Sie sind auf Seite 1von 12

Term

Paper
Of
Operating
System
CSE 316
Topic- How windows operating system
handles viruses? Write down various
viruses that can cause serious damage to
the computer system.
Submitted To: Submitted
By:

ACKNOWLEDGEMENT

I take this opportunity to offer my deep


gratitude to all those who have extended their
valued support and advice to complete this
term paper. I cannot in full measure,
reciprocate the kindness showed and
contribution made by various persons in this
endeavor.

I acknowledge my sincere thanks to


____________ ma’am (Faculty Member) who
stood by me as a pillar of strength throughout
the course of work and under whose mature
guidance the term paper arrives out
successfully. I am grateful to his valuable
suggestions.

Contents:

1. Abstract

2. Introduction To Viruses

3. Different Types Of Computer Virses

o Resident Viruses

o Direct Action Viruses

o Overwrite Viruses

o Boot Viruses

o Macro Virus

o Directory Virus

o Polymorphic Virus

o File Infectors

o Companions Virus
o FAT Virus

o Worms

o Trojans Or Trojan Horses

o E-Mail Virus

o Logic Bombs

4. Strategies For Implementing Antivirus

5. Virus Detection By OS

o Network Firewall

o Online Scanning

6. Linux Virus Protection

7. References

1. Abstract: programs specifically for tracking


down viruses and stopping them.
Computer viruses are pieces of Below are articles which provide
computer code, designed to information on latest computer
implant itself in programs or files viruses, virus statistics, computer
with the idea of destroying, or virus protection and removal.
changing the data transmitted.
Viruses can be spread through There are so many things you
interchange of files and have to watch out for when
programs, loaded onto a you're online, and one of the
computer and executed. They worst of those is the good old
slow down computers, crash a computer virus. Now that
system, or simply reroute data to broadband Internet is almost
other units. Virus numbers have everywhere it's making things a
risen since the 90s, and the U.S lot easier for viruses to get to
government has passed laws your computer quickly. This is
making virus introduction into why it's very important to have a
computers of unknowing victims, very good firewall on your
a serious crime. Software computer, as well as a good
companies have also sought to antivirus program. It's just as
stem the tide by creating important to keep them updated
on a regular basis - having out- As stated above, the term
of-date security software is "computer virus" is sometimes
pointless. used as a catch-all phrase to
include all types of malware,
This term paper is about even those that do not have the
operating system, different types reproductive ability. Malware
includes computer viruses,
of computer viruses and and
computer worms, Trojan horses,
different techniques of operating most rootkits, spyware, dishonest
system to handle viruses like adware and other malicious and
windows firewall, various anti unwanted software, including
viruses etc. true viruses. Viruses are
sometimes confused with worms
and Trojan horses, which are
technically different. A worm can
2. Introduction to exploit security vulnerabilities to
Virus: spread itself automatically to
other computers through
networks, while a Trojan horse is
A computer virus is a computer
a program that appears harmless
program that can copy itself and
but hides malicious functions.
infect a computer. The term
Worms and Trojan horses, like
"virus" is also commonly but
viruses, may harm a computer
erroneously used to refer to other
system's data or performance.
types of malware, including but
Some viruses and other malware
not limited to adware and
have symptoms noticeable to the
spyware programs that do not
computer user, but many are
have the reproductive ability. A
surreptitious or simply do
true virus can spread from one
nothing to call attention to
computer to another (in some
themselves. Some viruses do
form of executable code) when
nothing beyond reproducing
its host is taken to the target
themselves.
computer; for instance because a
user sent it over a network or the
Internet, or carried it on a
removable medium such as a
floppy disk, CD, DVD, or USB
drive.

Viruses can increase their


chances of spreading to other
computers by infecting files on a
network file system or a file
system that is accessed by
another computer.
copied, renamed etc.

Examples include: Randex, CMJ,


Meve, and MrKlunky.

3.2 Direct Action Viruses


The main purpose of this virus is
to replicate and take action when
it is executed. When a specific
Different Types of condition is met, the virus will go
Computer Viruses into action and infect files in the
directory or folder that it is in and
Computer Virus is a kind of in directories that are specified in
malicious software written the AUTOEXEC.BAT file
intentionally to enter a computer PATH. This batch file is always
without the user’s permission or located in the root directory of
knowledge, with an ability to the hard disk and carries out
replicate itself, thus continuing to certain operations when the
spread. Some viruses do little but computer is booted.
replicate others can cause severe
harm or adversely effect program 3.3 Overwrite Viruses
and performance of the system. A Virus of this kind is characterized
virus should never be assumed by the fact that it deletes the
harmless and left on a system. information contained in the files
Most common types of viruses that it infects, rendering them
are mentioned below: partially or totally useless once
they have been infected.
3.1 Resident Viruses
This type of virus is a permanent The only way to clean a file
which dwells in the RAM infected by an overwrite virus is
memory. From there it can to delete the file completely, thus
overcome and interrupt all of the losing the original content.
operations executed by the
system: corrupting files and Examples of this virus include:
programs that are opened, closed, Way, Trj.Reboot, Trivial.88.D.
Examples of macro viruses:
3.4 Boot Virus Relax, Melissa.A, Bablas,
This type of virus affects the boot O97M/Y2K.
sector of a floppy or hard disk.
This is a crucial part of a disk, in 3.6 Directory Virus
which information on the disk Directory viruses change the
itself is stored together with a paths that indicate the location of
program that makes it possible to a file. By executing a program
boot (start) the computer from the (file with the extension .EXE
disk. or .COM) which has been
infected by a virus, you are
The best way of avoiding boot unknowingly running the virus
viruses is to ensure that floppy program, while the original file
disks are write-protected and and program have been
never start your computer with an previously moved by the virus.
unknown floppy disk in the disk
drive. Once infected it becomes
impossible to locate the original
files.

Examples of boot viruses


include: Polyboot.B, AntiEXE.

3.5 Macro Virus


Macro viruses infect files that are
created using certain applications
or programs that contain macros.
These mini-programs make it
possible to automate series of
operations so that they are
performed as a single action,
thereby saving the user from
having to carry them out one by
one. 3.7 Polymorphic Virus
Polymorphic viruses encrypt or
encode themselves in a different
way (using different algorithms Some examples include: Stator,
and encryption keys) every time Asimov.1539, and Terrax.1069
they infect a system.
3.10 FAT Virus
This makes it impossible for anti- The file allocation table or FAT
viruses to find them using string is the part of a disk used to
or signature searches (because connect information and is a vital
they are different in each part of the normal functioning of
encryption) and also enables the computer.
them to create a large number of This type of virus attack can be
copies of themselves. especially dangerous, by
preventing access to certain
Examples include: Elkern, sections of the disk where
Marburg, Satan Bug, and Tuareg. important files are stored.
Damage caused can result in
3.8 File Infectors information losses from
This type of virus infects individual files or even entire
programs or executable files directories.
(files with an .EXE or .COM
extension). When one of these 3.11 Worms
programs is run, directly or A worm is a program very
indirectly, the virus is activated, similar to a virus; it has the
producing the damaging effects it ability to self-replicate, and can
is programmed to carry out. The lead to negative effects on your
majority of existing viruses system and most importantly they
belong to this category, and can are detected and eliminated by
be classified depending on the antiviruses.
actions that they carry out.
Examples of worms include:
3.9 Companion Viruses PSWBugbear.B, Lovgate.F,
Companion viruses can be Trile.C, Sobig.D, Mapson.
considered file infector viruses
like resident or direct action 3.12 Trojans or Trojan
types. They are known as Horses
companion viruses because once Another unsavory breed of
they get into the system they malicious code are Trojans or
"accompany" the other files that Trojan horses, which unlike
already exist. In other words, in viruses do not reproduce by
order to carry out their infection infecting other files, nor do they
routines, companion viruses can
wait in memory until a program
is run (resident viruses) or act
immediately by making copies of
themselves (direct action
viruses).
self-replicate like worms.

3.13 Logic Bombs


They are not considered viruses
because they do not replicate.
They are not even programs in
their own right but rather
camouflaged segments of other Role of operating system
programs. in handling viruses-Once
a computer has been
Their objective is to destroy data compromised by a virus,
on the computer once certain to continue using the
conditions have been met. Logic same computer without
bombs go undetected until completely reinstalling
launched, and the results can be the operating system is
destructive. unsafe. There are a
number of recovery
options that exist to
recover a computer by
removing viruses. It
3.14 E-mail viruses: depends on severity of
type of virus. It involves
E-mail usually replicates itself by either reformatting the
automatically mailing itself to computer’s hard drive or
dozens of people in the victim's installing the OS and all
e-mail address book. programs from original
media, or restore entire
partition with clean
backup image.

When a virus comes in a


computer system it can be
detected by antivirus installed thus make no attempt to identify
in computer. or remove anything. They may
Antivirus software is used to protect against infection from
prevent, detect, and outside the protected computer
remove malware, or LAN, by blocking incoming or
including computer outgoing requests on certain
viruses, worms, and Trojan TCP/IP ports. It is designed to
horses, adware, spyware etc. deal with broader system threats
that come from network
3. Strategies used for connections into the system.
implementing
antivirus software 5.2 Online scanning
are:
It is an on-demand antivirus and
antispyware tool that shows how
Signature-based detection
safe PC is. Some antivirus
involves searching for known
vendors maintain websites with
patterns of data within executable
free online scanning capability of
code. A signature file is a
the entire computer, critical areas
database of uniquely identifiable
only, local disks, folders or files.
"fingerprints" that a virus
contains. The fingerprint for an
executable virus is a series of
machine code bytes aka "strings"
that a virus contains Linux Virus Protection
Heuristic scanning is similar to Linux Virus Protection, you
signature scanning, but in this say, isn't that redundant?
instead of looking for specific Why Linux itself is virus
signatures, heuristic scanning protection. A malicious
looks for certain instructions or program that seeks to infect
commands within a program that system files is going to have
are not found in typical very little success when
invoked by a non-root user.
application programs.

4. Operating system Linux Virus Protection, you say,


contains following by isn't that redundant? Why Linux
itself is virus protection. A
which virus can be malicious program that seeks to
detected: infect system files is going to
have very little success when
5.1 Network firewall invoked by a non-root user. So
while our hearts are filled with
Network firewalls is designed to great sorrow over the travails of
block unauthorized access while our Windows friends who have
permitting authorized had to do battle with Melissa,
communications. They are not Chernobyl and ExploreZip, we
antivirus systems as such and have felt insulated from those
threats ourselves. Those days are defense, anti-virus software at
rapidly coming to an end. Not every point of entry into the
because Linux is highly network, using multiple signature
susceptible to virii, but because files.
the key to enterprise acceptance
of Linux is its ability to be highly While it is theoretically possible
integrated with corporate to develop a native Linux virus, it
standards, even if it means is a difficult task. The program
solving problems caused by other will need to obtain root access to
operating systems. perform major damage, unlike
Windows 9x where any user can
In this increasingly execute a virus that can destroy
interconnected world, the indirect the Master Boot Record and
effects of problematic systems render a system unusable. The
can be felt by everyone. When way Linux handles memory
the Melissa virus hit, some Linux management also prevents a virus
servers' sendmail became from executing at will. It is
overloaded with messages and possible that a virus author could
had to shut down. When attempt to create an environment
ExploreZip exploded, some for infection by creating a buffer
Linux servers running Samba had overflow condition. By invoking
to contend with Windows clients a child process out of an attacked
deleting data files, which had to daemon running with root
be restored. In this sense, Linux privileges, a virus could
is only immune to virii if you potentially have access to system
unplug it from the network. files and infect them. This is a
very difficult piece of code to
Beyond protecting Linux systems write, but merits more research as
from the indirect effect of virii, in Linux gains in popularity. The
many enterprise networks, Linux bottom line is that since the first
servers should have anti-virus "native" Linux virus, Staog was
detection capabilities to detect reported in the fall of 1996, you
and clean infected files that are can count the number of new
moving through the network, Linux viruses on your shop
files that may be missed by the teacher's left hand. Linux can be
anti-virus software running on considered to have a strong
other stations. As Linux is inherent immunity to virii.
increasingly adopted in corporate
environments, it must not act as The virtual immunity that Linux
"Typhoid Mary" during a virus has to the virus can and should be
outbreak, obliviously storing and leveraged to build Linux anti-
passing along a virus. As IT virus appliances. Not only should
managers seek to provide Linux Samba servers scan
solutions to the increasing infected files deposited by
instances of virii, many are Windows clients, but a Linux-
taking the approach of based anti-virus gateway can be
implementing multiple layers of used to scan and protect SMTP,
FTP and Web traffic for entire integration and interoperability
networks. It seems natural that an are key issues, and we can be in
operating system that cannot be blissful ignorance no longer.
compromised a virus itself, will Linux systems will grow as
be the ideal platform for network file servers and need to
providing enterprise anti-virus be able to provide integrated
solutions virus detection and repair. In
some instances, IT managers
There are a small but growing migrating to Linux are forced to
number of anti-virus solutions for keep NT servers in service to
the Linux market. There is a provide functions like anti-virus
single open source solution and scanning, because of a dearth of
two "freeware" solutions we are Linux solutions. Linux advocates
aware of: need to see the powerful role
their chosen operating system can
AMaVis - A Mail Virus Scanner. play in the AV market, even if it
This software is intended to use means they are making
other virus scanners as plug-ins Microsoft-based desktops run all
to disinfect attachments traveling that more smoothly.
through sendmail. It is in effect a
SMTP anti-virus gateway. This is
an open source, GPL solution.

H+B EDV AntiVir/X - This


scanner is only free for personal
use.
5. Refrences:
Central Command - This is
actually developed at Kaspersky
• http://linux.omnipotent.ne
labs
t/article.php?
article_id=5409
On the commercial side, Network
• www.articlesnatch.co
Associates, Data Fellows and
m/Article/Ways-To-
Sophos all have Linux versions Handle-
of their virus scanners. Trend Virus.../1247345
Micro is beta testing VirusWall, • en.wikipedia.org/wiki/
which is an example of an anti- Computer_virus
virus gateway. We hope to see • www.avast.com/free-
more products like this and virus-cleaner
additional functionality into some • www.boloji.com/comp
of the free solutions, such as uting/security/015.htm
AmaVis. • www.secureurpc.com/.
../types-of-computer-
Linux users have had the luxury viruses.php
of ignoring virus threats in the
past. As Linux grows up and
becomes an enterprise player,

Das könnte Ihnen auch gefallen