Malicious Software. Malicious Software. Overview. Backdoor or Trapdoor. Raj Jain. Washington University in St. Louis



Similar documents
Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software

Computer Security DD2395

Malicious Software. Ola Flygt Växjö University, Sweden Viruses and Related Threats

CS549: Cryptography and Network Security

CS 356 Lecture 9 Malicious Code. Spring 2013

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

ACS-3921/ Computer Security And Privacy. Lecture Note 5 October 7 th 2015 Chapter 5 Database and Cloud Security

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning

ANTIVIRUS BEST PRACTICES

Malware. Björn Victor 1 Feb [Based on Stallings&Brown]

Chapter 14 Computer Threats

Network Incident Report

Ch. 7 Malicious Software Malware. Malware Terminology

Security Engineering Part III Network Security. Intruders, Malware, Firewalls, and IDSs

Introduction To Security and Privacy Einführung in die IT-Sicherheit I

MALICIOUS SOFTWARE CHAPTER Types Of Malicious Software. Backdoor Logic Bomb Trojan Horses Mobile Code Multiple-Threat Malware. 21.

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

Intruders and viruses. 8: Network Security 8-1

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Malware: Malicious Code

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis

Cryptography and Network Security

Common Cyber Threats. Common cyber threats include:

WHITE PAPER. Understanding How File Size Affects Malware Detection

Computer Security Threats

CSE331: Introduction to Networks and Security. Lecture 15 Fall 2006

Computer Viruses: How to Avoid Infection

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

(Self-Study) Identify How to Protect Your Network Against Viruses

WORMS HALMSTAD UNIVERSITY. Network Security. Network Design and Computer Management. Project Title:

Virii, Worms, and Other Malware. Thanks to Marc Liberatore for putting together these slides

Outline. CSc 466/566. Computer Security. 12 : Malware Version: 2012/03/28 16:06:27. Outline. Introduction

Network Monitoring Tool to Identify Malware Infected Computers

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

Application Security Backgrounder

DDoS Attacks & Defenses

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Network Security and the Small Business

What Do You Mean My Cloud Data Isn t Secure?

Integrated Protection for Systems. João Batista Territory Manager

Malware: Malicious Software

Personal Data Security. Grand Computers Club New Technologies SIG May 21, 2014

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

WORMS : attacks, defense and models. Presented by: Abhishek Sharma Vijay Erramilli

Topics. Virus Protection and Intrusion Detection. What is a Virus? Three related ideas

OutbreakShield Effective and Immediate Protection against Virus Outbreaks

Cryptography and Network Security: Overview

Randy Lee FireEye Labs. Understanding Modern Malware.

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Operating Systems Principles

CHECK POINT Mobile Security Revolutionized. [Restricted] ONLY for designated groups and individuals

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Basic Computer Security Part 2

Section 12 MUST BE COMPLETED BY: 4/22

CIS 551 / TCOM 401 Computer and Network Security. Spring 2006 Lecture 21

1949 Self-reproducing cellular automata Core Wars

E-BUSINESS THREATS AND SOLUTIONS

Rogue Programs. Rogue Programs - Topics. Security in Compu4ng - Chapter 3. l Rogue programs can be classified by the way they propagate

CSE331: Introduction to Networks and Security. Lecture 17 Fall 2006

Seminar Computer Security

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Detailed Description about course module wise:

Networking for Caribbean Development

CS574 Computer Security. San Diego State University Spring 2008 Lecture #7

Lecture 13 - Network Security

License for Use Information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Information Security Threat Trends

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document

CEH Version8 Course Outline

Security A to Z the most important terms

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

CS5008: Internet Computing

Sapphire/Slammer Worm. Code Red v2. Sapphire/Slammer Worm. Sapphire/Slammer Worm. Sapphire/Slammer Worm. Why Was Slammer So Fast?

Module 4 Protection of Information Systems Infrastructure and Information Assets. Chapter 6: Network Security

IBM Protocol Analysis Module

CSE331: Introduction to Networks and Security. Lecture 18 Fall 2006

Symantec Endpoint Protection

ANTI-VIRUS POLICY OCIO TABLE OF CONTENTS

Virus Protection Across The Enterprise

Secure Your Mobile Workplace

Cybersecurity for the C-Level

Fighting Advanced Threats

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

CHAPTER 10: COMPUTER SECURITY AND RISKS

CIT 480: Securing Computer Systems. Malware

How To Classify A Dnet Attack

Content Teaching Academy at James Madison University

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Smartphone Security. A Holistic view of Layered Defenses. David M. Wheeler, CISSP, CSSLP, GSLC. (C) 2012 SecureComm, Inc. All Rights Reserved

The Evolution of Computer Security Attacks and Defenses. Angelos D. Keromytis Columbia University

The Leading Provider of Endpoint Security Solutions

WildFire Overview. WildFire Administrator s Guide 1. Copyright Palo Alto Networks

Transcription:

Malicious Software Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/ 21-1 1. Types of Malicious Software 2. Viruses 3. Virus Countermeasures 4. Worms 5. Distributed Denial of Service Attacks These slides are based partly on Lawrie Brown s slides supplied with William Stallings s book Cryptography and Network Security: Principles and Practice, 6 th Ed, 2014. 21-2 Malicious Software Backdoor or Trapdoor Secret entry point into a program Allows those, who know, access bypassing usual security procedures Commonly used by developers A threat when left in production programs Allowing exploitation by attackers Very hard to block in O/S Requires good s/w development & update 21-3 21-4

Logic Bomb One of oldest types of malicious software Code embedded in legitimate program Activated when specified conditions met E.g., presence/absence of some file Particular date/time Particular user When triggered typically damages the system Modify/delete files/disks, halt machine, etc. Trojan Horse A superficially attractive program with hidden side-effects E.g., game, s/w upgrade, etc. When run performs some additional tasks Allows attacker to indirectly gain access Often used to propagate a virus/worm or install a backdoor or simply to destroy data 21-5 21-6 Mobile Code Programs/scripts/macros that run unchanged on heterogeneous collection of platforms E.g., java applets Transmitted from remote system to local system and then executed on local system Inject virus, worm, or Trojan horse Perform own exploits: unauthorized data access, root compromise Multiple-Threat Malware Malware may operate in multiple ways Multipartite virus infects in multiple ways E.g., multiple file types Blended attack: uses multiple methods of infection or transmission To maximize speed of contagion and severity May include multiple types of malware e.g., Nimda had worm, virus, mobile code Can also use instant messaging and P2P 21-7 Ref: http://en.wikipedia.org/wiki/nimda 21-8

Viruses Virus Structure Piece of software that infects programs Modifying them to include a copy of the virus The code is executed secretly when host program is run Specific to operating system and hardware Taking advantage of their details and weaknesses A typical virus goes through phases of: Dormant Propagation Triggering Execution Infected program is larger than original 21-9 21-10 Compression Virus Infected program has the same size as original 21-11 By Target: Virus Classification Boot Sector: Spreads when booted with infected disks File Infector: Infects executables Macro Virus: Macro code By Concealment Strategy: Encrypted Virus: virus encrypted with a random key stored w the virus Stealth Virus: Explicitly designed to avoid detection Polymorphic Virus: Mutates with every infection Signature varies Metamorphic Virus: Rewrites itself completely with every infection 21-12

Macro Virus Common in mid-1990s since Platform independent Infect documents Easily spread Exploit macro capability of office apps Executable program embedded in office docs More recent MS office releases include protection Recognized by many anti-virus programs Recent development Example: Melissa E-Mail Viruses Exploits MS Word macro in attached doc If attachment opened, macro activates Sends email to all on users address list and does local damage Newer versions triggered by just opening email (rather than attachment) Much faster propagation 21-13 Ref: http://en.wikipedia.org/wiki/melissa_%28computer_virus%29 21-14 Virus Countermeasures Prevention: Avoid freewares - ideal solution but difficult Realistically need detection, identification, removal If detected but can t identify or remove, must discard and replace infected program Anti-Virus Evolution Virus and antivirus tech have both evolved Early viruses simple code, easily removed As viruses become more complex, so must the countermeasures Generations: First - signature scanners Second - heuristics Third - identify actions Fourth - combination packages 21-15 21-16

Generic Decryption Digital Immune System Runs executable files through GD scanner: CPU emulator to interpret instructions Virus scanner to check known virus signatures Emulation control module to manage process Lets virus decrypt itself in interpreter Periodically scan for virus signatures Issue is long to interpret and scan Tradeoff chance of detection vs time delay 21-17 21-18 Behavior-Blocking Blocking Software Worms Replicating program that propagates over net Using email, remote exec, remote login Has phases like a virus: Dormant, propagation, triggering, execution Propagation phase: searches for other systems, connects to it, copies self to it and runs May disguise itself as a system process Concept seen in Brunner s Shockwave Rider Implemented by Xerox Palo Alto labs in 1980 s 21-19 21-20

Morris Worm Worm Propagation Model One of the best known worms Released by Robert Morris in 1988 Various attacks on UNIX systems Cracking password file to use login/password to logon to other systems Exploiting a bug in the finger protocol Exploiting a bug in sendmail If succeed have remote shell access Sent bootstrap program to copy worm over 21-21 21-22 Code Red: Sample Worm Attacks July 2001 exploiting MS IIS bug Probes random IP address, does DDoS attack Code Red II variant includes backdoor SQL Slammer Early 2003, attacks MS SQL Server Mydoom Mass-mailing e-mail worm that appeared in 2004 Installed remote access backdoor in infected systems Warezov family of worms Scan for e-mail addresses, send in attachment Worm Technology Multiplatform: Windows, MAC, Linux, Multi-exploit: Browsers, emails, file sharing, Ultrafast spreading: Prior scans to accumulate IP addresses of vulnerable machines Polymorphic: Each copy has a new code generated on the fly Metamorphic: Different behavior at different stages of propagation Transport Vehicles: Worms used to spread DDoS bots Zero-day exploit: Vulnerability detected only when the worm is launched. 21-23 21-24

Mobile Phone Worms First appeared on mobile phones in 2004 Target smartphone which can install s/w They communicate via Bluetooth or MMS To disable phone, delete data on phone, or send premium-priced messages CommWarrior: Launched in 2005 Replicates using Bluetooth to nearby phones and via MMS using address-book numbers Worm Countermeasures Overlaps with anti-virus techniques Once worm on system A/V can detect Worms also cause significant net activity Worm defense approaches include: Signature-based worm scan filtering Filter-based worm containment Payload-classification-based worm containment Threshold random walk scan detection Rate limiting and rate halting 21-25 21-26 Proactive Worm Containment Network Based Worm Defense 21-27 21-28

Distributed Denial of Service Attacks (DDoS) DDoS (Cont) Distributed Denial of Service (DDoS) attacks form a significant security threat Making networked systems unavailable by flooding with useless traffic using large numbers of zombies Growing sophistication of attacks Defense technologies struggling to cope 21-29 21-30 DDoS Flood Types Constructing an Attack Network Must infect large number of zombies Needs: 1. Software to implement the DDoS attack 2. An unpatched vulnerability on many systems 3. Scanning strategy to find vulnerable systems: random, hit-list, topological, local subnet 21-31 21-32

DDoS Countermeasures Three broad lines of defense: 1. Attack prevention & preemption (before) 2. Attack detection & filtering (during) 3. Attack source traceback & ident (after) Huge range of attack possibilities Hence evolving countermeasures Summary Malicious programs: trapdoor, logic bomb, trojan horse, zombie Viruses Worms Distributed denial of service attacks 21-33 21-34