Chapter 5 Virus and Malicious Code
Chapter 5 Virus and Malicious Code
Virus code
Original + Virus code =
Program Original
Program
Trojan Horse
► Trojan Horse
A malicious code, in addition to primary
effect, it has a malicious effect.
Example 1: a login scripts that solicits a
user’s identification and password, passes
the info to the system for logging
processing and keeps a copy for malicious
purpose.
Example 2: a cat command that displays
text and sends a copy of the text to
somewhere else.
Trapdoor
► Trapdoor/ backdoor
A feature in a program by which someone
can access the program using special
privilege.
e.g. ATM provides 990099 to execute
something
Worm
► Worm
Spread copies of itself through a network.
Worm through network and virus through
other medium.
Spread itself as a stand-alone program.
The Differences
Malware Types Description Characteristics
Virus Self-replicating programs that attaches Self-replicating: Yes
itself to other programs and usually Growth: Yes
requires human interaction to propagate Parasitic: Yes
Worm Self-replicating program that spreads via Self-replicating: Yes
Internet or computer networks Growth: Yes
Parasitic: No
Trojan Horse Benign program contains malicious Self-replicating: No
element hidden inside Growth: No
Parasitic: Yes
Spyware/ Program which collects information from Self-replicating: No
Adware a host and transmits it to someone else Growth: No
Parasitic: No
Rootkit Program which designed to take control Self-replicating: No
of the infected host by the gaining Growth: No
administrator role in the operating Parasitic: No
system.
Zombies/Botnet Compromised host used by attackers to Self-replicating: No
usually sending spam and participating in Growth: No
coordinated, large-scale denial-of-service Parasitic: Yes
attacks
Preventing Malware
Avoidance Technique
Polymorphic Metamorphic
Hybrid Malware
► Program which has characteristics
belonging to several different types of
malware
► Malware writers also apply hybrid
techniques to blend threats