3
International Journ Internat ISSN No: 245 @ IJTSRD | Available Online @ www Fo Lecturer (Senior Nachimuthu Po ABSTRACT This Project “Foray spotlight system” protecting the Computer from Malware real time project and system security so is used to identify the malicious a computer. Malwares are the main computers. Once it enters into the co corrupt the files. Foray spotlight system antivirus software. It detects malwar antivirus software’s, but it has some m advantages. Malwares are easily spr computer at the time of connecting devices like Pen-drive, Card reader, e various steps to clear malwares. First i malware and asks the user whether to d If the user chooses destroy option it w or else choose track option for tracking If it is able to track, then it will clear the is unable to track, it will block the file graphical interface than the antiviru Additional feature like auto boost techn the performance of the system. It i removes the unwanted running pro Malwares detection method is more other system protecting software. Keyword: Malvares, Threads, Pen drive I. INTRODUCTION This project is used to detect and delet the system .It consists of 3 types of sc customs scan, full scan and quick scan. T special feature that it will automaticall memory in a particular drive. All thes integrated within the project .The m required for this project is below 3MB. virus is user-friendly and the Graphical is also very clear and easy to use. Spar database to identify and detect the va nal of Trend in Scientific Research and De tional Open Access Journal | www.ijtsr 56 - 6470 | Volume - 2 | Issue – 6 | Sep w.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct oray Spotlight System Mrs A. Nalini r Grade), Department of Computer Engineering, olytechnic College, Pollachi, Tamil Nadu, India ” is used for attacks. It is a oftware which activities in a problem for omputer it will m acts like an res like other more additional read over the g the external etc. and it has it checks for a destroy or not. will destroy file g for malware. e malware. If it e. It has more us software’s. nology increase identifies and rograms. This effective than e, auto boost te the virus in cans. They are This also has a lly free up the se features are memory space .Spartans anti- User Interface artans have big arious types of virus. Uploading and modifyin in Spartans. It has boost u running virus and boost up system. Most important function of an engine. It scans the informatio detected, it disinfects them. T scanned in different ways. Size: it can easy detect if the f Some viruses append their m of the file. An antivirus scann and compares it before and a modification done by the user is some malicious activity runn Pattern Matching: every viru that they use to infect the fi signature could be some line that overwrite the stack point new line of code. An antiviru information with a virus datab information matches any of t antivirus shows that the file is Heuristic: if any informat dangerous and without know virus or not? This method scanning. It analyse that how and comparing it with the list For e.g. if an antivirus program is trying to open every EXE fi infecting it by writing a copy into it. So an antivirus progra and declares it a dangerous ac of virus and sound the alarm weather the danger should be e evelopment (IJTSRD) rd.com p – Oct 2018 2018 Page: 1078 , ng the virus can be done up tool that detect the the performance of the ny antivirus is virus scan on and if the viruses are The information can be file is infected or altered. alicious code at the end ner (scan engine) scans it after sizes. If there is no r so it suspects that there ning. us has a unique signature iles or computers. This es in assembly language ter and then jump to the us program compares the base (virus signature). If he virus signatures then infected by the virus. tion being scanned is wing that is it contains a is known as heuristic w an information acting t of dangerous activities. m notices that a program ile on your computer and of the original program am detects this program ctivity or unknown type m. Then it is up to user eliminated or not.

Foray Spotlight System

  • Upload
    ijtsrd

  • View
    13

  • Download
    0

Embed Size (px)

DESCRIPTION

This Project Foray spotlight system is used for protecting the Computer from Malware attacks. It is a real time project and system security software which is used to identify the malicious activities in a computer. Malwares are the main problem for computers. Once it enters into the computer it will corrupt the files. Foray spotlight system acts like an antivirus software. It detects malwares like other antivirus softwares, but it has some more additional advantages. Malwares are easily spread over the computer at the time of connecting the external devices like Pen drive, Card reader, etc. and it has various steps to clear malwares. First it checks for a malware and asks the user whether to destroy or not. If the user chooses destroy option it will destroy file or else choose track option for tracking for malware. If it is able to track, then it will clear the malware. If it is unable to track, it will block the file. It has more graphical interface than the antivirus softwares. Additional feature like auto boost technology increase the performance of the system. It identifies and removes the unwanted running programs. This Malwares detection method is more effective than other system protecting software. Mrs A. Nalini "Foray Spotlight System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: https://www.ijtsrd.com/papers/ijtsrd18811.pdf Paper URL: http://www.ijtsrd.com/computer-science/computer-security/18811/foray-spotlight-system/mrs-a-nalini

Citation preview

Page 1: Foray Spotlight System

International Journal of Trend in

International Open Access Journal

ISSN No: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com

Foray Spotlight System

Lecturer (Senior Grade),Nachimuthu Polytechnic College,

ABSTRACT This Project “Foray spotlight system” is used for protecting the Computer from Malware attacks. It is a real time project and system security software which is used to identify the malicious activities in a computer. Malwares are the main problem for computers. Once it enters into the computer it will corrupt the files. Foray spotlight system acts like an antivirus software. It detects malwares like other antivirus software’s, but it has some more additional advantages. Malwares are easily spread over the computer at the time of connecting the external devices like Pen-drive, Card reader, etc. and it has various steps to clear malwares. First it checks for a malware and asks the user whether to destroy or not. If the user chooses destroy option it will destroy file or else choose track option for tracking for malware. If it is able to track, then it will clear the malware. If it is unable to track, it will block the file. It has more graphical interface than the antivirus software’s. Additional feature like auto boost technology increasethe performance of the system. It identifies and removes the unwanted running programs. This Malwares detection method is more effective than other system protecting software. Keyword: Malvares, Threads, Pen drive, auto boost I. INTRODUCTION This project is used to detect and delete the virus in the system .It consists of 3 types of scans. They are customs scan, full scan and quick scan. This also has a special feature that it will automatically free up the memory in a particular drive. All these features are integrated within the project .The memory space required for this project is below 3MB.Spartans antivirus is user-friendly and the Graphical User Interface is also very clear and easy to use. Spartans have big database to identify and detect the various types of

International Journal of Trend in Scientific Research and Development (IJTSRD)

International Open Access Journal | www.ijtsrd.com

ISSN No: 2456 - 6470 | Volume - 2 | Issue – 6 | Sep

www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018

Foray Spotlight System

Mrs A. Nalini Lecturer (Senior Grade), Department of Computer Engineering,Nachimuthu Polytechnic College, Pollachi, Tamil Nadu, India

system” is used for protecting the Computer from Malware attacks. It is a real time project and system security software which is used to identify the malicious activities in a computer. Malwares are the main problem for

computer it will corrupt the files. Foray spotlight system acts like an antivirus software. It detects malwares like other antivirus software’s, but it has some more additional advantages. Malwares are easily spread over the

ting the external drive, Card reader, etc. and it has

various steps to clear malwares. First it checks for a malware and asks the user whether to destroy or not. If the user chooses destroy option it will destroy file

option for tracking for malware. If it is able to track, then it will clear the malware. If it is unable to track, it will block the file. It has more graphical interface than the antivirus software’s. Additional feature like auto boost technology increase the performance of the system. It identifies and removes the unwanted running programs. This Malwares detection method is more effective than

drive, auto boost

This project is used to detect and delete the virus in the system .It consists of 3 types of scans. They are customs scan, full scan and quick scan. This also has a special feature that it will automatically free up the

ese features are integrated within the project .The memory space required for this project is below 3MB.Spartans anti-

friendly and the Graphical User Interface is also very clear and easy to use. Spartans have big

ect the various types of

virus. Uploading and modifying the virus can be done in Spartans. It has boost up tool that detect the running virus and boost up the performance of the system. Most important function of any antivirus is virus scan engine. It scans the information and if the viruses are detected, it disinfects them. The information can be scanned in different ways. Size: it can easy detect if the file is infected or altered. Some viruses append their malicious code at the end of the file. An antivirus scanner (scan engine) scans it and compares it before and after sizes. If there is no modification done by the user so it suspects that there is some malicious activity running. Pattern Matching: every virus has a unique signature that they use to infect the files or computers. This signature could be some lines in assembly language that overwrite the stack pointer and then jump to the new line of code. An antivirus program compares the information with a virus database (virus signature). If information matches any of the virus signatures then antivirus shows that the file is infected by the virus. Heuristic: if any information being scanned is dangerous and without knowing that is it contains a virus or not? This method is known as heuristic scanning. It analyse that how an information acting and comparing it with the list of dangerous activities. For e.g. if an antivirus program notices that a program is trying to open every EXE file on your computer and infecting it by writing a copy of the origiinto it. So an antivirus program detects this program and declares it a dangerous activity or unknown type of virus and sound the alarm. Then it is up to user weather the danger should be eliminated or not.

Research and Development (IJTSRD)

www.ijtsrd.com

6 | Sep – Oct 2018

Oct 2018 Page: 1078

rtment of Computer Engineering,

virus. Uploading and modifying the virus can be done in Spartans. It has boost up tool that detect the running virus and boost up the performance of the

Most important function of any antivirus is virus scan cans the information and if the viruses are

detected, it disinfects them. The information can be

it can easy detect if the file is infected or altered. Some viruses append their malicious code at the end

tivirus scanner (scan engine) scans it and compares it before and after sizes. If there is no modification done by the user so it suspects that there is some malicious activity running.

every virus has a unique signature infect the files or computers. This

signature could be some lines in assembly language that overwrite the stack pointer and then jump to the new line of code. An antivirus program compares the information with a virus database (virus signature). If

ation matches any of the virus signatures then antivirus shows that the file is infected by the virus.

if any information being scanned is dangerous and without knowing that is it contains a virus or not? This method is known as heuristic

ing. It analyse that how an information acting and comparing it with the list of dangerous activities. For e.g. if an antivirus program notices that a program is trying to open every EXE file on your computer and infecting it by writing a copy of the original program into it. So an antivirus program detects this program and declares it a dangerous activity or unknown type of virus and sound the alarm. Then it is up to user weather the danger should be eliminated or not.

Page 2: Foray Spotlight System

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN:

@ IJTSRD | Available Online @ www.ijtsrd.com

These methods have their pros and conantivirus program uses virus signature mechanism then it must update it at least once a day because 15 new viruses we discovered every day. If an antivirus left for two or more days without updating it cause a serious danger. II. EXISTING SYSTEM Antivirus will identify the virus and detect the virus. But it doesn’t have a real time protection method. They do not delete the archive files. It doesn’t replace the deleted files from our computer. Lot of memory is required for Grafical user interface. Scanning time duration is high. It detects and delets corrupted files. Hidden files can’t get back. Some features need to be added for this. History of deleted virus lists are not stored. Antivirus cannot identify the newly created virus.

FIG1. ANTIVIRUS MODULE Types of Worms A few different types of worms are emailing worms, instant messaging worms, internet worms and filesharing networks worms. emailing worms are those in the attachments that are sometimes sent with emails. instant messaging worms usually infect a computer when an infected link is sent to a person and they open it. these also get into computers and automatically send to most if not all of the people on your buddy list. internet worms usually scan different computers and try to get into their systems. a lot of times they will try and be downloaded onto the computer by sending a request to be downloaded. filesharing networks worms usually copy itself in a shared file under a name that is not suspicious and will start to infect the computer as well as those in the same network. III. PROPOSED SYSTEM Spartans antiviruses have the custom scan method for scanning particular drives. It has real time protection

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN:

www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018

These methods have their pros and cons. If the antivirus program uses virus signature mechanism then it must update it at least once a day because 15 new viruses we discovered every day. If an antivirus left for two or more days without updating it cause a

Antivirus will identify the virus and detect the virus. But it doesn’t have a real time protection method. They do not delete the archive files. It doesn’t replace the deleted files from our computer. Lot of memory is

ace. Scanning time duration is high. It detects and delets corrupted files. Hidden files can’t get back. Some features need to be added for this. History of deleted virus lists are not stored. Antivirus cannot identify the newly created

ANTIVIRUS MODULE

A few different types of worms are emailing worms, instant messaging worms, internet worms and file-sharing networks worms. emailing worms are those in the attachments that are sometimes sent with emails.

worms usually infect a computer when an infected link is sent to a person and they open it. these also get into computers and automatically send to most if not all of the people on your buddy list. internet worms usually scan different

o get into their systems. a lot of times they will try and be downloaded onto the computer by sending a request to be downloaded. file-sharing networks worms usually copy itself in a shared file under a name that is not suspicious and

the computer as well as those in the

the custom scan method for scanning particular drives. It has real time protection

method. If any unwanted malicious files is found or installed means, it will alert the user. History of the virus are listed in the registry form. Every user must register their details to create an account. Each user has permission to update a new virus and give suggestions for developing security. It is an open source software, easy to customize with Graphical user interface. Software does not require any framework application and is a simple installation process. The deleted files can be recovered in this project. If any virus enters the system, the antivirus software will report to user and block the virus. Corrupted files could be filtered and stored into drives. It supports all Hardware and software components. IV. LIST OF MODULES� Home page module. � Quick scan module. � Full scan module. � Custom scan module. HOME PAGE MODULE Home page contains scan options likescan, custom scan options. User can select this options to scan the drives. Some settings are provided for the User. History of detected viruses is visible for the users and virus updatation is alAdditional features available Tools, Advanced Protection, Real time protection. QUICK SCAN MODULE This module scans the drive very quickly. If any threat is found, it is automatically removed. All the memory files are scanned by this module. FULL SCAN MODULE Full scan method scans smoothly and slowly. It scans the whole system and if any threat is found, it is informed to the user. This method doesn’t delete the malicious files immediately. CUSTOM SCAN MODULECustom scan method is advantage for the user. If user wants to scan any particular drive , it is possible by this method. Custom scan helps to delete the malicious file in particular disks or Removable drives. V. FUTURE ENHANCEMENTThis software has full details and affecting methods of virus. Database has all kind of virus so it can block all type of viruses. If virus

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

Oct 2018 Page: 1079

method. If any unwanted malicious files is found or will alert the user. History of the

virus are listed in the registry form. Every user must register their details to create an account. Each user has permission to update a new virus and give suggestions for developing security. It is an open

easy to customize with Graphical user interface. Software does not require any framework application and is a simple installation process. The deleted files can be recovered in this project. If any virus enters the system, the antivirus

report to user and block the virus. Corrupted files could be filtered and stored into drives. It supports all Hardware and software

LIST OF MODULES

options like quick scan, full scan, custom scan options. User can select this options to scan the drives. Some settings are provided for the User. History of detected viruses is visible for the

datation is also available. for users are Manage,

Tools, Advanced Protection, Real time protection.

This module scans the drive very quickly. If any threat is found, it is automatically removed. All the

scanned by this module.

Full scan method scans smoothly and slowly. It scans the whole system and if any threat is found, it is informed to the user. This method doesn’t delete the

CUSTOM SCAN MODULE tom scan method is advantage for the user. If user

wants to scan any particular drive , it is possible by this method. Custom scan helps to delete the malicious file in particular disks or Removable drives.

FUTURE ENHANCEMENT etails about all types of virus

and affecting methods of virus. Database has all kind of virus so it can block all type of viruses. If virus

Page 3: Foray Spotlight System

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN:

@ IJTSRD | Available Online @ www.ijtsrd.com

attacks the system at any time, real time protection security will scans automatically and delete the virus without permission of user. This software is supported in android mobile phones. It has restore point method for replacing the deleted files. VI. CONCLUSION Most of the antivirus does not have all kind of features. Every antivirus was created for a specific protection from virus. But Spartans antivirus

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN:

www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018

time protection security will scans automatically and delete the virus

ut permission of user. This software is supported in android mobile phones. It has restore point method

Most of the antivirus does not have all kind of features. Every antivirus was created for a specific

otection from virus. But Spartans antivirus

developed for protecting the system in many methods. It helps the users to protect the system from virus attacks. Users do not worry about the malicious activities in system because Spartans will defend against all unwanted activities. REFERENCES 1. Jason N. Gaylord, Christian wenz. Professional

ASP.net 4.5 C# and VB, Publisher :APRESS

2. Smadav (antivirus)-Graphical user interface

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

Oct 2018 Page: 1080

developed for protecting the system in many methods. It helps the users to protect the system from virus

not worry about the malicious activities in system because Spartans will defend

l unwanted activities.

Jason N. Gaylord, Christian wenz. Professional , Publisher :APRESS

Graphical user interface