can copy to
other documents, deleting files etc.
•Example: Have a Nice Day, concept.
Anti-virus Engine
Anti-virus engine designed for detecting
Trojans, viruses, malware and other
malicious threats. It is the de facto
standard for mail gateway scanning. It
provides a high performance mutli-
threaded scanning daemon, command
line utilities for on demand file scanning,
and an intelligent tool for automatic
signature updates.
Anti-virus Approaches
• Detection

• Identification

• Removal
Anti-virus Techniques
• Scanars

• Monitors

• Integrity Checking
Basic virus defense
• Install antivirus softwares.
• Do not open e-mail attachments.
• Do not install new programs without first
  notifying IT.
• Install a firewall on your workstation.
• Scan your system regularly.
• Do not visit unauthorized web sites.
Thank You………

More Related Content

What's hot

WELCOME TO THE CORE OF UNIX OPERATING SYSTEM
WELCOME TO THE CORE OF UNIX OPERATING SYSTEMWELCOME TO THE CORE OF UNIX OPERATING SYSTEM
WELCOME TO THE CORE OF UNIX OPERATING SYSTEMNarendra Mohan Mishra
 
Android bootup process
Android bootup processAndroid bootup process
Android bootup processSanjay Kumar
 
Booting Process OS
Booting Process OSBooting Process OS
Booting Process OSanilinvns
 
Windows V/S Linux OS - Comparison
Windows V/S Linux OS - ComparisonWindows V/S Linux OS - Comparison
Windows V/S Linux OS - ComparisonHariharan Ganesan
 
The Boot Process
The Boot ProcessThe Boot Process
The Boot ProcessAmir Villas
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)Samiullah Khan
 
MNSEC 2018 - Windows forensics
MNSEC 2018 - Windows forensicsMNSEC 2018 - Windows forensics
MNSEC 2018 - Windows forensicsMNCERT
 
Operating systems unix
Operating systems   unixOperating systems   unix
Operating systems unixAchu dhan
 
Ms dos boot process
Ms dos boot process Ms dos boot process
Ms dos boot process Zahra Sadeghi
 
Linux Kernel Exploitation
Linux Kernel ExploitationLinux Kernel Exploitation
Linux Kernel ExploitationScio Security
 
Linux booting process - Linux System Administration
Linux booting process - Linux System AdministrationLinux booting process - Linux System Administration
Linux booting process - Linux System AdministrationSreenatha Reddy K R
 
Linux booting process!!
Linux booting process!!Linux booting process!!
Linux booting process!!sourav verma
 
Unix shell programming intro-part-1
Unix shell programming intro-part-1Unix shell programming intro-part-1
Unix shell programming intro-part-1Prachi Sasankar
 
Presentation
PresentationPresentation
Presentationbunti23
 

What's hot (20)

Linux
LinuxLinux
Linux
 
WELCOME TO THE CORE OF UNIX OPERATING SYSTEM
WELCOME TO THE CORE OF UNIX OPERATING SYSTEMWELCOME TO THE CORE OF UNIX OPERATING SYSTEM
WELCOME TO THE CORE OF UNIX OPERATING SYSTEM
 
Android bootup process
Android bootup processAndroid bootup process
Android bootup process
 
Booting Process OS
Booting Process OSBooting Process OS
Booting Process OS
 
Windows V/S Linux OS - Comparison
Windows V/S Linux OS - ComparisonWindows V/S Linux OS - Comparison
Windows V/S Linux OS - Comparison
 
Boot process
Boot processBoot process
Boot process
 
The Boot Process
The Boot ProcessThe Boot Process
The Boot Process
 
Introduction to computer lec (4)
Introduction to computer lec  (4)Introduction to computer lec  (4)
Introduction to computer lec (4)
 
MNSEC 2018 - Windows forensics
MNSEC 2018 - Windows forensicsMNSEC 2018 - Windows forensics
MNSEC 2018 - Windows forensics
 
Operating systems unix
Operating systems   unixOperating systems   unix
Operating systems unix
 
5. boot process
5. boot process5. boot process
5. boot process
 
Ubuntu OS Presentation
Ubuntu OS PresentationUbuntu OS Presentation
Ubuntu OS Presentation
 
Linux booting sequence
Linux booting sequenceLinux booting sequence
Linux booting sequence
 
Ch1 linux basics
Ch1 linux basicsCh1 linux basics
Ch1 linux basics
 
Ms dos boot process
Ms dos boot process Ms dos boot process
Ms dos boot process
 
Linux Kernel Exploitation
Linux Kernel ExploitationLinux Kernel Exploitation
Linux Kernel Exploitation
 
Linux booting process - Linux System Administration
Linux booting process - Linux System AdministrationLinux booting process - Linux System Administration
Linux booting process - Linux System Administration
 
Linux booting process!!
Linux booting process!!Linux booting process!!
Linux booting process!!
 
Unix shell programming intro-part-1
Unix shell programming intro-part-1Unix shell programming intro-part-1
Unix shell programming intro-part-1
 
Presentation
PresentationPresentation
Presentation
 

Viewers also liked

програма семінару
програма семінарупрограма семінару
програма семінаруsergeykarpec
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionIn a Rocket
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanPost Planner
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting PersonalKirsty Hulse
 

Viewers also liked (6)

програма семінару
програма семінарупрограма семінару
програма семінару
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Similar to Antivirus engine

Similar to Antivirus engine (20)

Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
Viruses & worms
Viruses & wormsViruses & worms
Viruses & worms
 
6unit1 virus and their types
6unit1 virus and their types6unit1 virus and their types
6unit1 virus and their types
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Kinds of Viruses
Kinds of VirusesKinds of Viruses
Kinds of Viruses
 
Virus vs worms vs trojans
Virus vs worms vs trojansVirus vs worms vs trojans
Virus vs worms vs trojans
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Viruses worms
Viruses wormsViruses worms
Viruses worms
 
Virus and Worms
Virus and WormsVirus and Worms
Virus and Worms
 
Isys20261 lecture 05
Isys20261 lecture 05Isys20261 lecture 05
Isys20261 lecture 05
 
Isas
IsasIsas
Isas
 
Introduction to Malware - Part 1
Introduction to Malware - Part 1 Introduction to Malware - Part 1
Introduction to Malware - Part 1
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Computer virus
Computer virusComputer virus
Computer virus
 
How do antivirus works
How do antivirus worksHow do antivirus works
How do antivirus works
 
Computer virus_the_things_u_must_know_
 Computer virus_the_things_u_must_know_ Computer virus_the_things_u_must_know_
Computer virus_the_things_u_must_know_
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Viruses and Anti-Viruses
Viruses and Anti-VirusesViruses and Anti-Viruses
Viruses and Anti-Viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

Antivirus engine

  • 1. POWERPOINT PRESENTATION ON ANTI-VIRUS ENGINE
  • 2. SUBMITTED BY SHILPA C CP1117 1st semester Msc.ComputerScience
  • 4. What is a Virus? • A virus is basically an executable file is designed such that of all it should be infect documents, then it has to have the ability to survive by replicating itself and then it should also be avoid detection.
  • 5. Basics about the virus…….. • Virus is program that self-replicate. • Virus is not a data. • You can only catch the virus by running a program. • Your computer can run all kinds of programs. • Most viruses are difficult to detect. • Computer viruses not inherently destructive. • Viruses are designed to corrupt or delete data on the hard disk.
  • 6. Types of viruses 1. File or program virus. 2. Boot Sector Virus (MBR or Master Boot Record). 3. Multipartite Virus. 4. Stealth Virus. 5. Polymorphic Virus. 6. Macro Virus.
  • 7. Functional elements of virus. virus Anti detection routines search copy Fig 1.Functional diagram of a virus.
  • 8. NOTES • Every visible computer virus must have at least 2 basic parts (subroutine). 1.A search routine 2.A copy routine 3.An anti-detection routine
  • 9. Virus In Detail….. 1.File or program virus some programs are in disguise ,when they load the memory along with the program and perform some steps and infect the system. They infect the program files like .COM, .BIN, .DRV, .EXE AND .SYS.
  • 10. sp Stack area FFFFH Uninitialized data COM file image ip 100 H PSP OH cs=ds=es=ss • Fig 2. Memory map just before executing a COM file.
  • 11. BEFORE AFTER mov dx,257H Timed virus Uninfected host COM file Infected host COM file Jmp 154AH 100H mov dx , 257 H 100H Fig 3.Replacing the first bytes in a COM file.
  • 12. EXE File Header Relocation pointer table EXE Load module Fig 4.The layout of an EXE File
  • 13. 2. Boot sector virus • Boot sector virus can be the simplest or the most sophisticated of all computer Viruses. •Boot sector is the first code to gain control after the ROM startup. •It is very difficult to stop before it loads.
  • 14. 3.Multipartite virus •A hybrid verity virus. •Only infects files and boot sector. •More destructive. •More difficult to remove. •Once it infect to the boot sector it never stops. •Example: invader,Flip.
  • 15. 4.Stealth virus •They are stealth in nature. •They have various methods to hide themselves. •They highly avoid detection. •Sometimes they reduce the file size sometimes increases. •Though it try to avoid detection from scanners. •Example: whale virus.
  • 16. 5.Polymorphic virus •They are the most difficult virus to detect. •They have the ability to mutate. •Anti viruses which look for the specific virus code are not able to detect such viruses.
  • 17. 6.Macro virus •A macro is an executable program embedded in a word processing document or other type of file. •Once the macro is running it can copy to other documents, deleting files etc. •Example: Have a Nice Day, concept.
  • 18. Anti-virus Engine Anti-virus engine designed for detecting Trojans, viruses, malware and other malicious threats. It is the de facto standard for mail gateway scanning. It provides a high performance mutli- threaded scanning daemon, command line utilities for on demand file scanning, and an intelligent tool for automatic signature updates.
  • 19. Anti-virus Approaches • Detection • Identification • Removal
  • 20. Anti-virus Techniques • Scanars • Monitors • Integrity Checking
  • 21. Basic virus defense • Install antivirus softwares. • Do not open e-mail attachments. • Do not install new programs without first notifying IT. • Install a firewall on your workstation. • Scan your system regularly. • Do not visit unauthorized web sites.