Help | Advanced Search

Computer Science > Cryptography and Security

Title: computer viruses: the abstract theory revisited.

Abstract: Identifying new viral threats, and developing long term defences against current and future computer viruses, requires an understanding of their behaviour, structure and capabilities. This paper aims to advance this understanding by further developing the abstract theory of computer viruses. A method of providing abstract definitions for classes of viruses is presented in this paper, which addresses inadequacies of previous techniques. Formal definitions for some classes of viruses are then provided, which correspond to existing informal definitions. To relate the abstract theory to the real world, the connection between the abstract definitions and concrete virus implementations is examined. The use of the proposed method in studying the fundamental properties of computer viruses is discussed.
Subjects: Cryptography and Security (cs.CR)
Cite as: [cs.CR]
  (or [cs.CR] for this version)
  Focus to learn more arXiv-issued DOI via DataCite

Submission history

Access paper:.

  • Other Formats

References & Citations

  • Google Scholar
  • Semantic Scholar

DBLP - CS Bibliography

Bibtex formatted citation.

BibSonomy logo

Bibliographic and Citation Tools

Code, data and media associated with this article, recommenders and search tools.

  • Institution

arXivLabs: experimental projects with community collaborators

arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.

Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.

Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs .

To read this content please select one of the options below:

Please note you do not have access to teaching notes, an introduction to computer viruses: problems and solutions.

Library Hi Tech News

ISSN : 0741-9058

Article publication date: 14 September 2012

The purpose of this paper is to discuss various types of computer viruses, along with their characteristics, working, effects on the computer systems and to suggest measures for detecting the virus infection in a computer system and to elaborate means of prevention.

Design/methodology/approach

The author undertook an extensive study and review of the literature available online and on relevant web sites on the present topic.

A large number of viruses were found during the study, which are causing serious damages to computer systems. The author suggests ways to detect and prevent the different computer viruses.

Research limitations/implications

The research is based on and limited to the study of the relevant literature available on different relevant web sites.

Practical implications

The research will benefit business organizations, business houses, educational institutions and libraries working in fully computerized environments, in detection of viruses and preventing infection of their computer systems.

Social implications

The society will also benefit by attaining knowledge about the different types of computer viruses and the measures of prevention of infection.

Originality/value

There are a number of studies and articles available on the topic but almost all of them appear to be incomplete in the sense that either they discuss only a limited number of known viruses or suggest only limited ways of prevention. The paper has made an attempt to discuss almost all the computer viruses and every possible way of prevention of infection from them.

  • Computer viruses
  • Data security
  • Computer security
  • Information security
  • Security measures

Khan, I. (2012), "An introduction to computer viruses: problems and solutions", Library Hi Tech News , Vol. 29 No. 7, pp. 8-12. https://doi.org/10.1108/07419051211280036

Emerald Group Publishing Limited

Copyright © 2012, Emerald Group Publishing Limited

Related articles

All feedback is valuable.

Please share your general feedback

Report an issue or find answers to frequently asked questions

Contact Customer Support

IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

Simulating Bluetooth virus propagation on the real map via infectious attenuation algorithm and discrete dynamical system

  • Published: 25 June 2024

Cite this article

research paper about computer viruses

  • Qingyi Zhu 1 , 2 , 3   na1 ,
  • Wentao Wan 2   na1 ,
  • Chengquan Gan 1   na1 ,
  • Ziqi Fan 1 &
  • Lu-Xing Yang 4  

Explore all metrics

In recent years, mobile smart devices have gained popularity globally due to their convenience and efficiency. However, this popularity has also attracted the attention of virus creators, resulting in a significant cost to users. Current research on virus propagation primarily focuses on developing anti-virus software and macroscopic modeling. Software development often lags behind and only begins when viruses become a significant threat. In contrast, macroscopic modeling frequently deviates from reality as real networks do not completely conform to the characteristics of scale-free or small-world networks. Furthermore, special factors such as device mobility and signal attenuation must be considered when studying Bluetooth-transmitted viruses. Traditional research methods have shown limited performance in this field. To address these issues, this paper proposes a method that describes the propagation behavior of Bluetooth viruses in smart devices by utilizing an Infectious Attenuation Algorithm (IAA) and real maps. This method incorporates population density, map contours, and user security awareness to construct a unique discrete system. More importantly, we integrate this system into the map of Deyuan Street in Chengdu City and create a visualization system using the Simulation of Urban Mobility (SUMO) simulation software. In this system, the proposed IAA simulates the decay of virus infectivity based on the distance between devices and the attenuation of signal power between them. Our research approach considers the two core elements of infectivity attenuation and maps, making it more realistic and overcoming the lag in software development. Additionally, the introduction of SUMO for visualization simulation enhances the practical significance of our experiments. Finally, we propose feasible prevention strategies based on comparative experiments, data analysis, and theoretical analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price includes VAT (Russian Federation)

Instant access to the full article PDF.

Rent this article via DeepDyve

Institutional subscriptions

research paper about computer viruses

Similar content being viewed by others

research paper about computer viruses

Modeling COVID-19 spread using multi-agent simulation with small-world network approach

research paper about computer viruses

A multi-agent model to study epidemic spreading and vaccination strategies in an urban-like environment

research paper about computer viruses

Mobility-based SIR model for complex networks: with case study Of COVID-19

Data availability.

Not applicable.

Cohen, F.: Computer viruses: theory and experiments. Comput. Secur. 6 (1), 22–35 (1987)

Article   Google Scholar  

Ponemon Institute, IBM Security: 2021 cost of a data breach study: Global interview. [Online], 1–73 (2021)

Shih, D.-H., Lin, B., Chiang, H.-S., Shih, M.-H.: Security aspects of mobile phone virus: a critical survey. Ind. Manag. Data Syst. 108 (4), 478–494 (2008)

González, G., Lárraga, M.E., Alvarez-Icaza, L., Gomez, J.: Bluetooth worm propagation in smartphones: modeling and analyzing spatio-temporal dynamics. IEEE Access 9 , 75265–75282 (2021)

Hsu, F.-H., Wu, M.-H., Hwang, Y.-L., Chen, J.-X., Huang, J.-H., Wang, H.-J., Lai, Y.-W.: Defending iot devices against bluetooth worms with bluetooth obex proxy. Information 14 (10), 525 (2023)

Lonzetta, A.M., Cope, P., Campbell, J., Mohd, B.J., Hayajneh, T.: Security vulnerabilities in bluetooth technology as used in iot. J. Sens. Actuator Netw. 7 (3), 28 (2018)

Xiang, H.: Bluetooth-base worm modeling and simulation. Electr. Eng. Comput. Sci. 3418 , 2004–2019 (2007)

Google Scholar  

Chen, L., Feldman, L., Witte, G., et al.: Updated Nist Guidance for Bluetooth Security. Technical report, National Institute of Standards and Technology (2017)

Zangana, H.M., Omar, M.: Threats, attacks, and mitigations of smartphone security. Acad. J. Nawroz Univ. 9 (4), 324–332 (2020)

Gan, C., Feng, Q., Zhang, X., Zhang, Z., Zhu, Q.: Dynamical propagation model of malware for cloud computing security. IEEE Access 8 , 20325–20333 (2020)

Ashawa, M., Morris, S., et al.: Analysis of mobile malware: a systematic review of evolution and infection strategies (2021)

Zimeras, S., Diomidous, M.: Computer virus models–the susceptible infected removed (sir) model. In: Data, Informatics and Technology: An Inspiration for Improved Healthcare, pp. 75–77. IOS Press, (2018)

Raja, M.A.Z., Mehmood, A., Ashraf, S., Awan, K.M., Shi, P.: Design of evolutionary finite difference solver for numerical treatment of computer virus propagation with countermeasures model. Math. Comput. Simul. 193 , 409–430 (2022)

Article   MathSciNet   Google Scholar  

Batistela, C.M., Piqueira, J.R.C.: Sira computer viruses propagation model: mortality and robustness. Int. J. Appl. Comput. Math. 4 (5), 1–9 (2018)

Dang, Q.A., Hoang, M.T.: Numerical dynamics of nonstandard finite difference schemes for a computer virus propagation model. Int. J. Dyn. Control 8 (3), 772–778 (2020)

Yang, F., Zhang, Z.: Hopf bifurcation analysis of seir-ks computer virus spreading model with two-delay. Results Phys. 24 , 104090 (2021)

Raza, A., Arif, M.S., Rafiq, M., Bibi, M., Naveed, M., Iqbal, M.U., Butt, Z., Naseem, H.A., Abbasi, J.N.: Numerical treatment for stochastic computer virus model. Comput. Model. Eng. Sci. 120 (2), 445–465 (2019)

Xie, B., Liu, M.: Dynamics stability and optimal control of virus propagation based on the e-mail network. IEEE Access 9 , 32449–32456 (2021)

Tomovski, I., Basnarkov, L., Abazi, A.: Discrete-time non-markovian seis model on complex networks. IEEE Trans. Netw. Sci. Eng. 9 (2), 552–563 (2021)

Yang, L., Song, Q., Liu, Y.: Stability and hopf bifurcation analysis for fractional-order sveir computer virus propagation model with nonlinear incident rate and two delays. Neurocomputing 547 , 126397 (2023)

Özdemir, N., Uçar, S., Eroğlu, B.B.İ: Dynamical analysis of fractional order model for computer virus propagation with kill signals. Int. J. Nonlinear Sci. Numer. Simul. 21 (3–4), 239–247 (2020)

Hosseini, S., Azgomi, M.A.: The dynamics of an seirs-qv malware propagation model in heterogeneous networks. Physica A 512 , 803–817 (2018)

Avcı, D., Soytürk, F.: Optimal control strategies for a computer network under virus threat. J. Comput. Appl. Math. 419 , 114740 (2023)

Zhao, X.: Optimal control strategy for slbrs with two control inputs. Mathematics 11 (19), 4036 (2023)

Kumar, P., Govindaraj, V., Erturk, V.S., Nisar, K.S., Inc, M.: Fractional mathematical modeling of the stuxnet virus along with an optimal control problem. Ain Shams Eng. J. 14 (7), 102004 (2023)

Dong, N.P., Long, H.V., Giang, N.L.: The fuzzy fractional siqr model of computer virus propagation in wireless sensor network using caputo atangana-baleanu derivatives. Fuzzy Sets Syst. 429 , 28–59 (2022)

Liu, G., Chen, J., Liang, Z., Peng, Z., Li, J.: Dynamical analysis and optimal control for a seir model based on virus mutation in wsns. Mathematics 9 (9), 929 (2021)

Hoang, M.T.: A new and simple condition for the global asymptotic stability of a malware spread model on wsns. arXiv preprint arXiv:2112.06285 (2021)

Gao, C., Liu, J.: Modeling and predicting the dynamics of mobile virus spread affected by human behavior. In: 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, pp. 1–9 (2011). IEEE

Gao, C., Liu, J.: Modeling and restraining mobile virus propagation. IEEE Trans. Mobile Comput. 12 (3), 529–541 (2012)

Shen, S., Zhou, H., Feng, S., Huang, L., Liu, J., Yu, S., Cao, Q.: Hsird: a model for characterizing dynamics of malware diffusion in heterogeneous wsns. J. Netw. Comput. Appl. 146 , 102420 (2019)

Zhao, T., Wei, S., Bi, D.: Hopf bifurcation of a computer virus propagation model with two delays and infectivity in latent period. Syst. Sci. Control Eng. 6 (1), 90–101 (2018)

Mohammad, T., Hussin, N.A.M., Husin, M.H.: Online safety awareness and human factors: an application of the theory of human ecology. Technol. Soc. 68 , 101823 (2022)

Coşkun, H., Yıldırım, N., Gündüz, S.: The spread of covid-19 virus through population density and wind in turkey cities. Sci. Total Environ. 751 , 141663 (2021)

Schläpfer, M., Dong, L., O’Keeffe, K., Santi, P., Szell, M., Salat, H., Anklesaria, S., Vazifeh, M., Ratti, C., West, G.B.: The universal visitation law of human mobility. Nature 593 (7860), 522–527 (2021)

Ren, J., Xu, Y., Xie, C., He, S.: A compartmental model for global spread dynamics of malware under mutation. Math. Methods Appl. Sci. 42 (6), 1859–1869 (2019)

Gan, C., Feng, Q., Zhu, Q., Zhang, Z., Zhang, Y., Xiang, Y.: Analysis of computer virus propagation behaviors over complex networks: a case study of oregon routing network. Nonlinear Dyn. 100 (2), 1725–1740 (2020)

Download references

National Natural Science Foundation of China (No. 61903056), and the Guangxi Key Research and Development Program (No. AB24010317).

Author information

Qingyi Zhu, Wentao Wan and Chengquan Gan contributed equally to this work.

Authors and Affiliations

School of Cyber Security and Information Law, Chongqing University of Posts and Telecommunications, Chongqing, 400065, China

Qingyi Zhu, Chengquan Gan & Ziqi Fan

School of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing, 400065, China

Qingyi Zhu & Wentao Wan

Key Laboratory of Cyberspace Big Data Intelligent Security, Ministry of Education, Chongqing, 400065, China

School of Information Technology, Deakin University, Melbourne, Victoria, 3125, Australia

Lu-Xing Yang

You can also search for this author in PubMed   Google Scholar

Contributions

Conceptualization: all authors. Writing-original draft: QZ and XL. writing-review & editing: all authors.

Corresponding author

Correspondence to Chengquan Gan .

Ethics declarations

Conflict of interest.

The authors declare no Conflict of interest.

Ethics approval

Additional information, publisher's note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Zhu, Q., Wan, W., Gan, C. et al. Simulating Bluetooth virus propagation on the real map via infectious attenuation algorithm and discrete dynamical system. Iran J Comput Sci (2024). https://doi.org/10.1007/s42044-024-00198-5

Download citation

Received : 12 January 2024

Accepted : 04 June 2024

Published : 25 June 2024

DOI : https://doi.org/10.1007/s42044-024-00198-5

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Bluetooth virus
  • Discrete dynamical system
  • SUMO simulation
  • Infectious attenuation algorithm
  • Population density
  • Security awareness
  • Find a journal
  • Publish with us
  • Track your research

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

paper cover thumbnail

Computer Viruses – from an Annoyance to a Serious Threat

Profile image of murugan paramasivam

Related Papers

Malicious codes are serious threat to our society. The presented work discusses various aspects of technological level, detection, mitigation , identification and Classification of malicious codes. Detection method depicts how various antivirus technologies get used to fight with complex encrypting , decrypting and nature changing virus activities. Antivirus approach consists of waiting for a number of computers to be infected, detecting the virus, designing a solution, delivering and deploying a solution.

research paper about computer viruses

Vishrut Sharma

In this paper, I will present a broad overview of recent worm attacks starting from the year 2000 through 2011. Some of the most ‘notorious’ worms were discovered during this period including code red, slammer, and conficker. Though this paper does not contain any original research, it is meant to provide malware researchers with well-documented information of some worms that caused havoc during the said period. After sifting through thousands of entries on virus information repositories, I present, in this paper, only those that I considered novel in their approach, primarily from a technical perspective. As a summary to the paper, I have presented a broad overview of trends that I extracted from this raw data and also focussed on the ever increasing destructive potential of worms.

joey maravillas

Eugene H Spafford

Engineering Research Publication and IJEAS

Abstract— The computers viruses have been become a challenge for computer architecture and self organizing system. There has been considerable interest in computer viruses since they first appeared in 1981 and increasing day by day as they have reached epidemic numbers in many personal computer environments. Viruses have been written about as a security problem, as a social problem, and as a possible means of performing useful tasks in a distributed computing environment. However, only recently have some scientists begun to ask if computer viruses are not a form of computer architecture- a self-replicating organism. Simply because computer viruses do not exist as organic molecules may not be sufficient reason to dismiss the classification of this form of “vandalware” as a form of life. This research paper starts with a description of how computer viruses operate and their history, and of the various ways computer viruses are structured. It then examines how viruses meet properties associated with life as defined by some researchers in the area of computer architecture and self organizing systems. The paper concludes with some comments directed towards the definition of artificially “alive” systems and experimentation.

Chris Moses

Ozone layer depletion, is simply the wearing out (reduction) of the amount of ozone in the stratosphere. Unlike pollution, which has many types and causes, Ozone depletion has been pinned down to one major human activity. Causes of Ozone Layer Depletion? Natural causes of depletion of ozone layer: Ozone layer has been found to be affected by certain natural phenomena such as Sunspots and stratospheric winds. But this has been found to cause not more than 1-2% depletion of the ozone layer and the effects are also thought to be only temporary. It is also believed that the major volcanic eruptions (mainly El Chichon in 1983 and and Mt. Pinatubo in 1991) has also contributed towards ozone depletion. Man-made causes of depletion of ozone layer: The main cause for the depletion of ozone is determined as excessive release of chlorine and bromine from man-made compounds such as chlorofluorocarbons (CFCs). CFCs (chlorofluorocarbons), halons, CH 3 CCl 3 (Methyl chloroform), CCl 4 (Carbon tetrachloride), HCFCs (hydro-chlorofluorocarbons), hydrobromofluorocarbons and methyl bromide are found to have direct impact on the depletion of the ozone layer. These are categorized as ozone-depleting substances (ODS). Chlorofluorocarbons are released into the atmosphere due to:

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024

A Study on Hazards of Computer Viruses

Computer use is becoming part of our lives every other day however there have been considerable threats of computer viruses in the recent past. Viruses have had adverse effects on data and programs ranging from formatting hard disks, damaging information infrastructure, suddenly restarting machines, deleting or modifying data and in some cases mild effects such as slowing down machines or producing irritating sounds. Viruses have been a major cause for worry especially with the advances in data processing, storage and movement of information technologically. Many computer users and organizations especially the computer intensive organizations have had to invest heavily in dealing with viruses particularly those organizations running the windows platform. These computer viruses have been defined by their characteristics of entry and multiplication without the user’s notice as well as diverting the normal functioning of the computer. This paper seeks to define a virus and explain its related terms such as malicious software, worms, and Trojan horses. It explains vulnerabilities of operating systems in relation to viruses, it makes an observation on strengths of Linux versus Windows, outline the present state of affairs, apart from using anti-virus software, there are other procedures which can help protect against viruses which are also mentioned, the future of computer viruses and the conclusion that the Internet is serving its purpose of interconnecting computer and hence promoting distribution of viruses then makes some recommendations on viruses.

  • Related Documents

Discovering Computer Security Awareness Levels Among U.S. and Chinese Computer Users

Despite the recent increased attention afforded malware by the popular press, there appears to be a dearth in user awareness and understanding of certain aspects of the security paradigm. This chapter presents a comparison of user awareness levels of rootkits, spyware, and viruses between U.S. and Chinese users. The results of a survey of 210 U.S. respondents and 278 Chinese respondents indicate that respondents’ awareness and knowledge of rootkits is well below that of spyware and viruses. Data analysis further reveals that there are significant differences in Chinese and U.S. user perceptions with regard to spyware and computer viruses. However, there is no difference in cross-cultural awareness with regard to rootkits. Due to the ubiquitous nature of the Internet, rootkits and other malware do not yield at transnational borders. An important step to mitigate the threats posed by malware such as rootkits is to raise awareness levels of users worldwide.

INTERNET-BASED PROJECT WORK// Social Sciences: Achievements and Prospects Journal 4(12), 2019/ OEAPS Inc.(Open European Academy of Public Sciences); Chief Editor Mark Freeman - Barcelona, Spain. 16.05.2019: OEAPS Inc., 2019. - pp. 34-40.

Some words about attitudes to technology: many people are afraid of new technology and, with the increasing presence of the Internet and computers, the term technophobe has appeared to refer to those of us who might be wary of these new developments. More recently, the term digital native has been coined to refer to someone who grows up using technology, and who thus feels comfortable and confident with it there is a tendency to call computer users either technophobes or technogeeks ( a term for a technology enthusiast) the truth is that most of us probably fall somewhere between the two extremes. A large part of the negative attitudes teachers have towards technology is usually the result of a lack of confidence, a lack of facilities or a lack of training, resulting in an inability to see the benefit of using technologies in the classroom. It is also often the case that teachers may not be fully in control of their work situations. A teacher may want to use more technology in their teaching, but the school may not have the facilities, or, on the other hand, a teacher may be instructed to start using technology for which they feel unprepared or untrained.

Options for putting CDS/ISIS databases on the internet

PurposeTo review the variety of software solutions available for putting CDS/ISIS databases on the internet. To help anyone considering which route to take.Design/methodology/approachBriefly describes the characteristics, history, origin and availability of each package. Identifies the type of skills required to implement the package and the kind of application it is suited to. Covers CDS/ISIS Unix version, JavaISIS, IsisWWW, WWWISIS Versions 3 and 5, Genisis, IAH, WWW‐ISIS, and OpenIsis.FindingsThere is no obvious single “best” solution. Several are free but may require more investment in acquiring the skills to install and configure them. The choice will depend on the user's experience with CDS/ISIS formatting language, HTML, programming languages, operating systems, open source software, and so on.Originality/valueThere is detailed documentation available for most of these packages, but little previous guidance to help potential users to distinguish and choose between them.

A Normative Framework for Sharing Information Online

People have always shared information through chains and networks of testimony. It is arguably part of what makes us human and enables us to live in cooperative communities with populations greater than 150 or so. The invention of the internet and the rise of social media have turbocharged our ability to share information. This chapter develops a normative epistemic framework for sharing information online. This framework takes into account both ethical and epistemic considerations that are intertwined in typical cases of online testimony. The authors argue that, while the current state of affairs is not entirely novel, recent technological developments call for a rethinking of the norms of testimony, as well as the articulation of a set of virtuous dispositions that people would do well to cultivate in their capacity as conduits (not just sources or receivers) of information.

How Do Home Computer Users Browse the Web?

With the ubiquity of web tracking, information on how people navigate the internet is abundantly collected yet, due to its proprietary nature, rarely distributed. As a result, our understanding of user browsing primarily derives from small-scale studies conducted more than a decade ago. To provide an broader updated perspective, we analyze data from 257 participants who consented to have their home computer and browsing behavior monitored through the Security Behavior Observatory. Compared to previous work, we find a substantial increase in tabbed browsing and demonstrate the need to include tab information for accurate web measurements. Our results confirm that user browsing is highly centralized, with 50% of internet use spent on 1% of visited websites. However, we also find that users spend a disproportionate amount of time on low-visited websites, areas with a greater likelihood of containing risky content. We then identify the primary gateways to these sites and discuss implications for future research.

Anti-WebShell PHP Backdoor Scanner pada Linux Server

Backdoor or commonly also known as web shell is one of the malicious software that hackers use to maintain access systems that they have entered. Relatively few programs like Anti Web-Shell, PHP Backdoor Scanner circulating on the Internet, and can be obtained free of charge to deal with the issues above. But most of these programs have no actual database of signature behavior to deal with PHP backdoor / Shell nowadays. Then comes the contemporary Anti Web-Shell program that can deal with today's backdoor shell. This study uses an experimental method concerning previous similar studies and is implemented directly into the world of cyber security professional industries. By enriching the Regex dictionary signature and String Array Matching the actualized Anti Web-Shell program can detect more backdoor than similar programs that have existed in the past. The results of this study are in the form of a web application software in PHP extension. The application can minimize 100% of false positives and is twice as fast in scanning files because it is more specific in heuristic analysis scan.

The Impact of Operating System on Bandwidth in Open VPN Technology

The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will be generated by the server. An authentication and key exchange will be based on standard protocol SSL/TLS. Various operating systems from open source and windows will be used. Each operating system uses a different hardware specification. Tools such as tcpdump and jperf will be used to verify and measure the connectivity and performance. OpenVPN in the LAN is based on the type of operating system, portability and straightforward implementation. The bandwidth which is captured in this experiment is influenced by the operating system rather than the memory and capacity of the hard disk. Relationship and interoperability between each peer and server will be discussed. At the same time privacy for the user in the LAN can be introduced with a minimum specification.

Computer Virus Models and Analysis in M-Health IT Systems

Computer viruses have been studied for a long time both by the research and by the application communities. As computer networks and the Internet became more popular from the late 1980s on, viruses quickly evolved to be able to spread through the Internet by various means such as file downloading, email, exploiting security holes in software, etc. Epidemiological models have traditionally been used to understand and predict the outcome of virus outbreaks in human or animal populations. However, the same models were recently applied to the analysis of computer virus epidemics. In this work we present various computer virus spread models combined with applications to e-health systems.

Open Source Survey Software

One of the significant advances in software design afforded by the internet has been the open source movement, an effort to collaboratively create software and make it widely and freely available to the online community. Although the open source movement started with Unix-like computer operating systems, it has expanded to include a wide variety of software programs, including tools to publish and analyze online surveys. This article introduces the open source movement and then profiles three leading open source survey programs: php Easy Survey Package (phpESP), PHP Surveyor, and the Moodle course management system.

Information Security as a Community of Practice

This entry concerns a live application in which the principles of communities of practice have been used to supplement the delivery of a critical business process. The company concerned is a multinational pharmaceutical organization with annual sales in the order of £20bn and a workforce of 100,000 employees worldwide. One of the more critical IT services provided is that which defends the organisation’s computer systems against attack by malicious software (commonly called computer viruses). This service draws significant direct and indirect resources to provide an acceptable level of defence for the organization. The service manages the provision of this defence from the gathering of intelligence concerning latest threats through deployment of protective measures to reporting of metrics showing service performance and adequacy of defences.

Export Citation Format

Share document.

research paper about computer viruses

Detection of Virus Using Artificial Intelligence and Machine Learning Concepts

Proceedings of the International Conference on Recent Advances in Computational Techniques (IC-RACT) 2020

5 Pages Posted: 9 Oct 2020

Sai Harshavardhan A.V.N

Amity University, Mumbai

Akash Ranjan

Artificial Intelligence, Department of Computer Engineering, Central Government University - Mizoram; Big Data Analytics , CDAC Pune; Department of Computer Science and Engineering, Amity University Mumbai

Date Written: June 26, 2020

This paper is devoted, to study of recent viruses, detection and prediction of viruses using AI and Machine Learning Techniques. Recently in December 2019 a new virus was discovered named coronavirus. So, to detect this type of viruses in the future and present, we can use AI and Machine Learning concepts for the detection of viruses. Artificial intelligence (AI) research is growing rapidly within the medicine research. In 2016, Artificial Intelligence projects on health care attracted more investment than Artificial Intelligence projects within any other sector of the global economy. It is well, known that in feature we may overcome the different types of new viruses across the city. The detection of the viruses is done with the help of the MS Kinect sensor. This sensor analyses human breathing, and if that person is not able to breathe properly then that person must be suffering from coughing, sneezing, etc. This particular sensor will be fixed at the public places if it identifies the person who is suffering from breathing problems, the person will be sanitized or will be provided with the mask or if it is a serious condition that person will be admitted to the hospital for the treatment. So that the spreading of virus decreases at public places. This sensor can also be used for checking the heartbeat pluses of the humans and animals also. Animals should also be monitoring with their health conditions because there are chances of spreading viruses from animals also.

Keywords: Artificial Intelligence, Machine Learning, MS Kinect sensor, Thermal Scanners Infra-red rays, ’Time of flight’ technology

Suggested Citation: Suggested Citation

Sai Harshavardhan A.V.N (Contact Author)

Amity university, mumbai ( email ), artificial intelligence, department of computer engineering, central government university - mizoram ( email ).

Aizawl, MI Mizoram 796004 India

HOME PAGE: http://mzu.edu.in/

Big Data Analytics , CDAC Pune ( email )

Pune, MA 400049 India

HOME PAGE: http://cdac.in/index.aspx

Department of Computer Science and Engineering, Amity University Mumbai ( email )

Mumbai, MA 410206 India

HOME PAGE: http://www.amity.edu/mumbai/

Do you have a job opening that you would like to promote on SSRN?

Paper statistics, related ejournals, artificial intelligence ejournal.

Subscribe to this fee journal for more curated articles on this topic

Civil Engineering eJournal

Mechanical engineering ejournal, data science, data analytics & informatics ejournal, libraries & information technology ejournal.

IMAGES

  1. (PDF) The Impact of Computer Virus

    research paper about computer viruses

  2. Computer Viruses vs. Biological Viruses Essay Example

    research paper about computer viruses

  3. Computer Viruses / Research Papers / ID: 732212

    research paper about computer viruses

  4. Computer Software for Virus and Malware Protection Free Essay Example

    research paper about computer viruses

  5. The 10 Main Types of Computer Virus and How to Avoid Them

    research paper about computer viruses

  6. SOLUTION: A comprehensive analysis on different types of computer

    research paper about computer viruses

VIDEO

  1. 7. Malware and its types

  2. virus//computer viruses,//computer virus,//ugcnet,#ugcnet,#mandinirikshak

  3. Dangerous computer virus explained

  4. Types of Virus In Computer

  5. Should You Read Research Paper As A COMPUTER SCIENCE Practitioner? #computerscience

  6. VIRUS vs. COMPUTER VIRUS! 🦠

COMMENTS

  1. (PDF) The Impact of Computer Virus

    This paper presents a general overview on evolution of concealment methods in computer viruses and defensive techniques employed by anti-virus products.

  2. Computer viruses: What they are, how they work, how they ...

    A computer virus is a program that replicates itself and spreads to computers with the goal of disrupting or destroying normal computer use. In academic computing, viruses represent a serious problem that costs millions of dollars in losses annually and hinders the free exchange of information so critical to education. Viruses operate in incubation, infection, and destroy phases. The nature ...

  3. 1653 PDFs

    Explore the latest full-text research PDFs, articles, conference papers, preprints and more on COMPUTER VIRUS. Find methods information, sources, references or conduct a literature review on ...

  4. An introduction to computer viruses: Problems and solutions

    The paper has made an attempt to discuss almost all the computer viruses and every possible way of prevention of infection from them. Discover the world's research 25+ million members

  5. Computer viruses: Theory and experiments

    22 Computer Viruses Theory and Experiments Fred Cohen Dept. of Computer Science and Electric Engineering, Lehigh University, Bethlehem, PA 18215, USA, and The Foundation for Computer Integrity Research, Pittsburgh, PA 15217, USA. This paper introduces "computer viruses" and examines their potential for causing widespread damage to computer systems.

  6. [1912.06510] Computer Viruses: The Abstract Theory Revisited

    Download PDF Abstract: Identifying new viral threats, and developing long term defences against current and future computer viruses, requires an understanding of their behaviour, structure and capabilities. This paper aims to advance this understanding by further developing the abstract theory of computer viruses. A method of providing abstract definitions for classes of viruses is presented ...

  7. Decoding the World of Computer Viruses: Types and Proactive ...

    Following the identification of common causes of computer virus assaults, potential remedies are sent to home computer users in an effort to help them combat these attacks and enhance their computer usage going ahead. This research focuses on the stages of computer viruses, their history, working principles and how to prevent them.

  8. Computer viruses: Theory and experiments

    This paper introduces "computer viruses" and examines their potential for causing widespread damage to computer systems. Basic theoretical results are presented, and the infeasibility of viral defense in large classes of systems is shown. Defensive schemes are presented and several experiments are described. Recommended articles.

  9. Computer Viruses, Computer Worms, and the Self-Replication ...

    Computer viruses are almost as old as computers themselves. The first technical paper about computer viruses appeared in 1984 and described a self-replicating computer program that reproduces and spreads automatically. The direct comparison and analogy-building between technical (computer) viruses and biologically effective viruses tempt us ...

  10. A systematic literature review on Windows malware ...

    Furthermore, each selected paper's quality was assessed based on the assessment criteria defined in Section 4. The following are the main contributions of this work. • Extracting and synthesizing relevant information from selected high-quality research papers that were focused on malware detection in Windows desktop devices. •

  11. Viruses, Computer

    Abstract. Viruses can be defined simply as self-replicating programs; however, viruses continue to be maliciously combined with cybercrime, which has become rampant as society grows more dependent on information systems. Most organizations cannot handle the viruses that are reported every day on their own, because these viruses have developed ...

  12. An introduction to computer viruses: problems and solutions

    - The purpose of this paper is to discuss various types of computer viruses, along with their characteristics, working, effects on the computer systems and to suggest measures for detecting the virus infection in a computer system and to elaborate means of prevention., - The author undertook an extensive study and review of the literature ...

  13. Technological Networks and the Spread of Computer Viruses

    Computer viruses and worms are an increasing problem throughout the world. By some estimates 2003 was the worst year yet: Viruses halted or hindered operations at numerous businesses and other organizations, disrupted cash-dispensing machines, delayed airline flights, and even affected emergency call centers. The Sobig virus alone is said to have caused more than $30 billion in damage (1). And ...

  14. (PDF) Computer Viruses and Detection : A review

    Abstract. This paper reviews computer virus and few detection techniques. Computer viruses can wreak havoc to the operations of the computer. A computer virus is a type of malware that is ...

  15. A Comprehensive Study on Malware Detection and Prevention Techniques

    This paper aims to explain and discuss advanced technology used by anti-virus. In this era of the digital world, technology is developing rapidly day by day. Along with technology, Along with the development, cyber risk also increasing; thousands of cyber attacks are taking place every day. Malware (Viruses, worms, Trojans, rootkits, ransomware, Adware, Spyware) is one of the most common cyber ...

  16. Computer Viruses: Principles of Exertion, Occurrence and Awareness

    Computer users, including students, home and corporate users, system administrators, corporate managers, and even the antivirus manufacturers. People with malefic intentions write the viruses to bother innocent users. Many sorts of viruses are boot sector viruses, file viruses, worms, Trojan horses, macro viruses, etc.

  17. Simulating Bluetooth virus propagation on the real map via ...

    Unlike traditional computer virus research, this paper does not seek the system's equilibrium point and calculate the virus's primary replication number \(R_0\). Still, it dynamically demonstrates the influence of model parameter values on the spread of Bluetooth viruses in a discrete-time system.

  18. (PDF) Computer viruses

    This paper presents a description of the major characteristics of disk and network borne viruses for the convenience of library and archival systems administrators.

  19. Computer Viruses

    This research paper starts with a description of how computer viruses operate and their history, and of the various ways computer viruses are structured. It then examines how viruses meet properties associated with life as defined by some researchers in the area of computer architecture and self organizing systems.

  20. PDF The Impact of Computer Virus Attacks and its Detection and ...

    The purposeof this research paper is to introduce to thereaderthe threats that the computer viruses can create ,provide guidelines on how individuals can protect themselves against these viruses. 2. Literatures Survey templates and documents that are contained in the file. According to the researchers, an every. day computer virus

  21. A Study on Hazards of Computer Viruses

    A Study on Hazards of Computer Viruses. International Journal of Advanced Research in Science, Communication and Technology . 10.48175/ijarsct-2107 . 2021 . pp. 206-210. Author (s): Jaishma Kumari B . Sathwik U Shetty . Pushvin Gowda .

  22. (PDF) Review of Viruses and Antivirus Patterns

    This paper reviews the various virus and antivirus patters and. various detection schemes. Keywords: viruses, antiviruses, patterns. GJCST -C Classification: D.4.6 K.6.5. Review ofVi ruses a ...

  23. Detection of Virus Using Artificial Intelligence and Machine ...

    This paper is devoted, to study of recent viruses, detection and prediction of viruses using AI and Machine Learning Techniques. Recently in December 2019 a new virus was discovered named coronavirus. So, to detect this type of viruses in the future and present, we can use AI and Machine Learning concepts for the detection of viruses.

  24. Computer Virus: Their Problems & Major at-tacks in Real Life

    This research paper highlights the phases of computer virus, History of computer virus, working of antivirus software, computer virus detection methods, and parameter for finding best antivirus ...