viruses

22
Computer Viruses and Worms By Mr UV

Upload: yuvan80

Post on 24-May-2015

319 views

Category:

Education


2 download

DESCRIPTION

Meant for Year 6

TRANSCRIPT

Page 1: Viruses

Computer Viruses and Worms

By Mr UV

Page 2: Viruses

Definition of Virus

A virus is a small piece of software that piggybacks on real programs in order to get executed

Once it’s running, it spreads by inserting copies of itself into other executable code or documents

Page 3: Viruses

Computer Virus Timeline 1949

Theories for self-replicating programs are first developed.

1981Apple Viruses 1, 2, and 3 are some of the first viruses “in the wild,” or in the public domain. Found on the Apple II operating system,

1983Fred Cohen, formally defines a computer virus as “a computer program that can affect other computer programs by modifying them in such a way as to include a (possibly evolved) copy of itself.”

Page 4: Viruses

1988One of the most common viruses,

Jerusalem, is unleashed. Activated every Friday the 13th, the virus affects both .exe and .com files and deletes any programs run on that day.

MacMag and the Scores virus cause the first major Macintosh outbreaks.

Page 5: Viruses

Worms Worm - is a self-replicating program,

similar to a computer virus. A virus attaches itself to, and becomes part of, another executable program; however, a worm is self-contained and does not need to be part of another program to propagate itself.

Page 6: Viruses

History of Worms

The first worm to attract wide attention, the Morris worm, was written by Robert Tappan Morris, who at the time was a graduate student at Cornell University.

It was released on November 2, 1988 Morris himself was convicted under the US

Computer Crime and Abuse Act and received three years probation, community service and a fine in excess of $10,000.

Page 7: Viruses

Worms… Worms – is a small piece of software that uses

computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well.

They are often designed to exploit the file transmission capabilities found on many computers.

Page 8: Viruses

Zombies

Infected computers — mostly Windows machines — are now the major delivery method of spam.

Zombies have been used extensively to send e-mail spam; between 50% to 80% of all spam worldwide is now sent by zombie computers

Page 9: Viruses

Typical things that some current Personal Computer (PC) viruses do

Display a message

Page 10: Viruses

Typical things that some current Personal Computer (PC) viruses do

Erase files Scramble data on a hard disk Cause erratic screen behavior Halt the PC Many viruses do nothing obvious at all

except spread!

Display a message

Page 11: Viruses

Distributed Denial of Service

A denial-of-service attack is an attack that causes a loss of service to users, typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational resources of the victim system.

Page 12: Viruses

How it works?

The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.

Victim's IP address. Duration of attack.

Page 13: Viruses

MyDoom

26 January 2004: The Mydoom virus is first identified around 8am. Computer security companies report that Mydoom is responsible for approximately one in ten e-mail messages at this time. Slows overall internet performance by approximately ten percent and average web page load times by approximately fifty percent

Page 14: Viruses

MyDoom… 27 January: SCO Group offers a US $250,000

reward for information leading to the arrest of the worm's creator.

1 February: An estimated one million computers around the world infected with MyDoom begin the virus's massive distributed denial of service attack—the largest such attack to date.

2 February: The SCO Group moves its site to www.thescogroup.com.

Page 15: Viruses

Executable Viruses

Traditional Viruses pieces of code attached to a legitimate

program run when the legitimate program gets

executed loads itself into memory and looks around

to see if it can find any other programs on the disk

Page 16: Viruses

Boot Sector Viruses Traditional Virus infect the boot sector on floppy disks and

hard disks By putting its code in the boot sector, a

virus can guarantee it gets executed load itself into memory immediately, and it

is able to run whenever the computer is on

Page 17: Viruses

Decline of traditional viruses

Reasons:– Huge size of today’s programs storing on a

compact disk– Operating systems now protect the boot

sector

Page 18: Viruses

E-mail Viruses Moves around in e-mail messages Replicates itself by automatically mailing

itself to dozens of people in the victim’s e-mail address book

Example: Melissa virus, ILOVEYOU virus

Page 19: Viruses

Melissa virus

March 1999 the Melissa virus was the fastest-spreading virus

ever seen Someone created the virus as a Word document

uploaded to an Internet newsgroup People who downloaded the document and opened

it would trigger the virus The virus would then send the document in an e-

mail message to the first 50 people in the person's address book

Page 20: Viruses

Melissa virus

Took advantage of the programming language built into Microsoft Word called VBA (Visual Basic for Applications)

Page 21: Viruses

Prevention

Updates Anti-Viruses More secure operating systems

e.g. UNIX

Page 22: Viruses

Reference

http://mirror.aarnet.edu.au/pub/code-red/newframes-small-log.gif http://www.factmonster.com/ipka/A0872842.html

http://www.faqs.org/faqs/computer-virus/new-users/ http://www.mines.edu/academic/computer/viri-sysadmin.htm