SlideShare a Scribd company logo
1 of 10
OVERVIEW OF VIRUSESOVERVIEW OF VIRUSES
BY:BY:
SAHITHI NARAPARAJUSAHITHI NARAPARAJU
VIRUS DEFINITIONVIRUS DEFINITION
 A virus is a program that can “infect” other programs by modifying them.A virus is a program that can “infect” other programs by modifying them.
 The modification includes a copy of the virus program which can go on to infectThe modification includes a copy of the virus program which can go on to infect
other programsother programs..
 A computer virus carries its instructional code for making perfect copies of itself.A computer virus carries its instructional code for making perfect copies of itself.
 Lodged in a host computer virus gains temporary control of computer’s diskLodged in a host computer virus gains temporary control of computer’s disk
operating system.operating system.
 Whenever the infected computer comes into contact with an uninfected piece ofWhenever the infected computer comes into contact with an uninfected piece of
software/computer, a fresh copy of virus passes into new program.software/computer, a fresh copy of virus passes into new program.
 Thus, virus can be spread from one computer to other.Thus, virus can be spread from one computer to other.
NATURE OF VIRUSESNATURE OF VIRUSES
 A virus can do anything that other programs do. The only difference is that itA virus can do anything that other programs do. The only difference is that it
attaches itself to another program and executes secretly when the host programattaches itself to another program and executes secretly when the host program
is run.is run.
 Once a virus is executing, it can perform any function, such as erasing files andOnce a virus is executing, it can perform any function, such as erasing files and
programs.programs.
 A virus goes through following four stages:A virus goes through following four stages:
1.1. DORMANT PHASE :DORMANT PHASE : In this phase virus is idle. The virus will eventuallyIn this phase virus is idle. The virus will eventually
activated by some event.activated by some event.
2.2. PROPAGATION PHASE:PROPAGATION PHASE: In this stage the virus places an identical copy ofIn this stage the virus places an identical copy of
itself into other programs or into certain system areas on disk.itself into other programs or into certain system areas on disk.
 Each infected program will contain a clone of virus, which will itself enter aEach infected program will contain a clone of virus, which will itself enter a
propagation phase..propagation phase..
3.3. TRIGGERING PHASE:TRIGGERING PHASE: The virus is activated to perform the function for which itThe virus is activated to perform the function for which it
was intended. Triggering phase can be caused by variety of system event.was intended. Triggering phase can be caused by variety of system event.
4.4. EXECUTION PHASE:EXECUTION PHASE: In this phase the function is performed . The function mayIn this phase the function is performed . The function may
be harmless, such as message on screen or damaging, such as the destruction ofbe harmless, such as message on screen or damaging, such as the destruction of
program and data files.program and data files.
Most viruses carry out their work in a manner that is specific to a particularMost viruses carry out their work in a manner that is specific to a particular
operating system and in some cases, specific to a particular hardware platform.operating system and in some cases, specific to a particular hardware platform.
Virus structureVirus structure
 A virus is prepended or postpended to an executable program or it can beA virus is prepended or postpended to an executable program or it can be
embedded in some other fashion.embedded in some other fashion.
 The key operation of virus that the infected program, when invoked, will firstThe key operation of virus that the infected program, when invoked, will first
execute the virus code and then execute the original code of the program.execute the virus code and then execute the original code of the program.
 An example of simple virus:An example of simple virus:
Program V : =Program V : =
{ go to main;{ go to main;
1234567;1234567;
Subroutine infect-executable :=Subroutine infect-executable :=
{ loop:{ loop:
file : = get-random-executable file;file : = get-random-executable file;
if (first-line-of-file =1234567)if (first-line-of-file =1234567)
then goto loopthen goto loop
else prepend V to file; }else prepend V to file; }
subroutine do-damage : ={whatever damage is to be done}subroutine do-damage : ={whatever damage is to be done}
Subroutine trigger-pulled :={return true if some condition holds}Subroutine trigger-pulled :={return true if some condition holds}
MainMain : main_program :={infect-executable;: main_program :={infect-executable;
if trigger-pulled then do-damage;if trigger-pulled then do-damage;
goto next; }goto next; }
next:next:
}}
 The first line of code jumps to main virus program.The first line of code jumps to main virus program.
 The second line is a special marker that is used by the virus to determine whetherThe second line is a special marker that is used by the virus to determine whether
or not potential victim program has been infected with this virus.or not potential victim program has been infected with this virus.
 When program is invoked control is immediately transferred to main virusWhen program is invoked control is immediately transferred to main virus
program.program.
 Virus seeks out uninfected executable files and infects them.Virus seeks out uninfected executable files and infects them.
 Next, the virus may perform some action, determined to the system.Next, the virus may perform some action, determined to the system.
 This action could be performed every time the program is invoked.This action could be performed every time the program is invoked.
 Finally, virus transfers the control to original program.Finally, virus transfers the control to original program.
 If the infection phase is reasonably rapid; a user can notice difference between theIf the infection phase is reasonably rapid; a user can notice difference between the
execution of infected and uninfected program.execution of infected and uninfected program.
TYPES OF VIRUSESTYPES OF VIRUSES
 Most significant types of viruses are :Most significant types of viruses are :
II Parasitic virus:Parasitic virus: A Parasitic virus attaches itself to executable files and replicates,A Parasitic virus attaches itself to executable files and replicates,
when the infected program is executed.when the infected program is executed.
IIII Memory-resident virus:Memory-resident virus: It lodges the main memory as part of a resident systemIt lodges the main memory as part of a resident system
program. Form that point virus infect every program that executes.program. Form that point virus infect every program that executes.
IIIIII Boot sector virus:Boot sector virus: Infects a master boot record or boot record and spreads when aInfects a master boot record or boot record and spreads when a
system is booted from the disk containing the virus.system is booted from the disk containing the virus.
IVIV Stealth virus:Stealth virus: A form of virus explicitly designed to hide itself from antivirusA form of virus explicitly designed to hide itself from antivirus
software.software.
VV Polymorphic virus:Polymorphic virus: A virus that mutates with every infection making detection byA virus that mutates with every infection making detection by
the “signature” of virus is impossible.the “signature” of virus is impossible.
 A polymorphic virus creates copies during replication that are functionallyA polymorphic virus creates copies during replication that are functionally
equivalent but have different bit patterns.equivalent but have different bit patterns.
 Signature of virus will vary with each copy. To achieve this variation the virus maySignature of virus will vary with each copy. To achieve this variation the virus may
randomly insert unnecessary instructions.randomly insert unnecessary instructions.
VV Polymorphic virus:Polymorphic virus: A virus that mutates with every infection making detection byA virus that mutates with every infection making detection by
the “signature” of virus is impossible.the “signature” of virus is impossible.
 A polymorphic virus creates copies during replication that are functionallyA polymorphic virus creates copies during replication that are functionally
equivalent but have different bit patterns.equivalent but have different bit patterns.
 Signature of virus will vary with each copy. To achieve this variation the virus maySignature of virus will vary with each copy. To achieve this variation the virus may
randomly insert unnecessary instructions.randomly insert unnecessary instructions.

More Related Content

What's hot

Why One Virus Engine is Not Enough
Why One Virus Engine is Not EnoughWhy One Virus Engine is Not Enough
Why One Virus Engine is Not EnoughGFI Software
 
Users’ Perception of the Effects of Viruses
Users’ Perception of the Effects of VirusesUsers’ Perception of the Effects of Viruses
Users’ Perception of the Effects of VirusesSolomon Sunday Oyelere
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirusPrem Sahu
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & preventionKhaleel Assadi
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUSSatyam Sangal
 
Computer viruses and anti viruses
Computer viruses and anti virusesComputer viruses and anti viruses
Computer viruses and anti virusesMohit Jaiswal
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threatSadaf Walliyani
 
Colby_Sawyer_white_paper final 2
Colby_Sawyer_white_paper final 2Colby_Sawyer_white_paper final 2
Colby_Sawyer_white_paper final 2Scott Brown
 
Fighting computer viruses
Fighting computer virusesFighting computer viruses
Fighting computer virusesNguyễn Anh
 
Virus & anti-virus
Virus & anti-virus Virus & anti-virus
Virus & anti-virus Jayesh Naik
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer supportbozzerapide
 

What's hot (19)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Why One Virus Engine is Not Enough
Why One Virus Engine is Not EnoughWhy One Virus Engine is Not Enough
Why One Virus Engine is Not Enough
 
Users’ Perception of the Effects of Viruses
Users’ Perception of the Effects of VirusesUsers’ Perception of the Effects of Viruses
Users’ Perception of the Effects of Viruses
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
How Antivirus detects VIRUS
How Antivirus detects VIRUSHow Antivirus detects VIRUS
How Antivirus detects VIRUS
 
Computer virus 2
Computer virus 2Computer virus 2
Computer virus 2
 
Computer viruses and anti viruses
Computer viruses and anti virusesComputer viruses and anti viruses
Computer viruses and anti viruses
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
 
Colby_Sawyer_white_paper final 2
Colby_Sawyer_white_paper final 2Colby_Sawyer_white_paper final 2
Colby_Sawyer_white_paper final 2
 
Fighting computer viruses
Fighting computer virusesFighting computer viruses
Fighting computer viruses
 
Virus & anti-virus
Virus & anti-virus Virus & anti-virus
Virus & anti-virus
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Computer viruses 911 computer support
Computer viruses 911 computer supportComputer viruses 911 computer support
Computer viruses 911 computer support
 
Malware
MalwareMalware
Malware
 

Similar to over view of viruses

Similar to over view of viruses (20)

Malicious Software and Virus
Malicious Software and Virus Malicious Software and Virus
Malicious Software and Virus
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
Iss lecture 9
Iss lecture 9Iss lecture 9
Iss lecture 9
 
Viruses ppt
Viruses pptViruses ppt
Viruses ppt
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus
VirusVirus
Virus
 
Computer Viruses and Environmental Hazards
Computer Viruses and Environmental HazardsComputer Viruses and Environmental Hazards
Computer Viruses and Environmental Hazards
 
Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious software
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
 
Virus
VirusVirus
Virus
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Viruses
VirusesViruses
Viruses
 
Virus
VirusVirus
Virus
 
Virus ......................... Khatarn
Virus ......................... KhatarnVirus ......................... Khatarn
Virus ......................... Khatarn
 
FCS Presentation.pptx
FCS Presentation.pptxFCS Presentation.pptx
FCS Presentation.pptx
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 

More from Sahithi Naraparaju

documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesSahithi Naraparaju
 
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...Sahithi Naraparaju
 
literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage Sahithi Naraparaju
 
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemesSahithi Naraparaju
 
Srs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSrs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSahithi Naraparaju
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)Sahithi Naraparaju
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSahithi Naraparaju
 
CONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN CCONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN CSahithi Naraparaju
 
constants, variables and datatypes in C
constants, variables and datatypes in Cconstants, variables and datatypes in C
constants, variables and datatypes in CSahithi Naraparaju
 
Steps for Developing a 'C' program
 Steps for Developing a 'C' program Steps for Developing a 'C' program
Steps for Developing a 'C' programSahithi Naraparaju
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSahithi Naraparaju
 
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...Sahithi Naraparaju
 

More from Sahithi Naraparaju (16)

PPT FOR IDBSDDS SCHEMES
PPT FOR IDBSDDS SCHEMESPPT FOR IDBSDDS SCHEMES
PPT FOR IDBSDDS SCHEMES
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
 
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
SYSTEM ARCHITECTURE / UML DIAGRAMS FOR IDENTITY BASED SECURE DISTRIBUTED DATA...
 
literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage literature survey for identity based secure distributed data storage
literature survey for identity based secure distributed data storage
 
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemes
 
Srs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemesSrs document for identity based secure distributed data storage schemes
Srs document for identity based secure distributed data storage schemes
 
66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)66913017 java-ring-1217949449014046-9 (1)
66913017 java-ring-1217949449014046-9 (1)
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
 
OVERVIEW OF ‘C’ PROGRAM
OVERVIEW OF ‘C’ PROGRAMOVERVIEW OF ‘C’ PROGRAM
OVERVIEW OF ‘C’ PROGRAM
 
CONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN CCONSTANTS, VARIABLES & DATATYPES IN C
CONSTANTS, VARIABLES & DATATYPES IN C
 
constants, variables and datatypes in C
constants, variables and datatypes in Cconstants, variables and datatypes in C
constants, variables and datatypes in C
 
Steps for Developing a 'C' program
 Steps for Developing a 'C' program Steps for Developing a 'C' program
Steps for Developing a 'C' program
 
pre processor directives in C
pre processor directives in Cpre processor directives in C
pre processor directives in C
 
Self protecteion in clustered distributed system new
Self protecteion in clustered distributed system newSelf protecteion in clustered distributed system new
Self protecteion in clustered distributed system new
 
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...A Batch-authenticated And Key AgreementFramework For P2p-based Online Social...
A Batch-authenticated And Key Agreement Framework For P2p-based Online Social...
 
Haptic technology
Haptic technologyHaptic technology
Haptic technology
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

over view of viruses

  • 1. OVERVIEW OF VIRUSESOVERVIEW OF VIRUSES BY:BY: SAHITHI NARAPARAJUSAHITHI NARAPARAJU
  • 2. VIRUS DEFINITIONVIRUS DEFINITION  A virus is a program that can “infect” other programs by modifying them.A virus is a program that can “infect” other programs by modifying them.  The modification includes a copy of the virus program which can go on to infectThe modification includes a copy of the virus program which can go on to infect other programsother programs..  A computer virus carries its instructional code for making perfect copies of itself.A computer virus carries its instructional code for making perfect copies of itself.  Lodged in a host computer virus gains temporary control of computer’s diskLodged in a host computer virus gains temporary control of computer’s disk operating system.operating system.  Whenever the infected computer comes into contact with an uninfected piece ofWhenever the infected computer comes into contact with an uninfected piece of software/computer, a fresh copy of virus passes into new program.software/computer, a fresh copy of virus passes into new program.  Thus, virus can be spread from one computer to other.Thus, virus can be spread from one computer to other.
  • 3. NATURE OF VIRUSESNATURE OF VIRUSES  A virus can do anything that other programs do. The only difference is that itA virus can do anything that other programs do. The only difference is that it attaches itself to another program and executes secretly when the host programattaches itself to another program and executes secretly when the host program is run.is run.  Once a virus is executing, it can perform any function, such as erasing files andOnce a virus is executing, it can perform any function, such as erasing files and programs.programs.  A virus goes through following four stages:A virus goes through following four stages: 1.1. DORMANT PHASE :DORMANT PHASE : In this phase virus is idle. The virus will eventuallyIn this phase virus is idle. The virus will eventually activated by some event.activated by some event. 2.2. PROPAGATION PHASE:PROPAGATION PHASE: In this stage the virus places an identical copy ofIn this stage the virus places an identical copy of itself into other programs or into certain system areas on disk.itself into other programs or into certain system areas on disk.
  • 4.  Each infected program will contain a clone of virus, which will itself enter aEach infected program will contain a clone of virus, which will itself enter a propagation phase..propagation phase.. 3.3. TRIGGERING PHASE:TRIGGERING PHASE: The virus is activated to perform the function for which itThe virus is activated to perform the function for which it was intended. Triggering phase can be caused by variety of system event.was intended. Triggering phase can be caused by variety of system event. 4.4. EXECUTION PHASE:EXECUTION PHASE: In this phase the function is performed . The function mayIn this phase the function is performed . The function may be harmless, such as message on screen or damaging, such as the destruction ofbe harmless, such as message on screen or damaging, such as the destruction of program and data files.program and data files. Most viruses carry out their work in a manner that is specific to a particularMost viruses carry out their work in a manner that is specific to a particular operating system and in some cases, specific to a particular hardware platform.operating system and in some cases, specific to a particular hardware platform.
  • 5. Virus structureVirus structure  A virus is prepended or postpended to an executable program or it can beA virus is prepended or postpended to an executable program or it can be embedded in some other fashion.embedded in some other fashion.  The key operation of virus that the infected program, when invoked, will firstThe key operation of virus that the infected program, when invoked, will first execute the virus code and then execute the original code of the program.execute the virus code and then execute the original code of the program.  An example of simple virus:An example of simple virus: Program V : =Program V : = { go to main;{ go to main; 1234567;1234567; Subroutine infect-executable :=Subroutine infect-executable := { loop:{ loop:
  • 6. file : = get-random-executable file;file : = get-random-executable file; if (first-line-of-file =1234567)if (first-line-of-file =1234567) then goto loopthen goto loop else prepend V to file; }else prepend V to file; } subroutine do-damage : ={whatever damage is to be done}subroutine do-damage : ={whatever damage is to be done} Subroutine trigger-pulled :={return true if some condition holds}Subroutine trigger-pulled :={return true if some condition holds} MainMain : main_program :={infect-executable;: main_program :={infect-executable; if trigger-pulled then do-damage;if trigger-pulled then do-damage; goto next; }goto next; } next:next: }}  The first line of code jumps to main virus program.The first line of code jumps to main virus program.  The second line is a special marker that is used by the virus to determine whetherThe second line is a special marker that is used by the virus to determine whether or not potential victim program has been infected with this virus.or not potential victim program has been infected with this virus.  When program is invoked control is immediately transferred to main virusWhen program is invoked control is immediately transferred to main virus program.program.  Virus seeks out uninfected executable files and infects them.Virus seeks out uninfected executable files and infects them.
  • 7.  Next, the virus may perform some action, determined to the system.Next, the virus may perform some action, determined to the system.  This action could be performed every time the program is invoked.This action could be performed every time the program is invoked.  Finally, virus transfers the control to original program.Finally, virus transfers the control to original program.  If the infection phase is reasonably rapid; a user can notice difference between theIf the infection phase is reasonably rapid; a user can notice difference between the execution of infected and uninfected program.execution of infected and uninfected program.
  • 8. TYPES OF VIRUSESTYPES OF VIRUSES  Most significant types of viruses are :Most significant types of viruses are : II Parasitic virus:Parasitic virus: A Parasitic virus attaches itself to executable files and replicates,A Parasitic virus attaches itself to executable files and replicates, when the infected program is executed.when the infected program is executed. IIII Memory-resident virus:Memory-resident virus: It lodges the main memory as part of a resident systemIt lodges the main memory as part of a resident system program. Form that point virus infect every program that executes.program. Form that point virus infect every program that executes. IIIIII Boot sector virus:Boot sector virus: Infects a master boot record or boot record and spreads when aInfects a master boot record or boot record and spreads when a system is booted from the disk containing the virus.system is booted from the disk containing the virus. IVIV Stealth virus:Stealth virus: A form of virus explicitly designed to hide itself from antivirusA form of virus explicitly designed to hide itself from antivirus software.software.
  • 9. VV Polymorphic virus:Polymorphic virus: A virus that mutates with every infection making detection byA virus that mutates with every infection making detection by the “signature” of virus is impossible.the “signature” of virus is impossible.  A polymorphic virus creates copies during replication that are functionallyA polymorphic virus creates copies during replication that are functionally equivalent but have different bit patterns.equivalent but have different bit patterns.  Signature of virus will vary with each copy. To achieve this variation the virus maySignature of virus will vary with each copy. To achieve this variation the virus may randomly insert unnecessary instructions.randomly insert unnecessary instructions.
  • 10. VV Polymorphic virus:Polymorphic virus: A virus that mutates with every infection making detection byA virus that mutates with every infection making detection by the “signature” of virus is impossible.the “signature” of virus is impossible.  A polymorphic virus creates copies during replication that are functionallyA polymorphic virus creates copies during replication that are functionally equivalent but have different bit patterns.equivalent but have different bit patterns.  Signature of virus will vary with each copy. To achieve this variation the virus maySignature of virus will vary with each copy. To achieve this variation the virus may randomly insert unnecessary instructions.randomly insert unnecessary instructions.