Chinaunix首页 | 论坛 | 博客
  • 博客访问: 123499
  • 博文数量: 32
  • 博客积分: 2011
  • 博客等级: 大尉
  • 技术积分: 375
  • 用 户 组: 普通用户
  • 注册时间: 2008-04-03 17:57
文章分类

全部博文(32)

文章存档

2011年(1)

2009年(8)

2008年(23)

我的朋友

分类: 网络与安全

2008-04-07 22:39:32

acm网上课程学习笔记
Malicious code can describe legitimate code that causes

unintentinal destruction. It includes viruses, Worms, and

Trojan horses. And it takes adavantage of known

vulnerabilities.
Virus types:
1.stealth
  Stealth viruses camouflage themselves by interfering

with the operating system to convince antivirus packages

that everything is running normally. they can hide the

modification date and time updated by their modification

date and time updated by their changes and conceal the

increase in file size. Examples of stealth viruses are

Brain, Monkey, and Frodo.
2. encrypted
  Encrypted viruses use encryption to avoid detection.

Stealth viruses sometimes encrypt themselves. These

viruses use a short piece of code, called a virus

decryption routine, to hold the information nedded to load

and decrypt the main virus code stored on another part of

the disk. Examples of encrypted viruses are AntiFort.1110

and Macro.Word.Amadillon.
3.multipartite
  Multipartite viruses use at least two propagation

techniques to penetrate systems that are not protected

against all the virus's forms of propagation. These

viruses can infect system sectors or they can infect. They

try to attack the boot sector and executables at the same

time. Examples of multipartite viruses are Predator,

LivingDeath, and Jerusalem.MBR.
4.Polymorphic
   Polymophic viruses change their own code as they

migrate from one system to another. In other words, the

signature of the virus changes when it moves on, making

signature-based antivirus packages redundant. Common

polymorphic viruses include ONE Half and Natas.



Malicious code types:
1.worms
  Worms are programs that are as destructive as viruses

but propagate without the need for human intervention,

such as sending e-mail.
  A worm can infect the operating system either by

completely replacing programs or by attaching itself to

programs and changing their functionality. It can corrupt

data in memory. A worm can hide by creating several files

within source code. Once a worm is discovered, cleanup is

not a problem because ther is only one copy to destroy.
  Examples of worms inlcude Code Red, Ska and Sasser.
2.logic bombs
  Logic bombs are mailicious code objects that infect a

system but lie domant until acertain date or other logical

trigger. They are ofthen the work of disaffected employees

who wish to leave a legacy of destruction after they

depart the organization.
  Although logic bombs cannot replicate, they may spawn

viruses. When activated, they may stop the machine, modify

the video display, cause a disk of keyboard failure,

destroy data, or release other logic bombs.
  An example of a logic bomb is contained in the

Michelangelo virus, which hides until March 6 when it

activates, reformatting the hare drive and destroying the

data on it.

3.Trojan horses
  Trojan horses are seemingly innocuous or attractive

programs, such as a free game, music, or application. They

are often distributed as e-mail attachments or downloaded

from the Web. These programs cause havoc when installed or

downloaded. They can take control of the computer

infrastructure, compromise data, and flood users'

mailboxes with gogus messages.
  Examples of Trojan horses include NetBus and Back

Orifice.
4.hoaxes
  Hoaxes are false warnings about viruses that are about

to strike. Some warnings may appear to come from reputable

sources and often recommend drastic antivirus measures.

The e-mail generated can bring down mail servers.
  One hoax claimed that a deadly virus named Red Alert had

infected Microsoft's home page. Any computer accessing the

site via internet Explorer would be destroyed. Users were

advised not to visit Microsoft's home page untile further

notice.
  The Good Times hoax warning has been in circulation

since 1994.
Summary
  Malicious code refers to any program that destroys or

harms a system's software or data by means of weaknesses

in computer systems. Skill is not necessarily required to

develop malicious code. The virus life cycle has two

stages-replication and activation.
  Macro viruses infect legimate scripting macros used to

improve application productivity. File infector viruses

infect or replace executables. Master Boot Record(MBR)

viruses cause the virus code to be loaded with the

operating system.
  The for types of advanceed virus are stealth, encrypted,

multipartite, and polymorphic.
  Malicious code includes programs that do not replicate

like viruses. These are worms, logic bombs, and Trojan

horses. Hoaxes are false warnings about nonexistent

viruses.
阅读(1998) | 评论(0) | 转发(0) |
给主人留下些什么吧!~~