Viruses, Worms, Zombies, and other Beasties COS 116, Spring 2011 Sanjeev Arora (based on lecture by Alex Halderman)

Slides:



Advertisements
Similar presentations
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Advertisements

Viruses, Worms, Zombies, and other Beasties COS 116: 4/10/2008 Sanjeev Arora.
Computer Basics Rabie A. Ramadan, PhD 6. Viruses, Worms, Zombies, and others 2.
Viruses, Worms, Zombies, and other Beasties COS 116, Spring 2012 Adam Finkelstein.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Computer Viruses.
The Internet = A World of Opportunities
Introduction to Security Computer Networks Computer Networks Term B10.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Computer Security Fundamentals by Chuck Easttom Chapter 5 Malware.
INTERNET SAFETY FOR EVERYONE
Chapter Nine Maintaining a Computer Part III: Malware.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Online Annoyances Spam – electronic junk mail
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Viruses.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Internet Security facilities for secure communication.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, + colleagues.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Administrative: Objective: –Tutorial on Risks –Phoenix recovery Outline for today.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 47 How Viruses Work.
Types of Electronic Infection
HDSB Security Awareness Training. Introduction Good security standards follow the 90/10 rule: 10% of security safeguards are technical. 90% of security.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Computer security By Isabelle Cooper.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
Computer and Network Security Rabie A. Ramadan Lecture 4.
Understand Malware LESSON Security Fundamentals.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
A Quick and Easy Crash Course Internet Safety for Everyone.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Botnets A collection of compromised machines
Protect Your Computer Against Harmful Attacks!
Botnets A collection of compromised machines
Risk of the Internet At Home
Computer Basics Rabie A. Ramadan, PhD 6.
Viruses, Worms, Zombies, and other Beasties
Viruses, Worms, Zombies, and other Beasties
Introduction to Internet Worm
Presentation transcript:

Viruses, Worms, Zombies, and other Beasties COS 116, Spring 2011 Sanjeev Arora (based on lecture by Alex Halderman)

Encryption (topic next week) Encryption strongly protects data en route YouAmazon.com Today’s story: Attacker can compromise your computer without breaking encryption.

Encrypted ≠ Secure Break into your computer and “sniff” keystrokes as you type YouAmazon.com

Breaking into a Computer What does it mean? How is it done? Can we prevent it?

What’s at Stake? Kinds of damage caused by insecurity  Nuisance: spam, …  Data erased, corrupted, or held hostage  Valuable information stolen (credit card numbers, trade secrets, etc.)  Services made unavailable ( and web site outages, lost business) Other fears: cybercrime, terrorism, etc.

Main themes of today’s lecture Self-reproducing programs: viruses, worms, zombies Other threats to computer security Internet = Today’s Wild West There is no silver bullet against cyber crime, but follow good security practices

Breaking into a Computer What?  Run unauthorized software How?  Trick the user into running bad software (“social engineering”)  Exploit software bugs to run bad software without the user’s help

Example of “social engineering”: Trojan Horse CoolScreenSaver.exe

Viruses and Worms Automated ways of breaking in; Use self-replicating programs (Recall self-replicating programs: Print the following line twice, the second time in quotes. “Print the following line twice, the second time in quotes.” )

Computer Viruses Self-replicating programs that spread by infecting other programs or data files Payload Cool Screen Saver Must fool users into opening the infected file NotepadSolitairePaint Payload

Viruses Infected program, screen saver, or Word document launches virus when opened Use social engineering to entice you to open the virus attachment Self-spreading: after you open it, automatically s copies to everyone in your address book Other forms of social engineering: downloadable software/games, P2P software, etc.

The Melissa Virus (1999) Social engineering: says attachment contains porn site passwords Self-spreading: Random 50 people from address book Traffic forced shutdown of many servers $80 million damage 20 months and $5000 fine David L. Smith Aberdeen, NJ

Payload Computer Worms Self-replicating programs like viruses, except exploit security holes in OS (e.g., bugs in networking software) to spread on their own without human intervention Payload

“Can we just develop software to detect a virus/worm?” [Adleman’88] This task is undecidable. (so no software can work with 100% guarantee) No real guarantee Current methods: (i) Look for snippets of known virus programs on harddrive (ii) maintain log of activities such as network requests, read/writes to hard-drive and look for “suspicious” trends (iii) look for changes to OS code.

A losing battle? Constant battle between attackers and defenders Example:  Anti-virus software finds “signature” of known virus  Attacker response: Polymorphic virus – to thwart detection, change code when reproduced  Anti-virus software adapts to find some kinds of polymorphism  But an infinite number of ways to permute viruses available to attackers

12600 Example of how worms spread: Buffer Overflow bug Space reserved for subject Return address Memory From: COS 116 Staff Subject: Welcome Students! …WelcomeStudents!12600 …<evilcode > From: Bad Guy Subject: Buffer overflow bug: Programmer forgot to insert check for whether subject is too big to fit in memory “buffer”  memory address:

The Morris Worm (1988) First Internet worm Created by student at Cornell Exploited holes in servers, other programs Infected ~10% of the net Spawned multiple copies, crippling infected servers Sentenced to 3 years probation, $10,000 fine, 400 hours community service Robert Tappan Morris

The Slammer Worm (2003) Fastest spreading worm to date Only 376 bytes—Exploited buffer overflow in Microsoft database server products Spread by sending infection packets to random servers as fast as possible, hundreds per second Infected 90% of vulnerable systems within 10 minutes! 200,000 servers No destructive payload, but packet volume shut down large portions of the Internet for hours 911 systems, airlines, ATMs — $1 billion damage! Patch already available months previously, but not widely installed

Why is it so hard to stop Worms? Spread of the Slammer worm

Why do people write worms and viruses? Sometimes because they are curious / misfits / anarchists / bored…

Main reason: Botnets Virus/worm payload: Install bot program on target computer Bot makes target a zombie, remotely controlled by attacker Many zombies harnessed into armies called botnets – often 100,000s of PCs

Bot Zombies Bot program runs silently in the background, awaiting instructions from the attacker Attacker’s Program

Why go to the trouble of creating a botnet?

“Distributed Denial of Service” Objective: Overwhelm target site with traffic. Example: Wikileaks incidents 2010 Reason 1: DDOS Attacks “Attack

Messages are hard to filter because there are thousands of senders Reason 2: Sending Spam “Forward this message: Subject: Viagra! …”

Other reasons Click fraud. Commit other cybercrime that is hard to trace

Storm Botnet o Created via scam in 2007 spread to a million computers o Owners unknown (believed to be Russian) o Used for DoS and spams, available for “rent” o Fiendishly clever design distributed control, similar to Kazaa, Gnutella rapidly morphing code; morphs every hour or so seems to detect attempts to track/contain it and “punishes” its pursuers

How can researchers study and track a botnet consisting of 100,000 zombies? How could the creators of the botnet evade these techniques? Discuss in groups of 3 and jot down some ideas. Discussion Time

And if you weren’t scared enough already…

Spyware/Adware Hidden but not self-replicating Tracks web activity for marketing, shows popup ads, etc. Usually written by businesses: Legal gray area

Spoofing Attacks You Amaz0n.com Attacker impersonates the merchant (“spoofing”) Your data is encrypted… …all the way to the bad guy! Amaz0n.com’s key

International warfare by other means Stuxnet: Computer worm allegedly created by US and Israeli intelligence to target Iranian nuclear processing faciltiies.

Attackers are Adaptive Defenders must continually adapt to keep up

Can we stop computer crime? Probably not! Wild West nature of the Internet Software will always have bugs Rapid exponential spread of attacks But we can take steps to reduce risks…

Protecting Your Computer Six easy things you can do… Keep your software up-to-date Use safe programs to surf the ‘net Run anti-virus and anti-spyware regularly Add an external firewall Back up your data Learn to be “street smart” online

Keep Software Up-to-Date

Use Safe Software to Go Online Firefox (web browser) Thunderbird ( )

Anti-virus / Anti-spyware Scans Symantec Antivirus (Free from OIT) Spybot Search & Destroy (Free download)

Add an External Firewall Provides layered security (think: castle walls, moat) (Recent operating systems have built-in firewall features)

Back Up Your Data Tivoli Storage Manager (Free from OIT)

Learn Online “Street Smarts” Be aware of your surroundings  Is the web site being spoofed? Don’t accept candy from strangers  How do you know an attachment or download isn’t a virus, Trojan, or spyware? Don’t believe everything you read  may contain viruses or phishing attack – remember, bad guys can forge from your friends