SlideShare a Scribd company logo
1 of 13
History, Classifications and Structure




                                PRESENTED BY :
                                IMRAN AHMED KHAN
                                University of Texas at Tyler
   A computer virus is a computer program
    that can replicate itself and spread from one
    computer to another.

   A program that alters other programs to
    include a copy of itself

   A computer program able to infect other
    programs by modifying them to include a
    Possibly evolved version of Itself.
   Computer virus is a segment of machine code
    (typically 200-4000 bytes)

   Do undesirable things ( damages )

   Destructive Software
   Search
    Search for the Host program.
   Copy
    Copy itself into the executable program.
   Anti-Detection
    Routines to prevent viruses from being detected.
   Payload
    Performs the function(s) for which virus was
    designed.
   Shell viruses
A shell virus is one that forms a “shell” around the
   original code. In effect, the virus becomes the program,
   and the original host program becomes an internal
   subroutine of the viral code.

   Add-on viruses
They function by appending their code to the host code.
  The add-on virus then alters the startup information of
  the program, executing the viral code first. The host
  code is left almost completely untouched
   Intrusive viruses
Intrusive viruses operate by overwriting some or all of the
   original host code with viral code. The replacement
   might be selective, as in replacing a subroutine with the
   virus.
   As soon as user run the host program which is
    infected.
   Specific date or time.
   Examining user keystrokes for a specific
    sequence.
   Some random event.
Sample Source Code
   Setting up a test machine

   Knowledge of all viruses in detail

   How it infects executable, what to look for to
    determine that the executable has been
    infected.

   Knowledge of anti-detection techniques.
   First generation: Simple
Do Replication only.
Detect easily.
Cannot Hide itself.
   Second generation: Self-recognition
Solved one problem in prior generation viruses.
Prevent unnecessary growth of infected files.
Use of signature.
   Third Generation: Stealth
Hide itself from detection.
   Fourth Generation: Armored
Add confusing and unnecessary code to make it more
   difficult to analyze and detect the virus code.
Direct attack against Anti-virus software.


   Fifth Generation: Polymorphic
Self mutating viruses.
Their modified version or encrypted version.
Difficult to identify
These viruses are not limited to computers or
laptop only. Virus can attack any hand held
device as well.

The more we know about viruses the more we
can protect our devices from it.
   http://en.wikipedia.org/wiki/Computer_virus

   http://
    www.zdnet.com/blog/bott/the-malware-numbers-game-how-many-viruses-are-out-there/4783


   http://www.symantec.com/security_response/definitions/rapidrelease/detail.jsp?relid=2012-09-05


   http://www.infinitechusa.net/blog/2012/05/01/number-of-viruses/


   http://www.makeuseof.com/tag/history-computer-viruses-worst-today-case-wondering/


   http://www.antivirusworld.com/articles/history.php


   http://www.ehow.com/info_8706914_three-structural-parts-computer-virus.html

   “Computer Viruses as Artificial Life” - Eugene H. Spafford , Department of Computer Sciences
    Purdue University

More Related Content

What's hot

Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusMaryam Malik
 
Computer virus
Computer virusComputer virus
Computer virusHemn Amin
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cureTamim Ahmed
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And AntivirusLokesh Kumar N
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer virusesjnnj
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virusLeonor Costa
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentationSardar Kaukaz
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Reportrawaabdullah
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventionsPrem Kumar Bonam
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issuesShweta Ghate
 
Computer Viruses
Computer VirusesComputer Viruses
Computer VirusesAnnies Minu
 

What's hot (20)

Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cure
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
virus,worms & analysis
 virus,worms & analysis virus,worms & analysis
virus,worms & analysis
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses ppt
Viruses pptViruses ppt
Viruses ppt
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 

Viewers also liked

Viruses and Anti-Viruses
Viruses and Anti-VirusesViruses and Anti-Viruses
Viruses and Anti-VirusesAyman Hussein
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologiesdbrown1
 
What is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of virusesWhat is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of virusesAjay Sharma
 
Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious softwarerajakhurram
 
Computer Ergonomics
Computer ErgonomicsComputer Ergonomics
Computer ErgonomicsYavira Marte
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus Ammy Vijay
 
Open Source Shareware Freeware
Open Source Shareware FreewareOpen Source Shareware Freeware
Open Source Shareware FreewareWilliam Stites
 
Utility software
Utility softwareUtility software
Utility softwareadeang47
 
Introduction to computer hardware
Introduction to computer hardwareIntroduction to computer hardware
Introduction to computer hardwaremite6025.hku
 
Computer Network
Computer NetworkComputer Network
Computer NetworkCma Mohd
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devicesRajesh Sadhukha
 

Viewers also liked (20)

Viruses and Anti-Viruses
Viruses and Anti-VirusesViruses and Anti-Viruses
Viruses and Anti-Viruses
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
What is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of virusesWhat is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of viruses
 
Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious software
 
Printer
PrinterPrinter
Printer
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Computer Ergonomics
Computer ErgonomicsComputer Ergonomics
Computer Ergonomics
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
 
Software
SoftwareSoftware
Software
 
Storage Devices
Storage DevicesStorage Devices
Storage Devices
 
How Motherboards Work
How Motherboards WorkHow Motherboards Work
How Motherboards Work
 
Windows Utilities
Windows UtilitiesWindows Utilities
Windows Utilities
 
Open Source Shareware Freeware
Open Source Shareware FreewareOpen Source Shareware Freeware
Open Source Shareware Freeware
 
Utility software
Utility softwareUtility software
Utility software
 
Podcasting
PodcastingPodcasting
Podcasting
 
spam
spamspam
spam
 
Introduction to computer hardware
Introduction to computer hardwareIntroduction to computer hardware
Introduction to computer hardware
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 

Similar to Computer viruses

Similar to Computer viruses (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Virus
VirusVirus
Virus
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Virus
VirusVirus
Virus
 
Virus
VirusVirus
Virus
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
 
Antiviruse.ppt
Antiviruse.pptAntiviruse.ppt
Antiviruse.ppt
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Technical Report Writing Presentation
Technical Report Writing PresentationTechnical Report Writing Presentation
Technical Report Writing Presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & Malware
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Computer viruses

  • 1. History, Classifications and Structure PRESENTED BY : IMRAN AHMED KHAN University of Texas at Tyler
  • 2. A computer virus is a computer program that can replicate itself and spread from one computer to another.  A program that alters other programs to include a copy of itself  A computer program able to infect other programs by modifying them to include a Possibly evolved version of Itself.
  • 3. Computer virus is a segment of machine code (typically 200-4000 bytes)  Do undesirable things ( damages )  Destructive Software
  • 4. Search Search for the Host program.  Copy Copy itself into the executable program.  Anti-Detection Routines to prevent viruses from being detected.  Payload Performs the function(s) for which virus was designed.
  • 5. Shell viruses A shell virus is one that forms a “shell” around the original code. In effect, the virus becomes the program, and the original host program becomes an internal subroutine of the viral code.  Add-on viruses They function by appending their code to the host code. The add-on virus then alters the startup information of the program, executing the viral code first. The host code is left almost completely untouched
  • 6. Intrusive viruses Intrusive viruses operate by overwriting some or all of the original host code with viral code. The replacement might be selective, as in replacing a subroutine with the virus.
  • 7. As soon as user run the host program which is infected.  Specific date or time.  Examining user keystrokes for a specific sequence.  Some random event.
  • 9. Setting up a test machine  Knowledge of all viruses in detail  How it infects executable, what to look for to determine that the executable has been infected.  Knowledge of anti-detection techniques.
  • 10. First generation: Simple Do Replication only. Detect easily. Cannot Hide itself.  Second generation: Self-recognition Solved one problem in prior generation viruses. Prevent unnecessary growth of infected files. Use of signature.  Third Generation: Stealth Hide itself from detection.
  • 11. Fourth Generation: Armored Add confusing and unnecessary code to make it more difficult to analyze and detect the virus code. Direct attack against Anti-virus software.  Fifth Generation: Polymorphic Self mutating viruses. Their modified version or encrypted version. Difficult to identify
  • 12. These viruses are not limited to computers or laptop only. Virus can attack any hand held device as well. The more we know about viruses the more we can protect our devices from it.
  • 13. http://en.wikipedia.org/wiki/Computer_virus  http:// www.zdnet.com/blog/bott/the-malware-numbers-game-how-many-viruses-are-out-there/4783  http://www.symantec.com/security_response/definitions/rapidrelease/detail.jsp?relid=2012-09-05  http://www.infinitechusa.net/blog/2012/05/01/number-of-viruses/  http://www.makeuseof.com/tag/history-computer-viruses-worst-today-case-wondering/  http://www.antivirusworld.com/articles/history.php  http://www.ehow.com/info_8706914_three-structural-parts-computer-virus.html  “Computer Viruses as Artificial Life” - Eugene H. Spafford , Department of Computer Sciences Purdue University