Malicious Software. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49. Viruses and Related Threats



Similar documents
CS549: Cryptography and Network Security

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

Malicious Software. Malicious Software. Overview. Backdoor or Trapdoor. Raj Jain. Washington University in St. Louis

Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software

Computer Security DD2395

Malware. Björn Victor 1 Feb [Based on Stallings&Brown]

Intruders and viruses. 8: Network Security 8-1

CS 356 Lecture 9 Malicious Code. Spring 2013

MALICIOUS SOFTWARE CHAPTER Types Of Malicious Software. Backdoor Logic Bomb Trojan Horses Mobile Code Multiple-Threat Malware. 21.

Chapter 14 Computer Threats

Network Security and the Small Business

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Network Incident Report

License for Use Information

Introduction To Security and Privacy Einführung in die IT-Sicherheit I

ANTIVIRUS BEST PRACTICES

ANTI-VIRUS POLICY OCIO TABLE OF CONTENTS

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning

Ch. 7 Malicious Software Malware. Malware Terminology

(Self-Study) Identify How to Protect Your Network Against Viruses

CS574 Computer Security. San Diego State University Spring 2008 Lecture #7

ACS-3921/ Computer Security And Privacy. Lecture Note 5 October 7 th 2015 Chapter 5 Database and Cloud Security

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

Computer Security Threats

Malware: Malicious Code

Computer Viruses: How to Avoid Infection

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Security Engineering Part III Network Security. Intruders, Malware, Firewalls, and IDSs

Introduction to Computer Security Table of Contents

Rogue Programs. Rogue Programs - Topics. Security in Compu4ng - Chapter 3. l Rogue programs can be classified by the way they propagate

What are Viruses, Trojans, Worms & Spyware:

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Malware: Malicious Software

Topics. Virus Protection and Intrusion Detection. What is a Virus? Three related ideas

Cryptography and Network Security

DDoS Attacks & Defenses

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Outline. CSc 466/566. Computer Security. 12 : Malware Version: 2012/03/28 16:06:27. Outline. Introduction

1949 Self-reproducing cellular automata Core Wars

PC Security and Maintenance

LASTLINE WHITEPAPER. In-Depth Analysis of Malware

1 Introduction. Agenda Item: Work Item:

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

Virii, Worms, and Other Malware. Thanks to Marc Liberatore for putting together these slides

1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders.

Operating Systems Principles

Anti-Virus Evasion Techniques and Countermeasures

COMPUTER-INTERNET SECURITY. How am I vulnerable?

Worms, Trojan Horses and Root Kits

Optimizing and Protecting Hard Drives Chapter # 9

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

STANDARD ON CONTROLS AGAINST MALICIOUS CODE

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Computer Security Maintenance Information and Self-Check Activities

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide

E-BUSINESS THREATS AND SOLUTIONS

1 Introduction. Agenda Item: Work Item:

WORMS HALMSTAD UNIVERSITY. Network Security. Network Design and Computer Management. Project Title:

Executable Integrity Verification

CIT 480: Securing Computer Systems. Malware

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

(General purpose) Program security. What does it mean for a pgm to be secure? Depends whom you ask. Takes a long time to break its security controls.

Remote Administrator. Overview

How To Understand What A Virus Is And How To Protect Yourself From A Virus

Seminar Computer Security

What Do You Mean My Cloud Data Isn t Secure?

OutbreakShield Effective and Immediate Protection against Virus Outbreaks

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

Hacking Database for Owning your Data

Top Ten Cyber Threats

Common Cyber Threats. Common cyber threats include:

Denial of Service (DoS)

Radware s Behavioral Server Cracking Protection

Personal Data Security. Grand Computers Club New Technologies SIG May 21, 2014

Security A to Z the most important terms

Countermeasures against Bots

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Data Management Policies. Sage ERP Online

PROACTIVE PROTECTION MADE EASY

Detecting Computer Worms in the Cloud

Network and Host-based Vulnerability Assessment

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS

How Spyware and Anti-Spyware Work

Security. Definitions

Network Security: From Firewalls to Internet Critters Some Issues for Discussion

The Law. Computer Hacking & Cybercrime. Hacking Tools. Hacking Tools. Group 4 - Troester, van Winkle, Wickless, & Wilson

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

Detecting Computer Viruses

Information Resource Management Directive USAP Software Management and Protection

Survey of Spyware Tools and Counter Measures

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Contents Introduction xxvi Chapter 1: Understanding the Threats: Viruses, Trojans, Mail Bombers, Worms, and Illicit Servers


N-CAP Users Guide. Everything You Need to Know About Using the Internet! How Worms Spread via (and How to Avoid That)

Advanced Endpoint Protection Overview

Transcription:

Malicious Software Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49 1 Outline Viruses and Related Threats Malicious Programs The Nature of Viruses Antivirus Approaches Advanced Antivirus Techniques DDoS attacks and countermeasures 2 1

Viruses and Malicious Programs Computer Viruses and related programs have the ability to replicate themselves on an ever increasing number of computers. They originally spread by people sharing floppy disks. Now they spread primarily over the Internet (a Worm ). Other Malicious Programs may be installed by hand on a single machine. They may also be built into widely distributed commercial software packages. These are very hard to detect before the payload activates (Trojan Horses, Trap Doors, and Logic Bombs). 3 Taxonomy of Malicious Programs 4 2

Backdoor or Trapdoor secret entry point into a program allows those who know access bypassing usual security procedures have been commonly used by developers a threat when left in production programs allowing exploited by attackers very hard to block in OS 5 Logic Bomb one of oldest types of malicious software code embedded in legitimate program activated when specified conditions met E.g., presence/absence of some file particular date/time particular user when triggered typically damage system modify/delete files/disks, halt machine, etc. 6 3

Trojan Horse program with hidden side-effects which is usually superficially attractive E.g., game, s/w upgrade, etc. when run performs some additional tasks allows attacker to indirectly gain access they do not have directly often used to propagate a virus/worm or install a backdoor or simply to destroy data Mail the password file. 7 Zombie program which secretly takes over another networked computer then uses it to indirectly launch attacks (difficult to trace zombie s creator) often used to launch distributed denial of service (DDoS) attacks exploits known flaws in network systems 8 4

Bacteria A Bacteria replicates until it fills all disk space, or CPU cycles. 9 Worms A program that replicates itself across the network (usually riding on email messages or attached documents (e.g., macro viruses). Similar to virus, but spreads across the network instead of between files. 10 5

Viruses a piece of self-replicating code attached to some other code attaches itself to another program and executes secretly when the host program is executed. propagates itself & carries a payload carries code to make copies of itself as well as code to perform some covert task 11 Virus Phases Dormant phase - the virus is idle Propagation phase - the virus places an identical copy of itself into other programs Triggering phase the virus is activated to perform the function for which it was intended Execution phase the function is performed Details usually machine/os specific exploiting features/weaknesses 12 6

Virus Structure program V := {goto main; 1234567; subroutine infect-executable := {loop: file := get-random-executable-file; if (first-line-of-file = 1234567) then goto loop else prepend V to file; } subroutine do-damage := {whatever damage is to be done} subroutine trigger-pulled := {return true if condition holds} main: main-program := {infect-executable; if trigger-pulled then do-damage; goto next;} next: } 13 Types of Viruses Parasitic Virus - attaches itself to executable files as part of their code. Runs whenever the host program runs. Memory-resident Virus - Lodges in main memory as part of the residual operating system. Boot Sector Virus - infects the boot sector of a disk, and spreads when the operating system boots up (original DOS viruses). Stealth Virus - explicitly designed to hide from Virus Scanning programs. Polymorphic Virus - mutates with every new host to prevent signature detection. Metamorphic virus - mutates with every infection, but rewrites itself completely every time. Making it extremely difficult to detect. 14 7

A Compression Virus 15 Macro Viruses Microsoft Office applications allow macros to be part of the document. The macro could run whenever the document is opened, or when a certain command is selected (Save File). Platform independent. Infect documents, delete files, generate email and edit letters. 16 8

Email Virus spread using email with attachment containing a macro virus triggered when user opens attachment or worse even when mail viewed by using scripting features in mail agent hence propagates very quickly usually targeted at Microsoft Outlook mail agent & Word/Excel documents 17 Worms replicating but not infecting program (does not attach itself to a program) typically spreads over a network Morris Internet Worm in 1988 using users distributed privileges or by exploiting system vulnerabilities worms perform unwanted functions widely used by hackers to create zombie PC's, subsequently used for further attacks, esp DoS major issue is lack of security of permanently connected systems, esp PC's 18 9

Worm Operation worm has phases like those of viruses: dormant propagation search for other systems to infect establish connection to target remote system replicate self onto remote system triggering execution 19 Morris Worm One of the best known classic worms released by Robert Morris in 1988 targeted Unix systems using several propagation techniques simple password cracking of local pw file exploit bug in finger daemon exploit debug trapdoor in sendmail daemon if any attack succeeds then replicated self 20 10

Malicious Software Protection Have well-known virus protection and anti spybot programs etc., configured to scan disks and downloads automatically for known viruses. Do not execute programs (or "macro's") from unknown sources (e.g., PS files, HyperCard files, MS Office documents. Avoid the most common operating systems and email programs, if possible. 21 Malicious Software Protection Best countermeasure is prevention (do not allow a virus to get into the system in the first place.) But in general not possible Hence need to do one or more of: detection - of viruses in infected system identification - of specific infecting virus removal - restoring system to clean state 22 11

Antivirus Approaches 1st Generation, Scanners: searched files for any of a library of known virus signatures. Checked executable files for length changes. 2nd Generation, Heuristic Scanners: looks for more general signs than specific signatures (code segments common to many viruses). Checked files for checksum or hash changes. 3rd Generation, Activity Traps: stay resident in memory and look for certain patterns of software behaviour (e.g., scanning files). 4th Generation, Full Featured: combine the best of the techniques above. Scanning & activity traps, access controls etc. 23 Generic Decryption (GD) CPU Emulator Virus Signature Scanner Emulation Control Module Advanced Antivirus Techniques For how long should a GD scanner run each interpretation? Digital Immune System Next page 24 12

Digital Immune System 25 Behavior-Blocking Software integrated with host OS monitors program behavior in real-time Eg. file access, disk format, executable mods, system settings changes, network access for possibly malicious actions if detected can block and/or terminate has advantage over scanners but malicious code runs before detection 26 13

Distributed Denial of Service Attacks (DDoS) Distributed Denial of Service (DDoS) attacks form a significant security threat making networked systems unavailable by flooding with useless traffic using large numbers of zombies growing sophistication of attacks defense technologies struggling to cope 27 Distributed Denial of Service Attacks (DDoS) 28 14

Direct DDoS attack 29 Reflector DDoS Attack 30 15

DDoS Countermeasures three broad lines of defense: 1. attack prevention & preemption (before) 2. attack detection & filtering (during) 3. attack source traceback & identification (after) huge range of attack possibilities hence evolving countermeasures 31 have considered: various malicious programs trapdoor, logic bomb, trojan horse, zombie viruses worms countermeasures Summary distributed denial of service attacks 32 16