Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 5.1 Malicious Logic.

Slides:



Advertisements
Similar presentations
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.2: IPsec.
Advertisements

Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 3.1 Overview of Authentication.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.1 Firewalls.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.6 Kerberos.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.5 Transport Layer Security.
Computer Science CSC 405Dr. Peng Ning1 CSC 405 Introduction to Computer Security Topic 3. Program Security -- Part I.
CSC 474 Information Systems Security
Lecture: Malicious Code CIS 3360 Ratan K. Guha. Malicious Code2 Overview and Reading Assignments Defining malicious logic Types Action by Viruses Reading.
Lecture 13 Malicious Software modified from slides of Lawrie Brown.
Chapter 3 (Part 1) Network Security
CS526: Information Security Chris Clifton November 25, 2003 Malicious Code.
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #9-1 Chapter 19: Malicious Logic What is malicious logic Types of malicious logic.
Malicious Logic What is malicious logic Types of malicious logic Defenses Computer Security: Art and Science © Matt Bishop.
Silberschatz, Galvin and Gagne  Operating System Concepts The Security Problem A system is secure iff its resources are used and accessed as.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
________________ CS3235, Nov 2002 Viruses Adapted from Pfleeger[Chap 5]. A virus is a program [fragment] that can pass on malicious code [usually itself]
 Population: N=100,000  Scan rate  = 4000/sec, Initially infected: I 0 =10  Monitored IP space 2 20, Monitoring interval:  = 1 second Infected hosts.
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
Security: Attacks. 2 Trojan Horse Malicious program disguised as an innocent one –Could modify/delete user’s file, send important info to cracker, etc.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Privacy - not readable Permanent - not alterable (can't edit, delete) Reliable - (changes detectable) But the data must be accessible to persons authorized.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Malicious Logic What is malicious logic Defenses
1 Computer Viruses (and other “Malicious Programs) Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
1 Malicious Logic CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 25, 2004.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Computer Viruses Preetha Annamalai Niranjan Potnis.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
Fundamentals of The Internet Learning outcomes After this session, you should be able to: Identify the threat of intruders in systems and networks and.
Structure Classifications &
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Malware.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
CSCE 522 Lecture 12 Program Security Malicious Code.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
Malicious Code By Diana Peng. What is Malicious Code? Unanticipated or undesired effects in programs/program parts, caused by an agent with damaging intentions.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
30.1 Lecture 30 Security II Based on Silberschatz & Galvin’s slides And Stallings’ slides.
For any query mail to or BITS Pilani Lecture # 1.
CIS 442: Chapter 2 Viruses. Malewares Maleware classifications and types Viruses Logical and time bombs Trojan horses and backdoors Worms Spam Spyware.
Recent Internet Viruses & Worms By Doppalapudi Raghu.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Program Security Malicious Code Program Security Malicious Code.
Malicious Logic and Defenses. Malicious Logic Trojan Horse – A Trojan horse is a program with an overt (documented or known) effect and covert (undocumented.
VIRUS.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Slammer Worm By : Varsha Gupta.P 08QR1A1216.
Program Security 1. Program Security – Outline 3.1. Secure Programs – Defining & Testing Introduction Judging S/w Security by Fixing Faults Judging S/w.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
@Yuan Xue Worm Attack Yuan Xue Fall 2012.
Operating Systems Services provided on internet
Viruses and Other Malicious Content
Chap 10 Malicious Software.
Chapter 22: Malicious Logic
Security.
Chap 10 Malicious Software.
Operating System Concepts
Malicious Program and Protection
Chapter 9 Intruders and Viruses.
Presentation transcript:

Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 5.1 Malicious Logic

Computer Science CSC 474Dr. Peng Ning2 Outline Malicious logic –Trojan horses –Computer viruses –Worms –Rabbits and bacteria –Logic bombs Defenses against malicious logic

Computer Science CSC 474Dr. Peng Ning3 An Introductory Example Assume the following UNIX script is named ls and is placed in a directory. Assume. is in the path environment. What happens if the user tries to ls this directory? cp /bin/sh /tmp/.xxsh chmod o+s+w+x /tmp/.xxsh rm./ls ls $* A malicious logic is a set of intrusions that cause a sites security policy to be violated.

Computer Science CSC 474Dr. Peng Ning4 Trojan Horses A Trojan horse is a program with an overt (documented or known) effect and a covert (undocumented or unexpected) effect. File F A:r A:w File G B:r A:w ACL Principal A Program Goodies Trojan Horse executes read write

Computer Science CSC 474Dr. Peng Ning5 Computer Viruses A computer virus is a program that inserts itself into one or more files and then performs some (possibly null) action. Two phases –Insertion phase The virus inserts itself into a file (or files) –Execution phase The virus executes

Computer Science CSC 474Dr. Peng Ning6 Computer Virus (Contd) Boot sector infectors –The boot sector is the part of a disk used to bootstrap the system. –Code in a boot sector is executed when the system sees the disk for the first time. 1.Move the disk interrupt vector 13H to 6DH 2.Set 13H to invoke Brian virus 3.Load the original boot sector Brian Virus

Computer Science CSC 474Dr. Peng Ning7 Boot Sector Infector (Contd) 1.Copy the old boot sector to alternative place; 2.Insert itself into the boot sector. Boot sector Virus Infecting disks

Computer Science CSC 474Dr. Peng Ning8 Computer Viruses (Contd) Executable infectors –Triggered if an infected program is executed –Infect executables COM and EXE Executable code and dataHeader Virus Header Executable code and data First program instruction

Computer Science CSC 474Dr. Peng Ning9 Computer Viruses (Contd) Terminate and Stay Resident (TSR) virus –Stays active in memory after the application (or bootstrapping) has terminated. 1.Move the disk interrupt vector 13H to 6DH 2.Set 13H to invoke Brian virus 3.Load the original boot sector Brian Virus New disks will be infected as long as the virus is in memory.

Computer Science CSC 474Dr. Peng Ning10 Computer Viruses (Contd) Stealth viruses –Conceal the infection of files –Make itself difficult to detect Polymorphic viruses –Encrypt itself with a random key –Avoid detection by anti-virus programs, which search for patterns of viruses. Metamorphic viruses –Change its form each time it inserts itself into another program.

Computer Science CSC 474Dr. Peng Ning11 Computer Viruses (Contd) Macro viruses –Viruses composed of instructions that are interpreted, rather than executed. –Examples Word viruses viruses –MS Office suite is the most popular target.

Computer Science CSC 474Dr. Peng Ning12 Worms A computer worm is a program that copies itself from one computer to another. Different from viruses –Viruses depend on other programs –Worms are usually standalone applications –Viruses usually trick people into propagating them –Worms can hack into vulnerable systems and spread without depending on others

Computer Science CSC 474Dr. Peng Ning13 The Sapphire/Slammer Worm Facts about Sapphire/Slammer –Happened slightly before 5:30 UTC on Saturday, January 25, –The fastest worm in history. –Doubled in size every 8.5 seconds at the beginning –Infected more than 90% of vulnerable hosts within 10 minutes

Computer Science CSC 474Dr. Peng Ning14 The Sapphire/Slammer Worm (Contd) How does it find vulnerable computers? –Random scanning Select IP addresses at random to infect How does it get into vulnerable computers? –Exploit a buffer overflow vulnerability in MS SQL Server or MSDE 2000 Vulnerability discovered in July 2002 Why was it so fast? –Small: 376 bytes; a 404 byte UDP packet –Based on UDP

Computer Science CSC 474Dr. Peng Ning15 The Sapphire/Slammer Worm (Contd) Whats its real impact (so far)? –Sapphire does not have a malicious payload –The Internet was saturated. Too many hosts are infected and are trying to infect randomly selected hosts.

Computer Science CSC 474Dr. Peng Ning16 Rabbits and Bacteria A bacterium or a rabbit is a program that absorbs all of some class of resource. Example –Exhaust disk space –Exhaust inode tables

Computer Science CSC 474Dr. Peng Ning17 Logic Bombs A logic bomb is a program that performs an action that violates the security policy when some external event occurs.

Computer Science CSC 474Dr. Peng Ning18 Defenses against Malicious Logic Type enforcement by human users –A program being written is considered data –A program must be changed into executable by a certifying authority before its executed.

Computer Science CSC 474Dr. Peng Ning19 Defense against Malicious Logic (Contd) Limiting the users access domain –Idea: limit the objects that can be accessed by a malicious logic that assumes the users privilege. Methods –Control information flow distances Ex. Information cannot flow more than n times –Reduce the rights –Sandboxing Implicitly restrict process rights –Ex. Insert special instructions that cause traps whenever an instruction violates the security policy.

Computer Science CSC 474Dr. Peng Ning20 Defense against Malicious Logic (Contd) Inhibit users from sharing programs in different domains –An extreme: isolated domains Detect modified files –Using cryptographic checksums to detect alteration of files

Computer Science CSC 474Dr. Peng Ning21 Defense against Malicious Logic (Contd) Proof-carrying code –Carry proof with the code –It can be verified (to a certain extent) that the program does what it is supposed to do –A program essentially carries an abstract version of itself so that the binary can be checked against this version.