Detect and Model the Camouflaging Worms A Java Based Application

This chapter deals with the detailed design aspects followed for this application, as the main aim of this project is to detect and model the camouflaging worms a java based application is developed to model this application. Using this application, active worms are detected and blocked and the corresponding design aspects followed are explained in this chapter. Different levels of scanning are provided in this design and the detailed design followed is as explained below 

Front end design 

The required frontend design is created using the java swings concept and all the required components are used to create the frontend design.  An administration window is created initially to start the application and the actual flow of the application is initiated from this window and this window is created using the java swings as discussed. Following are the key components used in this window and all the required components are created using the java swings framework and few buttons are also created against these windows to start the actual operation of the scanning function and they are as explained below 

Pure Random scan (PRS) 

Pure random scan is the basic algorithm used in this application and this algorithm can scan the all the drives and total system against the camouflage worms and the corresponding active worms against the system operation. As discussed this algorithm can scan different layers of the system like all the drives, total system scan and scan to the user drive and the corresponding window can be created using the java swings.  Few buttons are created to start the required operation and the buttons actions are captured to initiate the operation and the key buttons used across this window are listed as below 

  • Scan all drives
  • Scan system
  • Scan user drive
  • Scan folder
  • Scan file
  • Chart

Scan all drives button can be pressed to scan all the drives across the system and the scan process start from the C: drive of the system and proceeds with all the drives created in the hard disk of the system. Scan system will scan the complete system including the system directories and libraries as well. Scan user drive will scan the user drive in the C drive of the system and scans all the user defined directories and folders in the system. Scan folder will scan the desired folder selected by the user and scan file will scan the required file as selected by the user. Chart will give the complete analysis of the scan results and is discussed in details later in this chapter. 

Few settings are also defined in this application and a separate window can be used in this context. The key settings used in this design are as listed below 

  • Task manager: This option is provided in the form of a button and when the user clicks on this button, the CPU performance against the virus scan can be tracked and the corresponding screenshot is shown in the appendix section
  • Empty virus values: This option can be used to detect the empty virus detected across the scan process as discussed in the previous section
  • Settings: This option is provided in the form of a button and when the user clicks on this button, they are redirected to save few settings against the scan process and the corresponding procedure is explained in the next chapter. 

A separate File status area is provided in this design and this text area displays the status of the current file being scanned against the desired option selected across the user choice window and the percentage of scan done can be tracked at this area. Few text areas can be used in this design to track the current status of the scan operation against the worms and the key areas used in this application are as given below 

File scan: This text area is used to display the current file details being scanned and it shows the complete path of the file along with the parent directory and folder respectively

Infection: This area can be used to locate the current and recent infected file and the complete details of this file are tracked in this area 

Virus List: This is the text area and this area can be used to view all the files scanned till the time and the complete list of infected files are displayed in this area along with the key details like pull path of the infected file, type of attack and the type of action performed by the corresponding worms. This list can be used to analyze the number of infected files at any point of time during the scanning process. 

Log file are also created to view the detailed log of the scanned files and the corresponding infected files and three different log options are provided in this design and they are as given below. 

View Log: This log can be used to track the complete details of the file scanned and the time taken to scan them along with the complete path and the information related to the worms are also tracked using this view log file. 

View File Log: This log displays the complete path of the particular drive being scanned and the details of the folders and the file structure used to scan the files are tracked using this view file log.

About worm: This option is provided in the design to track the details of the worm that may infect the system with respect to their technical specifications are also provided in this option. 

As discussed in the previous section, an analysis chart is provided in this design and this chart is used to track the detection rate and detection time of the worms against different attempts done towards detecting the worms across the system as per the user choice. This chart is displayed to the users when the complete scan operations are done with respect to the full drives scan, user drive scan and files and folders scan and the results are shown in the form a graph and is as shown in the appendix section. 

Flow of the application 

This section defines the complete flow of the application with the help of the required user interface diagrams as shown below. Dataflow diagram of the complete application is as given below

Leave a Reply

Your email address will not be published. Required fields are marked *