Article | REF: H5440 V3

Computer Virus and other malware

Authors: Éric FILIOL, Baptiste DAVID, Paul IROLLA

Publication date: October 10, 2017

You do not have access to this resource.
Click here to request your free trial access!

Already subscribed? Log in!


Overview

Français

Read this article from a comprehensive knowledge base, updated and supplemented with articles reviewed by scientific committees.

Read the article

AUTHORS

  • Éric FILIOL: Research Director, Operational Virology and Cryptology Laboratory, ESIEA, Laval, France

  • Baptiste DAVID: Doctoral student at the Operational Virology and Cryptology Laboratory, ESIEA, Laval, France

  • Paul IROLLA: Doctoral student at the Operational Virology and Cryptology Laboratory, ESIEA, Laval, France

 INTRODUCTION

The term computer virus, coined in 1984, is now well known to the general public. The omnipresence of information technology in the workplace and now in the home, the use of the Internet and, more generally, networks (computer, telephone), and the emergence of connected and communicating objects have confronted almost all users, at least once, with the risk of viruses. However, it turns out that in reality, users' knowledge (in the broadest sense of the term) of computer virology still has many gaps, to the point of increasing rather than decreasing the risks. In fact, the term "virus" itself is improperly used to designate a more general class of programs that have nothing to do with viruses: worms, Trojans, logic bombs, decoys... Moreover, viruses are far more complex than they appear. Numerous sub-categories exist, and numerous viral techniques are involved, all implying different risks, which need to be understood in order to protect and combat them effectively.

In 1999, the ILoveYou worm infected over 45 million computers worldwide. In 2003, the Sapphire/Slammer worm infected over 75,000 servers worldwide, in around ten minutes. In 1998, the CIH Chernobyl virus forced thousands of users to replace their motherboards after destroying the BIOS program. The damage caused by this virus is estimated at around 250 million euros in South Korea alone, compared with several billion euros for a computer worm. According to the FBI, the threat posed by BotNets since 2002-2003 concerns one computer in four worldwide, i.e. almost two hundred million machines infected without the owner's knowledge. The Storm Worm attack, in the summer of 2007, hit over 10 million machines worldwide in less than a month. These figures forcefully demonstrate the importance of taking the viral threat seriously. Since then, attacks have multiplied to such an extent that they are no longer systematically reported in the media. It seems to have become a reality that individuals and businesses alike have realized they have to live with. The case of ransomware is one of the most illustrative examples. The recent attack by the Wannacry virus in June 2017, however, has shaken the world out of its torpor: by giving a second birth to certain codes that were thought to belong to the past, it forcefully confirms that mafiosi and other hackers are no longer the only evil actors using computer viruses. In fact, we now have to include governments, which are making ever more frequent use of them not only in their espionage operations, but also in more conventional warfare: the so-called "cyber" dimension, after the land, air and sea components, has become a sad reality.

In this article, we'll introduce computer viruses and worms and consider them in the general context of today's more realistic computer infections....

You do not have access to this resource.

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource.
Click here to request your free trial access!

Already subscribed? Log in!


The Ultimate Scientific and Technical Reference

A Comprehensive Knowledge Base, with over 1,200 authors and 100 scientific advisors
+ More than 10,000 articles and 1,000 how-to sheets, over 800 new or updated articles every year
From design to prototyping, right through to industrialization, the reference for securing the development of your industrial projects

This article is included in

Security of information systems

This offer includes:

Knowledge Base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

Practical Path

Operational and didactic, to guarantee the acquisition of transversal skills

Doc & Quiz

Interactive articles with quizzes, for constructive reading

Subscribe now!

Ongoing reading
Computer viruses and other computer infections