The Legendary Era of Computer Virus and Their Detection

Authors

  • Soumen Chakraborty   Department of Information Technology, MCKV Institute of Engineering, MAKAUT, West Bengal, India

Keywords:

Antivirus Techniques, Computer Antivirus, Creation, Defensive, Metamorphism, NGVCK, Virus.

Abstract

In this paper, anti-virus professionals layout and develop new methodologies to lead them to more potent, more and more, every day. The cause of this paper is to review these methodologies and description their strengths and weaknesses to inspire those are inquisitive about more research on those regions. In this paper, first examine 4 virus advent kits to determine the degree of metamorphism provided by way of each and capable of precisely quantify the diploma of metamorphism produced by way of these virus mills. While the nice generator, the Next Generation Virus Creation Kit (NGVCK), produces virus editions that range greatly from each other, the alternative 3 turbines examined are tons much less powerful. This paper gives a trendy evaluate on laptop viruses and protective strategies. Computer virus writers commonly use metamorphic strategies to produce viruses that exchange their inner structure on every infection. On the opposite hand, anti-virus technology always follow the virus hints and methodologies to triumph over their threats.

References

  1. Leonard Adleman. An abstract theory of computer viruses. In Lecture Notes in Computer Science, vol 403. Springer-Verlag, 1990.
  2. M. Stamp, “Information Security: Principles and Practice,” August 2005.
  3. Fred Cohen. Computer Viruses. PhD thesis, University of Southern California, 1985.
  4. Peter J. Denning, editor. Computers Under Attack: Intruders, Worms and Viruses. ACMPress (Addison-Wesley), 1990.
  5. Christopher V. Feudo. The Computer VirusDesk Reference. Business One Irwin, Homewood, IL, 1992.
  6. Harold Joseph Highland, editor. Computer Virus Handbook. Elsevier Advanced Technology, 1990.
  7. J. Aycock, “Computer Viruses and malware,” Springer Science+Business Media, 2006.
  8. E. Daoud and I. Jebril, “Computer Virus Strategies and Detection Methods,” Int. J. Open Problems Compt. Math., Vol. 1, No. 2, September 2008. Http://www.Emis.De/journals/IJOPCM/documents/IJOPCM(vol.1.2.3.S.08).Pdf
  9. Lance J.Hoffman, editor. Rogue Programs:Viruses,Worms, and Trojan Horses. VanNostrand Reinhold, New York, NY, 1990.
  10. Jan Hruska. Computer Viruses and Anti-VirusWarfare. Ellis Horwood, Chichester, England, 1990.
  11. Filiol, E., G. Jacob, M.L. Liard, 2007. Evaluation technique and theoretical version for antiviral behavioral detection strategies. J. Comput. Virol., three(1): 27-37
  12. Ye, Y., D. Wang, T. Li and D. Ye, 2008. An sensible pe-malware detection device primarily based on association mining. In Journal in Computer Virology,
  13. Zakorzhevsky, 2011. Monthly Malware Statistics. Available from : http://www.Securelist.Com/en/evaluation/204792182/Monthly_Malware_Statistics_June_ Accessed 2 July.
  14. W. Wong, “Analysis and Detection of Metamorphic Computer Viruses,” Master’s thesis, San Jose State University, 2006. Http://www.Cs.Sjsu.Edu/college/stamp/college students/Report.Pdf
  15. Eugene H. Spafford. Computer viruses. In John Marciniak, editor, Encyclopedia of Software Engineering. JohnWiley & Sons, 1994.
  16. S. Attaluri, “Profile hidden Markov models for metamorphic virus evaluation,” Master’s thesis, San Jose State University, 2007. Http://www.Cs.Sjsu.Edu/college/stamp/college students/Srilatha_cs298Report.Pdf
  17. P. Szor, “The Art of Computer Virus Defense and Research,” Symantec Press 2005. 18] VX Heavens, http://vx.Netlux.Org/International Journal of Network Security & Its Applications (IJNSA), Vol.Four, No.Three, May 2012
  18. Orr, “The viral Darwinism of W32.Evol: An in-depth analysis of a metamorphic engine,” 2006. Http://www.Antilife.Org/documents/Evol.Pdf
  19. E. Konstantinou, “Metamorphic Virus: Analysis and Detection,” January 2008. 21] A. Venkatesan, “Code Obfuscation and Metamoprhic Virus Detection,” Master’s thesis, San Jose State University, 2008. Http://www.Cs.Sjsu.Edu/college/stamp/students/ashwini_venkatesan_cs298report.Doc
  20. The Mental Driller, “Metamorphism in practice or How I made MetaPHOR and what I've learnt,” February 2002. Http://vx.Netlux.Org/lib/vmd01.Html
  21. M. Stamp, “A Revealing Introduction to Hidden Markov Models”, January 2004. Http://www.Cs.Sjsu.Edu/school/stamp/RUA/HMM.Pdf
  22. Walenstein, R. Mathur, M. Chouchane R. Chouchane, and A. Lakhotia, “The design area of metamorphic malware,” In Proceedings of the second International Conference on Information Warfare, March 2007.
  23. “Benny/29A", Theme: metamorphism, http://www.Vx.Netlux.Org/lib/static/vdat/epmetam2.Htm
  24. J. Borello and L. Me, “Code Obfuscation Techniques for Metamorphic Viruses”, Feb 2008, http://www.Springerlink.Com/content/233883w3r2652537
  25. A. Lakhotia, “Are metamorphic viruses in reality invincible?” Virus Bulletin, December 2005.
  26. JDB. EstiHMM: een greeǹˆ algoritme ter bepaling van de maximale sequenties in een imprecies hidden Markovmodel. Master Thesis at Ghent University. Supervised by GdC. June 2011.
  27. JDB & GdC. State sequence prediction in vague hidden Markov models. ISIPTA 'eleven: pp. 159-168. July 2011.

Lea

Downloads

Published

2019-06-30

Issue

Section

Research Articles

How to Cite

[1]
Soumen Chakraborty , " The Legendary Era of Computer Virus and Their Detection, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 3, pp.256-267, May-June-2019.