CFP last date
22 April 2024
Reseach Article

Proposing OMVDPM – Offline Macro Virus Detection and Prevention Mechanism

by Inderpal Singh, Sheetal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 170 - Number 3
Year of Publication: 2017
Authors: Inderpal Singh, Sheetal
10.5120/ijca2017914720

Inderpal Singh, Sheetal . Proposing OMVDPM – Offline Macro Virus Detection and Prevention Mechanism. International Journal of Computer Applications. 170, 3 ( Jul 2017), 19-22. DOI=10.5120/ijca2017914720

@article{ 10.5120/ijca2017914720,
author = { Inderpal Singh, Sheetal },
title = { Proposing OMVDPM – Offline Macro Virus Detection and Prevention Mechanism },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2017 },
volume = { 170 },
number = { 3 },
month = { Jul },
year = { 2017 },
issn = { 0975-8887 },
pages = { 19-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume170/number3/28050-2017914720/ },
doi = { 10.5120/ijca2017914720 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:17:30.178714+05:30
%A Inderpal Singh
%A Sheetal
%T Proposing OMVDPM – Offline Macro Virus Detection and Prevention Mechanism
%J International Journal of Computer Applications
%@ 0975-8887
%V 170
%N 3
%P 19-22
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper discussed about different types of viruses along with its symptoms, causes as well as side-effects and correspondingly proposes a new designed methodology named OMVDPM (offline macro virus detection and prevention mechanism) on the time of MS-Word document accessing. The complete functioning of this new designed methodology is work under main two steps viz. at first detect macro virus in word document and in second step provide prevention from macro virus. This new designed methodology utilizes the concept of log files for continuous monitoring of the details of that specific MS-Word document as like the date of creation of document, time as well as space consumed and the working of this new designed methodology is totally based on automatic randomly generated encrypted digital signature on the time of MS- Word document saving. The more interesting feature of this new designed methodology is every time a log file is created when document will be accessed by that specific user (i.e. who is owner of the document) and it provides latest details of that specific file with automatic updated time, date and space consumed. The main focus of this paper is to reduce the growth of macro virus in MS Word document on the time of document accessing and provide offline encrypted digital signature security of document at saving mode.

References
  1. Zaqaibeh belal & Jebril.H Iqbal, September 2008. Computer virus strategies and detection method, International journal of open problems in computation math.
  2. Ibrahim suhaimi & masrram Maslin, January 2016. Evolution of computer virus concealment & anti-virus techniques: A short survey, International journal of computer science.
  3. Patil.V Bhaskar & Joshi, May 2013. Computer virus: Their problems and major attacks in real life, International journal of peer to peer network trends and technology.
  4. Spafford.H Engine, 1994.Computer viruses as artificial life, Journal of artificial life, MIT Press.
  5. MIS Unit, the impact of computer virus attacks and its preventive mechanisms among personnel computer users, south eastern University, Sri Lanka.
  6. Zanero Stefano & serazzi giuseappe, 2001.Computer virus propagation models, IEIIFCNR Institute.
  7. Malavade N. Vinayak, Bhuvad S Shrinivas, March 2014. Study and comparison of computer viruses, International journal of advanced research in computer science and software engg.
  8. Bag by KURT, Taking computer virus detection to a new level, University of Auckland, New Zealand.
  9. Gong Weibo, Towsley Don, Email Virus propagation modeling and analysis, Technical report TR-CSE-03-04.
  10. Martin Alexandra, Koi Yaw Godfred, 2012. The economic impact on computer virus- A Case of Gauna, Journal of emerging trends in computing and information sciences.
  11. Dey Kumar Bhabesh, Charan Singer Mahindra, Mishra Lokesh, May 2012. The new age of computer viruses and their detection, International journal of network security and its applications.
  12. Kharat Vilas & Gore Sharad, December 2011. Computer viruses in UNIX Environment- A Case study, International journal of computer engg and Science.
  13. Joshi.J Milind & patil V. Bhaskar, 2011. The working and problems of computer virus in enterprise areas, International journal of computer science an Information technology.
  14. Singhal, 2014. Computer viruses in India- A Questionnaire Survey, International journal of computer applications, National conference on innovations and recent trends in engg and technology.
  15. Saharan ravi & Chaudhary ravi raj, 2011.Feature detection approach from viruses through mining, Journal of global research in computer science.
  16. Lai.Y.K, Kwan K.W, The rules of time on NTFS file System, University of hongkong.
  17. Pathak K.M, Keller M.J, October 2014. Protection of smart phone, personnel computer and other similar devices from virus infections, International journal of innovative research in computer and communication engg.
  18. Herawan Tutu & sharif MD Azmir, July 2013.On analysis and effectiveness of signature based in detecting metamorphic virus, International journal of security and its applications.
  19. Gong Weibo, Towsley Don & Zon C Cliff, Modeling and simulation study of the propagation & defense of internet email worm, University of central Florida.
  20. Liu Jun Ding Hua Qing, Computer virus propagation model based on variable propagation rate, International journal of advanced science and technology.
  21. Rasheed Frheem Muhammad, March 2012. Modeling virus propagation in peer to peer network, International journal of computer science.
  22. Sarvanam.V, Rajeshwari.S, January 2013. Security issues in protecting computers & maintenance, Journal of global research in Computer science.
  23. Toyoizumi Hiroshi, Performance evaluation of defence strategies against computer virus, University of Aizu.
  24. Bajaj Chetna & Khari MANJU,July 2014.Detecting Computer Virus, International journal of advanced research in computer engg and technology.
  25. Virus Classification [Image - Online] http://ib.bioninja.com.au/standard-level/topic-5-evolution-and-biodi/53-classification-of-biodiv/virus-classification.html
  26. What Are The Types of Computer Viruses? [Image - Online] http://www.codercaste.com/2009/09/30/what-are-the-types-of-computer-viruses/
Index Terms

Computer Science
Information Sciences

Keywords

Macro Virus Resident Virus Log Files Computer Offline Security Digital Signature MS-Word document.