I INTRODUCTION
The Story of Computer Virus since its introduction has always
made us fear from problems in computers. It always scares us from hackers, data
and financial losses. Also, there comes many privacy issues with computer. While
Mobile and Computers remain an Integral part of our modern work environment, our
devices too are largely exposed to this world of computer viruses.
II HOW
INFECTIONS OCCUR
From The Story of Computer Virus : A virus can contaminate a
computer in various ways. It can touch base on a floppy circle or inside an
email message. It can piggyback on records downloaded from the World Wide Web
or from an Internet administration used to share music and motion pictures. Or
on the other hand it can endeavor defects in the manner computers trade
information over a system. Purported mixed risk viruses spread by means of
numerous strategies simultaneously. Some mixed danger viruses, for example,
spread through email yet additionally proliferate by abusing imperfections in a
working framework.
Generally, regardless of whether a virus discovered its
direction onto a computer, it couldn't really taint the machine—or engender to
different machines—except if the client was by one way or another tricked into
executing the virus by opening it and running it similarly as one would run an
authentic program. In any case, another type of computer virus can taint
machines and spread to others totally all alone. Basically by associating a
computer to a system, the computer proprietor risks disease. Since the Internet
associates computers around the globe, viruses can spread from one finish of
the globe to the next in only minutes.
III TYPES
OF VIRUSES
From The Story of Computer Virus : There are numerous
classifications of viruses, including parasitic or document viruses,
bootstrap-segment, multipartite, large scale, and content viruses. At that
point there are alleged computer worms, which have turned out to be especially
common. A computer worm is a sort of virus. In any case, rather than
contaminating documents or working frameworks, a worm repeats from computer to
computer by spreading whole duplicates of itself.
Parasitic or document viruses contaminate executable records
or projects in the computer. These records are frequently distinguished by the
expansion .exe for the sake of the computer document. Record viruses leave the
substance of the host program unaltered yet join to the host so that the virus
code is run first. These viruses can be either immediate activity or
inhabitant. An immediate activity virus chooses at least one projects to
contaminate each time it is executed. An occupant virus covers up in the
computer's memory and contaminates a specific program when that program is
executed.
Bootstrap-area viruses live on the primary bit of the hard
circle or floppy plate, known as the boot division. These viruses supplant
either the projects that store data about the plate's substance or the projects
that begin the computer. Ordinarily, these viruses spread by methods for the
physical trade of floppy plates.
Multipartite viruses consolidate the capacities of the
parasitic and the bootstrap-part viruses, as can taint either records or boot
divisions. These kinds of viruses can spread if a computer client boots from a
tainted diskette or gets to contaminated documents.
Different viruses taint programs that contain amazing large
scale dialects (programming dialects that let the client make new highlights
and utilities). These viruses, called large scale viruses, are written in full
scale dialects and naturally execute when the authentic program is opened.
Content viruses are written in content programming dialects,
for example, VBScript (Visual Basic Script) and JavaScript. These content
dialects can be viewed as an extraordinary sort of full scale language and are
considerably increasingly incredible in light of the fact that most are firmly
identified with the working framework condition. The 'ILOVEYOU' virus, which showed
up in 2000 and contaminated an expected 1 out of 5 PCs, is a well known case of
a content virus.
Carefully, a computer virus is consistently a program that
joins itself to some other program. In any case, computer virus has turned into
a sweeping term that additionally alludes to computer worms. A worm works
completely individually, while never connecting itself to another program.
Normally, a worm spreads over email and through different ways that computers
trade data over a system. Along these lines, a worm unleashes destruction on
machines, yet in addition obstructs organize associations and moderates system
traffic, with the goal that it requires some investment to stack a Web page or
send an email.
IV ANTI-VIRAL
TACTICS
A Preparation
and Prevention
Computer clients can get ready for a viral contamination by
making reinforcements of genuine unique programming and information records
routinely with the goal that the computer framework can be reestablished if
vital. Viral disease can be forestalled by getting programming from real
sources or by utilizing an isolated computer—that is, a computer not associated
with any system—to test new programming. In addition, clients ought to
consistently introduce working framework (OS) patches, programming refreshes
that repair the kind of imperfections, or gaps, in the OS regularly abused by
viruses. Patches can be downloaded from the Web webpage of the working
framework's designer. Notwithstanding, the best avoidance might be the establishment
of present and well-structured antiviral programming. Such programming can
forestall a viral disease and in this way help stop its spread.
B Virus
Detection
A few kinds of antiviral programming can be utilized to
distinguish the nearness of a virus. Checking programming can perceive the
qualities of a virus' computer code and search for these attributes in the
computer's records. Since new viruses must be dissected as they show up,
checking programming must be refreshed intermittently to be successful.
Different scanners look for basic highlights of viral projects and are
typically less dependable. Most antiviral programming utilizes both on-request
and on-get to scanners. On-request scanners are propelled just when the client
initiates them. On-get to scanners, then again, are continually observing the
computer for viruses yet are consistently out of sight and are not noticeable
to the client. The on-get to scanners are viewed as the proactive piece of an
antivirus bundle and the on-request scanners are viewed as receptive.
On-request scanners more often than not distinguish a virus simply after the
contamination has happened and that is the reason they are viewed as receptive.
Antivirus programming is normally sold as bundles containing
a wide range of programming programs that are free of each other and perform
various capacities. Whenever introduced or bundled together, antiviral bundles
give total insurance against viruses. Inside most antiviral bundles, a few
strategies are utilized to recognize viruses. Checksumming, for instance,
utilizes numerical counts to look at the condition of executable projects when
they are run. On the off chance that the checksum has not changed, at that
point the framework is uninfected. Checksumming programming can identify a
contamination simply after it has happened, notwithstanding. As this innovation
is dated and some viruses can sidestep it, checksumming is once in a while
utilized today.
Most antivirus bundles additionally use heuristics (critical
thinking by experimentation) to identify new viruses. This innovation watches a
program's conduct and assesses how intently it takes after a virus. It depends
on involvement with past viruses to foresee the probability that a suspicious
document is a so far unidentified or unclassified new virus.
Different sorts of antiviral programming incorporate
checking programming and respectability shell programming. Observing
programming is not the same as checking programming. It distinguishes unlawful
or possibly harming viral exercises, for example, overwriting computer records
or reformatting the computer's hard drive. Uprightness shell programming builds
up layers through which any direction to run a program must pass. Checksumming
is performed consequently inside the honesty shell, and contaminated projects,
whenever recognized, are not permitted to run.
C Containment
and Recovery
Once a viral infection has been detected, it can be
contained by immediately isolating computers on networks, halting the exchange
of files, and using only write-protected disks. In order for a computer system
to recover from a viral infection, the virus must first be eliminated. Some
antivirus software attempts to remove detected viruses, but sometimes with
unsatisfactory results. More reliable results are obtained by turning off the
infected computer; restarting it from a write-protected floppy disk; deleting
infected files and replacing them with legitimate files from backup disks; and
erasing any viruses on the boot sector.
V VIRAL
STRATEGIES
The
authors of viruses have several strategies to circumvent antivirus software and
to propagate their creations more effectively. So-called polymorphic viruses
make variations in the copies of themselves to elude detection by scanning
software. A stealth virus hides from the operating system when the system
checks the location where the virus resides, by forging results that would be
expected from an uninfected system. A so-called fast-infector virus infects not
only programs that are executed but also those that are merely accessed. As a
result, running antiviral scanning software on a computer infected by such a
virus can infect every program on the computer. A so-called slow-infector virus
infects files only when the files are modified, so that it appears to
checksumming software that the modification was legitimate. A so-called
sparse-infector virus infects only on certain occasions—for example, it may
infect every tenth program executed. This strategy makes it more difficult to
detect the virus.
By using combinations of several virus-writing methods,
virus authors can create more complex new viruses. Many virus authors also tend
to use new technologies when they appear. The antivirus industry must move
rapidly to change their antiviral software and eliminate the outbreak of such
new viruses.
VI VIRUS-LIKE
COMPUTER PROGRAMS
There are other harmful computer programs that can be part
of a virus but are not considered viruses because they do not have the ability
to replicate. These programs fall into three categories: Trojan horses, logic
bombs, and deliberately harmful or malicious software programs that run within
a Web browser, an application program such as Internet Explorer and Netscape
that displays Web sites.
A Trojan horse is a program that pretends to be something
else. A Trojan horse may appear to be something interesting and harmless, such
as a game, but when it runs it may have harmful effects. The term comes from
the classic Greek story of the Trojan horse found in Homer’s Iliad.
A logic bomb infects a computer’s memory, but unlike a
virus, it does not replicate itself. A logic bomb delivers its instructions
when it is triggered by a specific condition, such as when a particular date or
time is reached or when a combination of letters is typed on a keyboard. A
logic bomb has the ability to erase a hard drive or delete certain files.
Malicious software programs that run within a Web browser
often appear in Java applets and ActiveX controls. Although these applets and
controls improve the usefulness of Web sites, they also increase a vandal’s
ability to interfere with unprotected systems. Because those controls and
applets require that certain components be downloaded to a user’s personal
computer (PC), activating an applet or control might actually download
malicious code.
A History
: From the Story of Computer Virus
In 1949 Hungarian American mathematician John von Neumann,
at the Institute for Advanced Study in Princeton, New Jersey, proposed that it
was theoretically possible for a computer program to replicate. This theory was
tested in the 1950s at Bell Laboratories when a game called Core Wars was
developed, in which players created tiny computer programs that attacked,
erased, and tried to propagate on an opponent's system.
In 1983 American electrical engineer Fred Cohen, at the time
a graduate student, coined the term virus to describe a self-replicating
computer program. In 1985 the first Trojan horses appeared, posing as a
graphics-enhancing program called EGABTR and as a game called NUKE-LA. A host
of increasingly complex viruses followed.
The so-called Brain virus appeared in 1986 and spread
worldwide by 1987. In 1988 two new viruses appeared: Stone, the first
bootstrap-sector virus, and the Internet worm, which crossed the United States
overnight via computer network. The Dark Avenger virus, the first fast
infector, appeared in 1989, followed by the first polymorphic virus in 1990.
Computer viruses grew more sophisticated in the 1990s. In
1995 the first macro language virus, WinWord Concept, was created. In 1999 the Melissa
macro virus, spread by e-mail, disabled e-mail servers around the world for
several hours, and in some cases several days. Regarded by some as the most
prolific virus ever, Melissa cost corporations millions of dollars due to
computer downtime and lost productivity.
The VBS_LOVELETTER script virus, also known as the Love Bug
and the ILOVEYOU virus, unseated Melissa as the world's most prevalent and
costly virus when it struck in May 2000. By the time the outbreak was finally
brought under control, losses were estimated at U.S.$10 billion, and the Love
Bug is said to have infected 1 in every 5 PCs worldwide.
The year 2003 was a particularly bad year for computer
viruses and worms. First, the Blaster worm infected more than 10 million
machines worldwide by exploiting a flaw in Microsoft’s Windows operating
system. A machine that lacked the appropriate patch could be infected simply by
connecting to the Internet. Then, the SoBig worm infected millions more
machines in an attempt to convert systems into networking relays capable of
sending massive amounts of junk e-mail known as spam. SoBig spread via e-mail,
and before the outbreak was 24 hours old, MessageLabs, a popular e-mail
filtering company, captured more than a million SoBig messages and called it
the fastest-spreading virus in history. In January 2004, however, the MyDoom
virus set a new record, spreading even faster than SoBig, and, by most
accounts, causing even more damage.
No comments:
Post a Comment