Overview
FrançaisABSTRACT
Viruses and other malicious codes fall into many sub-categories, with many viral techniques, and different risks.
This article presents viruses in the now more realistic general context of computer infections (malware). First, all the varieties of these programs and their functioning are explained in detail, along with their adaptation to the defenses that a user can marshal. Second, techniques to protect against malware are described. These, while generally effective, and boosted by machine learning, cannot remove all the risks, but only reduce them. It is thus essential not to rely only on installing antivirus software, however efficient. The rules of computer hygiene, which have proved very effective, must also be followed.
Read this article from a comprehensive knowledge base, updated and supplemented with articles reviewed by scientific committees.
Read the articleAUTHORS
-
Éric FILIOL: Head of Discipline Cybersecurity, Thales Digital Factory, Paris, France & ENSIBS, Vannes, France
-
Baptiste DAVID: IT Security Analyst & Researcher, ERNW, Heidelberg, Germany
-
Paul IROLLA: Doctoral student at the Operational Virology and Cryptology Laboratory, ESIEA, Laval, France
INTRODUCTION
The term computer virus, coined in 1984, is now well known to the general public. The omnipresence of information technology in the workplace and now in the home, the use of the Internet and, more generally, networks (computer and telephone), and the emergence of connected and communicating objects have, at least once, confronted almost all users with the risk of viruses. However, it turns out that in reality, users' knowledge (in the broadest sense of the term) of computer virology is still far from complete, to the point of increasing rather than reducing risks. In fact, the term "virus" itself is misused to designate a more general class of programs that have nothing to do with viruses: worms, Trojans, logic bombs, decoys and so on. Moreover, viruses are far more complex than they appear. Numerous sub-categories exist, and numerous viral techniques are involved, all implying different risks, which need to be understood in order to protect and combat them effectively.
In 1999, the ILoveYou worm infected over 45 million computers worldwide. In 2003, the Sapphire/Slammer worm infected over 75,000 servers worldwide, in around ten minutes. In 1998, the CIH Chernobyl virus forced thousands of users to replace their motherboards after destroying the BIOS program. The damage caused by this virus is estimated at around 250 million euros in South Korea alone, compared with several billion euros for a computer worm. According to the FBI, the threat posed by BotNets since 2002-2003 concerns one computer in four worldwide, i.e. almost two hundred million machines infected without the owner's knowledge. The Storm Worm attack, in the summer of 2007, hit over 10 million machines worldwide in less than a month. These figures underline the importance of taking the virus threat seriously.
Since then, attacks have multiplied to such an extent that they are no longer systematically reported in the media. It seems to have become a reality that individuals and businesses alike have realized they have to live with. The case of ransomware is one of the most illustrative examples. The recent attack by the Wannacry and NotPetya viruses in June 2017 has, however, shaken the world out of its torpor: by giving a second birth to certain codes that were thought to belong to the past, it forcefully confirms that mobsters and other hackers are no longer the only evil actors using computer viruses. Indeed, we now have to add to this the States, which are making ever more frequent use of them, not only in their espionage operations, but also in more conventional warfare: the so-called "cyber" dimension, after the Land, Air and Sea components, has become a sad reality. The Ukrainian and Israeli-Palestinian conflicts have confirmed this sad reality even more forcefully.
In...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
KEYWORDS
computer virus | malware | antiviral protection | computer hygiena | backdoors | 0-day vulnerabilities
EDITIONS
Other editions of this article are available:
This article is included in
Security of information systems
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Computer viruses and other computer infections
Bibliography
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference