Analysis on computer network viruses and preventive measures

Similar documents
Study on Computer Network Technology of Digital Library

Problems and Countermeasures of Information Security of Electric. Power Enterprises in China

3.5 SECURITY. How can you reduce the risk of getting a virus?

CERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES

Computer Life (CPL) ISSN: Research on the Construction of Network and Information Security. Architecture in Campus

United Automotive Electronic Systems Co., Ltd Relies on McAfee for Comprehensive Security

Overview. Handling Security Incidents. Attack Terms and Concepts. Types of Attacks

Study on the Current Situation of Information Security and Countermeasures in China

TCM Health-keeping Proverb English Translation Management Platform based on SQL Server Database

International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015)

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

Chapter 10: Security and Ethical Challenges of E-Business

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.

Symantec Client Security. Integrated protection for network and remote clients.

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Study on secure data storage based on cloud computing ABSTRACT KEYWORDS

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and the Case For Automated Sandboxing

Policy recommendations. Technology fraud and online exploitation

MIS5206-Section Protecting Information Assets-Exam 1

Study on data encryption technology in network information security. Jianliang Meng, Tao Wu a

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

Prevx 3.0 v Product Overview - Core Functionality. April, includes overviews of. MyPrevx, Prevx 3.0 Enterprise,

INSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic

Information Security Management Criteria for Our Business Partners

SmartSiren: Virus Detection and Alert for Smartphones. Jerry Cheung, Starsky Wong, Hao Yang and Songwu Lu MOBISYS 2007

NetDefend Firewall UTM Services

HUAWEI TECHNOLOGIES CO., LTD. Huawei FireHunter6000 series

Ryan KS office thesee

Information Security Coding Rule Based on Neural Network and Greedy Algorithm and Application in Network Alarm Detection

The Analysis of Information System Security Issue Based on Economics Wang Jin 1,a, Zhu Yu 2,b

MEMORY AND BEHAVIORAL PROTECTION ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

INSIDE. Integrated Security: Creating the Secure Enterprise. Symantec Enterprise Security

Future-ready security for small and mid-size enterprises

CA Security Management

PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Kaspersky Open Space Security

Chapter 1 B: Exploring the Network

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

Information Security and Cyber Security

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

2. INTRUDER DETECTION SYSTEMS

Application of Nonlinear Later TV Edition in Gigabit Ethernet. Hong Ma

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright Chapter 12 1

Process System Security. Process System Security

Quick Heal AntiVirus for Server. Optimized Antivirus Scanning. Low on Resources. Strong on Technology.

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 1 Introduction to Security

Seqrite Antivirus for Server

Management Information Systems. B15. Managing Information Resources and IT Security

Online Security and Safety Protect Your Computer - and Yourself!

escan Security Network From MicroWorld Technologies Anti-Virus & Content Security

Analysis of Computer Network and Communication System

Management of IT Infrastructure Security by Establishing Separate Functional Area with Spiral Security Model

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

Second International Barometer of Security in SMBs

EXECUTIVE REPORT 20 / 12 / 2006

Technology in Action

Quick Heal AntiVirus Pro. Tough on malware, light on your PC.

2018 By: RemoveVirus.net. Remove A Virus From Your PC In 5 Simple Steps

Intruders. significant issue for networked systems is hostile or unwanted access either via network or local can identify classes of intruders:

SO YOU THINK YOU ARE PROTECTED? THINK AGAIN! NEXT GENERATION ENDPOINT SECURITY

SECURITY & PRIVACY DOCUMENTATION

Antivirus Technology

Course Outline (version 2)

AT&T Endpoint Security

TOP 10 Vulnerability Trends for By Nevis Labs

Malware, , Database Security

How To Remove Personal Antivirus Security Pro Virus Manually

BUFFERZONE Advanced Endpoint Security

Design of Physical Education Management System Guoquan Zhang

The Challenge of Spam An Internet Society Public Policy Briefing

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague

A Review Paper on Network Security Attacks and Defences

Kaspersky Security Network

Network Security Whitepaper. Good Security Policy Ensures Payoff from Your Security Technology Investment

The Case for Office 365 Backup. Uncovering critical reasons why organizations need to backup Office 365 data

Zillya Internet Security User Guide

Symantec Small Business Solutions

Cyber fraud and its impact on the NHS: How organisations can manage the risk

PRINCE GEORGE'S COMMUNITY COLLEGE OFFICE OF INSTRUCTION MASTER COURSE SYLLABUS

Symantec Antivirus Manual Removal Tool Corporate Edition 10.x

Cybersecurity. Overview. Define Cyber Security Importance of Cyber Security 2017 Cyber Trends Top 10 Cyber Security Controls

Information Security Solutions

Introduction. Controlling Information Systems. Threats to Computerised Information System. Why System are Vulnerable?

McAfee Public Cloud Server Security Suite

The Establishment of Large Data Mining Platform Based on Cloud Computing. Wei CAI

Nine Steps to Smart Security for Small Businesses

Secure Network Design Document

State of Israel Prime Minister's Office National Cyber Bureau. Unclassified

CompTIA Network+ Lab Series Network Concepts. Lab 11: Business Continuity - Disaster Recovery

Small Office Security 2. Scan PC for viruses and vulnerabilities

You will discuss topics related to ethical hacking, information risks, and security techniques which hackers will seek to circumvent.

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

A (sample) computerized system for publishing the daily currency exchange rates

Endpoint Protection : Last line of defense?

An Introduction to Virus Scanners

Leading the Digital Transformation from the Centre of Government

ENDPOINT SECURITY STORMSHIELD PROTECTION FOR WORKSTATIONS. Protection for workstations, servers, and terminal devices

Transcription:

International Symposium on Computers & Informatics (ISCI 2015) Analysis on computer network viruses and preventive measures Yongbin ZHU Engineering College, Honghe University, Mengzi 661100, Yunnan, China email: zuybing@163.com Abstract With the emergence of computer networks, information technology has become an indispensable part in people's daily lives, greatly contribute to the progress of human society. However, with the continuous progress of network information technology, network virus has emerged, and has brought and will continue to bring a serious influence on the safety of computer network system and network application. This paper analyzes the characteristics of network virus, harm and mode of transmission, computer network virus prevention and control measures are introduced in detail, for the maintenance of the network environment and strengthen the network security applications to provide the reference. Keywords: network virus; computer network security; virus protection Introduction The rapid development of the popularization of computer and network, enable people to fully into the information age, but also pose new problems at the same time, the computer network security problems. Due to the vulnerabilities of computer networks and ease of attack and other problems as a result of a series of safety problems, such as the job does not run correctly, and even military, social, science and technology, culture and security information stolen; information security has a direct impact on the country's political stability, social security and economic development [1].With the rapid development of Internet, computer virus problems increased gradually, how to solve these problems, safeguard the security of computer systems, received widespread attention. The rapid development of the information society, making people's lives with the help of computer information technology easier, how to prevent computer viruses, and this requires us to step up prevention efforts in the daily life, good safety protective measures, while keeping your computer information technology brings convenience to us, as far as possible with the fewest problems. So how do you prevent virus attacks and address potential security risks, it is the primary tasks of maintenance and management of computer networks [2]. Computer network virus's characteristics and mode of transmission 2015. The authors - Published by Atlantis Press 1378

(1) Features of computer network virus In order to enhance the aesthetics and functionality of the Web page, so as to develop ActiveX and Java technologies. However, the virus program's producers took advantage of these technologies, to infiltrate viruses into personal computers, which lead network virus to born. Network virus use network as a platform in network environments, can be transmitted, enforceability, destructive and can be common triggers such as computer viruses, but also has some new features [3, 4]. a. The fast infection: in a stand-alone environment, the virus can only through the floppy disk, optical disk, USB flash disk and other removable storage devices to infect other computers, but in the network can spread rapidly through the network communication mechanism. b. The wide spread: the spread of the virus very quickly in the network, spread over a large, not only the rapid transmission of all computers within the LAN, but also can spread the virus to the thousands of miles away by a remote workstation in an instant. c. The complex and varied communication: computer viruses on the network, typically by "workstation to the server approach workstation ways of spreading, but forms are complex and diverse. d. It is more difficult to completely remove: viruses on a single computer can sometimes by removing the poison files, low level format the hard disk and other ways to completely remove the virus. In the network, as long as there is a workstation fails to clear, it is possible to make the whole network has been infected; even one workstation removal task has just been completed, it could soon be infected by another machine on the network workstation. e. The damage is large: viruses on network will directly affect the network's work, ranging from reduce speeds, then crash the network, or even damage the server information and years of work to be destroyed at one time. Like other computer viruses, network virus was man-made, its use of network information technology in order to undermine the network and information security for the purpose. In recent years, with continued advances in network technology, network viruses, also in rapid development. At present, a wide variety of common computer virus and network viruses, a type of virus, characterized by regular computer virus there is a big difference. Network viruses spread using network system, network system contains a wide variety of devices, which make it impossible to use the appropriate means to eliminate hidden dangers. However, the Internet in the spread of the virus, which is mediated by networks in the process, if you leave the network, then the network virus could not be spread. But in the current network environment, which is difficult to prevent the spread of viruses for most of them direct presence in online equipment systems, to destroy the integrity of network information, making the whole security of network equipment drops drastically. Portion of the network viruses in online equipment will not affect the security of network information data, but destroy the accessibility of computer network system, which can lead to network device is not working properly.network virus is generated artificially, its appear largely have a very close relationship to 1379

hackers, which use them to modify or destroy the network system, so as to achieve the goal of stealing file information. (2) Computer network virus propagation mode Network viruses have a great impact on the development of computer information technology, can be divided into two categories, namely the worm and Trojan virus. Worm virus replicate itself or a part to all kinds of computer information system via computer networks by e-mail or any other means to disseminate itself, so as to cause harm. Trojan virus is a fake and latent viruses, leaks from the onset of the virus itself to various privacy information. Computer network virus basically has the following kinds of dissemination way [5]: The first is transmitted through a variety of communication software, such as the user in the use of Msn or other instant messaging software, and download the unknown executable program; it will cause the virus intrusion into computer networks. Secondly, the computer network virus can also be spread with the help of the email. In addition to the above two methods, computer network virus can also spread through the website directly, but this mode of transmission needs the help of security vulnerabilities of system or software to threat the computer security. By entering into the internal procedures used by the computer web markup language to change the operating system registry, or on the system resources of all kinds of improper control, and thus to harm the user's computer information. Computer network virus prevention measures In order to enhance the security of computer network, must come to realize the maintenance of the computer network from the two aspects of management and application of technology, operators need to know about a variety of computer virus, and master various preventive measures [6]. In addition, according to the daily operation of computer networks in a variety of situations to develop practical preventive measures, computer networks may be affected by a variety of viruses or system vulnerability to systemic checks, once the existence of security risks, should take immediate measures to maintain. (1) Improve and strengthen the management and technical measures To prevent computer network virus, can begin from the two aspects of management and technology measures. a. Management measures. For the computer network management need to strengthen the operation of computer personnel training, to help them to set up the awareness of computer network security and virus prevention, to know about the means of intrusion and harm of network virus, so as to make them to inhance protection consciousness in the work; according to the specific circumstances of the itself of computer network system, formulate the corresponding executable operation regulations, and strictly in accordance with the requirements of the operation, ensure that policies can obtain the very good implementation; grasping the development trends of network virus in a timely manner, in view of its intrusion methods and technical features, modify and improve the protective measures in a timely manner. 1380

b. Technical measures. Due to the large number of network viruses, a wide range, and spread rapidly, dependent on the network characteristics and traditional computer virus protection is difficult to play an effective role, so it should aim at the propagation and damage link of network virus to take technical measures, can effectively protect the safety of computer network system. (2) Protection against virus attacks For the virus attack mode to establish the multi-level, three-dimensional defense system. Route of transmission for the virus can use close management, for example, to monitor the mail server, prevent virus spread through e-mail. Common anti-virus software and Internet firewall should be installed and fair use, but also to ensure timely upgrades for loopholes to be repaired in order to prevent virus damage the registry and other important information, the data are complete and valid backup. (3) Improve network security a. Proper use of firewalls. A firewall is a network security technology within the network and external network isolation, which provides security by controlling the transmission of information between internal and external networks. A firewall with appropriate setting can filter out most potential threat from external network, avoid the spread of the virus effectively, and minimize the harm of network virus [7]. b. The legal download and install software. Part of the network virus and Trojan hidden in most software programs through camouflage, some users due to negligence download a virus software, however more users for the sake of a little small cheap and go blind to download, a computer system to enable the virus to successfully enter the user equipment and network, infection harm to the network security. c. Timely upgrading software and system. A lot of network virus will use the system and software vulnerability. In general, developers will be timely to update and maintain the development of the product, eliminating loopholes to protect network security. So, should upgrade in time system and the latest version of the software, or is likely to cause vulnerability attack, the network virus caused great harm to the computer system and network security. d. Use the correct command system. The correct use of the system command, communication sometimes can prevent some network virus in a timely manner. For example, some network virus need to be attached to a computer system in some unnecessary procedures can be run, as long as we stop running the program or file, can indirectly prevent network virus operation. e. Secure Internet skill. The rapid development of high-speed expansion of computer and network, more foil a people not perfect Internet skills, most people do not have the knowledge of computer and network of basic security awareness. Causes the network security system exists in name only, not for the computer network security protection. So for this user, to cultivate their good habit of using internet. You can also often see the updated firewall and antivirus software, and prevent access of unknown origin site, the installation is not legitimate software. f. The regular backup of important data. This is an important security measure which ignores most people. Although a lot of people with related 1381

exercises, but because of lazy thinking work, no timely backup. When the computer system and network attacks In time, this method can spread and harm of network virus to a minimum, to minimize the loss. To maintain the security of network is not simple to install antivirus software, but to establish a strict firewall from the thought, eliminated lazy and covet small profits behavior, can effectively protect the network security. Conclusion Because of the openness and vulnerability of computer network system, allowing network viruses can exploit the bugs of system, software and protocols for network attack. The large number of the computer network virus, a wide range, and rapidly spread, has become a major threat to computer network security [8]. With the development of computer technology, to protect the security of computer networks has become particularly important. In the daily maintenance of computer network security, the computer security vulnerabilities should be discovered promptly and take appropriate control measures to control, to protect the computer network security and promote the healthy and rapid development of the computer industry. In order to ensure the security of computer networks, the maintainer need first understand and analyze a variety of viruses, computer network for daily use may suffer from a variety of viruses or other security hazards, to take certain measures to control and prevent ; use a firewall or other type of virus prevention software to protect the operating system, but also uninterrupted and procedures for various software updates; for important data or information do backup; when installing a variety of computer software, be sure to carefully consider, comprehensive screening, the official website or downloaded from the regular channels, so as to avoid the computer network intrusion by a variety of security risks, so as to ensure the normal operation of computer networks. All in all, the computer network security continual emergence of new problems, not only the technical aspects of innovation, but also need to protect the laws and regulations, but also need multi-pronged approach to create synergy; in the rapid development of the Internet today, continue to study new ways to solve this a potential network security problems for people's production and life and consumption provide a healthy and secure network environment. References [1] Han Yang. The Characteristics and Prevention Policies of Network Virus. Computer Engineering, 2003(9). [2] Wang Xiguang. Current Situation and Development Trend of computer viruses Almost [J]. Computer Knowledge and Technology, 2010 (12). [3] Guo Lina. The damage and control technique of computer network virus. Read count (Teacher): Quality Education Forum, 2014 (26) 263. 1382

[4] Xi Xiaohong. Discussion on computer viruses and preventive measures[j]. Sci-Tech Information Development & Economy, 2010 (35). [5] Han Yang, Li June. The characteristics and prevention policies of network virus [J]. Computer Engineering, 2003 (1) 6-7. [6] Xu Yansheng. Computer network safety and network virus prevention. Consumer Electronics Review, 2014 (10): 150. [7] Li Shaobiao. Study on the Countermeasures of network virus and characteristics of computer network security risks. Silicon Valley, 2014 (9). [8] Zhang Yuwen. Characteristics of computer viruses, harm and prevention research. Computer CD Software and Application, 2013 (10). 1383