Preview

Protecting Anti-Virus Software Under Viral Attacks

Good Essays
Open Document
Open Document
17792 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Protecting Anti-Virus Software Under Viral Attacks
PROTECTING ANTI-VIRUS SOFTWARE UNDER VIRAL ATTACKS by Raghunathan Srinivasan

A Thesis Presented in Partial Fulfillment of the Requirements for the Degree Master of Science

ARIZONA STATE UNIVERSITY August 2007

PROTECTING ANTI-VIRUS SOFTWARE UNDER VIRAL ATTACKS by Raghunathan Srinivasan

has been approved July 2007

Graduate Supervisory Committee: Partha Dasgupta, Chair Charles Colbourn Aviral Shrivastava

ACCEPTED BY THE GRADUATE COLLEGE

ABSTRACT Computers are an important part of everyday life to many people across the world. Computers in the hands of consumers who lack the knowledge of protection tools and who have limited administrator skills are vulnerable to virus attacks. These systems are extremely valuable to intruders as they have lot of secret personal information about the users. Attackers exploit vulnerabilities in the software layers to install malicious programs on user machines to steal secret data for financial gains. Security protocols have been in place for some time to counter the threat posed by the attacks. However, despite the presence of such measures, the number of attacks on consumer computers is growing rapidly. A recent trend in attacks has been the attempt to disable security protocols in place at the host machine. This type of attack leaves the host computer completely defenseless and vulnerable to many further exploits through the Internet. To ensure the continuous functioning of the security protocols, a software-based solution is proposed in this thesis. The solution involves camouflaging the security processes to avoid being detected and disabled by malicious programs. To protect the program in the memory from being tampered or altered with, various modules are employed in this solution. The modules provide obscurity, diversity, randomization and migration of code to hide the location and presence of the security processes.

iii

In memory of my parents who helped me fight my viruses

iv

ACKNOWLEDGMENTS I

You May Also Find These Documents Helpful

  • Better Essays

    The CIO has requested that we follow up with a plan that is detailing a strategy for addressing all risks identified in the previous research. This plan needs to identify controls in administration, preventative, detective and corrective. With this data, the business will be able to mitigate each risk that we identified earlier. The following paper will explain the approach to correcting the various malware.…

    • 1122 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Sunset Grill

    • 1322 Words
    • 5 Pages

    We certify that we are the authors of this paper and that any assistance we received in its preparation is fully acknowledge and disclosed in the paper. We have also cited any sources from which we used data, ideas of words, whether quoted directly or paraphrased. We also certify that this paper was prepared by us specifically for this course.…

    • 1322 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    NIH-PA Author Manuscript

    • 4232 Words
    • 17 Pages

    This research was supported in part by: 1) an anonymous foundation; 2) award number UL1 RR024992 from the…

    • 4232 Words
    • 17 Pages
    Satisfactory Essays
  • Powerful Essays

    study, research, criticism or review) no part of this book may be reproduced, stored in…

    • 2427 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    As computer systems have become more and more sophisticated over the time, it has become less and less credible to ensure security by inspection and intuition alone. However, standard methods of analyzing different aspects of the area have been developed to identify and apply key principles of the area, but the area of Security Analysis is constantly developing as new secure designs are invented and so are the new ways of breaking them. In many cases, systems are so complex that it is impossible find a secure solution. In situations like such, instead improvement measures, one should focus towards counter-measures.…

    • 484 Words
    • 2 Pages
    Good Essays
  • Best Essays

    It checks for connection speed and static on the line to ascertain the best route for the packet to take to reach its destination. Acting as a gateway between networks, routers make sure that data is delivered to its proper destination. The second purpose of a router is to ensure that data does not go where it is not permitted. By acting as a virtual network traffic cop, routers keep data and specifically large files from being distributed to all machines on a network, which could potentially cripple the network (Hill,…

    • 4393 Words
    • 18 Pages
    Best Essays
  • Good Essays

    Boundaries

    • 14239 Words
    • 57 Pages

    This thesis has greatly benefited from the support of professor Bonita Rhoads Ph.D. I would like to thank her for her kindness and for being always ready to help with her advice and encouragement.…

    • 14239 Words
    • 57 Pages
    Good Essays
  • Best Essays

    Kaspersky Lab

    • 3561 Words
    • 15 Pages

    The future of Antivirus software sales is expected to continue to be strong especially when you consider emerging markets like China and India. The prevalence with which hackers are dishing out obstacles to IT security pros will mean a big positive for vendors in 2012 (Kirk, 2011). Today, an unprotected computer isn’t just vulnerable, it’s probably already infected. New viruses, spyware, trojans, worms and other malware debut every day. New threats are disguised to bypass other security…

    • 3561 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    Thomson Case tudy

    • 5899 Words
    • 24 Pages

    I hereby declare that this assignment is entirely my own work and that it has not previously been submitted to any other Higher Education Institution. I also declare that all published and unpublished sources have been fully acknowledged and properly referenced. This Includes figures, tables and exhibits. Where modified by me, this has also been indicated.…

    • 5899 Words
    • 24 Pages
    Powerful Essays
  • Good Essays

    We certify that we are the authors of this paper and that any assistance received in its presentation is fully acknowledged and disclosed in the paper. We have also cited any sources from which we have used, data, ideas or words, either quoted directly or paraphrased. We also certify that this paper was prepared specifically for this course.…

    • 3185 Words
    • 11 Pages
    Good Essays
  • Better Essays

    In today’s world almost every home in the world has at least one computer. Computers have become a very beneficial tool; however there are many malicious programs that can harm computers, for example viruses, Trojans, and worms. We use different tools to protect computers such as antivirus software. Even with antivirus software viruses find a way to get in computer. The primarily reason is because many viruses are becoming more sophisticated to the point where the viruses attacking the antivirus software itself. (Latamore 24) Or the problem could be the type of method that is used by the antivirus and is affecting its performance. Because viruses and other harmful program are evolving to the point where antiviruses cannot stop them, people need to learn how to prevent viruses form entering their computer and how to have a clean computer.…

    • 1358 Words
    • 6 Pages
    Better Essays
  • Good Essays

    The computer virus employees of Symantec Corp. are never able to enjoy a finished product. They are constantly collecting viruses and suspicious codes to analyze the way they work and to find a solution to prevent these viruses form damaging the public’s computers. They are determined to provide their consumers with updated versions of anti viruses for their computers. At the Symantec lab, they have a box, which has all dangerous types of viruses that needs or be disposed of. Vincent Weafer has been a part of Symantec since 1999. In 1999, there were only a few employees at Symantec and that there were only a few viruses spread out through months compared to how it is now. Nowadays there are about 20,000 viruses monthly so more talented employees around the world work for Symantec. Vincent Weafer said that colleges are not creating computer security experts everyday so as soon as they find someone who does, that no matter in what country they hire him or her.…

    • 971 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    On 07/21/1999, I sent the first patch to the maintainer of the AMaViS project (A Mail Virus Scanner, http://www.amavis.org/, GPL’ed1 ) fixing the AntiViral Toolkit Pro/Linux call. Since then - among other stuff - I wrote and maintained several anti-virus modules (and still do). So, with the help of other people, AMaViS supports a wide range of anti-virus products. But wouldn’t it be easier to maintain only one anti-virus module, implementing a common protocol, to support all those anti-virus scanners? Also, back in 1999, I was looking for an on-access virus scanning solution for Samba fileservers2 , receiving a first Linux kernel-based solution via email in June ’99. More than a year later, I came across the Samba Virtual File System (VFS)3 . A half year later, I digged into the Samba VFS and started to work on a small piece of code which eventually became the samba-vscan project: onaccess file scanning directly integrated into Samba (GPL’ed, too). As nearly all the code I wrote past years was put under an Open Source License, I decided to release this thesis under the terms of the GNU Free Documentation License.…

    • 20671 Words
    • 83 Pages
    Powerful Essays
  • Good Essays

    In the context of computer security the user, hardware and data may face threats at any time and we must take proper countermeasures to deal with such threats.…

    • 1208 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Viruses and Anti-Virus

    • 3458 Words
    • 14 Pages

    Computer viruses are the small software programs that are designed for the purpose of spreading from one computer to another in order to interfere with the computer operations.…

    • 3458 Words
    • 14 Pages
    Powerful Essays

Related Topics