Handbook of Local Area Networks, 1998 Edition:LAN Security
Click Here!
Search the site:
ITLibrary
ITKnowledge
EXPERT SEARCH
Programming Languages
Databases
Security
Web Services
Network Services
Middleware
Components
Operating Systems
User Interfaces
Groupware & Collaboration
Content Management
Productivity Applications
Hardware
Fun & Games
EarthWeb sites
Crossnodes
Datamation
Developer.com
DICE
EarthWeb.com
EarthWeb Direct
ERP Hub
Gamelan
GoCertify.com
HTMLGoodies
Intranet Journal
IT Knowledge
IT Library
JavaGoodies
JARS
JavaScripts.com
open source IT
RoadCoders
Y2K Info
Previous
Table of Contents
Next
HOW TO DISCOVER A VIRUS
Viruses can continue replicating until they are detected. The most well-crafted viruses show no symptoms to reveal their presence. However, many viruses are flawed and betray their presence with some of these indications:
Changes in the length of programs.
Changes in the file date or time stamp.
Longer program load times.
Slower system operation.
Reduced memory or disk space.
Bad sectors on a floppy diskette.
Unusual error messages.
Unusual screen activity.
Failed program execution.
Failed system bootups when booting or accidentally booting from the A: drive.
Unexpected writes to a drive.
Instead of waiting for a sign, network managers should use the appropriate tools to seek out viruses before they get far enough to compound problems. The ideal is to repel them before they infect the system.
STANDARD APPROACHES TO FIGHTING VIRUSES
There are several ways to combat viruses. Computer viruses have become increasingly cunning in their programming and ability to avoid detection or eradication. However, virus-fighting tools have also grown through several generations to meet the challenge. Some of the various approaches are described in the following sections.
Signature-based Scanners
Traditionally, virus scanners look for known virus code and when they find a match, they alert the user. The leading scanners are signature-based. Signatures are strands of code unique to a single virus, analogous to DNA strands in a biological virus. Virus researchers and antivirus product developers catalog known viruses and their signatures. Scanners use these catalogs to search for viruses on a users system. The best scanners have an exhaustive inventory of all viruses known to exist and examine all possible locations for infection, including boot sectors, system memory, and files.
Multilevel Generic Detection
Generic detectors are used to eliminate unknown viruses. This method performs integrity checking using checksums.
A checksum is created when an algorithm reads a files bytes sequentially, creating a unique numeric code based on the file itself. Generic antivirus detectors then compare checksums recorded when the system was in a known, clean state with checksums recalculated subsequently. If a virus has attached itself to a file, the bytes will add up differently and the new checksum will no longer match the old (i.e., clean) checksum.
Using this method, it is not necessary to know anything about a virus; instead, the system focuses on what the clean file should look like. The Secret Service uses the same method when teaching agents how to spot counterfeit currency. New agents receive extremely detailed training on what a real dollar should look like rather than on what various counterfeits look like.
The other techniques used in generic detection enable antivirus programs to distinguish between normal, legitimate writes to a file in contrast to viral additions. Expert systems test a systems software by examining code flows, calls, and executions, and other functions to spot viral activity. Sophisticated versions of this approach not only spot viruses, but clean them automatically.
TSR Monitoring
Terminate and stay resident (TSR) programs stay in memory but operate in the background while other programs run. Because most viruses are essentially TSRs, it makes sense to combat them with a TSR. Antivirus TSR programs can provide real-time monitoring of disks and files, expert system analysis of virus-like behavior and code, and may even detect stealth and polymorphic activity. Rather than only working when invoked, TSRs stay on in automatic mode whenever the workstation is in use. Instead of looking for code that matches memorized patterns, as scanners do, antivirus TSRs attempt to catch viruses in the act. On a network, antivirus TSRs can download from a server to each client as it logs on so that users do not need to remember to activate antivirus tools.
Behavior Blocking
This is the only defense that can prevent viral infection, rather than merely detecting viruses after they have infected. Behavior blocking performs on-the-fly code analysis, monitoring the sequence of code behavior until it can distinguish whether the code is safe or harmful. Harmful code is not permitted to execute. Instead, the behavior blocker notifies the user. Behavior blocking programs use some or all of the following techniques.
File Attribute Monitors
A virus cannot infect (i.e., write to) an executable that is marked read-only. Many viruses work around this by first modifying the files attributes so that the file is now a read-write file. Behavior blockers can intercept code that attempts to change or delete the attributes of files.
Intercept Reboot
Some behavior blocking intercepts Ctrol+Alt+Del warm reboots and checks any inserted floppy for viruses before allowing the computer to warm-boot off that floppy. If the floppy has a virus, the behavior blocker warns the user that the floppy is infected. This technique can halt boot viruses.
Smart Blocking
This term refers to very sophisticated behavior blockers that are able to distinguish complex virus behaviors from the complex behaviors of a user running complex software. Smart behavior blockers can analyze detailed sequences of behavior, using statistical analysis to determine the probability that a particular sequence is a virus.
Rescue Disks
Rescue disks are used to salvage data once a virus has infected a PC. It is important that each PC have its own rescue disk. During the installation, an operator must be present to put in the diskette there is no automatic installation. Users must keep track of their rescue disks. If the disk is lost, there is no way to rescue the PC from the virus infection.
Physical Access to PCs
One simple but important technique for defeating viruses is to control who is able to use the computers. Despite the rise of the Internet, most viruses still enter machines through floppy disks. Although the majority of infections come through the hands of unwitting employees, a percentage of attacks emanate from hostile intent. Therefore, some viral attacks can be deflected simply by deterring unauthorized personnel from using machines. Besides taking measures such as securing physical access to computer rooms, a manager can also use security products that render physical and logical drives invisible to certain users or user groups on a network. Thus, fewer personnel have the opportunity to hack those drives.
Previous
Table of Contents
Next
Use of this site is subject certain Terms & Conditions.
Copyright (c) 1996-1999 EarthWeb, Inc.. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of EarthWeb is prohibited.
Please read our privacy policy for details.
Wyszukiwarka
Podobne podstrony:
763 766761 76320030817180219id!763mbdch20 763766 767mbdch20 766763 (2)766 769000 763więcej podobnych podstron