Вы находитесь на странице: 1из 5

Major Project Synopsis On

Virus Detection
By RAKESH DUGAR (2008-311-035)

B.Tech IT (Sem 8 )
th

Supervisor: Mrs Farheen siddiquie Asst. Professor

Page 1 of 5

INTRODUCTION

Antivirus or anti-virus software is used to prevent, detect, and remove malware, including but not limited to computer viruses, computer worm, trojan horses, spyware and adware. The software used for the prevention and removal of such threats, rather than computer security implemented by software methods. A variety of strategies are typically employed. Signature-based detection involves searching for known patterns of data within executable code. However, it is possible for a computer to be infected with new malware for which no signature is yet known. Some antivirus software can also predict what a file will do by running it in a sandbox and analyzing what it does to see if it performs any malicious actions. No matter how useful antivirus software can be, it can sometimes have drawbacks. Antivirus software can impair a computer's performance. Inexperienced users may also have trouble understanding the prompts and decisions that antivirus software presents them with. An incorrect decision may lead to a security breach. If the antivirus software employs heuristic detection, success depends on achieving the right balance between false positives and false negatives. False positives can be as destructive as false negatives. Finally, antivirus software generally runs at the highly trusted kernel level of the operating system, creating a potential avenue of attack.

Page 2 of 5

OBJECTIVE
After understanding the problem and a clear objective, we actually defined the scope of application by formulating the functions that it would perform. It has the following objectives:-

Prevention from Malicious Software


Most PCs are affected by boot-sector viruses and worms. This is caused by introduction of foreign storage devices into the computer without virus scans or firewall protection for the computer. The antivirus policy intends to reduce this crisis by ensuring prevention of the PC from damage by malware. The user has the sole responsibility of ensuring that their PC is shielded by use of continuously updated antivirus and protection software.

Email and File Attachment Malware Scanning


Both email and files that are transferred or introduced to the PC are prone to malware. Their exposure to continuous transfers of data exposes them to malware that may destroy normal flow of data. Scanning of both email and file attachment is an objective that reduces their risks of being infected with viruses or other malware.

Network Protection New software in a network should be scanned and checked before it is used. This ensures that all the PCs in the network are protected from exploits by malicious software that may be tagged onto them from files or email attachments. This objective protects all computers in the network or even mobile computers that are introduced to the network.

Page 3 of 5

SOFTWARE REQUIREMENT SPECIFICATION

1. Introduction
1.1. Purpose The main purpose of our algorithm is to detect the viruses and not to include the genuine files into the list. 1.2. Document Conventions The following are the list of conventions and acronyms used in this document and the project as well:

1.3 SCOPEThis work represents a prototype of a virus detection system. Therefore there is a lot of work that could still be done from both a research point of view and from a commercial point of view. 2 Product Features: 2.1 Operating Environment

The product will be operating in windows XP environment. 2.2 Design and Implementation Constraints The Product is developed using C at front end. 2.3 Assumptions and Dependencies

3. System Features
13.1 Stimulus / Response Sequences Responses for User: Page 4 of 5

3.2. Functional Requirements This section gives the list of Functional and non functional requirements which are applicable to the Security Tools Product. 3.2.1 Interface Requirements This section describes how the software interfaces with other software products or users for input or output.

3.2.1.1UserInterfaces
Describes how this product interfaces with the user. GUI Describe the graphical user interface if present.

4. Non Functional Requirements


4.1. Hardware Interface Operating System: Windows XP,2000,98. Processor: Pentium 3.0 GHz or higher RAM: 256 Mb or more Hard Drive: 125 MB or more. 4.2. Software Interfaces Application: ANSI C 4.3. Communications Interfaces Dialup Modem of 52 kbps Broadband Internet Dialup or Broadband Connection with a Internet Provider. EXPECTED RESULT At the end of the project we will be able to find out different viruses in the system and can remove them.

Page 5 of 5

Вам также может понравиться