Computer Security DD2395



Similar documents
Malicious Software. Malicious Software. Overview. Backdoor or Trapdoor. Raj Jain. Washington University in St. Louis

Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software

CS 356 Lecture 9 Malicious Code. Spring 2013

Malicious Software. Ola Flygt Växjö University, Sweden Viruses and Related Threats

CS549: Cryptography and Network Security

ACS-3921/ Computer Security And Privacy. Lecture Note 5 October 7 th 2015 Chapter 5 Database and Cloud Security

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

Malware. Björn Victor 1 Feb [Based on Stallings&Brown]

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Ch. 7 Malicious Software Malware. Malware Terminology

Security Engineering Part III Network Security. Intruders, Malware, Firewalls, and IDSs

Computer Security Threats

Intruders and viruses. 8: Network Security 8-1

MALICIOUS SOFTWARE CHAPTER Types Of Malicious Software. Backdoor Logic Bomb Trojan Horses Mobile Code Multiple-Threat Malware. 21.

Malware: Malicious Software

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning

Network Incident Report

ANTIVIRUS BEST PRACTICES

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Security A to Z the most important terms

CIT 480: Securing Computer Systems. Malware

Malware: Malicious Code

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Chapter 14 Computer Threats

Top Ten Cyber Threats

WHITE PAPER. Understanding How File Size Affects Malware Detection

LASTLINE WHITEPAPER. In-Depth Analysis of Malware

Common Cyber Threats. Common cyber threats include:

Section 12 MUST BE COMPLETED BY: 4/22

Malware Trend Report, Q April May June

Computer Viruses: How to Avoid Infection

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

CS574 Computer Security. San Diego State University Spring 2008 Lecture #7

Hackers: Detection and Prevention

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

Operating Systems Principles

Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A monnappa22@gmail.com

Randy Lee FireEye Labs. Understanding Modern Malware.

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Computer Networks & Computer Security

Fighting Advanced Threats

Integrated Protection for Systems. João Batista Territory Manager

OutbreakShield Effective and Immediate Protection against Virus Outbreaks

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Symantec Endpoint Protection Getting Started Guide

How To Test For Security Protection

Host-based Intrusion Prevention System (HIPS)

PFP Technology White Paper

5 Steps to Advanced Threat Protection

OS Security. Malware. Radboud University Nijmegen, The Netherlands. Winter 2014/2015

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

The Hillstone and Trend Micro Joint Solution

What are Viruses, Trojans, Worms & Spyware:

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

Windows Malware Annual Report 2014 And prognosis 2015

Introduction to Computer Security Table of Contents

24/7 Visibility into Advanced Malware on Networks and Endpoints

Cybersecurity for the C-Level

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Self Protection Techniques in Malware

COMPUTER-INTERNET SECURITY. How am I vulnerable?

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Sapphire/Slammer Worm. Code Red v2. Sapphire/Slammer Worm. Sapphire/Slammer Worm. Sapphire/Slammer Worm. Why Was Slammer So Fast?

(Self-Study) Identify How to Protect Your Network Against Viruses

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control

DDoS Attacks & Defenses

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Stopping zombies, botnets and other - and web-borne threats

Legal & Ethical Considerations of Offensive Cyber-Operations?

Getting Ahead of Malware

Advanced Endpoint Protection Overview

PROACTIVE PROTECTION MADE EASY

Lessons Learned in Cyberspace Security. Margaret M. McMahon, Ph.D. and Lori DeLooze, Ph.D. ANRC, LLC Wurzbach Rd. Suite 101

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Spyware Doctor Enterprise Technical Data Sheet

Worms, Trojan Horses and Root Kits

CSE509 System Security

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Cloud Services Prevent Zero-day and Targeted Attacks

ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows

WildFire. Preparing for Modern Network Attacks

Description: Objective: Attending students will learn:

Transcription:

Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh11/ Fall 2011 Sonja Buchegger buc@kth.se Lecture 7 Malicious Software DD2395 Sonja Buchegger 1

Course Admin Lab 2: - prepare before lab session - signup! Lab 3: - prepare: webgoat, gruyere Lab 4: - signup - finding group partners: meet here during break DD2395 Sonja Buchegger 2

Malicious Software programs exploiting system vulnerabilities known as malicious software or malware - program fragments that need a host program e.g. viruses, logic bombs, and backdoors - independent self-contained programs e.g. worms, bots - replicating or not sophisticated threat to computer systems DD2395 Sonja Buchegger 3

Malware Terminology Virus Worm Logic bomb Trojan horse ( trapdoor ) Backdoor Mobile code ( generator Auto-rooter Kit (virus Spammer and Flooder programs Keyloggers, Spyware Rootkit Zombie, bot Adware DD2395 Sonja Buchegger 4

Would you trust this program? DD2395 Sonja Buchegger 5

Trojan Horse First identified at NSA in 1972 by Daniel Edwards It's a program with two purposes, one obvious and one hidden from the user Today it's often used to install other software or backdoors Trojan horses can be built from existing programs using a special wrapper Or designed from the start to be one. DD2395 Sonja Buchegger 6

What would you do? How to get someone to run a trojan? How to not run a trojan? DD2395 Sonja Buchegger 7

Backdoor Software that gives access to a system Bypassing OS restrictions Can be part of a trojan Often installed for legitimate reasons Only to later be abused Typically very very hard to find DD2395 Sonja Buchegger 8

Legitimate Reasons? What would be a legitimate reason to install a backdoor? DD2395 Sonja Buchegger 9

Grayware In the gray zone between harmless and harmful, mostly annoying Popup windows For teh lulz Can include adware, spyware DD2395 Sonja Buchegger 10

Logic Bomb A small bit of code that triggers on a specific condition Typically with malicious results No vector for spreading Installed directly DD2395 Sonja Buchegger 11

Viruses piece of software that infects programs - modifying them to include a copy of the virus - so it executes secretly when host program is run specific to operating system and hardware - taking advantage of their details and weaknesses a typical virus goes through phases of: - dormant - propagation - triggering - execution DD2395 Sonja Buchegger 12

Virus Structure components: - infection mechanism - enables replication - modification engine for disguise - trigger - event that makes payload activate - payload - what it does, malicious or benign prepended / appended / embedded when infected program invoked, executes virus code then original program code ( difficult ) can block initial infection ( controls or propagation (with access DD2395 Sonja Buchegger 13

Virus Structure DD2395 Sonja Buchegger 14

Virus Classification boot sector file infector macro virus encrypted virus: different keys stealth virus: evade detection, e.g. compression polymorphic virus metamorphic virus DD2395 Sonja Buchegger 15

Compression Virus DD2395 Sonja Buchegger 16

Polymorphic Virus A virus can take things one step further: Rebuild the whole virus at every infection to something functionally identical There are many ways to do nothing on a computer Instructions can be reordered in many ways To detect these the AV engine often has to simulate the virus to figure out what it is. DD2395 Sonja Buchegger 17

Metamorphic Virus Complete rewrite Can also change behavior DD2395 Sonja Buchegger 18

Macro Virus became very common in mid-1990s since - platform independent - infects documents - is easily spread exploit macro capability of office apps - executable program embedded in office doc - often a form of Basic more recent releases include protection recognized by many anti-virus programs DD2395 Sonja Buchegger 19

E-Mail Viruses more recent development e.g. Melissa - exploits MS Word macro in attached doc - if attachment opened, macro activates - sends email to all on users address list - and does local damage then saw versions triggered reading email hence much faster propagation DD2395 Sonja Buchegger 20

Virus Countermeasures prevention - ideal solution but difficult realistically need: - detection - identification - removal if detected but can t identify or remove, must discard and replace infected program DD2395 Sonja Buchegger 21

Anti-Virus Evolution virus & antivirus tech have both evolved early viruses simple code, easily removed as become more complex, so must the countermeasures generations - first - signature scanners - second - heuristics - third - identify actions - fourth - combination packages DD2395 Sonja Buchegger 22

Generic Decryption runs executable files through GD scanner: - CPU emulator to interpret instructions - virus scanner to check known virus signatures - emulation control module to manage process lets virus decrypt itself in interpreter periodically scan for virus signatures issue is long to interpret and scan - tradeoff chance of detection vs time delay DD2395 Sonja Buchegger 23

Digital Immune System DD2395 Sonja Buchegger 24

Behavior-Blocking Software DD2395 Sonja Buchegger 25

Worms replicating program that propagates over net - using email, remote exec, remote login has phases like a virus: - dormant, propagation, triggering, execution - propagation phase: searches for other systems, connects to it, copies self to it and runs may disguise itself as a system process implemented by Xerox Palo Alto labs in 1980 s DD2395 Sonja Buchegger 26

Morris Worm one of best known early worms released by Robert Morris in 1988 various attacks on UNIX systems - cracking password file to use login/password to logon to other systems - exploiting a bug in the finger protocol - exploiting a bug in sendmail if succeed have remote shell access - sent bootstrap program to copy worm over DD2395 Sonja Buchegger 27

Worm Propagation Model DD2395 Sonja Buchegger 28

Why the slow finish phase? DD2395 Sonja Buchegger 29

Recent Worm Attacks Code Red - July 2001 exploiting MS IIS bug - probes random IP address, does DDoS attack - consumes significant net capacity when active Code Red II variant includes backdoor SQL Slammer - early 2003, attacks MS SQL Server - compact and very rapid spread Mydoom - mass-mailing e-mail worm that appeared in 2004 - installed remote access backdoor in infected systems DD2395 Sonja Buchegger 30

Conficker 2009 Recent Worm Attacks Stuxnet 2010 Duqu 2011 DD2395 Sonja Buchegger 31

Worm Technology multiplatform multi-exploit ultrafast spreading polymorphic metamorphic transport vehicles zero-day exploit DD2395 Sonja Buchegger 32

Worm Countermeasures overlaps with anti-virus techniques once worm on system A/V can detect worms also cause significant net activity worm defense approaches include: - signature-based worm scan filtering - filter-based worm containment - payload-classification-based worm containment - threshold random walk scan detection - rate limiting and rate halting DD2395 Sonja Buchegger 33

Proactive Worm Containment DD2395 Sonja Buchegger 34

Network Based Worm Defense DD2395 Sonja Buchegger 35

Bots program taking over other computers to launch hard to trace attacks if coordinated form a botnet characteristics: - remote control facility via IRC/HTTP etc - spreading mechanism attack software, vulnerability, scanning strategy various counter-measures applicable DD2395 Sonja Buchegger 36

Rootkits set of programs installed for admin access malicious and stealthy changes to host O/S may hide its existence - subverting report mechanisms on processes, files, registry entries etc may be: - persistent or memory-based - user or kernel mode installed by user via trojan or intruder on system range of countermeasures needed DD2395 Sonja Buchegger 37

Rootkit System Table Mods DD2395 Sonja Buchegger 38

Summary introduced types of malicous software - incl backdoor, logic bomb, trojan horse - virus types and countermeasures worm types and countermeasures bots rootkits DD2395 Sonja Buchegger 39