Preview

Computer Virus and Server-based Virus Protection

Powerful Essays
Open Document
Open Document
20671 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Virus and Server-based Virus Protection
Diploma Thesis
University of Applied Sciences Furtwangen, Germany Faculty of Computer Science - Computer Networking

Server-based Virus-protection On Unix/Linux

by Rainer Link

Advisor: Advisor: Finished: Public Release:

Prof. Hannelore Frank Prof. Dr. Rainer Mueller May, 28 2003 August, 2003

Preface
Abstract
Evaluation and development of server-based anti-virus solutions, running on Linux/Unix, using the Internet Content Adaption Protocol (ICAP). The diploma thesis covers proof-of-concept solutions for web proxy (Squid), eMail server (sendmail/postfix) and file server (Samba), with focus on the latter one aiming to provide a (fully-featured) product.

Motivation
On 07/21/1999, I sent the first patch to the maintainer of the AMaViS project (A Mail Virus Scanner, http://www.amavis.org/, GPL’ed1 ) fixing the AntiViral Toolkit Pro/Linux call. Since then - among other stuff - I wrote and maintained several anti-virus modules (and still do). So, with the help of other people, AMaViS supports a wide range of anti-virus products. But wouldn’t it be easier to maintain only one anti-virus module, implementing a common protocol, to support all those anti-virus scanners? Also, back in 1999, I was looking for an on-access virus scanning solution for Samba fileservers2 , receiving a first Linux kernel-based solution via email in June ’99. More than a year later, I came across the Samba Virtual File System (VFS)3 . A half year later, I digged into the Samba VFS and started to work on a small piece of code which eventually became the samba-vscan project: onaccess file scanning directly integrated into Samba (GPL’ed, too). As nearly all the code I wrote past years was put under an Open Source License, I decided to release this thesis under the terms of the GNU Free Documentation License.

GNU General Public License, see http://www.gnu.org/copyleft/gpl.html see e.g. http://www.geocrawler.com/archives/3/281/1999/4/0/1652065/ 3 see e.g.

You May Also Find These Documents Helpful

  • Powerful Essays

    With admirable foresight, the Internet Engineering Task Force (IETF) initiated as early as in 1994, the design and development of a suite of protocols and standards now known as Internet Protocol Version 6 (IPv6), as a worthy tool to phase out and supplant IPv4 over the coming years. There is an explosion of sorts in the number and range of IP capable devices that are being released in the market and the usage of these by an increasingly tech savvy global population. The new protocol aims to effectively support the ever-expanding Internet usage and functionality, and also address security concerns.…

    • 981 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    Oppliger, R. (1997, May). Internet security: firewalls and beyond. Communication of the ACM Volume 40 Issue 5, pp. 92-100.…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    BUS 520 Case 1 1

    • 1885 Words
    • 6 Pages

    The computer virus employees of Symantec Corp. are never able to enjoy a finished product. They are constantly collecting viruses and suspicious codes to analyze the way they work and to find a solution to prevent these viruses form damaging the public’s computers. They are determined to provide their consumers with updated versions of anti-viruses for their computers. At the Symantec lab, they have a box, which has all dangerous types of viruses that needs or be disposed of. Vincent Weafer has been a part of Symantec since 1999. In 1999, there were only a few employees at Symantec and that there were only a few viruses spread out through months compared to how it is now. Nowadays there are about 20,000 viruses monthly spread out, so more talented employees around the world work for Symantec. Vincent Weafer said that colleges are not creating computer security experts everyday so as soon as they find someone who does, that no matter in what country they hire him or her. The Blaster-B worm made Symantec employees work really hard and this proved that they needed more employees would be more talented towards fixing these problems. Each employee has their own job; some people are managers who are responsible for responding to new security threats, some write research papers, some develop tools that will be used to fight the viruses and even some who find out about the new viruses. Symantec never stops meaning that the labs switch when they are done for the day. Vincent Weafer wants to have a well-defined process for dealing with the viruses that are found every day.…

    • 1885 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Lan Consulting Plan

    • 2879 Words
    • 12 Pages

    Axia College. (2006). Network security. Retrieved August 28, 2009, from Axia College, Week Seven, IT 240 Intro to LAN Technologies.…

    • 2879 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Virus Quiz

    • 602 Words
    • 3 Pages

    A virus may not kill a host cell but may become inactive for a period…

    • 602 Words
    • 3 Pages
    Good Essays
  • Best Essays

    Linux Course Project

    • 2602 Words
    • 11 Pages

    Kabir, Mohammed J.. ( © 2003). Red hat linux 8 server.[Books24x7 version] Available from http://common.books24x7.com.proxy.devry.edu/toc.aspx?bookid=671…

    • 2602 Words
    • 11 Pages
    Best Essays
  • Good Essays

    Week3 Hacking

    • 391 Words
    • 2 Pages

    Workstation and Desktop devices are prone to viruses, malware, and malicious software, especially if the user surfs the Internet and World Wide Web. Given that users connect to the Internet and World Wide Web, what security countermeasures can organization implement to help mitigate the risk caused from viruses, malware, and malicious software?…

    • 391 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    20th centurt

    • 671 Words
    • 3 Pages

    During the 1990s, the Internet remained largely the province of specialists, including defense personnel and scientists. The creation of browsers, or software that provided a convenient graphical interface between user and machine, revolutionized the…

    • 671 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    AtekPC

    • 286 Words
    • 2 Pages

    In 2007, a major news magazine ran a cover article entitled "Whither the PC?" The threats reported in their analysis were worldwide and stemmed from a variety of factors including the growing popularity of 1110bile phones, PDAs, and Web-based application software. For most people, e-mail is the 1110St important application that they use. For a long period of time, sending and receiving e-mail necessitated having a full-ncdged Pc. Nowadays, though, businesspcople and consumcrs want to reap the benefit of being able to access e-mail from anywhere, 24-7.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    • A computer virus’s main purpose is to replicate itself and copy its code into as many other files as possible. Although virus replication can slow down networks, it is not usually…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Good Essays

    Lyssavirus Research Paper

    • 879 Words
    • 4 Pages

    Rabies is a viral disease that affects the central nervous system (CNS). The genus Lyssavirus contains more than 80 viruses. Classic rabies, the focus of this article, is the prototypical human Lyssavirus pathogen.…

    • 879 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    A keylogger is something that could put your privacy and security at risk. Make sure you learn more about it. Otherwise, you could suffer like Joe Lopez. This is a Florida-based entrepreneur who took the Bank of America to court. The bank had misplaced his $90000. The money appeared to be somewhere in Latvia. After conducting an investigation, Coreflood was the cause. Coreflood is a keylogger Trojan.…

    • 363 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Mateti, P. (2006). TCP/IP Suite. In Bidgoli, H. (Ed.), Handbook of Information Security. Bakersfield, California: John Wile & Sons, Inc.…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Powerful Essays

    Humanities Course Paper

    • 1596 Words
    • 7 Pages

    Through the past several decades the advancement of technology has evolved. Among one of the advancements was the Internet. The Internet is a worldwide of networks connecting millions of computers. Through the Internet countries are able to exchange data, news and opinions. It started in the 1960’s when the internet was originally being used for government which later evolved to the world (Computer history museum, 2006). Over the past forty years the internet has changed technology of computers and how the world communicates, online banking, social networking, and online shopping. The Internet we know today grew from seeds planted by the U.S. Government. The Department of Defense issued a twenty thousand dollar contract on December 6, 1967 for the purpose of studying the design and specification of a computer network (Internet History from ARPANET to Broadband, 2007). It was conceived by the Advanced Research Projects Agency (ARPA) of the U.S. government in 1969 and was first known as the ARPANet (Computer history museum, 2006). The ARPA laid the groundwork which later became the internet. By 1992 the Internet has one million hosts (Ganna, 2006). Through the years the Internet has changed the way people live and run businesses. My project will walk through the discovery and evolution of the Internet.…

    • 1596 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Recent Internet worm outbreaks have infected hundreds of thousands of Internet servers and user machines within minutes, causing billions of dollars in losses for businesses, governments, and service providers. The high stakes involved have inspired numerous research projects, through which industry and academic institutions are working to strengthen local-area and wide-area networked systems’ abilities to fend off cyber-attacks. To that end, we propose to find new algorithm to detect internet worm viruses deploying fast, scalable security overlay networks to facilitate high-speed intrusion detection and alert-information exchange by depend on failure connection. Fortifying the Internet infrastructure with such a solution could benefit many security-sensitive applications, such as digital government, critical infrastructures, grid computing, e-commerce, and law enforcement. The broader impacts are far reaching in science, education, business, and homeland security. Currently, the internet is getting close to the persons’ life. They login internet to chat with others, download files or browse Web Pages. The internet is also playing an important role in the economy of country. Once the internet breaks down, it will cause an enormous economic loss. Worms is a serious security threat that may cause network congestion and internet break down. Anti-virus software scans files regularly for unusual changes in a file size, programs that match the software's database of known viruses, suspicious email attachments, and other warning signs. Anti-virus compares the signature stored in its database with file structure. If the file contain same signature, so it is infected with the worm, the anti-virus will detect it. The anti-virus database must then be updated continuously to detect new worms. The internet worm is dangerous because it spread very fast and anti-virus are too slow to detect. Anti-virus…

    • 612 Words
    • 3 Pages
    Good Essays

Related Topics