Vous êtes sur la page 1sur 49

Virus Information System

1. INTRODUCTION
1.1 MOTIVATION
As the use of the Internet began to grow in the late 1980s and early 1990s, viruses began to be created for different reasons. Although a lot of viruses are written for fame and proof of concept, more viruses began to be created for spying on other people, other companies, and other governments. The term spying does not just refer to spyware, which is a form of malicious code that tracks the actions of users and then sells this information to advertisers. Instead, spying viruses refer to any type of virus that is installed on a computer to allow remote access to a computer by unauthorized persons. These viruses can be in the form of a Trojan horse that creates a backdoor, a virus that installs a key logger for capturing data, or any other type of software that provides unauthorized access to information on a computer system. Due to the above poblems faced by the people or the organisations who are using the personal computer for doning there work have to install an antivirus software into there system which prevents there system form virus. Now a days every one is using an antivirus in there system to project there system from virus. If a virus attacks to a system they are using a antivirus available in the market ofcorce it is hamfull to such but they dont know what is the correct antivirus required to them. So this is the reason why we have developed this project which give the information to the user about virus and the correct antivirus to the virus, is provided in our project.

1.2 Problem Defination


Systems such as ebay, tucows, download.com only provide Antivirus downloads .But they dont provide information about updates.They dont contain latest Virus information.They dont have all Antivirus developers at one place.Visitor cannot get any information about the existing virus.Visitor may not get correct information about which antivirus he has to purchase. Any person cannot post their information with respect to the Viruses.User cannot update the system.Visitor may face some unnecessary problems. Feed back may not be taken properly

Tenali Engineering College

Page 1

Virus Information System

1.3 Objectives of Project


The main objective of our poject is to provide the information of virus to the users. Here we proviede the information of various viruses at one place and user can give the feedback about the project and he can upload a virus to which he need an antivirus not only that if any user developed an antivirus he can upload it into our site so it can be used by the other users who need it.

1.4 Limitations of Project


As this project is about giving the information of virus to the users which is usefull to them but there is a drwaback in our porject that every one may use our site and there is no security porvided to them in this site. At present in our project the antivirus available to the user are not lisensed so they may cause problem to the user system who download them.

1.5 Organisation of Documentation


In this project documentation we have initially put the definition and objective of the project as well as the design of the project which is followed by the implementation and testing phases. Finally the project has been concluded successfully and also the future enhancements of the project were given in this documentation.

Tenali Engineering College

Page 2

Virus Information System

2. LETERATURE SURVEY
2.1 INTODCUTION
1981/82, the first computer viruses in a wild have been developed. The programs infect Apple 11 disks without deleting data. It is called Elk Cloner. In 1983, the first documented experimental virus has been developed by Fred Cohen. Ralf Burger from Germany has presented Virdem virus during Chaos Computer Club conference. It establishes itself in the disk's boot sector. A small Pakistani computer firm developed Brain virus whose purpose is to foster customer loyalty. In 1987, Lehigh virus becomes the first virus to infect command.com. Jerusalem or also known as Friday the Thirteenth is the first virus to establish itself in the main memory (RAM). It affects the computer in two ways: On any thirteenth day of the month falling on Friday and on all other days, the virus reduces computer speed after 30 minutes. In 1988, Denny Yanuar Ramdhani from Bandung, Indonesia has developed Zuk; the first anti-virus. It recognizes and removes the Brain virus and then replaces it with a copy itself. The first memory resident virus; Cascade, loose into the wilderness in 1988. This virus has been developed by anonymous from Germany. In 1989, the first polymorphic virus is discovered. It is called as Washburn or V2Px 1260. Symantec introduces Norton Anti-virus in 1990. This is the first anti-virus programs developed by a large Internet company. In 1990, Verband Deutscher Virenhebhaber has developed the first virus construction kit for DOS systems. This kit enables someone to assemble new viruses. Mutation Engine program has been developed by Dark Avenger. This program can be used to generate polymorphic viruses from simple viruses. This program has been introduced in 1992. In 1993, the anti-virus industry presents its first wild list. This is a list of all computer viruses which surface "in the wild" that is directly on the user's PC. Goodd Times is the first hoax. This virus supposedly causes the entire contents of the hard disk to be deleted, merely by reading the message. This virus was launched on 1994. In 1995, the first macro virus which infects Microsoft Word documents was introduced. It is called Concept. WM/Concept was the first virus specifically written for the Microsoft Word system and discovered "in the wild". In 1995, the first Windows 95 virus; Boza was launched. On the 31"' of each month it issues a message regarding its creators; Quantum. Beside that, XM.Laroux; the first Excel virus make sits appearance in Alaska and Africa. Staog, the first Linuc virus is found in the lab but it is never spotted in the wild. Linux Bliss is the first Linux Tenali Engineering College Page 3

Virus Information System virus in the wild found in 1997. It searches for programs for which current process has write permission and then overwrite such files with its viral code. In 1998, the first VB script virus; VBS.Rabbit was found.

2.2 Existing System:


Systems such as ebay, tucows, download.com only provide Antivirus downloads .But they dont provide information about updates.They dont contain latest Virus information.They dont have all Antivirus developers at one place.

2.3 Disadvantages of Existing System:


1. Visitor cannot get any information about the existing virus. 2. Visitor may not get correct information about which antivirus he has to purchase 3. Any person cannot post their information with respect to the Viruses. 4. User cannot update the system. 5. Visitor may face some unnecessary problems. 6. Feed back may not be taken properly

2.4 Proposed System:


This system allows the users to report about new viruses and their symptoms.Allows freelance developers to develop antivirus.Provide latest updates.Take Feedbacks to optimize the system.Give performance rankings to the members

2.5 Advantages of Proposed System


1. Time & money can be saved 2. Can access any type of information required by anyone. 3. User can upload the antiviruses which he have. 4. Employees week ness & strengths can be known online 5. Features are added with respect to the feedback sent.

2.6 CONCLUSION
In this we specify the how proposed system is more usefull than the existing system. It is operationally feasible because now a days every one uses system and internet so every one can easily use this porject

Tenali Engineering College

Page 4

Virus Information System

3. ANYALYSIS
3.1 Introduction
After analyzing the requirements of the task to be performed, the next step is to analyze the problem and understand its context. The first activity in the phase is studying the existing system and other is to understand the requirements and domain of the new system. Both the activities are equally important but the first activity serves as a basis of giving the functional specifications and then successful design of the proposed system. Understanding the properties and requirements of a new system is more difficult and requires creative thinking as well as understanding of existing system is also difficult. Improper understanding of present system can lead diversion from solution.

Technical Feasibility
This project, Employee Performance and Recognition Portal needs the support to average technology already being implemented for other useful systems in a company. It requires PCs and a modem with normal configuration for Internet access. Almost all administrators have their own PC on their desk. Thus it is technically feasible to implement the new system here.

Economic Feasibility
Employee Performance and Recognition Portal is a mid-scale project. It is very much useful to employees as well as admin people in reducing manual work which increases the productivity of the company. The infrastructure for the development of their new system is available in the company. The system is developed at no additional cost. Hence it is economically feasible for the new system to be implemented.

Operational Feasibility
This system is being automated on the request of the employees of a company and the management people. This new system meets their requirement and covers all aspects

required much better than the old manual system. Most of the people involved in this company are computer literates and do not need much training if this system is implemented. Hence it is operationally feasible. Tenali Engineering College Page 5

Virus Information System

3.2 Software Requirement Specification


3.2.1 User requirement
Personal computer with modem connection Username and password for the purpose of logining into the site and download an antivirus

3.2.2 Software requirement


Operating System Operating environment Front End Back End Server Side Programming Tool Web Server : Windows 2000/xp Professional

HTML

JAVA

Oracle 10g

JSP

Apache Tomcat 5.0

3.2.2.1 HTML
Hyper Text Markup Language (HTML) is a language used to create hypertext documents that have hyper links embedded in them. It consists of tags embedded in the text of a document with HTML. We can build web pages or web document s. it is basically a formatting language and not a programming language. The browser reading the document interprets mark up tags to help format the document for subsequent display to a reader. HTML is a language for describing structured documents. HTML is a platform independent. WWW (World Wide Web) pages are written using HTML. HTML tags control in part the representation of the WWW page when view with web browser. The browser interprets

Tenali Engineering College

Page 6

Virus Information System HTML tags in the web document and displays it. Different browsers show data differently. Examples of browsers used to be web pages include: Netscape Internet Explorer

HTML: What It Is HTML is a document-layout and hyperlink-specification language. It defines the syntax and placement of special, embedded directions that aren't displayed by the browser, but tell it how to display the contents of the document, including text, images, and other support media. The language also tells you how to make a document interactive through special hypertext links, which connect your document with other documents--on either your computer or someone else's, as well as with other Internet resources, like FTP and Gopher. IMAGE HTML TAG: This command presents Select File dialog box to select image file. If you want to insert the image tag directly without the dialog box, hold down Shift key when running this command. <IMG SRC="" ALT=""> The Table Generator helps you to insert table tag into the HTML document very easily. Press left mouse button on a table cell and drag to the desired size then release the mouse button. Inserts Frame HTML tag: <FRAMESET ROWS="," COLS=","> <FRAME NAME="" SRC="" SCROLLING=""> <FRAME NAME="" SRC="" SCROLLING=""> </FRAMESET> Inserts Font HTML tag: <FONT SIZE=""></FONT> This command presents Heading popup menu. Heading 1 - 6 tags are available on heading popup menu.

Tenali Engineering College

Page 7

Virus Information System Inserts Horizontal Ruler HTML tag: <HR> This command presents List tag popup menu. Unordered list, ordered list and Definition list are available on List tag popup menu. Inserts List Box HTML tag: <SELECT NAME=""></SELECT> Inserts Ordered List HTML tag. <OL> <LI> </LI> </OL> With all its multimedia-enabling, new page layout features, and the hot technologies that give life to HTML documents over the Internet, it is also important to understand the language's limitations: HTML is not a word processing tool, a desktop publishing solution, or even a programming language, for that matter. That's because its fundamental purpose is to define the structure and appearance of documents and document families so that they might be delivered quickly and easily to a user over a network for rendering on a variety of display devices.

Structure of an HTML Document:


An HTML document consists of text, which defines the content of the document, and tags, which define the structure and appearance of the document. The structure of an HTML document is simple, too, consisting of an outer <html> tag enclosing the document header and body: <Html> <Head> <Title>Barebones HTML Document</title> </head> <Body> Tenali Engineering College Page 8

Virus Information System .. .. </Body> </Html> Each document has a head and a body, delimited by the <head> and <body> tags. The head is where you give your HTML document a title and where you indicate other parameters the browser may use when displaying the document. The body is where you put the actual contents of the HTML document. This includes the text for display and document control markers (tags) that advise the browser how to display the text. Tags also reference specialeffects files including graphics and sound, and indicate the hot spots (hyperlinks and anchors) that link your document to other documents.

Basic HTML Tags : <! ---> Specifies comments Creates hypertext links Formats text as bold Formats text in large font. Contains all tags and text in the HTML document Creates text Definition of a term Creates definition list Formats text with a particular font Encloses a fill-out form Defines a particular frame in a set of frames Creates headings of different levels Contains tags that specify information about a document <HR>...</HR> <HTML></HTML> <META>...</META> <SCRIPT></SCRIPT> Tenali Engineering College Creates a horizontal rule Contains all other HTML tags Provides meta-information about a document Contains client-side or server-side script Page 9

<A>.</A> <B>.</B> <BIG>. </BIG> <BODY></BODY> <CENTER>...</CENTER> <DD></DD> <DL>...</DL> <FONT></FONT> <FORM>...</FORM> <FRAME>...</FRAME> <H#></H#> <HEAD>...</HEAD>

Virus Information System <TABLE></TABLE> <TD></TD> <TR></TR> <TH></TH> Advantages

Creates a table Indicates table data in a table Designates a table row Creates a heading in a table

A HTML document is small and hence easy to send over the net. It is small because it does not include formatted information.

HTML is platform independent. HTML tags are not case-sensitive.

3.2.2.2 JAVA
About JAVA: Java was conceived by James Gosling, Patrick Naughton, Chris Warth, Ed Frank and Mike Sheridan at SUN Micro Systems Incorporation in 199I.It took 18 months to develop the first working version .This language initially called "OAK", but was renamed " JAVA " In 1995.Beforde the initial implementation of OAK in 1992 and the public announcement of Java in 1995, many more contributed to the design and evolution of the language.

JAVA Overview: Java is a powerful but lean object oriented programming language. lt has generated a lot of excitement because it makes it possible to program for internet by creating applets. Programs that can be embedded in a web page. The context of an applet is limited only by one's imagination. For example an applet can be an animation with sound, an interactive game or a ticker tape with constantly updated stock prices. Applets can be just little decorations to liven up web page, or they can be serious applications like word processors or spreadsheets. But Java is more than programming language for writing applets. It is being used more and more for writing standalone application as well. It is becoming so popular that many people believe it will become standard language for both general purpose and internet programming.

Tenali Engineering College

Page 10

Virus Information System JAVA is Robust: The multiplatform environment of the Web places extraordinary demands on a program, because it must execute reliably in a variety of systems. Thus the ability to create robust programs was given a high priority in the design of java. To gain reliability Java restricted you in a few key areas to force you to find your mistakes early in program developments. At the same Java frees you from having to worry about many of the most common causes of programming errors. Because Java is strictly typed language, it checks your code at compile time. JAVA Scales Well: Java platform is designed to scale well, for portable consumer electronic devices to powerful desktop and several machines. The virtual machine takes a small foot print and Java byte code is optimized to be small and compact. As a result java accommodates the need for low storage and bandwidth transmission over the internet. JAVA is Multithreaded: Multithreading is simply the ability of a program to do more than one thing at a time. For example an application could be faxing documentation at the same time is printing another document. Multithreading is particularly important in multimedia: a multimedia program might often be running a movie, running an audio track and displaying text at the same time. JAVA is Extensible: A big plus for Java is the fact it can be extended. lt was purposely written to be lean with the emphasis on doing what it does very well: instead of typing of trying to do everything from the beginning, it was written so that extending it is very easy. JAVA is Secure: The Java platform builds security in four ways. 1 .The way memory is allocated and laid out. 2. The way incoming code checked. 3. The classes are loaded 4. The way access is restricted for untrusted code. JAVA performs well: Java's performs is better than one might expect. Java's many advantages, such as having built-in security and being interpreted as well as compiled, does have a cost attached Tenali Engineering College Page 11

Virus Information System them. However, various optimizations have been built-in, and the byte code interpreter can run very fast the cost it does not have to do any checking. No pointers: Eliminates big source errors by using object references instead of memory pointers, problems with pointer arithmetic are eliminated and problems with in adversely accessing the wrong memory address are greatly reduced. Strong Typing: Cuts down on runtime errors because Java enforces strong type checking, many errors are caught when code is compiled. Dynamic binding is possible and often very useful but static binding with strict type checking is used when possible. Simplicity: Makes Java easier to learn and correctly Java keeps it simple by having just one way to do something instead of having several alternatives as in some languages Java also stays lean by not including multiple inheritance which eliminates the errors and ambiguity that arise when you create a subclass that inherits from two or more classes. JAVA includes a Library of classes and interfaces: The Java platform includes an extensive class library so that programmers can use already existing classes it is create sub classes to modify existing classes or implements interfaces to augment the capabilities of classes.

3.2.2.3 Java Server Pages:


A server side technology, Java Server Pages are an extension to the Java servlet technology that was developed by Sun.JSPs have dynamic scripting capability that works in tandem with HTML code, separating the page logic from the static elements -- the actual design and display of the page -- to help make the HTML more functional (i.e. dynamic database queries). A JSP is translated into Java servlet before being run, and it processes HTTP requests and generates responses like any servlet. However, JSP technology provides a more convenient way to code a servlet. Translation occurs the first time the application is run. A JSP translator is triggered by the .jsp file name extension in a URL. JSPs are fully interoperable with servlets. You can include output from a servlet or forward the output to a servlet, and a servlet can include output from a JSP or forward output to a JSP. Tenali Engineering College Page 12

Virus Information System JSPs are not restricted to any specific platform or server. It was originally created as an alternative to Microsoft's ASPs(Active Server Pages). Recently, however, Microsoft has countered JSP technology with its own ASP.NET, part of the .NET initiative. Java Server Pages (JSP) is a technology that lets you mix regular, static HTML with dynamically-generated HTML. Many Web pages that are built by CGI programs are mostly static, with the dynamic part limited to a few small locations. But most CGI variations, including servlets, make you generate the entire page via your program, even though most of it is always the same. JSP lets you create the two parts separately

Advantages of JSP?

Vs. Active Server Pages (ASP). ASP is a similar technology from Microsoft. The advantages of JSP are twofold. First, the dynamic part is written in Java, not Visual Basic or other MS-specific language, so it is more powerful and easier to use. Second, it is portable to other operating systems and non-Microsoft Web servers.

Vs. Pure Servlets. JSP doesn't give you anything that you couldn't in principle do with a servlet. But it is more convenient to write (and to modify!) regular HTML than to have a zillion println statements that generate the HTML. Plus, by separating the look from the content you can put different people on different tasks: your Web page design experts can build the HTML, leaving places for your servlet programmers to insert the dynamic content.

Vs. JavaScript. JavaScript can generate HTML dynamically on the client. This is a useful capability, but only handles situations where the dynamic information is based on the client's environment. With the exception of cookies, HTTP and form submission data is not available to JavaScript. And, since it runs on the client,

Tenali Engineering College

Page 13

Virus Information System JavaScript can't access server-side resources like databases, catalogs, pricing information, and the like.

Vs. Static HTML. Regular HTML, of course, cannot contain dynamic information. JSP is so easy and convenient that it is quite feasible to augment HTML pages that only benefit marginally by the insertion of small amounts of dynamic data. Previously, the cost of using dynamic data would preclude its use in all but the most valuable instances.

Steps in the execution of a JSP Application:


1. The client sends a request to the web server for a JSP file by giving the name of the JSP file within the form tag of a HTML page.This request is transferred to the JavaWebServer. At the server side JavaWebServer receives the request and if it is a request for a jsp file server gives this request to the JSP engine. 2. JSP engine is program which can understands the tags of the jsp and then it converts those tags into a Servlet program and it is stored at the server side. This Servlet is loaded in the memory and then it is executed and the result is given back to the JavaWebServer and then it is transferred back to the result is given back to the JavaWebServer and then it is transferred back to the client.

3.2.2.4 ABOUT ORACLE:


Database Management System (DBMS): A Database is an integrated collection of user related data stored with minimum redundancy, serves many users/application quickly and efficiency. A Database system is basically a computerized record keeping system, i.e. it is a computerized system whose coverall purpose is to maintain information and make that information available on demand.

Tenali Engineering College

Page 14

Virus Information System DBMS is a collection of inter-related data and set of programs that allow several users to access and manipulate data. Its main purpose is to provide users with an abstract view of the data, i.e. the system hides certain details of how the data is stored and maintained. Database Management System is divided into 4 main components. Database Hardware Software User

Database:
It consists of collection of persistent data that is used by the application system. Hardware: The processor (s) and associated main memory that are used to support the execution of database system software. Software: The layer between the physical database and the users that handle all requests from the user for access to the database. User: There are three types of users Application Programmers End User Database Administrator (DBA)

TYPES OF DBMS:
There are four major categories of DBMS data models. Hierarchical Network Inverted Relational

Tenali Engineering College

Page 15

Virus Information System

3.2.2.5 STRUCTURED QUERY LANGUAGE:


SQL (pronounced SEQUEL) stands for Structured Query Language, which is used to communicate with relational database, which are in turn a set of related information stored in the form of tables. SQL is a non-procedural language because it process sets of record rather than just one data at a time and also provides automatic navigation to the data. Here one can manipulate a set or rows rather than one at a time. SQL commands accept a set or rows as input and return sets as outputs. The set property of SQL allows the results of one SQL statement to be used as input to another. Here one need not specify the access method of the data. SQL is utilized as the communication language with the database among the database user like database administrators, System administrators, security administrators and application programmers. SQL provides command for a variety of tasks including: 1. 2. 3. 4. Inserting, updating, and deleting rows in an object. Creating, replacing, altering and dropping objects. Controlling access to the database and its objects. Guaranteeing database consistency and integrity.

The commands in SQL is subdivided according to their functions as follows: Data Definition Language (DDL)-create, alter, drop, Truncate, rename Data Manipulation Language (DML)-insert, update, delete Data Control Language (DCL)-grant, revoke Data Retrival Language (DRL)-select Transaction Control Language (TCL)-commit, savepoint, rollback SQL*PLUS is a program or a tool available for working with an ORACLE Database. It allows the user to: 1. 2. 3. 4. Create tables in a database. Stores information in the tables. Changes information in the tables. Retrieve the information in the form we choose, Page 16

Tenali Engineering College

Virus Information System 5. 6. performing calculations on it and combining it in new ways. Maintain the database itself.

3.2.2.5 Apache Tomcat


Apache tomcat is an open source servlet continer develeped by the apache software foundation. Tomcat implements the java servlets and the java server pages (jsp) specification form sun microsystems and provides a pure java. HTTP web server environment for java code to run.

3.2.2.6 JAVA Database Connectivity:


JDBC is an API developed by Sun Microsystems that provides a standard way to access data using the Java programming language. Using JDBC, an application can access a variety of databases and run on any platform with a Java Virtual Machine. It isnt necessary to write separate applications to access different database systems, JDBC allows you to write one application that can send SQL statements to different database systems. SQL is the standard language for accessing relational databases.

How Does JDBC Work? JDBC makes it possible to do the following things within a Java application: Establish a connection with a data source Send queries and update statements to the data source Process the results

The following figure shows the components of the JDBC model.

Tenali Engineering College

Page 17

Virus Information System Why Do We Need JDBC? Why cant application developers use ODBC (Open Database Connectivity) on the Java platform? After all, its an established standard API for database access. You can use ODBC; however, ODBC isnt appropriate for direct use from the Java programming language because it uses a C interface. The JDBC API was modeled after ODBC, but, because JDBC is a Java API, it offers a natural Java interface for working with SQL. JDBC is needed to provide a pure Java solution for application development. Features of JDBC Following are some of the features that are part of the JDBC 3.0 specification:

Retrieval of auto-generated keys Blob/Clob Updates Multiple open result sets Transactional Save points Statement Pooling

Types of JDBC Drivers


There are four types of JDBC drivers in use:

Type 1: JDBC-ODBC bridge Type 2: partial Java driver Type 3: pure Java driver for database middleware Type 4: pure Java driver for direct-to-database

Establishing A Connection
The first thing to do, of course, is to install Java, JDBC and the DBMS on your working machines. Since we want to interface with an Oracle database, we would need a Tenali Engineering College Page 18

Virus Information System driver for this specific database as well. Fortunately, we have a responsible administrator who has already done all this for us on the Leland machines. To access a database, a connection must be opened between our program (client) and the database (server). This involves two steps: Load the vendor specific driver Why would we need this step? To ensure portability and code reuse, the API was designed to be as independent of the version or the vendor of a database as possible. Since different DBMSs have different behavior, we need to tell the driver manager which DBMS we wish to use, so that it can invoke the correct driver. Make the connection Once the driver is loaded and ready for a connection to be made, you may create an instance of a Connection object using: The connection returned in the last step is an open connection which we will use to pass SQL statements to the database. In this code snippet, con is an open connection, and we will use it below.

Creating JDBC Statements


A JDBC Statement object is used to send your SQL statements to the DBMS, and should not to be confused with an SQL statement. A JDBC Statement object is associated with an open connection, and not any single SQL Statement. You can think of a JDBC Statement object as a channel sitting on a connection, and passing one or more of your SQL statements (which you ask it to execute) to the DBMS. An active connection is needed to create a Statement object. The following code snippet, using our Connection object con, does it for you: Statement stmt = con.createStatement() ; At this point, a Statement object exists, but it does not have an SQL statement to pass on to the DBMS. We learn how to do that in a following section.

Executing SELECT Statements


As opposed to the previous section statements, a query is expected to return a set of tuples as the result, and not change the state of the database. Not surprisingly, there is a corresponding method called executeQuery, which returns its results as a ResultSet object:

Transactions

Tenali Engineering College

Page 19

Virus Information System JDBC allows SQL statements to be grouped together into a single transaction. Thus, we can ensure the ACID (Atomicity, Consistency, Isolation, Durability) properties using JDBC transactional features. The Connection object performs transaction control. When a connection is created, by default it is in the auto-commit mode. This means that each individual SQL statement is treated as a transaction by itself, and will be committed as soon as its execution finished. (This is not exactly precise, but we can gloss over this subtlety for most purposes).

Handling Errors with Exceptions


The truth is errors always occur in software programs. Often, database programs are critical applications, and it is imperative that errors be caught and handled gracefully. Programs should recover and leave the database in a consistent state. Rollback-s used in conjunction with Java exception handlers is a clean way of achieving such a requirement. The client (program) accessing a server (database) needs to be aware of any errors returned from the server. JDBC give access to such information by providing two levels of error conditions: SQLException and SQLWarning. SQLExceptions are Java exceptions, which, if not handled, will terminate the application. SQLWarnings are subclasses of SQLException, but they represent nonfatal errors or unexpected conditions, and as such, can be ignored.

3.2.3 HARDWARE REQUIREMENTS:


Processor Ram Hard Disk : Pentium IV

128 MB

20 GB

3.5 CONCLUSION
In this phase, we understand the software requirement specifications for the project. We arrange all the required components to develop the project in this phase itself so that we will have a clear idea regarding the requirements before designing the project. Thus we will proceed to the design phase followed by the implementation phase of the project. Tenali Engineering College Page 20

Virus Information System

4.DESIGN
4.1 INTODUCTION
It details how the softare rquirements should be implemented and it gives the programmers a blueprint to follow.Once the software design document is approved by the appropriate parties, it becomes a baseline for limiting changes in the scope of the project.

4.2 UML DIAGRAMS


Use cases are narrative descriptions of processes that you create early in a development cycle. They describe the interactions between external actors and your system, and help to understand the system requirements and the terminology used in the domain area. During the use case phase, you create use case diagrams.To understand the UML diagrams, we first need to understand the distinction between a diagram and a model.Models appear in a hierarchical tree view.Diagrams are views of a model that are represented by icons in the tree view.

4.2.1 Use case diagram:


After you can identify the use cases, you can create use case diagrams to put the use cases in context. Creating a use case diagram involves establishing a system boundary for a set of use cases and defining the lines of communication between a particular actor and use case. In the early stages of a development project, use case diagrams describe real world activities and motivations. You can refine the diagrams in later stages to reflect user interface and design details.

Tenali Engineering College

Page 21

Virus Information System

4.2.1.1 OVERVIEW/DFD

Login

User View virus

Administrator Search virus

Visitor Post virus

Logout

Tenali Engineering College

Page 22

Virus Information System

4.2.1.2 USECASE FOR ADMINISTRATOR:

Update virus

Accept/reject Virus

administrator Post Anti-virus

View Feedback

Searchvirus

4.2.1.3 USECASE FOR USER:

Viewvirus

Postvirus

Post anti-virus user

download antivirus

send Feedback

SearchVirus

Tenali Engineering College

Page 23

Virus Information System

4.2.1.4 USECASE FOR VISITOR:

ViewVirus

visitor

Send feedback

search virus

4.2.2 CLASS DIAGRAM:

Tenali Engineering College

Page 24

Virus Information System

4.2.3 SEQUENCE DIAGRAMS:


A type of interaction diagram, a sequence diagram shows the actors of objects participating in an interaction and the events they generate arranged in a time sequence. Often, a sequence diagram shows the events that result from a particular instance of a use case but a sequence diagram can also exist in a more generic form.The vertical dimension in a sequence diagram represents time, with time proceeding down the page. The horizontal dimension represents different actors or objects.

4.2.3.1Sequence Diagram for Administrator:

: ADMIN

LOGIN

ACCEPT/REJE CT USERS

POST VIRUS

POST ANTIVIRUS

VIEW FEEDBACK

SEARCH VIRUS

LOGOUT

LOGIN ACCEPT/REJECT

POST VIRUS

POST ANTIVIRUS

VIEW FEEDBACK

SEARCH VIRUS

LOGOUT

Tenali Engineering College

Page 25

Virus Information System

4.2.3.2 Sequence Diagram for Visitor:

VIEW VIRUS

SEND FEEDBACK

SEARCH VIRUS

: VISITOR

VIEW VIRUS SEND FEEDBACK SEARCH VIRUS

4.2.3.3 Sequence Diagram For User:

LOGIN

VIEW VIRUS

POSTVIRUS

POST ANTIVIRUS

DOWNLOAD ANTIVIRUS

SEND FEEDBACK

SEARCH VIRUS

LOGOUT

: USER

LOGIN VIEW VIRUS

POST VIRUS

POST ANTIVIRUS

DOWNLOAD ANTIVIRUS

SEND FEEDBACK

SEARCH VIRUS

LOGOUT

Tenali Engineering College

Page 26

Virus Information System

4.3 MODULE DESIGN


There are three modules related to this system. They are 1. visitor module 2. User module 3. administrator module

Visitor module:
He/she can search for virus He/she can view virus information He/she can send feedback to administrator

User module:
He/she first login into the system He/she can upload and download antivirus for the existing virus He/she can send feedback to the administrator He/she Can receive virus updates He/she Can post virus He/she Can view virus information He/she Can develop further to the existing system

Administrator module:
He/she Maintains or updates the wholr information system about viruses antiviruses He/she Has right to add or remove users He/she Can upload the antivirus with respect to the virus posted by users He/she Can view feedbacks that are3 sent by the users and visitors He/she Can view whole system information that is given by the users.

4.4 CONCLUSION
In this way we can design the layout of the project which is to be implemented during theconstruction phase. Thus we will have a clear picture of the project before being coded. Hence any necessary enhancements can be made during this phase and coding can be started. Tenali Engineering College Page 27

Virus Information System

5. IMPLEMENTATION AND RESULTS


5.1 INTRODUCTION
The implementation part is the most important phase of the project. In this phase, we code the entire project in the chosen software according to the design laid during the previous phase. The code has to be in such a way that the user requirements are satisfied and also not complicated for the user i.e., the user interface or GUI has to be easy to navigate. The code should be efficient in all terms like space, easy to update, etc. In this manner, we can complete the coding part of the project and later it can be sent for testing before being delivered to the customer.

5.2 Methods of Implementation Installing softwares:


First of all install java(jdk 1.6) next install OracleXE and finally install Apache tomcat5.0 while installing tomcat give the port number as 8009. You caninstall an IDE like ECLIPSE or an EditPlus editor to write Java programs (optional). Youcan even write them in notepad also. For the purpose of Testing you need to install J2MEUNIT testing tool.

Enable Path Settings


Now the path settings have to be enabled so that your system will be able torecognize the above installed softwares. Note that correct path have to be given otherwiseit may raise an error. The following picture depicts the method of setting path:

Tenali Engineering College

Page 28

Virus Information System

5.2.1 CREATING TABLES


Data Dictionary :
The Data dictionary describes the data base that can be used to manage the details of the organization. This will provide the administrator and also to the employees that are work in the organization to know the details whenever they want to retrieve the details.

Table Name: User


Sno 1 2 3 4 5 6 7 Column name Uno Uname Password Gender Address Emailid Qualification Data type Number(6) Varchar2(20) Varchar2(15) Varchar2(6) Varchar2(40) Varchar2(25) Varchar2(20) Not null Constraints Primary key Not null Not null Not null Not null Description Userno Username Password Gender Address Emailid Qualification

Tenali Engineering College

Page 29

Virus Information System

Table Name: Administrator

Sno 1 2 3 4 5

Column name Adname Password Gender Address Emailid

Data type Varchar2(20) Varchar2(15) Varchar2(6) Varchar2(40) Varchar2(25)

Constraints Primary key Not null Not null Not null

Description Admin name Password Gender Address Emailid

Table Name: Visitor

Sno 1 2 3 4 5 6

Column name Vno Vname Gender Address Emailid Comments

Data type Varchar2(20) Varchar2(15) Varchar2(6) Varchar2(40) Varchar2(25) Varchar2(40)

Constraints Primary key Not null Not null Not null

Description Virus no Virus name Gender Address Emailid Comments

Tenali Engineering College

Page 30

Virus Information System

Table Name: Upload

Sno Column name 1 2 3 4 5 6 7 8 Vno Vname Vtype Date Posted Posted By

Data type Number(6) Varchar2(15) Varchar2(15) Date Number(6)

Constraints Primary key Not null Not null Not null Not null Not null Not null

Description Virus no Virus name Virus type Date Posted Posted By Effected Files Effected Date Other Details

Effected Files Varchar2(40) Effected Date Other Details Date Varchar2(30)

Table Name: Virus


Sno 1 2 Column name Id Vname Data type Number(6) Varchar2(100) Constraints Primary key Not null Description Id Virusname

Table Name: Anti Virus

Sno 1 2 3 4 5 6

Column name Avno Avname Avtype Date Posted Locate File Posted By

Data type Number(6) Varchar2(15) Varchar2(15) Date Varchar2(40) Number(6)

Constraints Primary key Not null Not null Not null Not null Not null

Description Anti virusno Antivirus name Antivirus type Date Posted Locate File Posted By

Tenali Engineering College

Page 31

Virus Information System

Table Name: User Feedback


Sno 1 2 3 4 5 Column name Uno Send By Address Email Id Comments Data type Number(6) Varchar2(15) Varchar2(15) Varchar2(25) Varchar2(50) Constraints Primary key Not null Not null Not null Not null Description User no Send By Address Email Id Comments

Table Name: Visitor Feedback

Sno 1 2 3 4 5

Column name Vno Visitor name Address Email Id Comments

Data type Number(6) Varchar2(15) Varchar2(15) Varchar2(25) Varchar2(50)

Constraints Primary key Not null Not null Not null Not null

Description Virus no Visitor name Address Email Id Comments

Table Name: Antivirus for Virus


Sno Column name 1 2 3 4 Vno Vname Avname Avcost Data type Number(6) Varchar2(15) Varchar2(15) Varchar2(25) Constraints Primary key Not null Not null Not null Description Virus no Virus name Antivirus name Antivirus cost

Tenali Engineering College

Page 32

Virus Information System

5.2.2 Output Screens HOME PAGE SCREEN

Tenali Engineering College

Page 33

Virus Information System

HOME PAGE

ADMIN LOGIN SCREEN

Tenali Engineering College

Page 34

Virus Information System

ADMINSTRATOR MODULES SCREEN

POST VIRUS SCREEN

Tenali Engineering College

Page 35

Virus Information System

ACCEPT/REJECT SCREEN

POST ANTIVIRUS SCREEN

Tenali Engineering College

Page 36

Virus Information System

USER FEEDBACK SCREEN

SEARCH VIRUS SCREEN

Tenali Engineering College

Page 37

Virus Information System

LOGOUT SCREEN

NEWUSER REGISTRATION SCREEN

Tenali Engineering College

Page 38

Virus Information System

USER LOGIN SCREEN

VIRUS INFORMATION SCREEN

Tenali Engineering College

Page 39

Virus Information System

ANTIVIRUS INFORMATION SCREEN

NEW ANTIVIRUS UPLOAD SCREEN

Tenali Engineering College

Page 40

Virus Information System

USER ANTIVIRUS INFORMATION SCREEN

DOWNLOAD ANTIVIRUS SCREEN

Tenali Engineering College

Page 41

Virus Information System

USER FEEDBACK FORM

NEW USER DETAILS

Tenali Engineering College

Page 42

Virus Information System

5.2.3 Result Analysis


This system allows the users to report about new viruses and their symptoms.Allows freelance developers to develop antivirus.Provide latest updates.Take Feedbacks to optimize the system.Give performance rankings to the members.

5.3 Conclusion
In this way we implement the project successfully using java server pages for an easy interaction of the user to virus information with less effort work . we proceed to the next phase i.e.,testing which is very important while delevering the porject.

Tenali Engineering College

Page 43

Virus Information System

6.SYSTEM TESTING
6.1 INTRODUCTION:
Testing is performed after the coding phase. It is a major software quality control measure employed during software development. Its basic function is to detect the errors in the software. The goal of the testing is to uncover required design and coding errors in the programs. The input phase of the testing is the written code. Testing is performed with unit testing which detects errors in each module. These modules are integrated into subsystems and tested for integration. Eventually the overall system is tested which is called system testing. At the end, the system is tested with the real data at the place of installation called as acceptance testing. Testing involves selection of test cases on the basis of two methods. Functional testing, which involves selection test cases for testing the specifications of the system or the module. Structural testing, which involves testing the internal structure of the system or module. The goal of the testing is to select the test cases such that maximum number of errors can be detected by making use of minimum number of test cases. For this reason we generate the test cases on the basis of the test criteria. A criterion is valid if any error in the software can be revealed by the same test case satisfying the criteria.

6.2 Design of testcases:


Testing means quality test. Testing is a process of executing a program with the intent of finding an error. A good test case is one that has a high probability of finding an as yet undiscovered error. Objective should be to design test that systematically uncovers different classes of error. And to do with a minimum amount of time and effort. Testing cannot show the absence of Defects, it can only show that soft wear defects are present. It is important to keep this statement in one of these ways knowing the specific function that a product has been designed to perform, test can be conducted that demonstrate each function is fully operational. This approach is called black box testing. Knowing the internal working of the product, test can be conducted to ensure that all gears mesh that internal operation of the product performs according to specification and all internal components have been adequately exercised. This Approach is call white box testing.

Tenali Engineering College

Page 44

Virus Information System

TESTING PROCESS:
Testing performs a very critical role for quality assurance and ensuring the reliability of the software. During testing, the program to be tested is executed with a set of test cases and output of the program for the test case is evaluated to determine if the program is performing as it is expected to. Testing is a process of executing a program with the intent of finding errors. A good test case is one that has a high probability of finding as yet undiscovered error. A successful test is one yet uncovers as yet-undiscovered error.

TESTING TYPES:
Black box Testing focuses on the input/output behavior of the component. Black box tests do not deal with the internal aspects of the component nor with the behavior or the structure of the component. White box Testing focuses on the internal structure of the component. A white box test makes sure that every state in the dynamic model of the object and interactions among the objects are tested.

Client Needs Requirements Design Code

Acceptance Testing System Testing Integration Testing Unit Testing

Types of Testing

Tenali Engineering College

Page 45

Virus Information System

6.3 Testcases:
TEST CASE ID VIS_01 Enter the wrong username Error Message has to Error Message is Pass and password for Admin be displayed displaying TEST CASE EXPECTING BEHAVIOUR EXHIBITING BEHAVIOUR RES ULT

VIS_02

Login as Admin and Try It has to Add the new It to Add the new virus virus

is

Adding Pass

successfully

VIS_03

Login as Admin and Try It has to Display all It is Displaying all Pass to View the virus Details virus details virus details is adding Pass

VIS_04

Enter Registration first to It has to add the user It access the site details

registration details

VIS_05

Enter the wrong username Error Message has to Error Message is Pass and password for User be displayed displaying It is Displaying all Pass Virus Details

VIS_06

Login as User and try to It has to Display View virus all Virus Details

VIS_07

Login as User and try to It has to add new virus It is adding virus Pass add virus details details is adding Pass

VIS_08

Login as User and try to It has to add new It add antivirus information antivirus information

antivirus information

VIS_09

Login as User and try to It has to download It is downloaded Pass download antivirus antivirus information antivirus information

10

Login as User and try to It has to display the It Search virus virus information

id

displaying Pass

virus information Page 46

Tenali Engineering College

Virus Information System

6.3 VALIDATION
Validation aims to demonstrate that the software functions in a manner that can be reasonably expected by the customer. This tests conformance the software to the Software Requirements Specification. Here an experiment has done for checking the consistency for the user requirements regarding the username and password which should be validated through the server and the username and password should be matched and also the method Steganography implemented also checked for its consistency to provide security.

6.4 CONCLUSION:
In this way we also completed the testing phase of the project and ensured that the system is ready to go live

Tenali Engineering College

Page 47

Virus Information System

7.CONCLUSION & FUTURE SCOPE


CONCLUSION:
Using this project we can maintain all the information about viruses and details of different antivirus programs developed to counter and quarantine them. This project is a web application which runs on a web server so that users of any platform can access the system to utilize its resources and features. We have given centralized control of the system to the administrator so that he can act as a moderator between users and members of the system and they can have total abstraction of the internal details. The User interface is made user friendly so that novices can also access it. We have fulfilled all the requirements that are specified in the project abstract and all the necessary steps are taken for further development.

FUTURE SCOPE:
In Feature this application can be developed with effectively with Security implementation. It also implemented with different new tools also used for development. In feature the users can provide the different tips for the virus removal In feature the administrator can also upload the licensed antivirus for user access to purchase from the site. In feature it can also implemented to provide more security for the application.

Tenali Engineering College

Page 48

Virus Information System

BIBLIOGRAPHY
S. No Author of the Book Name of the Book Publisher Magazine Edition Year

01

Herbert Shieldt

The Complete Reference of Java

Gold

2003

02

Ivan Bayross

Web Enabled Commercial Application Development

TatMcGrahil

2001

03

Subramanyam Allam Raju

Professional Java Programming

Pattern And Java

1999

04

Roger Pressman

Software Engineering

Pearson Edition

1996

05

Roger S.Pressman

Software Engineering

MC-Graw-Hill International

1992

06

Bernerd Bruegge

Object-Oriented Soft ware Engineering

Wiley Edition

2000

WEBSITES:
www.java2s.com www.javascript.internet.com www.freecsstemplates.org www.roseindia.net Tenali Engineering College Page 49

Vous aimerez peut-être aussi