The Evolution of the Computer Virus

1772 Words4 Pages

The Evolution of the Computer Virus

Introduction
In simple terms a virus can be defined as software, which is unwanted and executes arbitrary code on systems. It acts as a small software program, which has the capability of exploiting other software programs in order to piggyback[1]. The terms viruses and malwares are used interchangeably, however, in technical terms, the viruses are a subset of malware and so are trojans, worms and rootkits.
The name for the “Computer Virus” has actually derived from its biological counterpart because of their proximity in properties. Similar to the functioning of biological viruses, a computer virus must use another program to exploit some other program in order to start functioning. Hence, this principle characteristics trait results in the name “Computer “Virus”.

1. Why is Computer Virus created?
Few researchers believe in constructing viruses for staying up-to date security inaccuracies and for finding vulnerabilities in the antivirus software. This helps them to stay aware and acquainted against the people who write viruses with the main motive of procuring damages.[2]
The creation of virus involves not only the coding phase but also a testing phase, in order to check the capability of virus to spread itself. Then the virus attack phase also needs to be developed. ‘Diverse intentions motivate people to write these viruses. Few of the intentions behind programmers to develop these viruses are’[1] –
• Few programmers find it as a sense of thrill and excitement .These people can be compared to despoilers or hooligans but who are acquaint with computer programming skills.
• Few programmers’ harm un-intentionally, for example- Robert Tappan Morris had never expected that the worm develope...

... middle of paper ...

...tackers. For an example- the 2003 "Lirva" worm attempted to download "BackOrifice" which was a remote access software package[7].

4.1 Recent Trends
• Data Stealing Payloads-
Traditionally, viruses were not intended to cause very destructible payload, though few viruses resulted in the Denial of Service (DoS) attacks. However with the evolution criminal activities over internet, the viruses have developed to inculcate keyloggers and password stealing capabilities within them.
For an example, the 2003 "Lirva" worm had the capability to store keystores in a separate encrypted file.
• Fast and Furious Worms
This is a new fast growing trend among viruses to target a single vulnerability instead of multiple ones. It results in the saturation of the target population. For an example the Code Red Worm at its peak had started affecting more than 2000 hosts every minute

More about The Evolution of the Computer Virus

Open Document