60 likes | 354 Views
PIS Unit 5- Malicious Software. Sanjay Rawat Sanjay_r@vnrvjiet.in. Overview. Malicious Software Virus/Worms etc. Types of Virus Virus Detection (AV softwares /techniques) Text Book: W. Stallings “Cryptography & Network Security”, Chapter 19. Malicious Software.
E N D
PISUnit 5- Malicious Software Sanjay Rawat Sanjay_r@vnrvjiet.in PIS Unit5 Sanjay Rawat
Overview • Malicious Software • Virus/Worms etc. • Types of Virus • Virus Detection (AV softwares/techniques) Text Book: W. Stallings “Cryptography & Network Security”, Chapter 19. PIS Unit5 Sanjay Rawat
Malicious Software • software that is intentionally included or inserted in a system for a harmful purpose. • Aka Malware. • Malware can be a virus, worm, trojan, adware, spyware, root kit, etc. • Most malware requires the user to initiate it's operation. Well… what about Windows Metafile vulnerability? PIS Unit5 Sanjay Rawat
Types of Malware • Based on Existence • Requires host program, e.g. virus, trojans. • Independent, e.g. backdoor, worms. • Based on Propagation • Replication, e.g. virus/worms • non-replication, e.g. bots(zombies), trojans PIS Unit5 Sanjay Rawat
Backdoors • Secret entry (door) to a system that is compromised by some technique. • Aka trapdoor; e.g. subseven, BackOrifice • leftover of maintenance code, sometimes intentional! • Often assisted by rootkit, e.g. Sony BMG CD PIS Unit5 Sanjay Rawat
Other Malware • Logic Bomb – piece of code embedded in another program, s.t. it starts functioning under certain conditions, e.g. date/time, presence of files, computer names. • Trojan Horse- a program that has some hidden functionalities, not known to users. E.g. a malicious compiler can insert code in login program! • Zombies- programs to serve a master. PIS Unit5 Sanjay Rawat