Skip to content

elliotfayman/IBCompSciEE2021

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

31 Commits
 
 
 
 
 
 
 
 

Repository files navigation

IB Comp Science Extended Essay 2021

Abstract

This essay will investigate the methods by which viruses attempt to avoid static, signature-based detection. That is, detection that is based on the analysis of a single stagnant source of information. Specifically, this paper will analyze the common techniques that metamorphic viruses use to avoid detection and a determination on which of these techniques are most effective at avoiding detection will be made.


Virus Detecter

This foulder contains resources used to detect viruses. Utilizing java, these methods where implimented in sensible way as to be able to utilize the same methodology without the need to anylize a real virus. The different scanning methods are listed below:

  • Direct Compare: Directly Compares to files to check for exact simularity.
  • eometric Detection: Compares the size of two files for size simularity.
  • Head Footer: Compares just the begining or end of a file for simularity.
  • Signiture Match: First removes common text and punctuation from both files being compared and then compares the core elements of the file for simularity.
  • Smart Scan: First removes the most common words and then compares the combined frequency of each text in each file and removes the least frequent words before comparing.
  • Static Decription: Rather than comparing the text to one another, treat the text as symbols and determine the amount of occurences of each symbol in each text. Then compare the amount of occurences of each text to one another and count the amount of matching comparisons.
  • Subsequence Compare: Break up each file into partails and compare each word within the partail to another partail in the different file ignoring order the word is found.

Virus Generators

This foulder creates simulated viruses. To ensure the saftey of the technology used while conducting this research, live dangourus malware will not be used. Rather, large text files will be used as anologues to a virus. A smaller subtext will then be inserted into several large texts and this smaller text will be treated as the dangourus malware. Here are the different methods by which the virus-text is inserted:

  • ECHS: Virus text is inserted at the head and footer of the text file.
  • ECRL: Virus text is inserted at a random location in the text file.
  • ECV: Virus is first encrypted by creating a hash key of virus-text keys and random letter value pairs. This hash is used to translate the virus into a unique looking text that can then be inserted.
  • GCI: Virus is augmented by placing a random amount of do-nothing text between each real virus text.
  • NECRL: Virus is placed in a random location but this location does not change between virus generations.
  • PS: Virus text is swapped around to create a newer looking string.

About

Used to fulfil the requirements of the international baccalaureate Extended Essay.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages