Essay preview
A
Project Report
On
ANTIVIRUS WITH WEB CONNECTIVITY
Submitted
For CASE LAB- IV th Sem of
Bachelor of Technology
In
Computer Engineering
Submitted To: Submitted By:
Prof. Dr. K. S. Raghuwanshi Nishant Jain
Head of Department Roll no.:13EAICS090
Department of Computer Science & Engineering/Information Technology Arya Institute of Engineering & Technology, Jaipur
Rajasthan Technical University, Kota
[2013-17]
Acknowledgement
We would like to first of all express our thanks to Dr. Arvind Agarwal, Chairman of Arya Main Campus, for providing us such a great infrastructure and environment for our overall development. We express sincere thanks to Dr. R. C. Bansal, the Principal of AIET, for his kind cooperation and extendible support towards the completion of our project. Words are inadequate in offering our thanks to Prof. Dr. K. S. Raghuwanshi, H.O.D of CSE/IT Department, for consistent encouragement and support for shaping our project in the presentable form. We wish to express our deep sense of gratitude to our Project Guide Mr. Abhishek Jain, for guiding me from the inception till the completion of the project. We sincerely acknowledge him for giving his valuable guidance, support for literature survey, critical reviews and comments for our Project. We also like to express our thanks to all supporting CSE faculty members who have been a constant source of encouragement for successful completion of the project. Also our warm thanks to Arya Institute of Engineering & Technology, who provided us this opportunity to carryout, this prestigious Project and enhance our learning in various technical fields.
Nishant Jain
Roll. No -13EAICS090
.
i
ABSTRACT
Antivirus software is one of the most widely used tools for detecting and stopping malicious questionable and unwanted files. However, the long term effectiveness of traditional host-based antivirus is. Antivirus software fails to detect many modern threats and its increasing complexity has resulted in vulnerabilities that are being exploited by malware. These limitations motivate a fundamentally new deployment model for malware detection provided by antivirus software. We advocate a new model for malware detection on end hosts based on providing antivirus as an in-cloud network service. This new model provides several important benefits: Better detection of malicious software: Antivirus engines have complementary detection capabilities and a combination of many different engines can improve the overall identification of malicious and unwanted software. This model enables identification of malicious and unwanted software by multiple, heterogeneous detection engines in parallel, a technique we term N-version protection. Eliminating the impact of antivirus vulnerabilities: By moving the complexity of antivirus engines to the network service and isolating the engines within virtualized environments, CloudAV eliminates the impact of the numerous vulnerabilities present in antivirus engines that may be leveraged by an attacker to compromise a host. Retrospective detection of previously infected hosts: When signature updates are received, previously analysed files can be re-scanned, allowing the detection of malicious software and identification of hosts that have been infected by them. Enhanced forensics capabilities: Information about what hosts accessed what files provides an incredibly rich database of information for forensics and intrusion analysis. Such information provides temporal relationships between file access events on the same or different hosts. ii
Table of Content
Cover Page
Acknowledgement………………………………………………………….(i) Abstract…………………………………………………………………….(ii) Table of content…………………………………………………………....(iii) List of Abbreviations………………………………………………………(v) List of Figure……………………………………………………………….(vi) List of Tables……………………………………………………………….(vii) Chapter 1 Introduction (01)
1.1 Purpose of the project……………………………….(01)
1.2 Existing system………………………………………(03)
1.3 Proposed system……………………………………..(04)
1.4 Limitation of system…………………………………(05) Chapter 2 Literature Survey (06)
2.1 History………………………………………………..(06)
2.2 Existing websites……………………………………..(08) Chapter 3 Feasibility Analysis (10)
3.1 Risk analysis………………………………………….(11) 3.2 Schedule………………………………………………(13) Chapter 4 Requirement Analysis (14)
4.1 Functional requirement……………………………..(14) 4.2 Non-Functional requirement………………………..(16)
iii
Chapter 5 System Analysis & Design (18) 5.1 System Analysis………………………………………(18) 5.2 System Design………………………………………...(19) 5.2.1. E-R diagram……………………………………….(19)
5.2.2. DFD………………………………………………...(20)
5.2.3. UML diagram…………………………………….. (23) Chapter 6 Testing & Maintenance (30)
6.1 Cases of testing……………………………………….(30) 6.2 Maintenance………………………………………….(34) Conclusion (37)
Summary…………………………………………...(37) Future Scope……………………………………….(37) References: (38)
iv
LIST OF ABBREVIATIONS
S NO.
ABBREVIATION
FULL FORMS
01
CASE
Computer aided software engineering
02
AV
Antivirus
03
ERD
Entity relationship diagram
04
DFD
Data flow diagram
05
VIRUS
Vital Information Resource Under Siege
06
CLOUDAV
Cloud Antivirus
07
AMD
Advanced Micro Devices
08
CA
Computer Associates
09
DB
Database
10
UML
Unified Modelling Language
11
USB
Universal Serial Bus
12
PC
Personal Computer
13
OEM
Original Equipment Manufacture
v
LIST OF FIGURE
S NO.
FIG. NO.
FIG. NAME
PAGE NO.
01
Fig. 5.2.1
Entity relationship diagram
19
02
Fig. 5.2.2.1
Level-0 DFD
20
03
Fig. 5.2.2.2
Level-1 DFD
21
04
Fig. 5.2.2.4
Level-2 DFD
21
05
Fig. 5.2.3.1
Class diagram
22
06
Fig. 5.2.3.2
Object diagram
23
07
Fig. 5.2.3.3
Activity diagram
24
08
Fig. 5.2.3.4
Use case diagram
25
09
Fig. 5.2.3.5
State chart diagram
26
10
Fig. 5.2.3.6
Collaboration diagram
27
11
Fig. 5.2.3.7
Component diagram
28
12
Fig. 5.2.3.8
Deployment diagram
29
vi
LIST OF TABLES
TABLE NO.
NAME
PAGE NO.
Table 01
Project risk
11
Table 02
Product risk
12
Table 03
Business risk
12
Table 04
Schedule
13
Table 05
Login
30
Table 06
New user
30
Table 07
User Details
32
Table 08
Payment
33
Table09
Mail
33
vii
CHAPTER 1
INTRODUCTION
A life without computers cannot be imagined in the present life style where it plays a very important role though it might be any field one chooses from the millions. Computer is vulnerable to attacks which are most dangerous and hard to handle with. Just like humans even computers are attacked by "viruses". A virus can be in a form of worm, malware or Trojan horses anything that infects the computer. The common source of these viruses is World Wide Web where a malicious person can spread the malware very easily. Many researchers found many methods or procedures to stop the attacks of virus that came up with many techniques or software to remove the viruses which are called "Anti-Virus" software. A computer virus spreads into the computer through emails, floppy disks, internet and many other sources. The spreading mechanism is usually from one computer to another where it corrupts data or deletes the data from the computer. The viruses mostly spread through internet or through emails which may have some hidden illicit software where the user unknowingly downloads the material into the computer. A virus can attack or cause damage to boot sector, system files, data files, software and also on system bios. There are many newer viruses which attack on many other parts of the computer. Viruses can spread by booting the computer using the infected file, executing or installing th...