Data Security and Encryption (CSE348) 1. Lecture # 27 2.

Slides:



Advertisements
Similar presentations
Computer Security Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Chapters 14 and 15 Operating Systems: Internals and Design Principles,
Advertisements

Data and Computer Communications
30/04/2015Tim S Roberts COIT13152 Operating Systems T1, 2008 Tim S Roberts.
Lecture 13 Malicious Software modified from slides of Lawrie Brown.
Chapter 18: Computer and Network Security Threats
Cryptography and Network Security Chapter 19 Fourth Edition by William Stallings.
Karlstad University Malware Ge Zhang Karlstad Univeristy.
Malware Ge Zhang Karlstad Univeristy. Focus What malware are Types of malware How do they propagate How do they hide How to detect them.
Chapter 14 Computer Security Threats
Cryptography and Network Security Malicious Software Third Edition by William Stallings Lecturer: Dr. Saleem Alzoubi.
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
Malicious Software programs exploiting system vulnerabilities known as malicious software or malware program fragments that need a host program e.g. viruses,
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Cryptography and Network Security Chapter 21
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Logical Security threats. Logical security Protects computer-based data from software-based and communications- based threats.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 7 – Malicious Software.
Malicious Software Malicious Software Han Zhang & Ruochen Sun.
1 Ola Flygt Växjö University, Sweden Malicious Software.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Network and Internet Security SYSTEM SECURITY. Virus Countermeasures Antivirus approach ◦Ideal solution: Prevention ◦Not allowing the virus to infect.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
CSCE 201 Attacks on Desktop Computers: Malicious Code Hardware attacks.
BY ANDREA ALMEIDA T.E COMP DON BOSCO COLLEGE OF ENGINEERING.
Malicious Software CIS 4361 Eng. Hector M Lugo-Cordero, MS Feb
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
VIRUSES - Janhavi Naik. Overview Structure Classification Categories.
Structure Classifications &
1 Chapter 19: Malicious Software Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal, U of Kentucky)
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
Chapter 11 Malicious Software
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Viruses and Related Threats. 2 Summary  have considered:  various malicious programs  trapdoor, logic bomb, trojan horse, zombie  viruses  worms.
Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
30.1 Lecture 30 Security II Based on Silberschatz & Galvin’s slides And Stallings’ slides.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
BY FIOLA CARVALHO TE COMP. CONTENTS  Malicious Software-Definition  Malicious Programs Backdoor Logic Bomb Trojan Horse Mobile Code Multiple-Threat.
Viruses a piece of self-replicating code attached to some other code – cf biological virus both propagates itself & carries a payload – carries code to.
Malicious Software.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Chapter 19 – Malicious Software What is the concept of defense: The parrying of a blow. What is its characteristic feature: Awaiting the blow. —On War,
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
Advanced Anti-Virus Techniques
Cryptography and Network Security Chapter 19 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
MALICIOUS SOFTWARE Rishu sihotra TE Computer
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Malicious Programs (1) Viruses have the ability to replicate themselves Other Malicious programs may be installed by hand on a single machine. They may.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
Company LOGO Malicious SW By Dr. Shadi Masadeh 1.
MALWARE.
LECTURE 6 MALICIOUS SOFTWARE
Malicious Software.
Viruses and Other Malicious Content
Network Security Essentials
NET 311 Information Security
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Presentation transcript:

Data Security and Encryption (CSE348) 1

Lecture # 27 2

Review have considered: – problem of intrusion, behavior and techniques – intrusion detection (statistical & rule-based) – password management 3

Chapter 21 – Malicious Software 4

Viruses and Other Malicious Content Computer viruses have got a lot of publicity One of a family of malicious software Effects usually obvious Have figured in news reports, fiction, movies Getting more attention than deserve Are a concern though 5

Malicious Software 6

The terminology used for malicious software presents problems Because of a lack of universal agreement on all terms and because of overlap Stallings Table 21.1, and this diagram from 3/e, provide a useful taxonomy 7

Malicious Software It can be divided into two categories: those that need a host program (being a program fragment eg virus) Those that are independent programs (eg worm) Alternatively one can also differentiate between those software threats that do not replicate (are activated by a trigger) Those that do (producing copies of themselves) 8

Backdoor or Trapdoor A backdoor, or trapdoor, is a secret entry point into a program that allows someone That is aware of it to gain access without going through the usual security access procedures Have been used legitimately for many years to debug and test programs 9

Backdoor or Trapdoor But become a threat when left in production programs, allowing intruders to gain unauthorized access It is difficult to implement operating system controls for backdoors Security measures must focus on the program development and software update activities 10

Backdoor or Trapdoor Secret entry point into a program Allows those who know access bypassing usual security procedures Have been commonly used by developers 11

Backdoor or Trapdoor A threat when left in production programs allowing exploited by attackers Very hard to block in O/S Requires good s/w development & update 12

Logic Bomb One of oldest types of malicious software Code embedded in legitimate program Activated when specified conditions met – eg presence/absence of some file – particular date/time – particular user When triggered typically damage system – modify/delete files/disks, halt machine, etc 13

Trojan Horse Program with hidden side-effects Which is usually superficially attractive – eg game, s/w upgrade etc When run performs some additional tasks – allows attacker to indirectly gain access they do not have directly Often used to propagate a virus/worm or install a backdoor or simply to destroy data 14

Mobile Code Mobile code refers to programs (e.g., script, macro, or other portable instruction) That can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics The term also applies to situations involving a large homogeneous collection of platforms (e.g., Microsoft Windows) 15

Mobile Code Mobile code is transmitted from a remote system to a local system And then executed on the local system without the user’s explicit instruction Mobile code often acts as a mechanism for a virus, worm, or Trojan horse to be transmitted to the user’s workstation 16

Mobile Code Mobile code is transmitted from a remote system to a local system And then executed on the local system without the user’s explicit instruction Mobile code often acts as a mechanism for a virus, worm, or Trojan horse to be transmitted to the user’s workstation 17

Mobile Code In other cases, mobile code takes advantage of vulnerabilities to perform its own exploits Such as unauthorized data access or root compromise 18

Mobile Code Popular vehicles for mobile code include Java applets, ActiveX, JavaScript, and VBScript The most common ways of using mobile code for malicious operations on local system are Cross-site scripting, interactive and dynamic Web sites, attachments, and downloads from untrusted sites or of untrusted software 19

Mobile Code Program/script/macro that runs unchanged – on heterogeneous collection of platforms – on large homogeneous collection (Windows) Transmitted from remote system to local system & then executed on local system Often to inject virus, worm, or Trojan horse or to perform own exploits – unauthorized data access, root compromise 20

Multiple-Threat Malware Malware may operate in multiple ways Multipartite virus infects in multiple ways – eg. multiple file types 21

Multiple-Threat Malware Blended attack uses multiple methods of infection or transmission – to maximize speed of infection and severity – may include multiple types of malware – eg. Nimda has worm, virus, mobile code – can also use IM & P2P 22

Viruses A virus is a piece of software that can "infect" other programs by modifying them The modification includes a copy of the virus program Which can then go on to infect other programs A virus can do anything that other programs do 23

Viruses The difference is that a virus attaches itself to another program and executes secretly when the host program is run Once a virus is executing, it can perform any function, such as erasing files and programs Most viruses carry out their work in a manner that is specific to a particular operating system and, in some cases, specific to a particular hardware platform 24

Viruses Thus, they are designed to take advantage of the details and weaknesses of particular systems During its lifetime, a typical virus goes through the following four phases: Dormant phase: The virus is idle. The virus will eventually be activated by some event, such as a date, the presence of another program or file, or the capacity of the disk exceeding some limit Not all viruses have this stage 25

Viruses Propagation phase: The virus places an identical copy of itself into other programs or into certain system areas on the disk Each infected program will now contain a clone of the virus, which will itself enter a propagation phase 26

Viruses Triggering phase: The virus is activated to perform the function for which it was intended As with the dormant phase, the triggering phase can be caused by a variety of system events Including a count of the number of times that this copy of the virus has made copies of itself 27

Viruses Execution phase: The function is performed, which may be harmless e.g. a message on the screen, or damaging e.g. the destruction of programs and data files 28

Viruses Piece of software that infects programs – modifying them to include a copy of the virus – so it executes secretly when host program is run Specific to operating system and hardware – taking advantage of their details and weaknesses 29

Viruses A typical virus goes through phases of: – dormant – propagation – triggering – execution 30

Virus Structure Components: – infection mechanism - enables replication – trigger - event that makes payload activate – payload - what it does, malicious or benign 31

Virus Structure Prepended / postpended / embedded When infected program invoked, executes virus code then original program code Can block initial infection (difficult) or propogation (with access controls) 32

Virus Structure 33

Compression Virus 34

Virus Classification There has been a continuous arms race between virus writers and writers of antivirus software since viruses first appeared As effective countermeasures have been developed for existing types of viruses, new types have been developed A virus classification by target includes the following categories: 35

Virus Classification Boot sector infector: Infects a master boot record or boot record and spreads when a system is booted from the disk containing the virus File infector: Infects files that operating system or shell consider to be executable Macro virus: Infects files with macro code that is interpreted by an application 36

Virus Classification A virus classification by concealment strategy includes the following categories: Encrypted virus: the virus creates a random encryption key, stored with the virus, and encrypts the remainder of the virus When an infected program is invoked, the virus uses the stored random key to decrypt the virus 37

Virus Classification When the virus replicates, a different random key is selected Stealth virus: A form of virus explicitly designed to hide itself from detection by antivirus software Thus, the entire virus, not just a payload is hidden 38

Virus Classification Polymorphic virus: A virus that mutates with every infection, making detection by the “signature” of the virus impossible 39

Virus Classification Metamorphic virus: As with a polymorphic virus,a metamorphic virus mutates with every infection The difference is that a metamorphic virus rewrites itself completely at each iteration, increasing the difficulty of detection Metamorphic viruses may change their behavior as well as their appearance 40

Virus Classification boot sector file infector macro virus encrypted virus stealth virus polymorphic virus metamorphic virus 41

Macro Virus Became very common in mid-1990s since – platform independent – infect documents – easily spread Exploit macro capability of office apps – executable program embedded in office doc – often a form of Basic More recent releases include protection Recognized by many anti-virus programs 42

Viruses More recent development e.g. Melissa – exploits MS Word macro in attached doc – if attachment opened, macro activates – sends to all on users address list – and does local damage Then saw versions triggered reading Hence much faster propagation 43

Virus Countermeasures Prevention - ideal solution but difficult Realistically need: – detection – identification – removal If detect but can’t identify or remove, must discard and replace infected program 44

Anti-Virus Evolution Virus & antivirus tech have both evolved Early viruses simple code, easily removed As become more complex, so must the countermeasures Generations – first - signature scanners – second - heuristics – third - identify actions – fourth - combination packages 45

Generic Decryption Runs executable files through GD scanner: – CPU emulator to interpret instructions – virus scanner to check known virus signatures – emulation control module to manage process Lets virus decrypt itself in interpreter Periodically scan for virus signatures Issue is long to interpret and scan – tradeoff chance of detection vs time delay 46

Digital Immune System 47

Behavior-Blocking Software 48

Worms Replicating program that propagates over net – using , remote exec, remote login Has phases like a virus: – dormant, propagation, triggering, execution – propagation phase: searches for other systems, connects to it, copies self to it and runs May disguise itself as a system process Concept seen in Brunner’s “Shockwave Rider” Implemented by Xerox Palo Alto labs in 1980’s 49

Morris Worm One of best know worms Released by Robert Morris in 1988 Various attacks on UNIX systems – cracking password file to use login/password to logon to other systems – exploiting a bug in the finger protocol – exploiting a bug in sendmail If succeed have remote shell access – sent bootstrap program to copy worm over 50

Recent Worm Attacks Code Red – July 2001 exploiting MS IIS bug – probes random IP address, does DDoS attack Code Red II variant includes backdoor SQL Slammer – early 2003, attacks MS SQL Server Mydoom – mass-mailing worm that appeared in 2004 – installed remote access backdoor in infected systems Warezov family of worms – scan for addresses, send in attachment 51

Worm Technology multiplatform multi-exploit ultrafast spreading polymorphic metamorphic transport vehicles zero-day exploit 52

Mobile Phone Worms First appeared on mobile phones in 2004 – target smartphone which can install s/w They communicate via Bluetooth or MMS To disable phone, delete data on phone, or send premium-priced messages CommWarrior, launched in 2005 – replicates using Bluetooth to nearby phones – and via MMS using address-book numbers 53

Worm Countermeasures Overlaps with anti-virus techniques Once worm on system A/V can detect Worms also cause significant net activity Worm defense approaches include: – signature-based worm scan filtering – filter-based worm containment – payload-classification-based worm containment – threshold random walk scan detection – rate limiting and rate halting 54

Proactive Worm Containment 55

Network Based Worm Defense 56

Distributed Denial of Service Attacks (DDoS) Distributed Denial of Service (DDoS) attacks form a significant security threat Making networked systems unavailable By flooding with useless traffic Using large numbers of “zombies” Growing sophistication of attacks Defense technologies struggling to cope 57

Constructing an Attack Network Must infect large number of zombies Needs: 1.software to implement the DDoS attack 2.an unpatched vulnerability on many systems 3.scanning strategy to find vulnerable systems random, hit-list, topological, local subnet 58

DDoS Countermeasures Three broad lines of defense: 1.attack prevention & preemption (before) 2.attack detection & filtering (during) 3.attack source traceback & ident (after) Huge range of attack possibilities Hence evolving countermeasures 59

Summary have considered: – various malicious programs – trapdoor, logic bomb, trojan horse, zombie – viruses – worms – distributed denial of service attacks 60