The Internet Worm Compromising the availability and reliability of systems through security failure.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

C risis And A ftermath Eugene H. Spafford 발표자 : 손유민.
Communications of the ACM (CACM), Vol. 32, No. 6, June 1989
Lecture: Malicious Code CIS 3360 Ratan K. Guha. Malicious Code2 Overview and Reading Assignments Defining malicious logic Types Action by Viruses Reading.
CSE331: Introduction to Networks and Security Lecture 32 Fall 2002.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
The Internet Worm Crisis and Aftermath Miyu Nakagawa Cameron Smithers Ying Han.
Information Networking Security and Assurance Lab National Chung Cheng University 1 A Real World Attack: wu-ftp.
Lecture 11 Reliability and Security in IT infrastructure.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Desktop Security: Worms and Viruses Brian Arkills, C&C NDC-Sysmgt.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Viruses.
Unit 2 - Hardware Computer Security.
Computation for Physics 計算物理概論 Introduction to Linux.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Controlling Files Richard Newman based on Smith “Elementary Information Security”
CMSC 414 Computer (and Network) Security Lecture 14 Jonathan Katz.
More Network Security Threats Worm = a stand-alone program that can replicate itself and spread Worms can also contain manipulation routines to perform.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Terminology Worm –A computer program that duplicates itself over computer networks. Virus –A computer program that inspects it’s environment and copies.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Administrative: Objective: –Tutorial on Risks –Phoenix recovery Outline for today.
Types of Electronic Infection
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
©Ian Sommerville 2004Software Engineering Case Studies Slide 1 The Internet Worm Compromising the availability and reliability of systems through security.
Crisis And Aftermath Eugene H. Spafford 이희범.  Introduction  How the worm operated  Aftermath Contents.
4061 Session 26 (4/19). Today Network security Sockets: building a server.
Malicious Software.
The Internet Worm Incident Eugene H. Spafford  Attack Format –Worm vs. Virus  Attack Specifications –Worm operation –Infection and propagaion  Topics.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Computer and Internet Security (How to protect your computer from Threats) By: Steven Siggers Instructor: Dr. Marko Puljic.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
Chapter 40 Internet Security.
Chapter 7: Using Windows Servers
Securing Network Servers
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Malware and Computer Maintenance
Viruses and Other Malicious Content
The Security Problem Security must consider external environment of the system, and protect it from: unauthorized access. malicious modification or destruction.
SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH
computer virus infection & symptoms
Internet Safety.
NET 311 Information Security
Intuit has launched QuickBooks File Doctor tool (QBFD) in QuickBooks File Doctor is a tool that has been designed to recover the damaged company.
Chap 10 Malicious Software.
UNIT 18 Data Security 1.
Computer Security Distributed System Security
Viruses and Virus Protection
Computer communications
Security.
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Chap 10 Malicious Software.
Technology Mrs. Huddleston
Operating System Concepts
Crisis and Aftermath Morris worm.
Test 3 review FTP & Cybersecurity
A Model For Network Security
Presentation transcript:

The Internet Worm Compromising the availability and reliability of systems through security failure

What happened In November 1988, a program was deliberately released that spread itself throughout Digital VAX and Sun workstations across the Internet. It exploited security vulnerabilities in Unix systems. In itself, the program did no damage but it’s replication and threat of damage caused extensive loss of system service and reduced system responsiveness in thousands of host computers This program has become known as the Internet Worm

Terminology A worm A virus A trapdoor This is a program that can autonomously spread itself across a network of computers A virus This is a program that can spread itself across a network of computers by attaching itself to some other program or document A trapdoor This is a vulnerability in a program that allows normal security controls to be bypassed

Consequences of the worm Strange files appeared in systems that were infected Strange log messages appeared in certain programs Each infection caused a number of processes to be generated. As systems were constantly re-infected, the number of processes grew and systems became overloaded Some systems (1000s) were shut down because of the problems and because of the unknown threat of damage

Worm description Program was made up of two parts A main program that looked for other machines that might be infected and that tried to find ways of getting into these machines A vector program (99 lines of C) that was compiled and run on the infected machine and which then transferred the main program to continue the process of infection Security vulnerabilities fingerd - an identity program in Unix that runs in the background. sendmail - the principal mail distribution program Password cracking Trusted logins

fingerd Written in C and runs continuously C does NOT have bound checking on arrays. Fingerd expects an input string but the writer of the worm noticed that if a longer string than was allowed for was presented, this overwrote part of memory By designing a string that included machine instructions and that overwrote a return address, the worm could invoke a remote shell (a Unix facility) that allowed priviledged commands to be executed

sendmail sendmail routes mail and the worm took advantage of a debug facility that was often left on and which allowed a set of commands to be issued to the sendmail program This allowed the worm to specify that information should be transferred to new hosts through the mail system without having to process normal mail messages

Password cracking Unix passwords are encrypted and, in the encrypted form, are publicly available in /etc/passwd The worm encrypted lists of possible passwords and compared them with the password file to discover user passwords It used a list of about 400 common words that were known to be used as passwords It exploited fast versions of the encryption algorithm that were not envisaged when the Unix scheme was devised

Trusted logins On Unix, tasks can be executed on remote machines To support this, there is the notion of a trusted login so that if a login command is issued to machine Z from user Y in machine X then Z assumes that X has carried out the authentication and that Y is trusted; no password is required The worm exploited this by looking for machines that might be trusted. It did this by examining files that listed machines trusted by the current machine and then assumed reciprocal trust

Killing the worm The main effects of the worm were in the US and system managers worked for several days to devise ways of stopping the worm These involved devising modifications to the programs affected so that the worm could not propagate itself, distributing these changes, installing them then rebooting infected machines to remove worm processes The process took several days before the net was cleared of infection

What we learned Security vulnerabilities result from flaws and these will always be with us. Problems can be fixed but new problems can arise with new versions of software Diversity is good - we need a heterogeneous not a homogeneous network Isolationism is not the answer - those sites that disconnected from the network were amongst the last to resume service

The perpetrator The perpetrator was a student at Cornell University He was discovered fairly quickly and charged His sentence was for a period of community service and a $10, 000 fine This was relatively light as the major thrust of his defence was that the program explicitly did not cause deliberate damage and, in fact, he had tried (but failed) to ensure that too many processes would not be generated on host machines

Warning Students before and since this infection have been curious about security and have written experimental programs. Few of these students are wicked and many of them are very competent programmers However, the consequences of experiments that go wrong are now so great that network authorities do not distinguish between stupidity and malice. There are severe penalties for any experiments that compromise system security

Finding out more Communications of the ACM, 32 (6), June 1989 has a number of articles on the Internet worm Computer-related RISKs. P. G. Neumann, Addison Wesley 1995. A compendum of information about system failures that have compromised safety, security and reliability. See Intranet web pages for links