際際滷

際際滷Share a Scribd company logo
The Computer Malware
By Afeef Imad Khateeb
Palestine Polytechnic University
Date :the 22th of July 2012
Outline
 The malware.
 The effect of the malware.
 Timeline of malwares .
 Main characteristics of malwares.
 Types of malwares.
 Virus classification based on target .
 Detecting the virus
 The antivirus
 who write the viruses
 Stuxnet
 Recommendation
Abstract
 The internet has become a powerful tool for enhancing
innovation and productivity .nevertheless , the increasing
dependency on the internet and other communication network
means that the internet has become a popular and efficient
way to spread the computer viruses and other types of
malicious software or
Malware .
The Malware
What is a malware ?
It is a program that can spread across computers
and network by making copies of itself usually
without the knowledge of the user
The effect of the malwares
1)Slow down email
2)Steal confidential data.
3)Use your computer to attack websites
4)Let other users hijack your computer.
5)And more
Timeline of viruses
 1950-2010
The first virus- at bell lab
The most powerful virus in the 20th century -
Michelangelo virus
The most powerful virus in the 21th century Stuxnet
The Main Characteristics Of the
Malware
1) self-replication
2) the population of growth.
3) Parasitic malware
Types of viruses
 Logic bomb
 Trojan horse
 Back door
 Spyware
 Adware
 Virus
Logic bomb
 Logic bomb:
self replicate :no .
population growth : zero.
parasitic : possibly.
Trojan horse
 Trojan horse :
self replicate :no
population growth : zero
parasitic : yes
Back door
Back door :
self replicate : no.
population growth : zero.
parasitic : possibly.
Example
username = read_username()
password = read_password()
if tisername i s "133t h4ck0r":
return ALLOW^LOGIN
if username and password are valid:
return ALLOW_LOGIN
e l s e:
return DENY^LOGIN
Spyware
 Spyware :
self replicate :No
population growth : Zero
parasitic : No
Attacks
1)Email addresses
2)Username/password
3)Bank account
4)Software licence
Adware
 Adware :
self replicate : No
population of growth: Zero
parasitic : No
This is similar to spyware but it is concentrated ti
advertisement
Viruses
Viruses or (Virii) :
self replicate : yes
population of growth : positive
parasitic : yes
Definitions of viruses
1)Germ
2)Intended
3)Dormant
Virus classification by target
 Boot sector infection
Virus classification by target cont
 File infector
 Macro
How to detect viruses
Command prompt
 The first way is to use the command prompt
 Very easy
 /cd/windows/system32/setup
The antivirus
 The second way we use is the antivirus
What is the antivirus Definition :
Antivirus is a software that can delete viruses
,prevent access to infected files and often
eliminate the infection.
Types of antivirus of the antivirus
1)Heuristics detection.
2)virus scanners.
A)On-Access.
B)On-Demand.
Three steps the antivirus use
1)Detection: detecting whether or not some code is a
virus or not which is in purest form of detection
results in a Boolean value yes there is a virus- so it is
infected no there is no virus.
2)Identification : once a virus is detected the
identification process may be distinct from detection or
identification may occur as a side effect of detection .
3)Disinfection : is the process of removing detected
viruses this is something called cleaning .
Who write viruses
 If your computer, or your network, is hit by a
virus, the first thing youre likely to say 
expletives apart  is Why do people write
these viruses?
Stuxnet
 Now we will see the video which talks about
stuxnet
1)zero days
2)Iran enrichment facility
3)Israel and USA
4) The purpose of Stuxnet
Recommendation and conclusion
I have found that there is no possibility that someone could
prevent himself from malware %100 because every
malware has its own characteristics and works different
than any other malware so the user must take care and pay
attention when using the internet or using any other
peripherals like USB Flash and also the user must make
sure that an Email is from a known place and also the
websites are famous, chose a good antivirus and make sure
of its updates .
Make a small virus using the notepad
 Now we will make a small virus using the
notepad .
Questions and answers
References
 1) John Aycock, Springer, computer viruses and
malware 2006, definition and timeline pp. 11-33
andpp.53-70.
 2) Cio website for the malware timeline
 http://www.cio.com/article/116250/A_Brief_History_o
f_Malware_and_Cybercrime _(accessed july15, 2012)
 3) Eric Filio, Springer, computer viruses from theory to
application2005, viruses or worms life cycle, pp.87-90.
 4) Paul Oldfield, Sophos, viruses and spam what you
need to know, 2004, pp.27-52.

More Related Content

Computer Malware Into

  • 1. The Computer Malware By Afeef Imad Khateeb Palestine Polytechnic University Date :the 22th of July 2012
  • 2. Outline The malware. The effect of the malware. Timeline of malwares . Main characteristics of malwares. Types of malwares. Virus classification based on target . Detecting the virus The antivirus who write the viruses Stuxnet Recommendation
  • 3. Abstract The internet has become a powerful tool for enhancing innovation and productivity .nevertheless , the increasing dependency on the internet and other communication network means that the internet has become a popular and efficient way to spread the computer viruses and other types of malicious software or Malware .
  • 4. The Malware What is a malware ? It is a program that can spread across computers and network by making copies of itself usually without the knowledge of the user
  • 5. The effect of the malwares 1)Slow down email 2)Steal confidential data. 3)Use your computer to attack websites 4)Let other users hijack your computer. 5)And more
  • 6. Timeline of viruses 1950-2010 The first virus- at bell lab The most powerful virus in the 20th century - Michelangelo virus The most powerful virus in the 21th century Stuxnet
  • 7. The Main Characteristics Of the Malware 1) self-replication 2) the population of growth. 3) Parasitic malware
  • 8. Types of viruses Logic bomb Trojan horse Back door Spyware Adware Virus
  • 9. Logic bomb Logic bomb: self replicate :no . population growth : zero. parasitic : possibly.
  • 10. Trojan horse Trojan horse : self replicate :no population growth : zero parasitic : yes
  • 11. Back door Back door : self replicate : no. population growth : zero. parasitic : possibly. Example username = read_username() password = read_password() if tisername i s "133t h4ck0r": return ALLOW^LOGIN if username and password are valid: return ALLOW_LOGIN e l s e: return DENY^LOGIN
  • 12. Spyware Spyware : self replicate :No population growth : Zero parasitic : No Attacks 1)Email addresses 2)Username/password 3)Bank account 4)Software licence
  • 13. Adware Adware : self replicate : No population of growth: Zero parasitic : No This is similar to spyware but it is concentrated ti advertisement
  • 14. Viruses Viruses or (Virii) : self replicate : yes population of growth : positive parasitic : yes Definitions of viruses 1)Germ 2)Intended 3)Dormant
  • 15. Virus classification by target Boot sector infection
  • 16. Virus classification by target cont File infector Macro
  • 17. How to detect viruses
  • 18. Command prompt The first way is to use the command prompt Very easy /cd/windows/system32/setup
  • 19. The antivirus The second way we use is the antivirus What is the antivirus Definition : Antivirus is a software that can delete viruses ,prevent access to infected files and often eliminate the infection.
  • 20. Types of antivirus of the antivirus 1)Heuristics detection. 2)virus scanners. A)On-Access. B)On-Demand.
  • 21. Three steps the antivirus use 1)Detection: detecting whether or not some code is a virus or not which is in purest form of detection results in a Boolean value yes there is a virus- so it is infected no there is no virus. 2)Identification : once a virus is detected the identification process may be distinct from detection or identification may occur as a side effect of detection . 3)Disinfection : is the process of removing detected viruses this is something called cleaning .
  • 22. Who write viruses If your computer, or your network, is hit by a virus, the first thing youre likely to say expletives apart is Why do people write these viruses?
  • 23. Stuxnet Now we will see the video which talks about stuxnet 1)zero days 2)Iran enrichment facility 3)Israel and USA 4) The purpose of Stuxnet
  • 24. Recommendation and conclusion I have found that there is no possibility that someone could prevent himself from malware %100 because every malware has its own characteristics and works different than any other malware so the user must take care and pay attention when using the internet or using any other peripherals like USB Flash and also the user must make sure that an Email is from a known place and also the websites are famous, chose a good antivirus and make sure of its updates .
  • 25. Make a small virus using the notepad Now we will make a small virus using the notepad .
  • 27. References 1) John Aycock, Springer, computer viruses and malware 2006, definition and timeline pp. 11-33 andpp.53-70. 2) Cio website for the malware timeline http://www.cio.com/article/116250/A_Brief_History_o f_Malware_and_Cybercrime _(accessed july15, 2012) 3) Eric Filio, Springer, computer viruses from theory to application2005, viruses or worms life cycle, pp.87-90. 4) Paul Oldfield, Sophos, viruses and spam what you need to know, 2004, pp.27-52.