SCSC 455 Computer Security 2011 Spring Chapter 5 Malware.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Lecture: Malicious Code CIS 3360 Ratan K. Guha. Malicious Code2 Overview and Reading Assignments Defining malicious logic Types Action by Viruses Reading.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
1 Anti Virus vs virus System i-Specific Anti-Virus Product Ali ameen al said.
 Population: N=100,000  Scan rate  = 4000/sec, Initially infected: I 0 =10  Monitored IP space 2 20, Monitoring interval:  = 1 second Infected hosts.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Hands-On Ethical Hacking and Network Defense Chapter 3 Network and Computer Attacks.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
CAP6135: Malware and Software Vulnerability Analysis Viruses Cliff Zou Spring 2011.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Viruses.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Hacker Zombie Computer Reflectors Target.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Internet Worms Brad Karp UCL Computer Science CS GZ03 / th December, 2007.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
CIS3360: Security in Computing Chapter 4.2 : Viruses Cliff Zou Spring 2012.
Staying Safe Online Keep your Information Secure.
Chapter 3 Network and Computer Attacks. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the different.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
CAP6135: Malware and Software Vulnerability Analysis Viruses Cliff Zou Spring 2015.
For any query mail to or BITS Pilani Lecture # 1.
Recent Internet Viruses & Worms By Doppalapudi Raghu.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Worm Defense Alexander Chang CS239 – Network Security 05/01/2006.
Malicious Software.
VIRUS.
Computer Skills and Applications Computer Security.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
Understand Malware LESSON Security Fundamentals.
Slammer Worm By : Varsha Gupta.P 08QR1A1216.
W elcome to our Presentation. Presentation Topic Virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
By Thomas Pantone Cosc 380.  A virus is a type of malware that self replicates after being executed and inserts itself into other programs, data files,
Week-14 (Lecture-1) Malicious software and antivirus: 1. Malware A user can be tricked or forced into downloading malware comes in many forms, Ex. viruses,
@Yuan Xue Worm Attack Yuan Xue Fall 2012.
Protecting Computers From Viruses and Similarly Programmed Threats Ryan Gray COSC 316.
3.6 Fundamentals of cyber security
Acknowledgement This lecture uses some contents from the lecture notes from: Dr. Vitaly Shmatikov CS Network Security and Privacy Introduction to.
Computer Applications Unit B
Chap 10 Malicious Software.
Brad Karp UCL Computer Science
Chap 10 Malicious Software.
Introduction to Internet Worm
Presentation transcript:

SCSC 455 Computer Security 2011 Spring Chapter 5 Malware

2 Index Malware Overview Virus Propagation of Viruses Worm Trojan Horses and other malware Methods against malware attacks

3 Malicious Software (Malware) Malicious software often masquerades as good software or attaches itself to good software  Some malicious programs need host programs Trojan horses, viruses, logic bombs  Others can exist and propagate independently Worms Goals of malware  Destroy data  Corrupt data  Shutdown networks or systems

4 Malware classification Malicious software includes  Virus  Worm  Trojan programs  Spyware  Adware

5 Index Malware Overview Virus Worm Trojan Horses and other malware Methods against malware attacks

6 Viruses propagation Virus propagates by infecting other programs  Automatically creates copies of itself, but to propagate, a human has to run an infected program  In contrast, self-propagating malicious programs are usually called worms Many propagation methods …  Insert a copy into every executable (.COM,.EXE)  Insert a copy into boot sectors of disks E.g., Stoned virus infected PCs booted from infected floppies, stayed in memory and infected every floppy inserted into PC  Infect TSR (terminate-and-stay-resident) routines By infecting a common OS routine, a virus can always stay in memory and infect all disks, executables, etc.  Etc.

7 Virus Classification Stealth viruses  Mutation  Aliasing Macro viruses  What is Macro? Polymorphic viruses  Viruses that mutate and/or encrypt parts of their code with a randomly generated key  changing the encryption routine, the sequence of instructions, or other such changes in the behavior of the virus Detail of each …

8 Mutation: virus has multiple binary variants  Defeats naïve signature-based detection  Used by the most successful (i.e., widespread) viruses e.g., Tanked: 62 variants, SdDrop: 14 variants Aliasing: virus places its copies under different names into the infected host’s sharing folder e.g., “ICQ Lite.exe”, “ICQ Pro 2003b.exe”, “MSN Messenger 5.2.exe” Virus Stealth Techniques [Shin, Jung, Balakrishnan]

9 Macro Viruses Macro viruses are virus encoded as a macro  Macro virus is lists of commands that can be used in destructive ways  When infected document is opened, virus copies itself into global macro file and makes itself auto-executing  Most macro viruses are very simple. Even nonprogrammers can create macro viruses Instructions posted on Web sites (You will read more about macro viruses in the reading article 3.)

10 Evolution of Polymorphic Viruses (1) Anti-virus scanners detect viruses by looking for signatures  signatures are snippets of known virus code Encrypted viruses: virus consists of a constant decryptor, followed by the encrypted virus body  Relatively easy to detect because decryptor is constant  E.g., Cascade (DOS), Mad (Win95), Zombie (Win95) Oligomorphic viruses: different versions of virus have different encryptions of the same body  Small number of decryptors (96 for Memorial viruses);  To detect, must understand how they are generated

11 Evolution of Polymorphic Viruses (2) Polymorphic viruses: constantly create new random encryptions of the same virus body  Virus must contain a polymorphic engine for creating new keys and new encryptions of its body Rather than use an explicit decryptor in each mutation, it decrypts its body by brute-force key search  E.g., Marburg (Win95), HPS (Win95), Coke (Win32)

12 How Hard Is It to Write a Virus? 2268 matches for “virus creation tool” in CA’s Spyware Information Center  Including dozens of poly- and metamorphic engines OverWritting Virus Construction Toolkit  "The perfect choice for beginners“ Biological Warfare Virus Creation Kit  Note: all viruses created this way will be detected by Norton Anti-Virus Vbs Worm Generator (for Visual Basic worms)  Used to create the Anna Kournikova worm

13 Index Malware Overview Virus Propagation of Viruses Worm Trojan Horses and other malware Methods against malware attacks

14 Websites with popular content  Games: 60% of websites contain executable content, one-third contain at least one malicious executable  Celebrities, adult content, everything except news Most popular sites with malicious content (Oct 2005) Propagation of Viruses [Moshchuk et al.]

15 Millions of users willingly download files e.g., KaZaA: 2.5 million users in May 2006 Easy to insert an infected file into the network  Pretend to be an executable of a popular application e.g., “Adobe Photoshop 10 full.exe”, “WinZip 8.1.exe”, …  Infected MP3 files are rare When executed, the malicious file opens a backdoor for the remote attacker  Steal user’s confidential information; spread spam 70% of infected hosts are already on DNS spam blacklists Viruses in P2P Networks [Shin, Jung, Balakrishnan]

study of 500,000 KaZaA files  Look for 364 patterns associated with 71 viruses Up to 22% of all KaZaA files infected  52 different viruses and Trojans  Another study found that 44% of all executable files on KaZaA contain malicious code  When searching for “ICQ” or “Trillian”, chances of hitting an infected file are over 70% Prevalence of Viruses in KaZaA [Shin, Jung, Balakrishnan]

17 Dangerous KaZaA Queries [Shin, Jung, Balakrishnan]

18 Index Malware Overview Virus Propagation of Viruses Worm Trojan Horses and other malware Methods against malware attacks

19 Worms Worm are self-propagating malicious programs  Replicates and propagates without a host Worms can infect a large number of computers in a short time Infamous examples: the Morris worm, Code Red I & Code Red II, Slammer, Nimda

20 Viruses vs. Worms VIRUS Propagates by infecting other programs Usually inserted into host code (not a standalone program) WORM Propagates automatically by copying itself to target systems Is a standalone program

21 Summer of 2001 [from “How to 0wn the Internet in Your Spare Time”] Three major worm outbreaks

22 Code Red I July 13, 2001: is the first worm of the modern era  Exploited buffer overflow in Microsoft’s Internet Information Server (IIS) How does Code Red I work? 1 st through 20 th of each month: spread  Find new targets by random scan of IP address space Spawn 99 threads to generate addresses and look for IIS  Creator forgot to seed the random number generator, and every copy scanned the same set of addresses 21 st through the end of each month: attack  Deface websites !

23 August 4, 2001: explore the same IIS vulnerability, completely different code,  Worked only on Windows 2000, crashed NT  Died by design on October 1, 2001 Scanning algorithm preferred nearby addresses  Chose addresses from same class A with probability ½, same class B with probability 3/8, and randomly from the entire Internet with probability 1/8 Payload: installed root backdoor in IIS servers for unrestricted remote access Code Red II Q: what is the class A, class B …?

24 Slammer Worm January 24/25, 2003: UDP worm exploiting buffer overflow in Microsoft’s SQL Server  Buffer overflow was already known and patched by Microsoft  but not everybody installed the patch Entire code fits into a single 404-byte UDP packet  Worm binary followed by overflow pointer back to itself Classic buffer overflow combined with random scanning:  once control is passed to worm code, it randomly generates IP addresses and attempts to send a copy of itself to port 1434  MS-SQL listens at port 1434 (We’ll see how buffer overflow works in the next chapter “network attacks”)

25 Slammer Propagation Scan rate of 55,000,000 addresses per second  Scan rate = rate at which worm generates IP addresses of potential targets  Up to 30,000 single-packet worm copies per second Initial infection was doubling in 8.5 seconds (!!)  Doubling time of Code Red was 37 minutes Worm-generated packets saturated carrying capacity of the Internet in 10 minutes  75,000 SQL servers compromised  And that’s in spite of broken pseudo-random number generator used for IP address generation

26 05:29:00 UTC, January 25, 2003 [from Moore et al. “The Spread of the Sapphire/Slammer Worm”]

27 30 Minutes Later [from Moore et al. “The Spread of the Slammer Worm”]

28 Secret of Slammer’s Speed Old-style worms (Code Red) spawn a new thread which tries to establish a TCP connection and, if successful, send a copy of itself over TCP  Limited by latency of the network Slammer was a connectionless UDP worm  No connection establishment, simply send 404-byte UDP packet to randomly generated IP addresses  Limited only by bandwidth of the network

29 Slammer Impact $1.25 Billion of damage Temporarily knocked out many elements of critical infrastructure  Bank of America ATM network  Entire cell phone network in South Korea  Five root DNS servers  Continental Airlines’ ticket processing software The worm did not even have malicious payload  simply bandwidth exhaustion on the network and resource exhaustion on infected machines

30 Index Malware Overview Virus Propagation of Viruses Worm Trojan Horses and other malware Methods against malware attacks

31 Trojan Horses Trojan horse is malicious code hidden in an apparently useful host program When the host program is executed, Trojan does something harmful or unwanted  User must be tricked into executing the host program  E.g., In 1995, a program distributed as PKZ300B.EXE looked like a new version of PKZIP… When executed, it formatted your hard drive. Trojans do NOT replicate  This is the main difference from worms and viruses

32 Trojan Insidious attack Trojan insidious attack against networks  Disguise themselves as useful programs, hide malicious contents (Backdoors, Rootkits) in program  Allow attackers remote access Trojan programs also use known ports  HTTP (TCP 80) or DNS (UDP 53)

33 Common Trojan Programs and Ports Used (details are not required)

34 Rootkits (revisit) Rootkit is a set of Trojan program binaries  Main characteristic: stealthiness (hides infection from the host’s owner)  Create a hidden directory /dev/.lib, /usr/src/.poop and similar Often use invisible characters in directory name Install hacked binaries for system programs such as netstat, ps, ls, du, login Typical infection path:  Use stolen password or dictionary attack to log in  Use buffer overflow in rdist, sendmail, loadmodule, rpc.ypupdated, lpr, or passwd to gain root access  Download rootkit by FTP, unpack, compile and install

35 Detecting Rootkit Presence Sad way to find out  Run out of physical disk space because of sniffer logs  Logs are invisible because du and ls have been hacked! Manual confirmation  Reinstall clean ps and see what processes are running Automatic detection  Host-based intrusion detection can find rootkit files assuming an rootkit did not disable your intrusion detection system!

36 Spyware Sends information from the infected computer to the attacker  Confidential financial data  Passwords  PINs  Any other stored data Can even registered each keystroke entered

37 Adware Similar to spyware  Can be installed without the user being aware  Display unwanted pop-up ads. Main goal  Determine user’s online purchasing habits  Tailored advertisement Problem of Adwares  Slows down computers

38 Index Malware Overview Virus Propagation of Viruses Worm Trojan Horses and other malware Methods against malware attacks

39 Protecting Against Malware Attacks Protecting against malware is a difficult task  New viruses, worms, Trojan programs appear daily  Most of antivirus software use signature to check known viruses.

40 Educating Your Users Structural training  Includes all employees and management monthly security updates  Is a simple but effective training method Recommend that users update virus signature database  Activate automatic updates

41 Defense via Software and Hardware Anti-virus software SpyBot and Ad-Aware  Help protect against spyware and adware Firewalls  Hardware (enterprise solution)  Software (personal solution) Intrusion Detection System (IDS)  Monitors your network 24/7