Novikov A.O.

 

National Research Irkutsk State Technical University

 

The Most Wide-spread Malicious Programs and the Best Virus and Spyware Protection

 

Unfortunately, the mainstream using of personal computers leaded to instance of virus quines, which damage computer’s work by destroying file system of disks and by injuring the information on computers. If a computer virus infilter to one computer, it will be able to spread on other computers. I would like to review the most dangerous of them and also to study the most effective methods of work and protection of them.

The computer virus is a program which can produce its shadow copy (and this copy may not be the same with original program) and place them to the area networks or/and files, system area of a computer and other operated objects. Moreover, copies save the capability to further spread.

The definition of “computer virus” is a historically significant question, because it is difficult to define a virus and to characterize qualities, which proper only to viruses, but not to other program system. Vice versa, defining a virus just as a program possessed certain properties, immediately we can find a virus, which does not have these properties.

Also there is the category of viruses, which use the mutation engine of a code. They are so named “polymorphic virus”. This virus use the encryption engine and the mutation engine. As a result, embed virus will be differ from the original, because one of the part will be changed and the other part will de encoded on the key. This key will be generated for this copy of the virus. It will compound a problem of malware detection essentially.

Polymorphic viruses are deep-laid viruses, which do not have patterns, i. e. they do not have non-alterable code area. In most cases two samples of one polymorphic virus will not have coincidences at all. We can find polymorphism in different types of viruses, such as file, load and macro virus.

Stealth viruses can hide their presence in the system and escape from antivirus program. These viruses can listen for an operating system’s question for reading/record of infected files. Moreover, they also can disinfect a file temporary or replace themselves with virusfree sections emulating cleanliness of infected files. If these viruses use stealth algorithm they can hide themselves in the system fully or partially.

The most popular method in macro viruses’ work is call restriction of on-view menu. One of the first files stealth viruses was the virus Frodo. The first load stealth virus was the virus Brain.

Viruses enter to a computer with infected files or the other objects (boot sector of a disk) and do not adjust on a process of entering (as contrasted with worms). Consequently the opportunities of entering define with possibilities of infection and there is no point to group viruses to lifecycle phase.

A worm (Internet worm) is a malicious program, which gets disseminated on network circuit and which can overcome security system of computer network itself and can create and reraise its copies (which may be not similar with the original).

By contrast with viruses, worms are own programs. The main specific feature of them is capability to self-replication. But at the same time they are able to independent expansion on network circuit. To accent this feature we can use the term “Internet worm”.

Worm’s lifecycle phase consists of several stages:

1.     system penetration

2.     enabling

3.     searching the object to infect

4.     initializing of copies

5.     expansion of copies

Trojan Horse (Trojan) is a malicious program, which runs unauthorized transmission of computer management to off-site user and moves to deleting, modding, logging and passing information to the third person.

1. Trojan remote troubleshooting utilities are utilities of hidden control, which allow to get and to send files, to start or del them, to output messages, to cancel information and to reboot. On start Trojan setups itself in system and then spies upon the system. At the same time, a user will not get any massage about operations of Trojan in the system. As a result “the user” of this Trojan program cannot know about its presence in the system while his computer is open for remote assistance.

2. Trojan-spies act out espionage for the user of the infected computer, for example,  keyboard command, screenshots, a list of active apps and user’s operations are saved in a file and are sent to a computer trespasser from time to time. This information is used for information pilfering from different online payments and bank accounts.

3. Adwares inline an advertisement to the main useful program and can act as Trojan.

Trojans change information of system registry of operating system. This system registry contains all information about a computer and installed software. For their cancelling it is necessary to reset a system registry, because the component, which resets the system registry, is a part of modern operating system.

We can use the next methods and resources for protection from computer viruses:

-         common methods and resources of protection;

-         particularized programs for protection from computer viruses;

-         preventive actions, which allow to restrict a probability of virus infection.

Common resources of protection the information are useful not only for protection from viruses. They are used as a preventer from physical spoilage of disks, malfunction of programs or mistakes of a user.

There are two main groups of these resources:

-         replications of information – are used for creating copies of files and system area of a disk

-         access control – prevent data abuse, particularly, secure protection of changing programs and information by viruses, malfunction of programs or mistakes of a user.

There are several types of particularized programs for checking and protection of viruses. Such programs are called antivirus programs. Virtually all antivirus programs secure automatic restoration of infected programs and boot sectors. Antivirus programs use different methods of checking viruses.

The main methods of checking computer viruses are the next:

-         template matching technique

-         heuristic analysis

-         antivirus monitoring

-         error control method

-         antivirus embedding to BIOS of a computer

Timely detection of infected files and disks, full purge of detected viruses on each computer allow to avoid spreading of malware outbreak to the other computers. There are not absolutely reliable programs, which assure to detect and purge any viruses. One of the important methods of controlling with computer viruses is early prophylaxis. To restrict probability of virus infliction and provide safe storage of information on disks it is necessary to do the next measures:

-         to use only licensed software;

-         to tool up your computer modern antivirus programs, such as Avast, Kaspersky, Dr.Web and update them constantly;

-         before reading the information from other data storage devices to scan these devices for malware, using  antivirus programs;

-         in the mail to your computer archived files to scan them just after their archive extraction on hard disk, limiting the checking area with new files;

-         at times to scan hard disks for malware, using antivirus programs on detachable disks tor testing files, storage and system disk areas. Also you should load operating system from detachable disks preliminary;

-         always protect your data storage devices from writing if you will not write information on them, when you work on other computers.

 


Reference
list:

 

1. A.V. Mikhailov. Computer viruses and their control. Ed. DMK Press, 2011.-104 p .: ill.

2. Information security and data protection: textbook / V.I. Gluhih; Irkutsk Technical University. - Irkutsk: Publishing House of the Irkutsk Technical University, 2012. - 244 p.

3. Electronic resource. Access: http: //www.voloshin- sb.ru/Portals/0/Download/Secur-IS-4grade/Lec-07.pdf.