Page 139 - DCAP516_COMPUTER_SECURITY
P. 139

Unit 11: Threats in Network




               Major Types of Viruses                                                           Notes
               Generally, there are two main classes of viruses. The first class consists of the file infectors,
               which attach themselves to ordinary program files. These usually infect arbitrary .COM
               and/or .EXE programs, though some viruses can infect any program for which execution
               is requested, such as .SYS, .OVL, .PRG, & .MNU files.

               File infectors can be either direct action virus or resident virus. A direct-action virus
               selects one or more other programs to infect each time the program that contains it is
               executed. A resident virus hides itself somewhere in memory the first time an infected
               program is executed, and thereafter infects other programs when they are executed or
               when certain other conditions are fulfilled.
               The second category is system or boot-record infectors: those viruses that infect executable
               code found in certain system areas on a disk, which are not ordinary files. On DOS systems,
               there are ordinary boot-sector viruses, which infect only the DOS boot sector, and MBR
               viruses which infect the Master Boot Record on fixed disks and the DOS boot sector on
               diskettes. Such viruses are always resident viruses. A few viruses are able to infect both.
               These are often called ‘multi-partite’ viruses.

               File system or cluster viruses are those that modify directory table entries so that the virus
               is loaded and executed before the desired program starts. The program itself is not
               physically altered; only the directory entry is changed. Some consider these infectors to be
               a third category of viruses, while others consider them to be a sub-category of the file
               infectors.
               (a)  Boot sector virus: A boot sector virus resides on a floppy’s or hard disk’s boot sector,
                    a specific track on a disk where the operating system finds the information to start
                    the machine. When a boot sector virus infects a system, it either froze or the floppy
                    is no longer usable until the virus is removed. Sometimes even the spare boot sector
                    is overwritten and then machine’s information can only be recovered with the help
                    of a recovery program.

               (b)  Polymorphic viruses: A polymorphic virus is a virus that can change itself to prevent
                    detection. For example, in stead of erasing the user’s hard disk it locks the keyboard
                    when specific keys are pressed in a particular sequence. This virus is very hard to
                    detect.
               (c)  Stealth virus: A stealth virus is one that hides the modifications it has made in the file
                    or boot record, usually by monitoring the system functions used by programs to
                    read files or physical blocks from storage media, and forging the results of such
                    system functions so that programs which try to read these areas see the original
                    uninfected form of the file instead of the actual infected form. Thus, the virus
                    modifications go undetected by anti-virus programs. However, in order to do this,
                    the virus must be resident in memory when the anti-virus program is executed.

               (d)  Fast and slow infectors: A typical file infector copies itself to memory when a program
                    infected by it is executed, and then infects other programs when they are executed.
                    A fast infector is a virus which, when it is active in memory, infects not only programs
                    which are executed, but also those which are merely opened. The result is that if such
                    a virus is in memory, running a scanner or integrity checker can result in all programs
                    becoming infected all at once.
                    The term ‘slow infector’ is sometimes used for a virus that, if it is active in memory,
                    infects only files as they are modified or created. The purpose is to fool the users
                    who use integrity checkers thinking that the modification reported by the integrity
                    checker is due to legitimate reasons.



                                           LOVELY PROFESSIONAL UNIVERSITY                                   133
   134   135   136   137   138   139   140   141   142   143   144