Anti-Malware Technologies
|
|
|
- Tracey Burke
- 9 years ago
- Views:
Transcription
1 : Trend of Network Security Technologies Anti-Malware Technologies Mitsutaka Itoh, Takeo Hariu, Naoto Tanimoto, Makoto Iwamura, Takeshi Yagi, Yuhei Kawakoya, Kazufumi Aoki, Mitsuaki Akiyama, and Shinta Nakayama Abstract This article introduces anti-malware technologies currently being researched and developed at NTT. Malware is used by cyber attackers to abuse users personal computers and servers, such as using them as bots, which exposes computer networks to security threats. Our anti-malware technologies can detect malware infection activities, collect malware, analyze infection routes, and analyze the malware itself. They will lead to a safe and secure network in which malware is filtered out. 1. Introduction With the widespread use of the Internet, the number of security problems has also increased. Cyber crime such as identity theft has dramatically increased in recent years. Most of the security problems are caused by malware, which is programmed and used by attackers. By operating malware on users personal computers and servers, attackers can control those personal computers and servers illegally as bots (programs designed to automate tasks) to engage in other cyber attacks. Malware infection activities take advantage of vulnerabilities not only in the Windows operating system (OS) but also in web applications on servers and in web browsers on personal computers. Such activities are become increasingly complex so it is difficult to detect them and identify infection routes. Furthermore, the variations of malware are increasing rapidly, making malware analysis all the more difficult. For example, a downloader (one type of malware) does not infect a victim directly but causes the victim to download other malware programs that do cause infection. At NTT Information Sharing Platform Laboratories, we are researching and developing technologies for detecting malware infection activities, collecting NTT Information Sharing Platform Laboratories Musashino-shi, Japan malware, analyzing infection routes, and analyzing malware itself. These technologies let us identify malware infection characteristics accurately and efficiently. Consequently, a safe and secure network will be achieved by filtering malware. 2. Overview of anti-malware technologies The anti-malware technologies that we have developed are divided into three main categories, as shown in Fig. 1. First, we introduce technologies for detecting malware infections and collecting malware; then, we explain malware analysis technologies. 2.1 Malware infection detection and malware collection These technologies are used to receive attacks and collect malware through the use of decoy systems called honeypots. They are also used to analyze communications with honeypots and identify information that can be useful in defending against malware infections. Honeypots can generally be classified into lowinteraction and high-interaction types. Low-interaction honeypots are designed to emulate vulnerable systems in order to attract malware. They can collect attack information safely because their systems do not execute the malware. However, the attack information acquired is limited because attackers cannot compromise such systems as they are just interacting NTT Technical Review
2 Malware infection detection and malware collection Malware analysis Countermeasures Server-type honeypot Web Phantom (honeypot for attacks via web applications) Honeypot for attacks via OS (Windows) Client-type honeypot MARIONETTE (honeypot for attacks via web browsers) Dynamic analysis Botnet Watcher (open-environment type) Stealth Debugger (behavior analysis) Static analysis Malware classification technology Disassembly techniques - Link to existing antimalware equipment - Interface design - Etc. Closed-environment type Bot Bot Malicious websites Internet Malicious websites Distribute/ infect Distribute/infect Get instructions Access Get Infect Via browser Via OS Via web application Detection/collection Analysis Countermeasures Client-type honeypot Collect Analyze trends by infection routes and vulnerabilities Server-type honeypot Dynamic analysis Virtual Internet Behavior analysis Get communication pattern Static analysis Classify Disassemble Create malicious URL list Create list of malicious communication patterns Warn owners of hosts used as bots Fig. 1. Overview of anti-malware technologies. with a simulation. On the other hand, high-interaction honeypots are composed of real vulnerable systems, which can actually be attacked through these vulnerabilities, with embedded surveillance functions. High-interaction honeypots are difficult to manage because their systems temporarily execute the attacking code, but they can collect much more attack information than low-interaction honeypots. Although the risk of high-interaction honeypots being infected with malware is said to be a problem, we have succeeded in developing secure high-interaction honeypots. We are researching and developing three kinds of honeypots for different types of major malwareinfection activities. The first type can detect activities that exploit the vulnerability of the Windows OS. The second type (web server honeypot) can detect activities that exploit vulnerabilities in web applications. The third type (web client honeypot) can detect activities that exploit vulnerabilities in web browsers. 2.2 Malware analysis These technologies analyze malware collected by honeypots and analyze its functions in detail to clarify potential threats. Malware analysis consists of dynamic and static types: dynamic analysis actually runs malware to analyze its behavior while static analysis analyzes the malware program code. Malware dynamic analysis can be classified into closed- and open-environment types: closed-environment analysis runs malware in an environment completely isolated from the Internet while open-environment analysis runs it in one connected to the Internet. In both environment types, a debugger is useful for monitoring the behavior of malware in detail. The communication patterns of malware obtained by dynamic analysis can be used to determine whether there are any users personal computers or servers infected by malware. Malware static analysis uses disassembly techniques and other means to clarify all of the functions possessed by a certain piece of malware. To make this process efficient, malware is classified into groups Vol. 8 No. 7 July 2010
3 Attack observation using server-type honeypots Realtime Past data Yr Mo Day Yr Mo Day Statistical data Honeypots xxx.com xxx.net xxx.jp Detailed information Date/time: :43 [attack: malware infection] Attack source: (IP: ) Malware download site: ( ) Attack code: Fig. 2. Screenshot of malware infection activities monitored by Web Phantoms. based on program similarities, and only malware representative of each group is analyzed. 3. Honeypots 3.1 Web server honeypot With the increasing popularity of weblogs (blogs) and online shopping, many web applications provide a platform for social services. The increase in the number of web applications has made it easy for attackers to hack websites by using exploit code targeting the vulnerabilities of those web applications. For example, attackers can illegally obtain and control information stored on websites. Furthermore, they can even infect websites with malware. To defend against such attacks, web application firewalls and log monitors are deployed. However, to prevent false-negative and false-positive detections, it is necessary to customize the settings according to the configuration of each website. To solve this problem, we are researching and developing a high-interaction web honeypot called Web Phantom, which collects attacks on websites from the Internet and automatically identifies information that can be used to detect and filter website attacks. The structure of Web Phantom makes it easy to install vulnerable web applications by using normal procedures. It also ensures safety with respect to the risk of malware infection by monitoring the execution of attack code. When the system detects the end of the execution, it returns to the state it was in prior to accepting the attack code. This function enables the Web Phantom to collect information about sequences of attack operations caused by attack code, such as malware downloaded from the Internet, safely and automatically. In addition, the system recreates attacks in a closed environment by using the collected information in order to precisely identify communications that cause an illegal state such as information falsification or malware infection. For example, when the system detects a malware infection, the exploited web application vulnerability can be identified and the URL (uniform resource locator) of the malware download site on which the attacker placed the malware, can be determined. Moreover, a centralized monitoring system that can collect information from many Web Phantoms has been constructed (Fig. 2). Using this monitoring system, we can gather a significant amount of useful information efficiently. By deploying this system, we can discover new vulnerabilities in web applications. Moreover, user websites are protected from malware infection by filtering communications from the websites to malware download sites. 3.2 Web client honeypot Nowadays, the number of web-browser-targeting attacks that lead users to adversaries websites and exploit web browser vulnerabilities is increasing. To comprehend the exploitation techniques and provide effective countermeasures, we have designed and implemented a high-interaction client honeypot, called MARIONETTE, that detects web browser exploitation in accurate detail. The key features of MARIONETTE are stepwise detection focusing on exploitation phases, multiple NTT Technical Review
4 Enlarged view Existing attack code Link structure IFRAME FRAME META-refresh Other : URL Fig. 3. Visualization of malware distribution network targeting web browsers. crawlers, malware infection prevention, and malware distribution network tracking. HoneyPatch, which is one of the detection methods, monitors the dataflow of certain vulnerable functions in web browsers and decides whether a vulnerable point is being attacked. Process Sandbox also detects malicious behavior and prevents infection in order to maintain continuous system operation. In addition, by running multiple crawler processes, MARIONETTE can discover malicious sites in a huge web space. In most situations, an adversary takes the form of a redirection network of malicious sites (i.e., exploit, hopping, and malware distribution sites). An exploit site does the actual exploitation of a target web browser and forces it to download executable malware from a malware distribution site. A hopping site redirects a target to the next hopping or exploit site. Adversaries lure web clients to exploit websites by using compromised websites that have been injected with malicious redirection code. Once web clients access these compromised websites, they are automatically redirected to the next hopping or exploit site. We call the redirection network formed by these sites a malware distribution network. MARIONETTE has a function for extracting the structure of malware distribution networks. Our lengthy investigation reveals the nature of a malware distribution network, which has a vast number of hopping sites embedded in the redirection code toward a specific exploit site (Fig. 3). The information obtained by MARIONETTE can be used to provide countermeasures appropriate to the situation. For example, the owner of a tampered hopping site can be notified of requesting to correct the tampered web content and we can filter the accesses to an exploit site embedded in exploit code. 4. Malware analysis technologies 4.1 Dynamic analysis The dynamic analysis of malware can take place in two types of execution environment: an environment that is isolated from the Internet or one that is not. Since some existing malware requires access to the Internet (e.g., bots and downloaders), dynamic analysis in an isolated environment cannot obtain a full set of results. However, executing malware in a non-isolated environment is difficult because there are some concerns about how to control the activities of malware that has access to the Internet. In addition, malware analysts always use a debugger to obtain detailed analysis results of malware, but some sophisticated malware can detect debugger activities and stop its own execution. So if we want to analyze malware using a debugger, we must hide the debugger s activities. In order to analyze malware safely, we have constructed Botnet Watcher, which executes malware in a non-isolated environment. We have also constructed Stealth Debugger, which implements debugging mechanisms in a virtual machine monitor (VMM) layer. When malware tries to connect to the Internet, Botnet Watcher terminates the connection and inspects Vol. 8 No. 7 July 2010
5 Malware execution environment Destination host (blue: IRC, red: HTTP) Elapsed time Communications (blue: IRC, red: HTTP) HTTP: hypertext transfer protocol IRC: Internet relay chat Fig. 4. Visualization of malware activities on the Internet. the payload. If the inspection reveals communication between the bot and a command and control (C&C) server or the downloading of other malware, Botnet Watcher transfers these communications to the Internet. However, if the malware begins to send malicious payloads (e.g., DDoS attacks or spam ), these are sent to a virtual Internet, which creates pseudo-responses to the malware. In this way, Botnet Watcher can safely obtain the features of the communication patterns between the malware and other hosts (Fig. 4). Stealth Debugger, which is implemented as a debugging mechanism in the VMM layer, provides a debugging function from another layer of the malware execution environment. Because ordinary debuggers make use of CPU (central processing unit) or OS debug-support mechanisms, some kinds of malware can easily detect the operation of a debugger. In contrast, Stealth Debugger provides the debugging function from the VMM layer independently of the original debug-support mechanisms, so malware cannot detect any debugger activities. Thus, Stealth Debugger can get effective malware analysis results by means of some anti-analysis techniques and can elucidate malware functions quickly. 4.2 Static analysis The number of malware programs has been steadily increasing in recent years, and while it would be unrealistic to come up with a countermeasure for each and every one, determining a priority for creating countermeasures is proving to be difficult. Under these circumstances, we have been researching malware static analysis technologies centered on the classification of malware with the aim of clarifying the overall content of malware. Our malware classification technology calculates the similarity between malware programs by examining the behavior of malware rather than its program code. This approach enables malware programs to be classified according to their potential functions such as ones that are not executed without a command from the attacker. However, much of the recent malware conceals the original program code through the use of an obfuscation tool. It is also hard to obtain information about malware symbols, which makes it difficult to disassemble binary streams mixed with machine-language instructions and data. In response to these problems, we have developed three malware analysis techniques and constructed a malware classification system by combining them. These are (1) an unpacking technique that extracts dynamically generated code, (2) a technique that computes the most likely disassembly result based on a probabilistic model, and (3) a technique that efficiently computes the longest common subsequence of machine-language instruction sequences. The results of clustering 3232 samples of malware that we collected using this system are shown in Fig. 5. The names of these 3232 samples are lined up along the periphery of the circle. Samples connected by arcs with large radii exhibit high similarity while those connected with arcs near the center 5 NTT Technical Review
6 of the circle exhibit low similarity. As a result of this classification, we found that about 50% of all samples were made up of Downadup malware, about 25% of Rahack malware, and about 20% of IRCBot malware (IRC: Internet relay chat). These results show that, for the malware samples targeted by this classification, most malware functions could be determined by analyzing representative samples of only a few types without having to analyze all samples. 5. Conclusion Downadup Rahack IRCBot Fig. 5. Results of classifying 3232 malware samples. Anti-malware technologies that we have developed can identify malicious URLs, which should not be accessed from personal computers and servers, in a form that can be input to existing filtering equipment. Furthermore, they can also identify infected user equipment with high accuracy based on the features of malware communications and functions. In the near future, we plan to evaluate these technologies by performing tests with prototype systems. Vol. 8 No. 7 July 2010
7 Mitsutaka Itoh Senior Research Engineer, Supervisor, Secure Communication Project, NTT Information Sharing Platform Laboratories. He received the B.S. and M.S. degrees in mathematics from Waseda University, Tokyo, in He joined NTT Laboratories in Since then, he has been engaged in network security R&D. He created NTT-CERT and has contributed to improvements in information-system security. His current research interests are VoIP security, mobile cloud computing, web security, and countermeasures against botnets. He is a member of the Institute of Electronics, Information and Communication Engineers (IEICE) of Japan and the Information Processing Society of Japan. Takeo Hariu Senior Research Engineer, Supervisor, Secure Communication Project, NTT Information Sharing Platform Laboratories. He received the M.S. degree in electro-communications from the University of Electro- Communications, Tokyo, in Since joining NTT in 1991, he has been engaged in network security R&D. He is a member of IEICE. Yuhei Kawakoya He received the M.E. degree in science and engineering from Waseda University, Tokyo, in Since joining NTT in 2005, he has been engaged in network security R&D. Kazuhumi Aoki He received the M.S. degree in information science from Tohoku University, Miyagi, in Since joining NTT in 2006, he has been engaged in network security R&D. Naoto Tanimoto Research Engineer, Secure Communication Project, NTT Information Sharing Platform Laboratories. He received the B.E. degree in engineering from the University of Electro-Communications, Tokyo, in Since joining NTT in 1989, he has been engaged in operating systems R&D. Mitsuaki Akiyama He received the M.E. degree in information science from Nara Institute of Science and Technology in Since joining NTT in 2007, he has been engaged in network security R&D. Makoto Iwamura Research Engineer, Secure Communication Project, NTT Information Sharing Platform Laboratories. He received the M.E. degree in science and engineering from Waseda University, Tokyo, in He joined NTT in He is currently working toward the D.E. degree at the Graduate School of Fundamental Science and Engineering, Waseda University. His research interests include reverse engineering, vulnerability findings, and malware analysis. Shinta Nakayama He received the M.S. degree in engineering from the University of Electro-Communications, Tokyo, in Since joining NTT in 2009, he has been engaged in network security R&D. Takeshi Yagi He received the B.E. degree in electrical and electronic engineering and the M.E. degree in science and technology from Chiba University in 2000 and 2002, respectively. Since joining NTT in 2002, he has been engaged in network architecture R&D. His current research interests include network security. He is a member of IEICE and the Institute of Electrical Engineers of Japan. NTT Technical Review
NTT R&D s anti-malware technologies
NTT R&D s anti-malware technologies Jan. 21, 2015 NTT Secure Platform Laboratories Takeo HARIU Threats causes most of cyber attacks Major infection routes are web browsing, URL links in email messages,
LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages
LASTLINE WHITEPAPER Large-Scale Detection of Malicious Web Pages Abstract Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and,
Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology. Project Proposal 1
Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology Project Proposal 1 Project Proposal 2 Abstract Honeypot systems are readily used by organizations large and
MARIONETTE: Client Honeypot for Investigating and Understanding Web-based Malware Infection on Implicated Websites
MARIONETTE: Client Honeypot for Investigating and Understanding Web-based Malware Infection on Implicated Websites Mitsuaki Akiyama, Yuhei Kawakoya, Makoto Iwamura, Kazufumi Aoki, Mitsutaka Itoh NTT Information
Detecting peer-to-peer botnets
Detecting peer-to-peer botnets Reinier Schoof & Ralph Koning System and Network Engineering University of Amsterdam mail: [email protected], [email protected] February 4, 2007 1 Introduction Spam,
IBM Advanced Threat Protection Solution
IBM Advanced Threat Protection Solution Fabio Panada IBM Security Tech Sales Leader 1 Advanced Threats is one of today s key mega-trends Advanced Threats Sophisticated, targeted attacks designed to gain
10 Things Every Web Application Firewall Should Provide Share this ebook
The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security
Countermeasures against Bots
Countermeasures against Bots Are you sure your computer is not infected with Bot? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Bot? Bot is a computer
SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper
SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4
Malicious Network Traffic Analysis
Malicious Network Traffic Analysis Uncover system intrusions by identifying malicious network activity. There are a tremendous amount of network based attacks to be aware of on the internet today and the
Cloud Services Prevent Zero-day and Targeted Attacks
Cloud Services Prevent Zero-day and Targeted Attacks WOULD YOU OPEN THIS ATTACHMENT? 2 TARGETED ATTACKS BEGIN WITH ZERO-DAY EXPLOITS Duqu Worm Causing Collateral Damage in a Silent Cyber-War Worm exploiting
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
Next Generation IPS and Reputation Services
Next Generation IPS and Reputation Services Richard Stiennon Chief Research Analyst IT-Harvest 2011 IT-Harvest 1 IPS and Reputation Services REPUTATION IS REQUIRED FOR EFFECTIVE IPS Reputation has become
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
How To Integrate Hosted Email Security With Office 365 And Microsoft Mail Flow Security With Microsoft Email Security (Hes)
A Trend Micro Integration Guide I August 2015 Hosted Email Security Integration with Microsoft Office 365» This document highlights the benefits of Hosted Email Security (HES) for Microsoft Office 365
A Critical Investigation of Botnet
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 9 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
UNMASKCONTENT: THE CASE STUDY
DIGITONTO LLC. UNMASKCONTENT: THE CASE STUDY The mystery UnmaskContent.com v1.0 Contents I. CASE 1: Malware Alert... 2 a. Scenario... 2 b. Data Collection... 2 c. Data Aggregation... 3 d. Data Enumeration...
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
Report on Cyber Security Alerts Processed by CERT-RO in 2014
Section III - Cyber-Attacks Evolution and Cybercrime Trends Report on Cyber Security Alerts Processed by CERT-RO in 2014 Romanian National Computer Security Incident Response Team [email protected] The
Covert Operations: Kill Chain Actions using Security Analytics
Covert Operations: Kill Chain Actions using Security Analytics Written by Aman Diwakar Twitter: https://twitter.com/ddos LinkedIn: http://www.linkedin.com/pub/aman-diwakar-ccie-cissp/5/217/4b7 In Special
WHITE PAPER. Understanding How File Size Affects Malware Detection
WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through
Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team
Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team The Internet is in the midst of a global network pandemic. Millions of computers
FORBIDDEN - Ethical Hacking Workshop Duration
Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once
Perspectives on Cybersecurity in Healthcare June 2015
SPONSORED BY Perspectives on Cybersecurity in Healthcare June 2015 Workgroup for Electronic Data Interchange 1984 Isaac Newton Square, Suite 304, Reston, VA. 20190 T: 202-618-8792/F: 202-684-7794 Copyright
Operation Liberpy : Keyloggers and information theft in Latin America
Operation Liberpy : Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab 7/7/2015 version 1.1 Contents Introduction... 3 Operation
Εmerging Ways to Protect your Network
Εmerging Ways to Protect your Network From Vulnerability Scanning to Real-time Monitoring and Detection of Cyber-attacks Konstantinos Xinidis Software Engineer [email protected] Development Dept.,
Unknown threats in Sweden. Study publication August 27, 2014
Unknown threats in Sweden Study publication August 27, 2014 Executive summary To many international organisations today, cyber attacks are no longer a matter of if but when. Recent cyber breaches at large
Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies
Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some
Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix
Honeynet2_bookTOC.fm Page vii Monday, May 3, 2004 12:00 PM Contents Preface Foreword xix xxvii P ART I THE HONEYNET 1 Chapter 1 The Beginning 3 The Honeynet Project 3 The Information Security Environment
Current counter-measures and responses by CERTs
Current counter-measures and responses by CERTs Jeong, Hyun Cheol [email protected] April. 2007 Contents I. Malware Trends in Korea II. Malware from compromised Web sites III. Case Study : Malware countermeasure
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
Shellshock. Oz Elisyan & Maxim Zavodchik
Shellshock By Oz Elisyan & Maxim Zavodchik INTRODUCTION Once a high profile vulnerability is released to the public, there will be a lot of people who will use the opportunity to take advantage on vulnerable
Loophole+ with Ethical Hacking and Penetration Testing
Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,
Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013
Integrated Approach to Network Security Lee Klarich Senior Vice President, Product Management March 2013 Real data from actual networks 2 2012, Palo Alto Networks. Confidential and Proprietary. 2008: HTTP,
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013.
Virtual Machines and Security Paola Stone Martinez East Carolina University November, 2013. Keywords: virtualization, virtual machine, security. 1. Virtualization The rapid growth of technologies, nowadays,
LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains
LASTLINE WHITEPAPER Using Passive DNS Analysis to Automatically Detect Malicious Domains Abstract The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way
Seminar Computer Security
Seminar Computer Security DoS/DDoS attacks and botnets Hannes Korte Overview Introduction What is a Denial of Service attack? The distributed version The attacker's motivation Basics Bots and botnets Example
LASTLINE WHITEPAPER. In-Depth Analysis of Malware
LASTLINE WHITEPAPER In-Depth Analysis of Malware Abstract Malware analysis is the process of determining the purpose and functionality of a given malware sample (such as a virus, worm, or Trojan horse).
Protecting the Infrastructure: Symantec Web Gateway
Protecting the Infrastructure: Symantec Web Gateway 1 Why Symantec for Web Security? Flexibility and Choice Best in class hosted service, appliance, and virtual appliance (upcoming) deployment options
Security Intelligenece: tracking obfuscated and unrecognized attacks. 2014 Check Point Software Technologies Ltd.
Security Intelligenece: tracking obfuscated and unrecognized attacks 2014 Check Point Software Technologies Ltd. Security Policy Rule Types: 1 Access People, Applications, Services, Servers, Data 2 Threat
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS
THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations have been hacked in the past two
The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud
The Advanced Attack Challenge Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge One of the most prominent and advanced threats to government networks is advanced delivery
Malicious Websites uncover vulnerabilities (browser, plugins, webapp, server), initiate attack steal sensitive information, install malware, compromise victim s machine Malicious Websites uncover vulnerabilities
Complete Protection against Evolving DDoS Threats
Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls... 3 Intrusion
HONEYPOT SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
HONEYPOT SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
LASTLINE WHITEPAPER. The Holy Grail: Automatically Identifying Command and Control Connections from Bot Traffic
LASTLINE WHITEPAPER The Holy Grail: Automatically Identifying Command and Control Connections from Bot Traffic Abstract A distinguishing characteristic of bots is their ability to establish a command and
Countermeasure for Detection of Honeypot Deployment
Proceedings of the International Conference on Computer and Communication Engineering 2008 May 13-15, 2008 Kuala Lumpur, Malaysia Countermeasure for Detection of Honeypot Deployment Lai-Ming Shiue 1, Shang-Juh
The Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? Drive-by Downloads are a common technique used by attackers to silently install malware on a victim s computer. Once a target website has been weaponized with
WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform
WHITE PAPER Cloud-Based, Automated Breach Detection The Seculert Platform Table of Contents Introduction 3 Automatic Traffic Log Analysis 4 Elastic Sandbox 5 Botnet Interception 7 Speed and Precision 9
Advanced Honeypot Architecture for Network Threats Quantification
Advanced Honeypot Architecture for Network Threats Quantification Mr. Susheel George Joseph M.C.A, M.Tech, M.Phil(CS) (Associate Professor, Department of M.C.A, Kristu Jyoti College of Management and Technology,
DoS: Attack and Defense
DoS: Attack and Defense Vincent Tai Sayantan Sengupta COEN 233 Term Project Prof. M. Wang 1 Table of Contents 1. Introduction 4 1.1. Objective 1.2. Problem 1.3. Relation to the class 1.4. Other approaches
[state of the internet] / SEO Attacks. Threat Advisory: Continuous Uptick in SEO Attacks
TLP: GREEN Issue Date: 1.12.16 Threat Advisory: Continuous Uptick in SEO Attacks Risk Factor High The Akamai Threat Research Team has identified a highly sophisticated Search Engine Optimization (SEO)
Intro to Firewalls. Summary
Topic 3: Lesson 2 Intro to Firewalls Summary Basic questions What is a firewall? What can a firewall do? What is packet filtering? What is proxying? What is stateful packet filtering? Compare network layer
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY
EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY Dean Frye Sourcefire Session ID: SEC-W05 Session Classification: Intermediate Industrialisation of Threat Factories Goal: Glory,
Security A to Z the most important terms
Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training
McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure
The Dark Side of Trusting Web Searches From Blackhat SEO to System Infection
The Dark Side of Trusting Web Searches From Blackhat SEO to System Infection Trend Micro, Incorporated Marco Dela Vega and Norman Ingal Threat Response Engineers A Trend Micro Research Paper I November
Honeypots and Honeynets Technologies
New Mexico State University Honeypots and Honeynets Technologies Hussein Al-Azzawi Final Paper CS 579 Special Topics / Computer Security Nov. 27, 2011 Supervised by Mr. Ivan Strnad Table of contents: 1.
Frontiers in Cyber Security: Beyond the OS
2013 DHS S&T/DoD ASD (R&E) CYBER SECURITY SBIR WORKSHOP Frontiers in Cyber Security: Beyond the OS Clear Hat Consulting, Inc. Sherri Sparks 7/23/13 Company Profile CHC was founded in 2007 by S. Sparks
Trend Micro Incorporated Research Paper 2012. Adding Android and Mac OS X Malware to the APT Toolbox
Trend Micro Incorporated Research Paper 2012 Adding Android and Mac OS X Malware to the APT Toolbox Contents Abstract... 1 Introduction... 1 Technical Analysis... 2 Remote Access Trojan Functionality...
Trends in Security Incidents and Hitachi s Activities
Hitachi Review Vol. 63 (2014), No. 5 270 Featured Articles Trends in Security Incidents and Hitachi s Activities About HIRT Activities Masato Terada, Dr. Eng. Masashi Fujiwara Akiko Numata Toru Senoo Kazumi
From Georgia, with Love Win32/Georbot. Is someone trying to spy on Georgians?
From Georgia, with Love Win32/Georbot Is someone trying to spy on Georgians? At the beginning of the year, a curious piece of malware came to our attention. An analyst in our virus laboratory noticed that
The Advantages of a Firewall Over an Interafer
FIREWALLS VIEWPOINT 02/2006 31 MARCH 2006 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation to the Centre for the Protection
VESZPROG ANTI-MALWARE TEST BATTERY
VESZPROG ANTI-MALWARE TEST BATTERY 2012 The number of threats increased in large measure in the last few years. A set of unique anti-malware testing procedures have been developed under the aegis of CheckVir
Botnets: The Advanced Malware Threat in Kenya's Cyberspace
Botnets: The Advanced Malware Threat in Kenya's Cyberspace AfricaHackon 28 th February 2014 Who we Are! Paula Musuva-Kigen Research Associate Director, Centre for Informatics Research and Innovation (CIRI)
Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013
Security Architecture: From Start to Sustainment Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013 Security Architecture Topics Introduction Reverse Engineering the Threat Operational
Hacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking
Hacking Book 1: Attack Phases Chapter 1: Introduction to Ethical Hacking Objectives Understand the importance of information security in today s world Understand the elements of security Identify the phases
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
Visualizing Threats: Improved Cyber Security Through Network Visualization
Visualizing Threats: Improved Cyber Security Through Network Visualization Intended audience This white paper has been written for anyone interested in enhancing an organizational cyber security regime
White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.
TrusGuard DPX: Complete Protection against Evolving DDoS Threats AhnLab, Inc. Table of Contents Introduction... 2 The Evolution of DDoS Attacks... 2 Typical Protection against DDoS Attacks... 3 Firewalls...
Defend Your Network with DNS Defeat Malware and Botnet Infections with a DNS Firewall
Defeat Malware and Botnet Infections with a DNS Firewall By 2020, 30% of Global 2000 companies will have been directly compromised by an independent group of cyberactivists or cybercriminals. How to Select
Taxonomy of Hybrid Honeypots
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore Taxonomy of Hybrid Honeypots Hamid Mohammadzadeh.e.n 1, Masood Mansoori 2 and Roza
Securing the system using honeypot in cloud computing environment
Volume: 2, Issue: 4, 172-176 April 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 M. Phil Research Scholar, Department of Computer Science Vivekanandha College
The HoneyNet Project Scan Of The Month Scan 27
The HoneyNet Project Scan Of The Month Scan 27 23 rd April 2003 Shomiron Das Gupta [email protected] 1.0 Scope This month's challenge is a Windows challenge suitable for both beginning and intermediate
Networks and Security Lab. Network Forensics
Networks and Security Lab Network Forensics Network Forensics - continued We start off from the previous week s exercises and analyze each trace file in detail. Tools needed: Wireshark and your favorite
Adaptability of IRC Botnet Detection Method to P2P Botnet Detection
Adaptability of IRC Botnet Detection Method to P2P Botnet Detection Ji, Yuan Department of Electrical Engineering and Computer Science University of California, Irvine [email protected] John, Robin Department
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define
Marble & MobileIron Mobile App Risk Mitigation
Marble & MobileIron Mobile App Risk Mitigation SOLUTION GUIDE Enterprise users routinely expose their employers data and threaten network security by unknowingly installing malicious mobile apps onto their
