SlideShare a Scribd company logo
1 of 13
History, Classifications and Structure




                                PRESENTED BY :
                                IMRAN AHMED KHAN
                                University of Texas at Tyler
   A computer virus is a computer program
    that can replicate itself and spread from one
    computer to another.

   A program that alters other programs to
    include a copy of itself

   A computer program able to infect other
    programs by modifying them to include a
    Possibly evolved version of Itself.
   Computer virus is a segment of machine code
    (typically 200-4000 bytes)

   Do undesirable things ( damages )

   Destructive Software
   Search
    Search for the Host program.
   Copy
    Copy itself into the executable program.
   Anti-Detection
    Routines to prevent viruses from being detected.
   Payload
    Performs the function(s) for which virus was
    designed.
   Shell viruses
A shell virus is one that forms a “shell” around the
   original code. In effect, the virus becomes the program,
   and the original host program becomes an internal
   subroutine of the viral code.

   Add-on viruses
They function by appending their code to the host code.
  The add-on virus then alters the startup information of
  the program, executing the viral code first. The host
  code is left almost completely untouched
   Intrusive viruses
Intrusive viruses operate by overwriting some or all of the
   original host code with viral code. The replacement
   might be selective, as in replacing a subroutine with the
   virus.
   As soon as user run the host program which is
    infected.
   Specific date or time.
   Examining user keystrokes for a specific
    sequence.
   Some random event.
Sample Source Code
   Setting up a test machine

   Knowledge of all viruses in detail

   How it infects executable, what to look for to
    determine that the executable has been
    infected.

   Knowledge of anti-detection techniques.
   First generation: Simple
Do Replication only.
Detect easily.
Cannot Hide itself.
   Second generation: Self-recognition
Solved one problem in prior generation viruses.
Prevent unnecessary growth of infected files.
Use of signature.
   Third Generation: Stealth
Hide itself from detection.
   Fourth Generation: Armored
Add confusing and unnecessary code to make it more
   difficult to analyze and detect the virus code.
Direct attack against Anti-virus software.


   Fifth Generation: Polymorphic
Self mutating viruses.
Their modified version or encrypted version.
Difficult to identify
These viruses are not limited to computers or
laptop only. Virus can attack any hand held
device as well.

The more we know about viruses the more we
can protect our devices from it.
   http://en.wikipedia.org/wiki/Computer_virus

   http://
    www.zdnet.com/blog/bott/the-malware-numbers-game-how-many-viruses-are-out-there/4783


   http://www.symantec.com/security_response/definitions/rapidrelease/detail.jsp?relid=2012-09-05


   http://www.infinitechusa.net/blog/2012/05/01/number-of-viruses/


   http://www.makeuseof.com/tag/history-computer-viruses-worst-today-case-wondering/


   http://www.antivirusworld.com/articles/history.php


   http://www.ehow.com/info_8706914_three-structural-parts-computer-virus.html

   “Computer Viruses as Artificial Life” - Eugene H. Spafford , Department of Computer Sciences
    Purdue University

More Related Content

What's hot

Computer virus
Computer virusComputer virus
Computer virus
Hemn Amin
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
jnnj
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
Shweta Ghate
 

What's hot (20)

Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus & its cure
Computer virus & its cureComputer virus & its cure
Computer virus & its cure
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
virus,worms & analysis
 virus,worms & analysis virus,worms & analysis
virus,worms & analysis
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
What is a virus and anti virus
What is a virus and anti virusWhat is a virus and anti virus
What is a virus and anti virus
 
virus and antivirus
virus and antivirusvirus and antivirus
virus and antivirus
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses ppt
Viruses pptViruses ppt
Viruses ppt
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer viruses, types and preventions
Computer viruses, types and preventionsComputer viruses, types and preventions
Computer viruses, types and preventions
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
computer virus and related legal issues
computer virus and related legal issuescomputer virus and related legal issues
computer virus and related legal issues
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 

Viewers also liked

Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
dbrown1
 
Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious software
rajakhurram
 
Utility software
Utility softwareUtility software
Utility software
adeang47
 
Computer Network
Computer NetworkComputer Network
Computer Network
Cma Mohd
 

Viewers also liked (20)

Viruses and Anti-Viruses
Viruses and Anti-VirusesViruses and Anti-Viruses
Viruses and Anti-Viruses
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
What is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of virusesWhat is virus and methods to recover from different types of viruses
What is virus and methods to recover from different types of viruses
 
Lecture malicious software
Lecture malicious softwareLecture malicious software
Lecture malicious software
 
Printer
PrinterPrinter
Printer
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Computer Ergonomics
Computer ErgonomicsComputer Ergonomics
Computer Ergonomics
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
 
Software
SoftwareSoftware
Software
 
Storage Devices
Storage DevicesStorage Devices
Storage Devices
 
How Motherboards Work
How Motherboards WorkHow Motherboards Work
How Motherboards Work
 
Windows Utilities
Windows UtilitiesWindows Utilities
Windows Utilities
 
Open Source Shareware Freeware
Open Source Shareware FreewareOpen Source Shareware Freeware
Open Source Shareware Freeware
 
Utility software
Utility softwareUtility software
Utility software
 
Podcasting
PodcastingPodcasting
Podcasting
 
spam
spamspam
spam
 
Introduction to computer hardware
Introduction to computer hardwareIntroduction to computer hardware
Introduction to computer hardware
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 

Similar to Computer viruses

How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
Sadaf Walliyani
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Cimab Butt
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & Malware
T.J. Schiel
 

Similar to Computer viruses (20)

Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Network virus detection & prevention
Network virus detection & preventionNetwork virus detection & prevention
Network virus detection & prevention
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Virus
VirusVirus
Virus
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Virus
VirusVirus
Virus
 
Virus
VirusVirus
Virus
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
 
Antiviruse.ppt
Antiviruse.pptAntiviruse.ppt
Antiviruse.ppt
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Virus bashdar
Virus bashdarVirus bashdar
Virus bashdar
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Technical Report Writing Presentation
Technical Report Writing PresentationTechnical Report Writing Presentation
Technical Report Writing Presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
Viruses & Malware
Viruses & MalwareViruses & Malware
Viruses & Malware
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

Computer viruses

  • 1. History, Classifications and Structure PRESENTED BY : IMRAN AHMED KHAN University of Texas at Tyler
  • 2. A computer virus is a computer program that can replicate itself and spread from one computer to another.  A program that alters other programs to include a copy of itself  A computer program able to infect other programs by modifying them to include a Possibly evolved version of Itself.
  • 3. Computer virus is a segment of machine code (typically 200-4000 bytes)  Do undesirable things ( damages )  Destructive Software
  • 4. Search Search for the Host program.  Copy Copy itself into the executable program.  Anti-Detection Routines to prevent viruses from being detected.  Payload Performs the function(s) for which virus was designed.
  • 5. Shell viruses A shell virus is one that forms a “shell” around the original code. In effect, the virus becomes the program, and the original host program becomes an internal subroutine of the viral code.  Add-on viruses They function by appending their code to the host code. The add-on virus then alters the startup information of the program, executing the viral code first. The host code is left almost completely untouched
  • 6. Intrusive viruses Intrusive viruses operate by overwriting some or all of the original host code with viral code. The replacement might be selective, as in replacing a subroutine with the virus.
  • 7. As soon as user run the host program which is infected.  Specific date or time.  Examining user keystrokes for a specific sequence.  Some random event.
  • 9. Setting up a test machine  Knowledge of all viruses in detail  How it infects executable, what to look for to determine that the executable has been infected.  Knowledge of anti-detection techniques.
  • 10. First generation: Simple Do Replication only. Detect easily. Cannot Hide itself.  Second generation: Self-recognition Solved one problem in prior generation viruses. Prevent unnecessary growth of infected files. Use of signature.  Third Generation: Stealth Hide itself from detection.
  • 11. Fourth Generation: Armored Add confusing and unnecessary code to make it more difficult to analyze and detect the virus code. Direct attack against Anti-virus software.  Fifth Generation: Polymorphic Self mutating viruses. Their modified version or encrypted version. Difficult to identify
  • 12. These viruses are not limited to computers or laptop only. Virus can attack any hand held device as well. The more we know about viruses the more we can protect our devices from it.
  • 13. http://en.wikipedia.org/wiki/Computer_virus  http:// www.zdnet.com/blog/bott/the-malware-numbers-game-how-many-viruses-are-out-there/4783  http://www.symantec.com/security_response/definitions/rapidrelease/detail.jsp?relid=2012-09-05  http://www.infinitechusa.net/blog/2012/05/01/number-of-viruses/  http://www.makeuseof.com/tag/history-computer-viruses-worst-today-case-wondering/  http://www.antivirusworld.com/articles/history.php  http://www.ehow.com/info_8706914_three-structural-parts-computer-virus.html  “Computer Viruses as Artificial Life” - Eugene H. Spafford , Department of Computer Sciences Purdue University