Studying and Classification of the Most Significant Malicious Software
As the cost of information processing and Internet accessibility falls, most organizations are becoming increasingly vulnerable to potential cyber threats which its rate has been dramatically increasing every year in recent times. In this paper, we study, discuss and classify the most significant malicious software: viruses, Trojans, worms, adware and pornware which have made step forward in the science of Virology.
đĄ Research Summary
The paper attempts to give a broad overview of the most significant types of malicious softwareâviruses, Trojans, worms, adware and pornwareâby tracing their historical development, describing their technical characteristics, and proposing a classification scheme. The introduction frames the problem: as computing costs fall and Internet access expands, organizations and ordinary users become increasingly exposed to cyberâthreats that jeopardize confidentiality, integrity and availability.
In the âTheory of Computer Virusesâ section the authors recount the theoretical origins of selfâreplicating code, citing Fred Cohenâs 1983 dissertation that coined the term âcomputer virus,â earlier work by John vonâŻNeumann on selfâreproducing automata, and Lionel Penroseâs and Frederick Stahlâs experimental implementations on IBMâ650. They argue that these academic studies unintentionally laid the groundwork for later malicious programs.
The historical narrative (SectionâŻIII) proceeds chronologically from the early 1970s Creeper worm on ARPANET, through the 1980s ElkâŻCloner (AppleâŻII) and Brain (the first IBMâcompatible bootâsector virus), to the infamous 1988 Morris Worm that exploited UNIX vulnerabilities on VAX and Sun machines. The authors then discuss the wave of highâimpact worms in the early 2000sâCodeRed, Nimda, Aliz, BadtransâŻII (2001), the 2003 Slammer (SQLâServer fileâless worm) and Lovesan (Windows RPC DCOM exploit), the 2004 Bagle, Mydoom and Sasser families, and the 2008â2009 Conficker/Kido/Downadup outbreak that leveraged the MS08â067 vulnerability. Throughout they note the shift from simple file infection to networkâwide denialâofâservice attacks, credential theft, and the emergence of âbootkitsâ and mobileâoriented malware such as Cabir.
SectionâŻIV tackles definitions and taxonomy. The authors point out the difficulty of giving a precise virus definition, noting that modern antiâvirus products often treat any malware as a âvirus.â They propose a functional definition of malware as software that damages information, abuses network resources, or disrupts normal operation. Within this framework they classify viruses by infection target (bootâsector, file, macro, script) and describe representative examples (e.g., Virus.WinâŻ9x.CIH, Macro.Word97, Virus.VBS.Sling). Worms are defined as networkâpropagating programs that can operate autonomously; they are further divided by propagation channel (network, email, IRC, P2P, instantâmessenger). Trojans are characterized as nonâreplicating payload carriers that rely on other malware or user action for delivery; their lifeâcycle consists of penetration, activation, and execution of malicious functions.
A substantial part of the taxonomy is devoted to Trojans, using Kaspersky Labâs threeâdimensional model based on violations of confidentiality, integrity, and availability. The paper lists concrete families: Backdoor, PSW, Spy, Banker, GameThief, MailFinder (confidentiality); Clicker, Downloader, Dropper, Proxy, Notifier, IM, SMS, Rootkits (integrity); DDoS, Ransom, ArcBomb (availability). The authors also discuss adware and pornware as âindirectâ threats that do not directly damage systems but force unwanted advertising or connect users to paid adult sites; they note a surge in such behavior after 2004.
The conclusion acknowledges that the survey cannot cover every global threat but claims to capture the most current trends. It emphasizes the âtriangleâ of hacker, antiâvirus vendor, and user, identifying the endâuser as the weakest link. The authors argue that continuous user education and upâtoâdate threat intelligence are essential for effective protection.
Overall, despite numerous typographical errors, inconsistent citations, and a lack of rigorous methodology, the paper provides a highâlevel historical timeline and a taxonomy that can serve as a starting point for readers new to the field of malware research.
Comments & Academic Discussion
Loading comments...
Leave a Comment