MALICIOUS SOFTWARE Rishu sihotra TE Computer 411152.

Slides:



Advertisements
Similar presentations
Computer Security Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Chapters 14 and 15 Operating Systems: Internals and Design Principles,
Advertisements

30/04/2015Tim S Roberts COIT13152 Operating Systems T1, 2008 Tim S Roberts.
Lecture 13 Malicious Software modified from slides of Lawrie Brown.
Cryptography and Network Security Chapter 19 Fourth Edition by William Stallings.
NS-H /11041 Malicious Software. NS-H /11042 Why bother to secure data? Information has value, it can affect our lives and our livelihood Information.
Chapter 14 Computer Security Threats
Cryptography and Network Security Malicious Software Third Edition by William Stallings Lecturer: Dr. Saleem Alzoubi.
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
Malicious Software programs exploiting system vulnerabilities known as malicious software or malware program fragments that need a host program e.g. viruses,
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Henric Johnson1 Intruders and Viruses Henric Johnson Blekinge Institute of Technology, Sweden
After this session, you should be able to:
1 Computer Viruses (and other “Malicious Programs) Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Intruders significant issue for networked systems is hostile or unwanted access either via network or local can identify classes of intruders: –masquerader.
Cryptography and Network Security Chapter 21
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
CSCE 815 Network Security Lecture 20 Intruders / Intrusion Detection April 3, 2003.
Video Following is a video of what can happen if you don’t update your security settings! security.
Hofstra University – Network Security Course, CSC290A
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 7 – Malicious Software.
Malicious Software Malicious Software Han Zhang & Ruochen Sun.
1 Ola Flygt Växjö University, Sweden Malicious Software.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Network and Internet Security SYSTEM SECURITY. Virus Countermeasures Antivirus approach ◦Ideal solution: Prevention ◦Not allowing the virus to infect.
Data Security and Encryption (CSE348) 1. Lecture # 27 2.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
Fundamentals of The Internet Learning outcomes After this session, you should be able to: Identify the threat of intruders in systems and networks and.
VIRUSES - Janhavi Naik. Overview Structure Classification Categories.
Structure Classifications &
1 Chapter 19: Malicious Software Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal, U of Kentucky)
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
CSCE 522 Lecture 12 Program Security Malicious Code.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Chapter 11 Malicious Software
Viruses and Related Threats. 2 Summary  have considered:  various malicious programs  trapdoor, logic bomb, trojan horse, zombie  viruses  worms.
Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
30.1 Lecture 30 Security II Based on Silberschatz & Galvin’s slides And Stallings’ slides.
For any query mail to or BITS Pilani Lecture # 1.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
BY FIOLA CARVALHO TE COMP. CONTENTS  Malicious Software-Definition  Malicious Programs Backdoor Logic Bomb Trojan Horse Mobile Code Multiple-Threat.
Viruses a piece of self-replicating code attached to some other code – cf biological virus both propagates itself & carries a payload – carries code to.
Malicious Software.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Chapter 19 – Malicious Software What is the concept of defense: The parrying of a blow. What is its characteristic feature: Awaiting the blow. —On War,
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
Cryptography and Network Security Chapter 19 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Malicious Programs (1) Viruses have the ability to replicate themselves Other Malicious programs may be installed by hand on a single machine. They may.
Prof. Wenguo Wang Network Information Security Prof. Wenguo Wang Tel College of Computer Science QUFU NORMAL UNIVERSITY.
Attack Methods  Attacks  DoS (Denial of Service)  Malware.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
Company LOGO Malicious SW By Dr. Shadi Masadeh 1.
MALWARE.
Malicious Software.
Viruses and Other Malicious Content
NET 311 Information Security
MALICIOUS SOFTWARE A.Sivaramakrishnan, AP
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Chapter 9 Intruders and Viruses.
Presentation transcript:

MALICIOUS SOFTWARE Rishu sihotra TE Computer

Topic  Introduction  Malicious programs  Virus  Macro virus  Worms  virus  Antivirus software

Introduction (W pg-647) The most sophisticated types of threats to computer systems are presented by programs that exploit vulnerabilities in computing system. Generic term for such threats is malicious software, or malware. Malicious software is designed to cause damage or to use up the resources of a target computer.

Malicious Software 4

Backdoor or Trapdoor(W pg ) secret entry point into a program allows those who know access bypassing usual security procedures have been commonly used by developers a threat when left in production programs allowing exploited by attackers very hard to block in O/S 5

Logic Bomb (W pg 649) one of oldest types of malicious software code embedded in legitimate program activated when specified conditions met ◦ E.g., presence/absence of some file ◦ particular date/time ◦ particular user when triggered typically damage system ◦ modify/delete files/disks, halt machine, etc. 6

Trojan Horse (W pg 649) program with hidden side-effects which is usually superficially attractive ◦ E.g., game, s/w upgrade, etc. when run performs some additional tasks ◦ allows attacker to indirectly gain access they do not have directly often used to propagate a virus/worm or install a backdoor or simply to destroy data Mail the password file. 7

Zombie program which secretly takes over another networked computer then uses it to indirectly launch attacks (difficult to trace zombie’s creator) often used to launch distributed denial of service (DDoS) attacks exploits known flaws in network systems 8

virus  code that copies itself into other programs and executes secretly when the host program is run.  Once a virus is executing, it can perform any function, such as erasing files and programs.  propagates itself & carries a payload ◦ carries code to make copies of itself ◦ as well as code to perform some covert task

Virus phase During its lifetime, a typical virus goes through the following four phases: Dormant phase: virus is idle, waiting for trigger event (eg date, program or file, disk capacity). Not all viruses have this stage Propagation phase: virus places a copy of itself into other programs / system areas Triggering phase: virus is activated by some trigger event to perform intended function Execution phase: desired function (which may be harmless or destructive) is performed

Types of Viruses can classify on basis of how they attack parasitic virus -attaches itself to executable files and replicates memory-resident virus -lodges in the main memory and infects every program that executes. boot sector virus -infects a boot record and spreads when the system is booted from the disk 11

Types of Viruses… Stealth -designed to hide itself from antivirus software polymorphic virus -a virus that mutates with every infection, making detection very difficult metamorphic virus -mutates with every infection, but rewrites itself completely every time. Making it extremely difficult to detect. 12

Virus Structure program V := {goto main; ; subroutine infect-executable :={loop: file := get-random-executable-file; if (first-line-of-file = ) then goto loop else prepend V to file; } subroutine do-damage := {whatever damage is to be done} subroutine trigger-pulled := {return true if condition holds} main: main-program :={infect-executable; if trigger-pulled then do-damage; goto next;} next: } 13

Macro Viruses Microsoft Office applications allow “macros” to be part of the document. The macro could run whenever the document is opened, or when a certain command is selected (Save File). Platform independent. Infect documents, delete files, generate and edit letters. Henric Johnson14

Cotd……… became very common in mid-1990s since ◦ platform independent ◦ infect documents ◦ easily spread exploit macro capability of office apps ◦ executable program embedded in office doc ◦ often a form of Basic more recent releases include protection recognized by many anti-virus programs

Worms replicating program that propagates over net ◦ using , remote exec, remote login typically spreads over a network ◦ Morris Internet Worm in 1988 using users distributed privileges or by exploiting system vulnerabilities worms perform unwanted functions widely used by hackers to create zombie PC's, subsequently used for further attacks, esp DoS major issue is lack of security of permanently connected systems, esp PC's 16

Worm Operation worm has phases like those of viruses: ◦ dormant ◦ propagation  search for other systems to infect  establish connection to target remote system  replicate self onto remote system ◦ triggering ◦ execution 17

Virus spread using with attachment containing a macro virus triggered when user opens attachment or worse even when mail viewed by using scripting features in mail agent hence propagates very quickly usually targeted at Microsoft Outlook mail agent & Word/Excel documents 18

Anti-Virus Software first-generation ◦ scanner uses virus signature to identify virus ◦ or change in length of programs second-generation ◦ uses heuristic rules to spot viral infection ◦ or uses crypto hash of program to spot changes third-generation ◦ memory-resident programs identify virus by actions fourth-generation ◦ packages with a variety of antivirus techniques ◦ eg scanning & activity traps, access-controls arms race continues 19

Advanced Antivirus Techniques Generic Decryption (GD) ◦ CPU Emulator ◦ Virus Signature Scanner ◦ Emulation Control Module Henric Johnson20

Semester questions  Write a short note on: 1.Viruses 2. Worms  Explain the nature of viruses and explain different types of viruses?  Can a Trojan horse attack be prevented by using a trusted system ? Justify.  What is virus? Explain different phases of virus. Also with the help of symbolic code explain virus structure.

Continue….. Write a short note on system threat? Write a short note on computer virus?

THANK YOU THANK YOU