Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software



Similar documents
Malicious Software. Ola Flygt Växjö University, Sweden Viruses and Related Threats

CS549: Cryptography and Network Security

Computer Security DD2395

Malicious Software. Malicious Software. Overview. Backdoor or Trapdoor. Raj Jain. Washington University in St. Louis

Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software

Malware. Björn Victor 1 Feb [Based on Stallings&Brown]

Denial of Service Attacks

Intruders and viruses. 8: Network Security 8-1

SECURING APACHE : DOS & DDOS ATTACKS - I

Network Incident Report

MALICIOUS SOFTWARE CHAPTER Types Of Malicious Software. Backdoor Logic Bomb Trojan Horses Mobile Code Multiple-Threat Malware. 21.

Seminar Computer Security

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Secure Software Programming and Vulnerability Analysis

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Abstract. Introduction. Section I. What is Denial of Service Attack?

CS 356 Lecture 16 Denial of Service. Spring 2013

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

CS 356 Lecture 9 Malicious Code. Spring 2013

Analysis on Some Defences against SYN-Flood Based Denial-of-Service Attacks

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Denial of Service Attacks

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning

Denial of Service (DoS)

Firewalls and Intrusion Detection

CSE 3482 Introduction to Computer Security. Denial of Service (DoS) Attacks

Computer Viruses: How to Avoid Infection

Chapter 14 Computer Threats

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Denial of Service Attacks, What They are and How to Combat Them

Security Engineering Part III Network Security. Intruders, Malware, Firewalls, and IDSs

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

E-BUSINESS THREATS AND SOLUTIONS

ANTIVIRUS BEST PRACTICES

Security Toolsets for ISP Defense

1 Introduction. Agenda Item: Work Item:

Security: Attack and Defense

DDos. Distributed Denial of Service Attacks. by Mark Schuchter

Denial Of Service. Types of attacks

Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment

1 Introduction. Agenda Item: Work Item:

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Acquia Cloud Edge Protect Powered by CloudFlare

CloudFlare advanced DDoS protection

Announcements. No question session this week

Denial of Service (DoS) Technical Primer

DDoS Protection Technology White Paper

Computer Security Threats

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

TLP WHITE. Denial of service attacks: what you need to know

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA DDoS and IP Traceback. Overview

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

WORMS : attacks, defense and models. Presented by: Abhishek Sharma Vijay Erramilli

Computer Networks & Computer Security

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Denial of Service. Tom Chen SMU

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Lecture 13 - Network Security

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

Description: Objective: Attending students will learn:

Ch. 7 Malicious Software Malware. Malware Terminology

How To Stop A Ddos Attack On A Website From Being Successful

Usage of Embedded Systems for DoS Attack Protection

Name: 1. CSE331: Introduction to Networks and Security Fall 2003 Dec. 12, /14 2 /16 3 /16 4 /10 5 /14 6 /5 7 /5 8 /20 9 /35.

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

Barracuda Intrusion Detection and Prevention System

Survey on DDoS Attack in Cloud Environment

CMS Operational Policy for Firewall Administration

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Client Server Registration Protocol

What are Viruses, Trojans, Worms & Spyware:

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Security vulnerabilities in the Internet and possible solutions

Certified Ethical Hacker Exam Version Comparison. Version Comparison

SECURING APACHE : DOS & DDOS ATTACKS - II

Firewalls, Tunnels, and Network Intrusion Detection

Denial of Service Attacks. Notes derived from Michael R. Grimaila s originals

CS5008: Internet Computing

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

Module 4 Protection of Information Systems Infrastructure and Information Assets. Chapter 6: Network Security

PART D NETWORK SERVICES

How To Classify A Dnet Attack

Complete Protection against Evolving DDoS Threats

ACS-3921/ Computer Security And Privacy. Lecture Note 5 October 7 th 2015 Chapter 5 Database and Cloud Security

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

(Self-Study) Identify How to Protect Your Network Against Viruses

Intro to Firewalls. Summary

co Characterizing and Tracing Packet Floods Using Cisco R

Transcription:

CEN 448 Security and Internet Protocols Chapter 19 Malicious Software Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University mdahshan@ccis.ksu.edu.sa Malicious Programs Programs that exploit vulnerabilities Cause damage to computer systems Programs that need host program viruses, logic bombs, backdoors Self-contained programs worms, zombies Threats hat do not replicate logic bombs, back doors Threats that produce copies of themselves viruses, worms

Malicious Programs

Backdoors / Trapdoors Secret entry point to program Allows bypassing normal security procedure Mainly used by programmers for debugging Example: special password, event sequence Threat if used to get unauthorized access Difficult to counter Focus on program development security Logic Bombs Coded embedded into some legit program Set to explode when certain conditions met Examples presence of certain files particular day of the week, month, year particular user

Trojan Horses Apparently useful program Contain hidden harmful code Will take privilege of user running it Can be implanted in a compiler All compiled applications will be infected Example backdoor in login application delete files in the background Zombie Program secretly planted in net computer Using virus or Trojan When activated, computer perform attacks Difficult to trace back to its creator Planted into hundreds of computers Used in DoS attacks

Virus Structure program V := special marker for victims {goto main; 1234567; subroutine infect-executable := {loop: file := get-random-executable-file; if (first-line-of-file = 1234567) then goto loop else prepend V to file; } subroutine do-damage := {whatever damage is to be done} subroutine trigger-pulled :={return true if some condition holds} main: main-program := {infect-executable; if trigger-pulled then do-damage; goto next;} infect other programs, do damage next: transfer control to original program } Virus Compression Previous structure easy detected from size Compression is used to hide virus

Types of Viruses Parasitic attach to exe, infect & do damage when executed Memory-resident virus load to memory, infect every executed application Boot sector virus infect MBR, spread when system boots up Stealth virus designed to hide itself from antivirus Polymorphic virus mutates with every infection, hard to detect signature Metamorphic virus rewrites itself completely each time, change behavior Worms Program that replicates itself Perform unwanted/harmful actions Send copies across network email, remote execution, remote login Recent worms Code Red: 360,000 servers in 14 hours Code Red II: targeted MS IIS, install backdoor Nimda: infect web servers, modify contents

Antivirus Approaches Main functions detection: determine virus infection occurred identification: identify specific virus removal: remove virus from infected programs First generation antivirus require virus signature to identify virus signature: structure, bit pattern, wildcards maintain length of programs, look for change Antivirus Approaches Second generation antivirus use heuristic rules, search for probable infection e.g. look for encryption loop, discover key integrity checking, use checksum, hash code Third generation antivirus memory resident identify virus by its actions, not signature Fourth generation antivirus package contain multiple AV techniques include access control, limit virus infection ability

Advanced Antivirus Techniques Generic Description (GD) technology enables detection of polymorphic viruses all executables run through GD scanner GD contains emulator (virtual computer) capture virus when it decrypted Digital immune system developed b IBM research, utilize GD emulator central server capture virus, analyze, remove pass info to other clients, systems Advanced Antivirus Techniques

Distributed Denial of Service Attacks Make system inaccessible by consuming resources with useless requests resource: internal (CPU, disk) or network (bandwidth) Prevent legit users from getting service DoS: launched by single user, host DDoS attacker recruit many Internet hosts coordinated attack against target sophisticated, difficult to trace back DDoS Examples SYN flood attack Flood target with many TCP SYN requests Target sends SYN/ACK, waiting for response SYN requests stored in target memory Eventually, memory filled, can t take more Legit users can t establish TCP connections

DDoS Examples Attack on network resources Multiple hosts send ICMP ECHO packets Spoof source IP address to victim target Nodes respond ICMP REPLY packets to spoofed address of target Target router get flooded with packets No bandwidth left for legitimate traffic

DoS Examples Consume system memory Simple program/script copy itself Consume process ID address table Consume disk space Generate many emails Generate many errors that must be logged Place files in network shared areas DDoS Levels Multiple layers of attack sources Direct DDoS attacks attacker, master zombies, slave zombies attacker coordinates, triggers master zombies master zombies trigger slave zombies Reflector DDoS attacks adds another layer: reflectors more difficulty added to trace and filter packets

DDoS Countermeasures Attack prevention: before attack enable victim to endure attack without denying service enforce policies on resource consumption provide backup resources modify internet protocols to reduce possibility of DDoS Attack detection (during attack) attempt to detect attack and respond immediately look for suspicious patterns, filter out offensive packets Attack trace back and identification (during, after) attempt to identify source to prevent future attack usually doesn t yield any results fast enough, if at all

Additional References What is botnet?, searchsecurity.techtarget.com/sdefinition/0,,sid1 4_gci1030284,00.html SYN Cookies, cr.yp.to/syncookies.html Router Expert: Smurf/fraggle attack defence using SACLs, searchnetworking.techtarget.com/tip/1,289483,si d7_gci856112,00.html