Essays /

Antivirus With Web Connectivity Autosaved Essay

Essay preview

A
Project Report
On
ANTIVIRUS WITH WEB CONNECTIVITY
Submitted
For CASE LAB- IV th Sem of
Bachelor of Technology
In
Computer Engineering

Submitted To: Submitted By:
Prof. Dr. K. S. Raghuwanshi Nishant Jain
Head of Department Roll no.:13EAICS090

Department of Computer Science & Engineering/Information Technology Arya Institute of Engineering & Technology, Jaipur
Rajasthan Technical University, Kota
[2013-17]
Acknowledgement
We would like to first of all express our thanks to Dr. Arvind Agarwal, Chairman of Arya Main Campus, for providing us such a great infrastructure and environment for our overall development. We express sincere thanks to Dr. R. C. Bansal, the Principal of AIET, for his kind cooperation and extendible support towards the completion of our project. Words are inadequate in offering our thanks to Prof. Dr. K. S. Raghuwanshi, H.O.D of CSE/IT Department, for consistent encouragement and support for shaping our project in the presentable form. We wish to express our deep sense of gratitude to our Project Guide Mr. Abhishek Jain, for guiding me from the inception till the completion of the project. We sincerely acknowledge him for giving his valuable guidance, support for literature survey, critical reviews and comments for our Project. We also like to express our thanks to all supporting CSE faculty members who have been a constant source of encouragement for successful completion of the project. Also our warm thanks to Arya Institute of Engineering & Technology, who provided us this opportunity to carryout, this prestigious Project and enhance our learning in various technical fields.

Nishant Jain
Roll. No -13EAICS090
.

i
ABSTRACT
Antivirus software is one of the most widely used tools for detecting and stopping malicious questionable and unwanted files. However, the long term effectiveness of traditional host-based antivirus is. Antivirus software fails to detect many modern threats and its increasing complexity has resulted in vulnerabilities that are being exploited by malware. These limitations motivate a fundamentally new deployment model for malware detection provided by antivirus software. We advocate a new model for malware detection on end hosts based on providing antivirus as an in-cloud network service. This new model provides several important benefits: Better detection of malicious software: Antivirus engines have complementary detection capabilities and a combination of many different engines can improve the overall identification of malicious and unwanted software. This model enables identification of malicious and unwanted software by multiple, heterogeneous detection engines in parallel, a technique we term N-version protection. Eliminating the impact of antivirus vulnerabilities: By moving the complexity of antivirus engines to the network service and isolating the engines within virtualized environments, CloudAV eliminates the impact of the numerous vulnerabilities present in antivirus engines that may be leveraged by an attacker to compromise a host. Retrospective detection of previously infected hosts: When signature updates are received, previously analysed files can be re-scanned, allowing the detection of malicious software and identification of hosts that have been infected by them. Enhanced forensics capabilities: Information about what hosts accessed what files provides an incredibly rich database of information for forensics and intrusion analysis. Such information provides temporal relationships between file access events on the same or different hosts. ii

Table of Content
Cover Page
Acknowledgement………………………………………………………….(i) Abstract…………………………………………………………………….(ii) Table of content…………………………………………………………....(iii) List of Abbreviations………………………………………………………(v) List of Figure……………………………………………………………….(vi) List of Tables……………………………………………………………….(vii) Chapter 1 Introduction (01)

1.1 Purpose of the project……………………………….(01)
1.2 Existing system………………………………………(03)
1.3 Proposed system……………………………………..(04)
1.4 Limitation of system…………………………………(05) Chapter 2 Literature Survey (06)
2.1 History………………………………………………..(06)
2.2 Existing websites……………………………………..(08) Chapter 3 Feasibility Analysis (10)
3.1 Risk analysis………………………………………….(11) 3.2 Schedule………………………………………………(13) Chapter 4 Requirement Analysis (14)
4.1 Functional requirement……………………………..(14) 4.2 Non-Functional requirement………………………..(16)

iii
Chapter 5 System Analysis & Design (18) 5.1 System Analysis………………………………………(18) 5.2 System Design………………………………………...(19) 5.2.1. E-R diagram……………………………………….(19)

5.2.2. DFD………………………………………………...(20)
5.2.3. UML diagram…………………………………….. (23) Chapter 6 Testing & Maintenance (30)
6.1 Cases of testing……………………………………….(30) 6.2 Maintenance………………………………………….(34) Conclusion (37)
Summary…………………………………………...(37) Future Scope……………………………………….(37) References: (38)

iv
LIST OF ABBREVIATIONS

S NO.
ABBREVIATION
FULL FORMS
01
CASE
Computer aided software engineering
02
AV
Antivirus
03
ERD
Entity relationship diagram
04
DFD
Data flow diagram
05
VIRUS
Vital Information Resource Under Siege
06
CLOUDAV
Cloud Antivirus
07
AMD
Advanced Micro Devices
08
CA
Computer Associates
09
DB
Database
10
UML
Unified Modelling Language
11
USB
Universal Serial Bus
12
PC
Personal Computer
13
OEM
Original Equipment Manufacture

v
LIST OF FIGURE

S NO.
FIG. NO.
FIG. NAME
PAGE NO.
01
Fig. 5.2.1
Entity relationship diagram
19
02
Fig. 5.2.2.1
Level-0 DFD
20
03
Fig. 5.2.2.2
Level-1 DFD
21
04
Fig. 5.2.2.4
Level-2 DFD
21
05
Fig. 5.2.3.1
Class diagram
22
06
Fig. 5.2.3.2
Object diagram
23
07
Fig. 5.2.3.3
Activity diagram
24
08
Fig. 5.2.3.4
Use case diagram
25
09
Fig. 5.2.3.5
State chart diagram
26
10
Fig. 5.2.3.6
Collaboration diagram
27
11
Fig. 5.2.3.7
Component diagram
28
12
Fig. 5.2.3.8
Deployment diagram
29

vi
LIST OF TABLES

TABLE NO.
NAME
PAGE NO.
Table 01
Project risk
11
Table 02
Product risk
12
Table 03
Business risk
12
Table 04
Schedule
13
Table 05
Login
30
Table 06
New user
30
Table 07
User Details
32
Table 08
Payment
33
Table09
Mail
33

vii
CHAPTER 1
INTRODUCTION
A life without computers cannot be imagined in the present life style where it plays a very important role though it might be any field one chooses from the millions. Computer is vulnerable to attacks which are most dangerous and hard to handle with. Just like humans even computers are attacked by "viruses". A virus can be in a form of worm, malware or Trojan horses anything that infects the computer. The common source of these viruses is World Wide Web where a malicious person can spread the malware very easily. Many researchers found many methods or procedures to stop the attacks of virus that came up with many techniques or software to remove the viruses which are called "Anti-Virus" software. A computer virus spreads into the computer through emails, floppy disks, internet and many other sources. The spreading mechanism is usually from one computer to another where it corrupts data or deletes the data from the computer. The viruses mostly spread through internet or through emails which may have some hidden illicit software where the user unknowingly downloads the material into the computer. A virus can attack or cause damage to boot sector, system files, data files, software and also on system bios. There are many newer viruses which attack on many other parts of the computer. Viruses can spread by booting the computer using the infected file, executing or installing th...

Read more

Keywords

-0 -1 -13 -17 -2 -2013 -28 01 02 03 04 05 06 07 08 09 1 1.1 1.2 1.3 1.4 1.5 10 10mbps 11 12 12c 13 13eaics090 14 15 16 17 18 18th 19 1949 1970 1980s 1983 1984 1987 1988 1992 1994 1997 2 2.1 2.1.1 2.2 2.2.1 2.2.2 2.2.3 2.2.4 20 2000 2001 2004 2005 2007 2011 2013 2014 2015 21 22 23 24 25 250 26 27 28 29 3 3.1 3.1.1 3.1.2 3.1.3 3.2 3.2.1 3.2.2 3.2.3 3.2.4 3.3 3.4.1 30 32 33 34 37 38 4 4.1 4.1.1 4.1.2 4.1.3 4.1.4 4.1.5 4.1.6 4.1.7 4.1.8 4.2 4.2.1 4.2.2 4.2.3 4.2.4 4.2.5 4.9 42.8.2345 5 5.1 5.2 5.2.1 5.2.2 5.2.2.1 5.2.2.2 5.2.2.4 5.2.3 5.2.3.1 5.2.3.2 5.2.3.3 5.2.3.4 5.2.3.5 5.2.3.6 5.2.3.7 5.2.3.8 512 6 6.1 6.1.1 6.1.4 6.1.5 6.2 6.2.1 6.2.1.1 6.2.1.2 6.2.1.3 6.2.1.4 60 61 7 8 8date 8field 9 a6 abbrevi abhishek abl abstract academ access accord account accur achiev acknowledg acquaint across act activ ad add addit address administ administr adopt advanc advantag advertis advisor advoc adwar affect agarw age agent ahead aid aiet aim algorithm alia allow along also alway always-on amd american analaysi analys analysi anlaysi annal anoth anti anti-malwar anti-spywar anti-virus anti4us antivirus anyth applet applic approach aren art arvind arya ask aspect associ atari attach attack aug authent automat automata autosav av avail avoid bachelor background backup bad bandwidth bank bansal base basic becam becom began behaviour benefit bernd best better bio birth bitdefend bitnet/earn block bodi book boot box brand breach brief broadband brows browser budget build built bundl bus busi button buy c ca calcul california call came campus cancel cannot capabl card carri carryout case catastroph cater caus cd central chairman challeng chanc chang chapter chart check checker chen choic choos chrome cis citi claim clara class clear click client clock cloner cloud cloudav code coder cohen collabor collect combin come comment commerci common compact compani compar comparison compet competitor complementari complet complex complic compon compris compromis comput concentr concept concern conclus condit configur confirm connect consist constant constraint consum content continu contract control conveni cooper copi core corpor corrupt cost could couldn countri coupl cours cover creat creation credit creeper criteria critic crowd cse cse/it current custom daili damag danger data databas date day db db-schedul debug dec dedic deep default defend defens defin definit delawar delet deliv deliveri demonstr depart depend deploy describ descript design destin destroy detail detect develop devic dfd diagram differ difficult direct directori disadvantag discoveri discuss disk distribut divis dob document done download dr drawback drive drop dropdown durat dynam e e-mail e-r eaics090 earli easi easili easy-to-us econom effect effici effort either electr elimin elk email embed enabl encourag encrypt encyclopaedia end engin engineering/information enhanc enough enter enterpris entiti environ equip erd error erwin essenti etc eugen even event ever everi evolut evolv excus execut exist exit expens experi experiment explain exploit explor express extend extern f5 facil faculti fail fast faster feasibl featur februari feedback field fig figur file fill filter final find finish firefox firewal first fit fix fixed-s floppi flow flushot folder follow forens form format found founder framework fred frequent fulfil full function fund fundament futur g gateway gender general generat get ghz give given global go good googl govern graphic gratitud great greenberg group growth guardian guest guid guidanc h.o.d habit half handl hard hardwar harm head headquart held help henc henceforth heterogen heurist hidden high higher highlight histori home home.aspx homepag horribl hors host host-bas hour howev huge human i3 id identif identifi ieee ignor ii iii illicit imag imagin impact implement implic import improv in-cloud inabl inadequ inc incept includ incompat incorpor increas incred inetpub infect infinit inform infrastructur infrequ initi innov input insid instal institut integr intel intend interact interfac internet interoper introduct intrus invalid involv isol issu iv jain jaipur java jean jean-marc job john juli june k kasperski keep key kind kit know knowledg kota l lab label lack languag lant laptop larg largest last later latest latter launch learn least leav led less let letter level leverag librari life lifehack lighter lightweight like limit line linkag list literatur load log login logon long low machin macro made mail main maintan mainten major make malici malwar manag mani manipul manpow manual manufactur marc market match materi may mb mcafe meant measur mechan media medium meet meltzer member memori memoriam menu merger messag metcalf method methodolog micro microsoft mid mid-1980s middl might mile million mind minim minut mobil model moder modern modif modul monitor month most motiv move mozilla mr msdnaa much multipl must n n-version name nation navig necessari need net netscap network neumann new newer next nishant node non non-execut non-funct non-techn norm norton nov novemb nowaday null number numer object occupi oct oem offer offici offload often old one onlin open oper opportun optim option oracl order organ origin ostens otherwis outlook outsid overal own p.a packag page panel paper parallel paramet part particular pass password past path pay payment pc peopl per perfect perform period perman person persona phillip phish phone pick piec pile place plan platform play plus pop pop-up popul possibl potenti power prefer prepar present prestigi prevent preview previous primari princip printer prioriti privaci privat probabl problem procedur process processor product prof profession profil program programm progress project properti propos protect prototyp provid public publish purpos put péter quarantin queri question r raghuwanshi rais rajasthan rapid rate rather re re-scan re-schedul read readi real realli reaper reason receiv recogn record recoveri recreat reduc refer regard regist registr relat relationship releas reliabl remov rent reoccur report reproduc reproduct request requir rescan reschedul research resign resourc respond respons result retail retriev retrospect return review rich rid right risk robert role roll romania romania-bas root rootkit ross routin run safe safer safeti salari santa sarah save scale scan scanner scenario schedul scienc scope scourg script sdk search second section sector secur see select self self-reproduc self-reproduct sem send sens sent sep serial serous serv server servic servlet session set set-up setup sever sex shall shape share show shown side sieg sign signatur simpl simul simultan sinc sincer singl site size skill sky slow small smooth societi soft softwar sold sole solut solv someth sort sourc space spam spawn specif speed spread spywar st staff start state stationari status stay step still stop storag strategi studi studio style subject submit subscript subsidiari success suit suitabl summari support sure surf survey suspect suspici symantec system szőr tabl table09 take taken target team technic techniqu technolog tedious telephon tempor term termin test tester text th thank theori therefor thesi thoma thorough though thought threat three thus till time toler tom tomcat tool top total tough toward tradit transfer transmiss travers trend tri trojan tune two type typic uml unabl understand unifi univers unknow unlimit unpack unsaf unwant updat upload us usabl usag usb use user user/customer usernam usual util uvk v valid valu valuabl vari varieti various version vi video view vii viii virtual virus virus-l virusbulletin visual vital volum von vulner wait walk wallet want wap war warm warn water way web web-serv web-sit web.config websit week well whenev wherebi whether wholli wide wider widespread wild win window wish within without wizard word work workstat world worm would wouldn write writer written wwwroot year yes youtub zero zero-day