You are on page 1of 4

International Journal of Computer Science Trends and Technology (IJCST) – Volume 6 Issue 5, Sep-Oct 2018

RESEARCH ARTICLE OPEN ACCESS

Review Paper on Risks of PC Virus and its Preventions


R.Saravanakumar [1], Dr.V.Kathiresan [2]
Department of Computer Application (PG)
Dr. SNS Rajalakshmi College of Arts and Science, Coimbatore
TamilNadu - India

ABSTRACT
Computer viruses are a nightmare for the pc world. it's a threat to any user World Health Organization uses a network. the pc
won't be infected by a pestilence if the pc isn't connected to the surface world. during this case, this is often the net. the net will
be used as a medium for the unfolding of the virus to the fullest. There are many varieties of viruses that unfold through the net.
a number of them are aimed at creating cash, and there are sole as a disrupt activity and pc performance. Some techniques are
done to forestall the unfold of the virus. Here are explained the way to tackle the virus optimally. The profit is that the pc used
are free from virus attacks and safe to exchange information in public. Techniques used to embody the interference and
interference of viruses against pc networks are to grasp the characteristics and workings of the virus.
Keywords:- Threats, Trojan, Virus, Bug, Malware, Worm.

I. INTRODUCTION crime. This research tries to discuss how to overcome the


threat problem on the computer network.
The biosphere of technology is growing apace from age to
age. This advancement was created attributable to the II. CONCEPTS
technology of web technology. It is the main medium for
exchanging information. This information is in the form of A. VIRUS
text, image, sound, video and so on. Not wholly info on the Virus initially seemed in 1981 in Texas. The virus title is Elk
net is open, though the internet is a link of computers that Cloner. It is feast over Apple II floppy disk. This virus shows
can join easily [8]. Thus, it is essential to safeguard the a note on the screen. The name "Virus" was announced after
security of info to computers associated to the Internet two years after the appearance of the Elk Cloner. It was
network. In the Internet network, there is a security gap that announced by LenAdleman on Nov 1983 in a session that
is always targeted by people who are not responsible. Many converses how to develop viruses and defend themselves
tries are created to enhance the protection of a web site from from viruses. However, people often assume that the virus
malicious threats whereas the square measure parties with a that first seemed to be in the Brain virus Was released in
particular intention seeking to use the protection. This is an 1986. Certainly, folks assume that manner as a result of this
attack on the security of information systems. This form of virus is that the most surprising and most widespread as a
attack can be grouped from easy and difficult. The form of result of it spreads through the dos disc that at that point is
exploitation of information system security is a digital fashionable. At that period, it started to spread broadly. It is
infection. Bugs, Worms, Viruses, computer viruses, square near a year earlier the initial virus seems to damage files.
measure a part of a digital infection that could be a threat to Typically, this virus bouts the *.exe files. This bug is called
pc users, particularly those connected to the net [1]. This Suriv. The speediness of the feast is quick. It started
activity is caused by software that is personally created by a damaging the mainframe since IBM near a year. In 1988, a
person to carry out criminal acts. virus appeared that confronted Macintosh. The term of this
virus is Macmag then Scores. On the similar period An, net-
This is an attack on the security of information systems. This
attacking virus was formed by Robert Morris. In 1995, there
form of attack can be grouped from easy and difficult. The
was a virus that damaged big corporations counting Griffith
form of exploitation of information system security is a
AF Base Research Institute, Korean atomic, IBM, NASA and
digital infection. Viruses, Worms, Trojan Horse, are part of a
much further by the Internet Liberation, on Thanks giving
digital infection which is a threat to computer users,
Day. Thus, in 1995 labelled as the year of the crackers &
especially those connected to the Internet. This activity is
hackers.
caused by software that is personally created by a person to
carry out criminal acts that would harm the owner he attacks. B. TROJAN
It aims to bargain data and know the confidences that exist
on the system and then sell it to the contrasting party. Trojan is a package of program that is not predictable and
Malicious software is one of the programs that commit this implanted without the data of the proprietor of the gear. It
has a remote switch. Generally, Trojans is a client` server
program. It is done so that trojan could be controlled and

ISSN: 2347-8578 www.ijcstjournal.org Page 1


International Journal of Computer Science Trends and Technology (IJCST) – Volume 6 Issue 5, Sep-Oct 2018

specified instructions by the creator remotely. It can be a Adware is a product or package offering that is portion of a
time bomb were a code will be performed at a certain time. site or application. Scripts written on an internet page enable
As an outcome, pc infected by a trojan are entirely below the adware to run on its own and can seem once activating bound
control of that person. Trojan is a database used to transfer a sites. Adware is extremely straightforward to eliminate,
significant function of a corruption. These codes are however there's additionally adware that includes a steady
regularly concealed and unidentified to the user. The package defence. Some Adware is embedded in applications
makes anonymous functions and bargains all essential data downloaded from the net. At the time of putting in the
and will be directed to the program's inventers [4]. program, there square measure many choices feature that
negligently serves to activate adware operate. As a result,
C. SPAM they'll be connected to the pc and greatly disrupt the
Spam is messages sent to somebody containing unrelated performance of the package. The disadvantage of adware is
information during internet activity. The purpose of spam is that the pc can start up a pop-up window containing bound
to advertise certain products or services. These commercials advertisements that, once clicked, can cause untrusted sites.
are usually injected by bugs, worms, or trojans. Junk is
III. RESULT AND DISCUSSION
spread via email by showing hyperlinks to precise websites
or files. At this period spam is also distributed through A. HOW A VIRUS WORKS
programs, social media, and chats that are connected on the
device. The main persistence of junk-mail is for promoting. A Pc virus is the codes that can destruct files or system. It
However, there is also spam containing propaganda and virus has many types and different ways of working.
content. Junk is very destructive to governments that uses Communication technology stays one technique to spread the
email services mainly for military and state events. Junks can virus. With the network of a system to the public system will
cause stacks on impractical emails. It will be terminal. The os increase the percentage of chances infected with computer
will not, able to last the quantity of spam directed to the viruses. The hackers easily attack and make the computers as
system. Spam also repeatedly holds malware so that the pc their main target. They will insert a killer program on any
will direct spam to further computers while linked to the system that has been successfully taken over. Viruses can
network. feast via VPN to nets possessed by the administration or
further authorized entities. IOT is one medium for viruses to
D. WORM grow or multiply. Usage of variety of supportive apps will
permit the virus to grow. It will make it cooler for crackers to
A worm could be a trojan horse which may accomplish self-
exploit weaknesses. The following types of bugs, viruses and
duplication on a system. associate degree engrained worm
the process of each virus:
has an effect on the computer's written record and creates a
script to double itself by taking advantage of a network while  File Virus This virus has a processing technique of
not the necessity for validation from the brain-ware. In damaging applications and documents that are in
distinction to PC viruses, worms exploit vulnerabilities that our computer. When the infested application is run,
are accidentally exposed. Some worms conjointly pay the then this virus will spread by contaminating all files
offered information measure as a result. or documents opened by the application.
E. SPYWARE  Boot Sector Virus This virus features a operating
approach of infecting an area within the disk drive
Spyware may be a program which will record any electronic that was 1st accessed once the pc is boot up. If the
network activity. It will steal a PIN, password, checking boot sector virus is active, the user won't be ready
account. The recorded information are transferred to the to boot his PC unremarkably. It slows down the
virus maker. If there's valuable information, it'll be sold-out speed.
to different parties United Nations agency will drop the  Macro Virus it's sometimes embedded in some
opponent. Spyware readying, can, not be detected. It comes application. It can't be a complete virus. It infects
from programs that square measure downloaded from the net Microsoft workplace applications, like Word and
that's sometimes already changed and inserted by spyware surpass. Documents affected by Macro Virus can
programs. It may also be infected from sites containing adult add or modify existing commands to spread itself
content or gambling. Spyware will degrade and affect the once the knowledge is dead.
performance of the package and application programs put in  E-mail Virus it works by mail. It particularly has
on the pc. it's a program that's tough to be discarded even if associate degree attachment. it's special options like
the pc is already doing the recovery method. extension .exe or .bat. If the virus is active, then it'll
send a harmful code to several e-mail address in
F. ADWARE random.

ISSN: 2347-8578 www.ijcstjournal.org Page 2


International Journal of Computer Science Trends and Technology (IJCST) – Volume 6 Issue 5, Sep-Oct 2018

 Polymorphic Virus It will modification the code by floppy disks & boot sectors initial within the expansion of
once infected to a different PC. it's done to cover computers, then goes through the network. Moreover, once
them from being detected. it's harder to lose of the system is already mistreatment wireless technology,
since they're hidden and no assets. numerous different sorts of viruses can still become older.
Viruses square measure a threat to pc users in Net.
Virus bouts can be prohibited or mitigated using antivirus Understanding of viruses like trojans, worms, malware,
software. This type of software can also spot and eliminate adware et al ought to be identified and anticipated by
computer viruses. The software vendor must provide and electronic network users. it's a good potential danger once
renew the computer virus database to kill the infected the pc is connected globally. Understanding includes
computer. however work, types, sources, and goals square measure the
primary steps to anticipate. electronic network users usually
B. PREVENTION
don't understand that a deadly disease has infected their
System security may be divided into 2 ways that, prevention, computers. it's expected to allow lessons to the user to be
and treatment. they're differentiated supported the time of ready to observe and eliminate viruses that are already in the
infection. interference efforts square measure performed system. It aims to secure from reinfection of systems that are
before infection. it's Associate in Nursing action so the already free from such issues. With this information system
system doesn't have a niche that may be exploited by the operators will be more cautious of the system coupled
virus to thrive. Treatment may be done once a system has publicly.
been infected. It aims to repair a weak and open security
hole. interference is completed by finding the liability of the REFERENCES
protection hole that has been exploited and eliminates the
[1]. S. Natarajan and S. Rajarajesware, "Computer Virus: A
reason for infection. Viruses usually modify initiate files, add
Major Network Security Threat," International Journal
or modify commands to the register and additionally write
of Innovative Research & Development, vol. 3, no. 7,
code to run a command on a system. It works to override the
pp. 229-302, 2014.
system at boot time. with these reasons, then to get rid of the
[2]. S. Chakraborty, "A Comparison study of Computer
virus takes an extended amount and high accuracy. This
Virus and Detection Techniques," International Journal
method could be a method filled with dangers, together with
of Scientific Research in Computer Science, Engineering
removing the suspected register. This security live could lose
and Information Technology, vol. 2, no. 1, pp. 236-240,
a number of the precious data.
2017.
C. RECOVERY [3]. M. Khari and C. Bajaj, "Detecting Computer Viruses,"
International Journal of Advanced Research in
Anti-virus works to detect viruses, not to detect Trojans, Computer Engineering & Technology, vol. 3, no. 7, pp.
Malware, Adware, and Spam. However, when these types of 2357-2364, 2014.
viruses begin to develop and cause many problems, anti-
virus makers add additional data to the coding. [4]. L. X. Yang, X. Yang, L. Wen and J. Liu, "A Novel
Computer Virus Propagation Model and its Dynamics,"
The simple steps taken to eliminate the bug from the system International Journal of Computer Mathematics, vol. 89,
are: no. 17, pp. 2307-2314, 2012.
 Identify the virus file on the hard drive. [5]. P. R. Shah, Y. Shah and S. Madan, "Mobile Viruses," in
 Find out how the virus triggers itself and take International Conference on Recent Trends in
required act to prevent it from running virus after Information Technology and Computer Science, 2011.
reboot.
[6]. P. Qin, "Analysis of a Model for Computer Virus
 Reboot the computer and remove the virus.
Transmission," Hindawi Publishing Corporation
 Observe the difference in computer performance
Mathematical Problems in Engineering, pp. 1-10, 2015.
before and after healing.
[7]. S. Ramadhani, Y. M. Saragih, R. Rahim and A. P. U.
The above steps are one option to remove a virus from a
Siahaan, "Post-Genesis Digital Forensics Investigation,"
computer. However, the most effective step is to re-install all
International Journal of Scientific Research in Science
pc programs with new ones. The virus can mechanically
and Technology, vol. 3, no. 6, pp. 164-166, 2017.
disappear once the pc features a new system.
[8]. Hariyanto and A. P. U. Siahaan, "Intrusion Detection
IV. CONCLUSION System in Network Forensic Analysis and
The development of system technology may be a trojan horse Investigation," IOSR Journal of Computer Engineering,
media to pass around killer codes. It begins from spreading vol. 18, no. 6, pp. 115-121, 2016.

ISSN: 2347-8578 www.ijcstjournal.org Page 3


International Journal of Computer Science Trends and Technology (IJCST) – Volume 6 Issue 5, Sep-Oct 2018

[9] Essam Al Daoud, Iqbal H. Jebril and Belal Zaqaibeh


“Computer Virus Strategies and Detection Methods” Int.
J. Open Problems Compt. Math., Vol. 1, No. 2,
September 2008.
[10] Imran Khan” An introduction to computer viruses:
problems and solutions” Library Hi Tech News Number
7 2012, pp. 8-12.

ISSN: 2347-8578 www.ijcstjournal.org Page 4

You might also like