Instant Messaging. Magnitude of the Problem Radicati reports that 85% of enterprises today use IM. Furthermore, Radicati predicts IM usage increases will.

Slides:



Advertisements
Similar presentations
Instant Messenger Security with a focus on implementing security policies in corporate IM services Kaushal S Chandrashekar CS 691 Dr. Edward Chow UCCS.
Advertisements

Kalpesh Vyas & Seward Khem
Voice over IP Skype.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Securing Instant Messaging Matt Hsu. Outline Introduction Instant Messaging Primer Instant Messaging Vulnerabilities and Exploits Securing Instant Messaging.
26.1 Chapter 26 Remote Logging, Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Secure Public Instant Messaging (IM): A Survey Mohammad Mannan Paul C. Van Oorschot Digital Security Group School of Computer Science Carleton University,
1 Enabling Secure Internet Access with ISA Server.
Instant Messaging Security Flaws By: Shadow404 Southern Poly University.
Presence Applications in the Real World Patrick Ferriter VP of Product Marketing.
Client-Server vs P2P or, HTTP vs Bittorrent. Client-Server Architecture SERVER client.
Botnets An Introduction Into the World of Botnets Tyler Hudak
? INTERNET WHAT, WHY, HOW. DEFINITION The Internet is a massive public spiderweb of computer connections. It connects personal computers, laptops, tablets,
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Computer Communication & Networks Lecture 27 Application Layer: Electronic mail and FTP Waleed.
Chapter 8 The Internet: A Resource for All of Us.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
Security+ All-In-One Edition Chapter 14 – and Instant Messaging Brian E. Brzezicki.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
What makes a network good? Ch 2.1: Principles of Network Apps 2: Application Layer1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail  SMTP,
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Introduction to Barracuda IM Firewall. Two Security Products in One Public IM Management –Manages traffic from public IM clients, including AIM, Yahoo!
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
Internet Information Server Name : Yao Gu Date : 10-June-2000 COSC : 573.
A Case Study: UIM The Universal Instant Messenger Babak Esfandiari Carleton University SYSC 5800 Winter 2003.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
Module 7: Advanced Application and Web Filtering.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
Jabber Technical Overview Presenter: Ming-Wei Lin.
ADVANCED COMPUTER NETWORKS Peer-Peer (P2P) Networks 1.
Slammer Worm By : Varsha Gupta.P 08QR1A1216.
Ming-Chen Zhao, Paarijaat Aditya, Yin Lin Andreas Haeberlen, Peter Druschel, Bruce Maggs, and William Wishon A First Look at a Hybrid Content Delivery.
2 pt 3 pt 4 pt 5pt 1 pt 2 pt 3 pt 4 pt 5 pt 1 pt 2pt 3 pt 4pt 5 pt 1pt 2pt 3 pt 4 pt 5 pt 1 pt 2 pt 3 pt 4pt 5 pt 1pt Internet History Computer Networks.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
External Messaging Services. Page 2 External Messaging: Extends the power of Presence and Instant Messaging outside corporate Network Provided only to.
Firewalls Fighting Spyware, Viruses, and Malware Ch 5.
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
26.1 Chapter 26 Remote Logging, Electronic Mail, and File Transfer Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Skype.
Introduction to Barracuda IM Firewall
Backdoor Attacks.
Some bits on how it works
Some Common Terms The Internet is a network of computers spanning the globe. It is also called the World Wide Web. World Wide Web It is a collection of.
Living in a Network Centric World
Living in a Network Centric World
Firewall Exercise.
File Transfer Protocol
Software for Eligible Beneficiaries Accession
Living in a Network Centric World
Living in a Network Centric World
Lecture 3: Secure Network Architecture
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
Living in a Network Centric World
Computer Networks Protocols
Wireless Spoofing Attacks on Mobile Devices
Living in a Network Centric World
Presentation transcript:

Instant Messaging

Magnitude of the Problem Radicati reports that 85% of enterprises today use IM. Furthermore, Radicati predicts IM usage increases will send the number of IM messages sent per day from a base of 11.4 billion messages per day to over 45.8 billion per day in 2008 Radicati predicts the IM user base will grow from 320 million IM users in 2004 to 592 million users in 2008

Why is it so popular? 1. Its free 2. Easy to Download, install, and use 3. It works –In most network environments 4.Network effect of attracting new users

General Problems 1. New mechanism for rapid virus propagation –File Transfers are the main problem –Real Time 2. IM spam (aka spIM) –Loss of productivity –Virus/Worms Most are a form of worm

Spim Continued 70 percent involve pornography in some fashion 12 percent involve get rich schemes of one sort or another 9 percent is involved with selling products, and 5 percent is involved in loans or finances.

Virus/Worm Propagation Social Engineering –Request for password ( Posing as an administrator) –A link to a website that has a download that is the payload of the worm How it works –Buddy lists –SpIM –Real Time

Architecture 1. IM clients connect to the service on the Internet, but the service never needs to connect to the client. 2. IM clients can simulate a TCP connection over HTTP by polling for presence and messages. 3. IM clients connect to a set of servers known as dispatch servers. The number of dispatch servers and their IP addresses grow constantly, almost on a daily basis.

Architecture Continued connect through well publicized port’s, 5190 for AIM, 1863 for MSN, and 5050 for Yahoo respectively. Each of these clients have the capability to exploit any open port on the firewall if the default ones are blocked. some of these services have the ability to connect with P2P connections and can negotiate a connection on random port.

Why this cause a problem Impossible to block all the IP addresses of the dispatch servers –After the first login the user will log in through the dispatch server Hard to block by port number because of its port negotiating capabilities

Sources s/ s/ http:// http:// 13