[Network Security 2] basic virus protection technology

Source: Internet
Author: User

1. Computer Virus Definition and feature ● definition: compilation or insertion in computer programs damages computer functions or destroys data, affects computer use, and can Self-replicationA group of computer commands or program code. ● Features: (1) parasitic. Legitimate programs infected with viruses are called Virus Vector, Also known Virus Host Program. (2) Contagious. Is a virus Basic FeaturesTo determine whether a program is a computer virus. Prerequisites. (3) concealment. The concealment of computer viruses is manifested in the concealment of existence and transmission. (4) latent. The better the legality, the longer the existence time in the system, and the larger the scope of infection. (5) Trigger. Because of the appearance of a feature or value, the characteristics that induce viruses to infect or attack are called triggering. (6) destructive. Common hazards: reduce system efficiency and occupy system resources. The destruction of viruses mainly depends on the purpose of computer virus designers. 2. Trojan Horse ● attack steps: (1) Set Server program(2) defrauding the other party to execute the server program; (3) Finding the IP address of the other party; (4) using Client ProgramTo control the computer of the other party. ● Features and behaviors: (1) trojans do not replicate themselves. (2) the infected computer system will show unusual behavior or slow operation. ● Communication channels: (1) EmailAttachment propagation; (2) Hidden in communication between users and other users DocumentAnd Other files(3) carried by other malicious code, such as worms; (4) downloaded from the internet Bundled Free Software. 3. computer worm (worm) ● features: using the defects of software systems in the network Self-replication and active communication. But it is different from virus spreading between files. They spread from one computer to another, thus infecting the entire system. ● Composition: main program and boot program 4. Logic Structure of computer viruses (1) virus boot module: when the virus Host ProgramWhen starting to work, the virus program is introduced into the memory from the external memory, so that it is independent from the host Program, and the virus infection module and destruction module are active to monitor system operation. (2) Virus Infection module: responsible InfectionSend viruses to other computer programs Outward diffusion. It consists of two parts: the condition judgment part of virus infection and the main part of virus infection program. (3) virus destruction (manifestation) module: it is the core part of the virus and reflects the intention of the virus maker. It consists of two parts: the condition judgment part of virus damage and the main part of the damage program. 5. workflow for boot and file viruses (1) boot: system startup, self-check, reading the content in the boot zone (the virus enters the memory), and executing the content in the boot zone (the virus directs itself) if the virus is in the dynamic state, modify the system parameters, set the trigger condition, and set the normal system guidance condition to meet the conditions, conduct the infection, and destroy the virus. (2) file type: the infected file is loaded into the memory by executing the virus guiding module. Introduce the infected and damaging module. The virus is in the dynamic mode. Modify system parameters and set the triggering condition to meet the conditions, make sure that the infection meets the conditions and causes damage. 6. macro virus-macro virus: A computer virus stored in a document, template, or macro program. ● Feature: only infected with Microsoft Data (documentation) files ● mechanism: Use VB Advanced LanguageThe compiled virus code is directly mixed in the file and spread. When you open an infected file or execute an operation that triggers the macro virus, the virus is ActivateAnd stored in the normal.dottemplate or personal.xls file. AutomaticInfected with virus. 7. Virus technology (1) Parasitic technology when the virus is infected, add the virus code Normal ProgramMedium, original Normal program functionsAll or part. Is the most widely used technology for file viruses. Classification: ① head parasitic, tail parasitic, insert parasitic (virus code inserted into different host program locations) ② empty hole utilization (example: CIH) (2) resident technology when infected files are executed, the virus PartFunction modules enter the memory, even if the program is completed, they still ResidentIn memory. (Viruses need to monitor suitable infected objects and trigger conditions in real time. They always want key code to remain in the memory, Run as soon as you get a chance. If antivirus software only clears the virus in the file but does not clear the virus in the memory, the virus will still have the chance to infect the file before exiting the system .) (3) encryption and deformation technology is a milestone virus technology. Based on the encryption Virus Improvement, Make Decrypt the Sub-AccountThe code is diverse for Different Infectious instances. Traditional viruses always have their own Features(For example, marking infected strings, special resident code, and special infected code), the anti-virus vendor uses these features to compile Signature, Used for viruses Detection. (4) Hiding Technology: After a virus enters the user system, various methods are taken to hide its whereabouts, making it difficult for users and anti-virus software to discover the virus. 8. Anti-Virus Technology (Computer Virus DetectionTechnology, computer virus ClearComputer viruses ImmuneComputer viruses Prevention(1) Computer Virus Detection Technology ● comparative method: Compare the original or normal features with the features of the detected objects. Advantages: simple and convenient, No special software required. Disadvantage: The computer virus type and name cannot be confirmed. ● Virus checksum: calculates the checksum of the program code of the normal file and saves it for comparison between the checked objects to determine whether the virus is infected. Advantage: various computer viruses can be detected, including Unknown virus. Disadvantages: High false positive rateUnable to confirm the virus type. ● Analysis Method: This method is mainly used by technical professionals against computer viruses. ● Search Method: Use each computer VirusContained SpecificString to scan the object to be detected. (Most commonly used) Disadvantages: scanning takes more time when a file is scanned for a long time; it is not easy to select a proper feature string; computer virus code base Not timelyNew computer viruses cannot be identified during update, and computer viruses cannot be identified. ● Behavior Monitoring Method: Because the virus shows some common behavior during infection and destruction, and is special, these behaviors are rare in normal programs, you can detect these behaviors to detect the existence of the virus. Advantage: not only can detect known viruses, but also Predictable unknown virus. Disadvantage: Possible False alarm. ● Virus behavior software simulation method ● infection experiment method (2) Cleaning of computer viruses: use special software to disinfect viruses or manually perform (3) computer virus Immunization: Principle: implemented based on virus signatures. When a virus is infected with another program, you must first determine whether the virus has been infected, that is, whether the host program to be attacked has the corresponding virus signature. If yes, the virus is no longer infected. Therefore, it can be done artificially in the "Health Program ". Virus signatureTo Immune Effect. (4) computer virus prevention: ① frequent Data backup(Data and system); ② new computers, hard disks, software, etc. can be used only after inspection by virus checking software; ③ avoid using removable disks on machines without antivirus software or on public machines as much as possible; ④ for computers PermissionStrictly control and prohibit people and software from entering the system. ⑤ use a set of the best virus detection and removal software, so as to monitor files and disks in real time and control virus intrusion in a timely manner, and promptly and reliably upgrade Anti-Virus products. -- This document is summarized by heki.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.