Computer Virus and Penetration Technique
Total Page:16
File Type:pdf, Size:1020Kb
COMPUTER VIRUS AND PENETRATION TECHNIQUE S. Jeya, A. P./M.C.A., Dr. K. Ramar, K.S.R. College of Engineering, Professor & HOD/CSE Dept., Thiruchengode, Namakkal, National Engineering College, Kovilpatti, Tamil Nadu, India, Tamil Nadu, India. Email: [email protected] Email: [email protected] Abstract alternative terminology in which a virus is any form of self- Computer viruses have been around almost as long as replicating malware. computers. Latest technical development such as high Some viruses are programmed to damage the computer by speed network, internet & advance personal computers damaging programs, deleting files, or reformatting the hard have provided viruses a main threat to the computers. I disk. Others are not designed to do any damage, but simply remember the story of elephant and ant and how the ant replicate themselves and perhaps make their presence brought the mighty elephant down on its knees? Similarly, known by presenting text, video, or audio messages. Even a computer virus, a few KBs in size, like any piece of code, these benign viruses can create problems for the computer which when executed on computer, carries out a particular user. They typically take up computer memory used by task, can destroy gigabytes of data stored in computer and legitimate programs. As a result, they often cause erratic bring the biggest organization to a halt. A lot of anti-virus behavior and can result in system crashes. In addition, software is available in the market and being widely used many viruses are bug-ridden, and these bugs may lead to but these anti-viruses are less effective as they are made system crashes and data loss. only for the existing viruses not for the viruses which Computer viruses are small software programs that are developed latter. So this paper mainly concentrates on designed to spread from one computer to another and to analyzing the procedures which is being used for interfere with computer operation. A virus might corrupt or preventing virus. Then it covers what strategy should be delete data on your computer, use your e-mail program to adopted for anti-virus and how to recover the computer spread itself to other computers, or even erase everything from a virus attack. This paper also describes the on your hard disk [9]. Viruses are most easily spread by identification & classification of computer virus, and attachments in e-mail messages or instant messaging current computer virus situation. messages. That is why it is essential that you never open e- mail attachments unless you know who it's from and you Keywords: malware, Trojan horses, arsonists, and Nessus. are expecting it. Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. 1. Introduction Viruses also spread through download on the Internet. They A computer virus is a computer program that can copy can be hidden in illicit software or other files or programs itself and infect a computer without permission or you might download. knowledge of the user. However, the term "virus" is 2. How Computer Viruses Work commonly used, albeit erroneously, to refer to many Strange as it may sound, the computer virus is something of different types of malware programs. The original virus an Information Age marvel [10]. On one hand, viruses’ may modify the copies, or the copies may modify show us how vulnerable we are -- a properly engineered themselves, as occurs in a metamorphic virus. A virus can virus can have a devastating effect, disrupting productivity only spread from one computer to another when its host is and doing billions of dollars in damages. On the other hand, taken to the uninfected computer, for instance by a user they show us how sophisticated and interconnected human sending it over a network or the Internet, or by carrying it beings have become. on a removable medium such as a floppy disk, CD, or USB For example, experts estimate that the Mydoom worm drive. Additionally, viruses can spread to other computers infected approximately a quarter-million computers in a by infecting files on a network file system or a file system single day in January 2004. Back in March 1999, the that is accessed by another computer. Viruses are Melissa virus was so powerful that it forced Microsoft and sometimes confused with computer worms and Trojan a number of other very large companies to completely turn horses. A worm can spread itself to other computers off their e-mail systems until the virus could be contained. without needing to be transferred as part of a host, and a The ILOVEYOU virus in 2000 had a similarly devastating Trojan horse is a file that appears harmless until executed. effect. In January 2007, a worm called Storm appeared -- Most personal computers are now connected to the Internet by October, experts believed up to 50 million computers and to local area networks, facilitating the spread of were infected [7]. That's pretty impressive when you malicious code. Today's viruses may also take advantage of consider that many viruses are incredibly simple. When network services such as the World Wide Web, e-mail, and you listen to the news, you hear about many different forms file sharing systems to spread, blurring the line between of electronic infection. The most common are: viruses and worms. Furthermore, some sources use an Department Of Computer Applications (MCA), K.S.R College of Engineering “BOOM 2K8” Research Journal on Computer Engineering, March 2008. Page 19 Viruses - A virus is a small piece of software that computer virus, mostly unknowingly, by sharing infecting piggybacks on real programs. For example, a virus files or sending e-mails with viruses as attachments in the e- might attach itself to a program such as a spreadsheet mail. program. Each time the spreadsheet program runs, the A worm is similar to a virus by its design, and is considered virus runs, too, and it has the chance to reproduce (by to be a sub-class of a virus. Worms spread from computer attaching to other programs) or wreak havoc. to computer, but unlike a virus, it has the capability to E-mail viruses - An e-mail virus travels as an travel without any help from a person. A worm takes attachment to e-mail messages, and usually replicates advantage of file or information transport features on your itself by automatically mailing itself to dozens of system, which allows it to travel unaided. The biggest people in the victim's e-mail address book. Some e- danger with a worm is its capability to replicate itself on mail viruses don't even require a double -click -- they your system, so rather than your computer sending out a launch when you view the infected message in the single worm, it could send out hundreds or thousands of preview pane of your e-mail software. copies of itself, creating a huge devastating effect. One Trojan horses - A Trojan horse is simply a computer example would be for a worm to send a copy of itself to program. The program claims to do one thing (it may everyone listed in your e-mail address book. Then, the claim to be a game) but instead does damage when worm replicates and sends itself out to everyone listed in you run it (it may erase your hard disk). Trojan horses each of the receiver's address book, and the manifest have no way to replicate automatically [5]. continues on down the line [4]. Due to the copying nature Worms - A worm is a small piece of software that of a worm and its capability to travel across networks the uses computer networks and security holes to replicate end result in most cases is that the worm consumes too itself. A copy of the worm scans the network for much system memory (or network bandwidth), causing another machine that has a specific security hole. It Web servers, network servers and individual computers to copies itself to the new machine using the security stop responding. hole, and then starts replicating from there, as well. A Trojan Horse is full of as much trickery as the Top threats mythological Trojan Horse it was named after. The Trojan Worm:Win32/Sober.AH@mm Horse, at first glance will appear to be useful software but Exploit: Win32/Anicmoo.A will actually do damage once installed or run on your Worm:Win32/Nuwar.N@mm!CME711 computer[3]. Those on the receiving end of a Trojan Horse Worm:Win32/Nuwar.N@mm!CME-711 are usually tricked into opening them because they appear to Win32/Stration be receiving legitimate software or files from a legitimate Virus: W97M/Kukudro.A source. When a Trojan is activated on your computer, the Worm:Win32/Bagle.EG@mm results can vary. Some Trojans are designed to be more Exploit: Win32/Wordjmp annoying than malicious (like changing your desktop, adding Worm:Win32/Mywife.E@mm silly active desktop icons) or they can cause serious damage Exploit: Win32/Wmfap by deleting files and destroying information on your system. Worm:Win32/Sober.Z@mm Trojans are also known to create a backdoor on your Win32/Mytob computer that gives malicious users access to your system, Worm: Win32/Mytob possibly allowing confidential or personal information to be Win32/Netsky compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate. 2.1. Virus, Worm and Trojan horse Added into the mix, we also have what is called a blended The most common blunder people make when the topic of a threat. A blended threat is a sophisticated attack that bundles computer virus arises is to refer to a worm or Trojan horse as some of the worst aspects of viruses, worms, Trojan horses a virus.