Professional Documents
Culture Documents
“ Virus Scanner ”
BACHELOR OF ENGINEERING
In
BIG DATA ANALYTICS
SUBMITTED BY:
STUDENT DETAILS
“ Digvijay Puri ”
ACKNOWLEDGEMENT
First of all, we would like to thank the Almighty for bestowing his blessings
upon us and over the successful completion of our project, and also keeping us
healthy throughout.
Secondly, We would like to express our deep and sincere gratitude to our Project
In charge Digvijay Puri for giving us the opportunity to do the project and
providing valuable guidance throughout this research. Their dynamism, vision
and exquisite efforts have deeply inspired us. They taught us the methodology to
carry out the research and to present the research work as clearly as possible. It
was a great privilege for us to study and work under their guidance. We owe the
completion of my project to our project Mentor for her continuous support and
guidance.
Finally, we would like to thank our institution, i.e. Chandigarh University for
giving us such fortunate opportunity to showcase our talent through this project
and we have gained a lot of knowledge about spring framework and web
development throughout the making of this project.
ABSTRACT
In today's world if there is one word that can strike fear in the heart of any
computer user, e sp eci all y one who generally access the internet or exchanges
diskettes that is virus. These viruses can generate so much fear in the cyber world
that the news of a new virus often spreads faster than the virus itself. Viruses can
easily be transmitted to your computer via infected files, and these, in turn, can
potentially harm your data and files. Viruses can infect your system without any
warning and your computer can be unbooted or you may find your self the victim
of identity theft. This is why it is important to have a security program working on
your computer. If you don't have patience to run regular scans, you can still find
something that is capable of performing fast virus scan, so you will be able to
resume routine right away.
The main objective of our virus scanner project is the security of the computer.
Our project aims at making the task of securing files easy from virus attacks. It
blocks all viruses form existing system. This is the best way for securing the
computers rather than purchasing external antiviruses from market.. In the project
we can secure data form viruses such as auto run ,new folder, trojan horse, logic
bombs.. Etc.
Table of Contents
CHAPTER 1 INTRODUCTION 6
2.1 Objectives 7
2.2 Definition Of Problem 7
2.3 Software tools required for project 8
2.4 Hardware tools required for project 9
4.1 ER diagram 12
4.2 Data Flow diagram 13
6.1 Problem 16
6.2 Snapshot 17-20
REFERENCES 23
CHAPTER 1
INTRODUCTION
Looking for viruses is not a simple matter of looking for extraneous code,
because it is not always obvious what is extraneous. Recent “stealth viruses”
make even this procedure difficult by ensuring that the original contents of an
infected file are returned when its contents are requested as data for examination.
It is more reliable to test for infected files by using a system that partitions its
processes into distinct address spaces by a virtual memory translation. This way
we can avoid the effects of stealth and other memory resident viruses on the
scanning procedure. Better still would be the use of a scanner on a completely
different architecture — one that cannot support the execution or spread of the
searched-for viruses. In such an environment, when a virus scanner running as a
user program requests bytes from a file for examination, it is assured of the
integrity of the bytes from influence by other user programs; in no case can an
ordinary user process modify the interrupt vectors of devices or traps leading to
system calls.
This is similar to doing a high integrity boot of a PC before scanning for viruses
on it. Furthermore, if we are able to run our detector in a completely different
environment from the one containing the potential viruses, those viruses cannot
infect or interfere with our detector.
CHAPTER 2
MAIN REPORT
2.1 Objectives :
• The main objective is to prevent the system from the viruses which
danger the computer's data and its integrity and to make it cost
effective so majority can protect their system because we believe
that the privacy of data and its integrity shouldn't be compromised
because it is one's fundamental right.
• One of the major objective is to keep eye on the kids and track
their activity and to ensure the protection from the removable
devices.
Each month several new viruses are reported according to many reports
in present scenario. Viruses can infect your system without any warning and
your computer can be rendered unbootable or you may find yourself the victim
of identity theft. This is why it is important to have a security program working
on your computer. And here comes our scanner which prevents the risks of
compromising computer and its data integrity. If you don't have patience to run
regular scans, you can still find something that is capable of performing a fast
virus scan, so you will be able to resume your daily routine right away.
2.3 Hardware specifications:
A common activity that you will likely run into when doing embedded
programming is the need to scan a keypad, keyboard, or some kind of switch
matrix, and as you will find the number of ports or lines needed to scan, these can
add up very quickly, so what I am presenting in this article is a way to scan any
size matrix type device using only 5 general purpose ports on the micro controller
and just a few components. The hardware for this solution is controller
independent, and the software can be modified to run on any processor that has
general purpose I/O port capability.
. Hardware Requirements
The software requirements specification lays out functional and Non functional
requirements, and it may include a set of use cases that describe user interactions
that the software must provide to the user for perfect interaction. The software
requirements specification document lists sufficient and necessary requirements
for the project development. To derive the requirements, the developer needs to
have clear and thorough understanding of the products under development. This
is achieved through detailed and continuous communications with the project
team and customer throughout the software development process.
Software Requirements
• C++
• Visual Studio Code
• Visual Studio
CHAPTER 3
LITERATURE SURVEY
In this approach to virus detection, the machine is booted from uninfected files and
a virus monitor is installed that monitors various activities of the machine while in
day-to-day use. The program monitors known methods of virus activity including
attempts to infect and evade detection. This may also include attempts to write to
boot sectors, modify intemipt vectors, write to system files, etc.
Software monitors work best when the normal or day-to-day usage characteristics
of the system are vastly different from the activity profile of an infected
system. This desirable characteristic, however, is not always present. If the virus is
cleverly written to always stay within this normal profile, it may be difficult to
detect its presence using a monitor. For monitoring to be more effective, users
need to be better educated about the behavior and functioning of viruses. They
must know how their system works so they can recognize suspicious activity when
the software monitor fails.
The chief advantage of a properly implemented monitoring technique is that it
Works for all viruses—the ones currently known and the ones yet to be
discovered. Furthermore, it can detect infections before they occur.
Unfortunately, to always detect these infections, the sensitivity of the monitor
must be set so high that it may generate many false alarms from normal activity.
Furthermore, such detectors must be installed at a low-level on the target machine,
and must always be run an infected detector will not be of practical use in
preventing further infections
We expect that our scanner may prove very useful when released, especially
on systems that share multi-platform file systems, and which host archive
sites.
We expect that by making this a freely-available program, others will
contribute modules and scanner strings to increase its usefulness and generality.
CHAPTER 4
Ye
fWta¥clned s
fu1aeoho<t
Normal
File
CHAPTER 5
Virus Detection
methods
A scanner will search all the files in memory, in the boot section and on the disk
for the code snippet that will uniquely identify a file as a virus. Obviously, this
require a list of unique signature that will be found in viruses and not in benign
programs. To prevent false alarm, most scanner also will check the code of a
suspected file against either the virus code itself or a checksum of it. This is the
most common method of the virus scanning available, is implemented in all
major anti-virus software packages.
• Interception -
Interception detects virus-like behaviour and warns the user about it. How to
defect virus-like behaviour? Use heuristics again. Many virus will perform
some suspicious action, like relocating themselves in memory and installing as
resident program. Many software packages have this as an option, although
most people usually disable it.
CHAPTER 6
6.1 Results :
The final version of the proposed project will deliver the following features:
File
7.1 Conclusion :
viruses are very destructive programs that can be devastating two companies and
individuals upon competition of this project each should be able to have an
understanding of the following: what viruses are, how they get into a computer, how
viruses can be avoided ,how you get rid of viruses ,and the best type of software
used to prevent viruses are students should also show proficiency in accessing one-
line in formation, document, presenting source code and a power point presentation.
it is very important that we learn to complete the project from beginning to end to
get real life experience and learning also increases when we will have to teach the
subject matters to others. This will allow us to get the feel of a real work experience
by learning proper searching techniques to find information on the internet how to
compile the information into document and create and present a presentation that
will spark interest and promote . These are all valuable tools that are used daily in
the work force.
• To ensure the upgradation advance level, so it can detect more efficiently several
newly develop viruses.
• You could be visiting any insecure website without a fear of get infected because of
complete web protection security system.
• You could be getting drive allocation space to store your data and private stuff
without any danger to get hack or infected and data loss.
• By the help of AI we can make scanning and every feature seamless to use and
automatic according to set parameters.
REFERANCES
YouTube video related to virus scanner- (30444) how to make anti virus with C/C++
(Delete anv tvPe of files) YouTube
YouTube video related to virus scanner- (30444) How to do a virus and an antivirus
in c+> usinti code::blocks - YouTube
Virus detection technique and their limitation- Virus Detection Techniques and Their
Limitations (ilser.ore)