Worms By: Aaron Stahler. Difference Between a Worm and A Virus Viruses are computer programs that are designed to spread themselves from one file to another.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Computer Viruses.
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Computer Security and Penetration Testing
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
100% Security “ The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Hierarchical file system Hierarchical file system - A hierarchical file system is how drives, folders, and files are displayed on an operating system.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Network and Internet Security SYSTEM SECURITY. Virus Countermeasures Antivirus approach ◦Ideal solution: Prevention ◦Not allowing the virus to infect.
1. 2 What is security? Computer Security deals with the prevention and detection of, and the reaction to, unauthorized actions by users of a computer.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
D. Beecroft Fremont High School VIRUSES.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Administrative: Objective: –Tutorial on Risks –Phoenix recovery Outline for today.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Types of Electronic Infection
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
Viruses : Notorious Pests James Barnes II Worms and Viruses Worms and Viruses | Solutions | Worms and Viruses | Myth | Prevention | Final WordSolutions.
Recent Internet Viruses & Worms By Doppalapudi Raghu.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Topic 5: Basic Security.
CONTENTS What is Virus ? Types of computer viruses.
Malicious Software.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
Understand Malware LESSON Security Fundamentals.
W elcome to our Presentation. Presentation Topic Virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
1 3 Computing System Fundamentals 3.7 Utility Software.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
MALICIOUS SOFTWARE Rishu sihotra TE Computer
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Malicious Programs (1) Viruses have the ability to replicate themselves Other Malicious programs may be installed by hand on a single machine. They may.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
Operating Systems Services provided on internet
Viruses and Other Malicious Content
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Test 3 review FTP & Cybersecurity
Malicious Program and Protection
Presentation transcript:

Worms By: Aaron Stahler

Difference Between a Worm and A Virus Viruses are computer programs that are designed to spread themselves from one file to another on a single computer. Worms are insidious because they rely less (or not at all) on human behavior in order to spread themselves from one computer to another and unlike viruses worms are not worried how many time they get copied on one machine but rather how many machines they infect.

Worm Classification Classified Based on Two Characteristics: 1.Worm Transport Classifications 2.Worm Launch Classifications

Worm Transport Classifications Worms – Native Embedded in the – Parasitic Sent as an attachment Arbitrary protocol Worms: IRC Worms, TCIP/IP Worms – Spread by using one or more non based protocols

Worm Launch Classifications: How it Gains Control Self -launching Worms – Worms that are capable of spreading to a new system and actively running on that system. User-launched Worms – Require user intervention in order to execute on a system. Hybrid-launch Worms – Are capable of spreading using both of the above mechanisms

Brief History of Worms The Xerox Worms: The first Computer Worms (1980) The CHRISMA EXEC Worm: The First Widespread , User-launched Worm (1987) The Internet Worm: The First Arbitrary Protocol, BACK Door Worm (1988) The IRC Worms: The First Consumer-oriented Arbitrary Protocol, Self Launching Worms (1997)

Brief History of Worms The Happy99 Worm: The First Mainstream Consumer-oriented Worm (1999) The Melissa Virus+Worm: The First Mainstream Corporate Macro Hybrid The ExploreZip Worm: The First Widespread Hybrid-launch, Arbitrary Protocol Worm Conficker:

Evolution of Enabling Technology Infrastructural Homogeneity: Homogeneity of computers, operating systems and communications platforms has been the single largest enabler for computer worms. Ubiquitous Programmability: Ubiquitous programmability of Windows components has made it possible for worms to spread without complex programming. Increased Connectedness via Homogenous Communications Mechanism: The increasing connectedness of the internet permits worms to spread faster, and to more machines, than ever before.

Other Factors Corporate/Consumer Bridge Technologies: The Malware authors only program against the worms they see. Home Networking: Many virus writers can test their product on these unsecured home network, so when they finally unleash the full version it has already been tested.

Future of Worms Cable/DSL Brings Worms Home: Continuous static connection+ Connected desktop apps+ scripting Capabilities= Worm heaven MAPI Worms: Such as Outlook, Exchange, and etc. Worms can leverage functionality. Information Stealers and Remote Control Worms: Example Prettypark worm sits on someone's computer and waits for the creator to call on it to retrieve information or send malicious code out. Peer-to-Peer Worms: Sent through s and any peer-to-peer networks. Scripting Worms: that has code scripted inside so when you open the your computer is infected. Mostly in corporate settings. ActiveX and Java Worms: Very rare but uses ActiveX to be deployed on the system

Second Generation Worms Polymorphic Worms: sends a virtually identical text message to everyone through and peer-to-peer. Retro Worms: These worms actively attack anti- virus software prevent themselves from being discovered. Stubborn Worms: The worms that prevent themselves from being unloaded from a system. Wireless Worms: These can attack palm pilots and other wireless devices.

Examination of Worms Epidemics Case Study on Mass Worms Easy to obtain “addresses” of other targets Homogenous makes spreading easy Humans are the biggest security risk: there's no need to find a back door into the system Corporate systems offer “one degree of separation” Why infect one other computer when you can infect 50 or 50,000 Spread to other computers as soon as they can Mailbox Penetration or computer penetration

Easy Ways to Exploit a System 1.Exploiting default passwords that have not been reset, to gain access to the system. 2.Using dictionary based password attacks to break into user accounts and remotely login to a system. 3.Using buffer overflows. 4.Exploitation of debugging facilities that are built into standard network services. 5.Attack of non-secured shared drives and peer- to-peer devices.

Case Study: Back Door Worms and The Internet Worm It’s easy to obtain “addresses” of other targets Homogeneous environments makes spreading easy Back door worms spread best unhindered Spread to other computers without user intervention

Case Study: Hybrid Worms and ExploreZip It’s easy to obtain “addresses” of other targets Homogeneous computers makes spreading easy The human is the biggest security risk; there’s no need to find a back door into the system It can Spread Slowly or Spread Quickly Mailbox penetration or computer penetration can happen Payload and trigger conditions affect the worms’ viability

Containment Proactive Steps Run Anti-virus Software on Servers, Gateways, and Desktops Remove “all company” Addresses from your lists Lock Down All Peer-to-Peer Networking Deploy Internal Firewalls Disable Script Capabilities Strip Executable Content From Incoming Use Heuristics and If Possible, Digital Immune System Technology

Active Infection If hit by a destructive Worm: Update File Server Permissions If hit by a data export Worm: Limit access to data and Networks If hit by an or arbitrary-protocol Worm infection: Distribute Virus definitions to gateways, servers and file servers first If hit by a file server-aware Worm infection: Distribute virus definitions to file servers first If hit by a back door Worm infection: Down all affected networks

Future Anti-worm Technologies Windows Memory Scanning and Repair Behavior Blockers Personal Firewalls Worm Heuristics Automated Worm Replication and Analysis

Future Containment Approaches Ubiquitous Authentication Policy-driven File/Macro-level Access Control Macro-free Products