Mobile Viruses and Worms (Project Group 6) Amit Kumar Jain Amogh Asgekar Jeevan Chalke Manoj Kumar Ramdas Rao.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
SECURITY AND INFORMATION SYSTEMS THE EVOLUTION OF SECURITY SYSTEMS Created By: Jamere Hill Instructor: Kyhia Bostic Section University of Houston.
Rootkits on Smart Phones: Attacks, Implications and Opportunities Jeffrey Bickford, Ryan O’Hare, Arati Baliga, Vinod Ganapathy, and Liviu Iftode Department.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
ROOTKIT VIRUS by Himanshu Mishra Points to be covered Introduction History Uses Classification Installation and Cloaking Detection Removal.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
William Enck, Machigar Ongtang, and Patrick McDaniel.
Chapter Nine Maintaining a Computer Part III: Malware.
Presentation By Deepak Katta
Copyright Security-Assessment.com 2004 New Technology Enforcement Strategies by Peter Benson.
Introduction to Mobile Malware
Understanding the spreading patterns of mobile phone viruses Presented by Sundararaman Natarajakumar Submitted to Prof.Dr. Eduard Heindl.
Mobile Operating System Security A PRESENTATION BY DANIEL ADAMS CSC 345 DR. BOX.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Viruses.
THREATS TO MOBILE NETWORK SECURITY
Unit 2 - Hardware Computer Security.
Malware: Defenses. Kinds of malware Viruses  Macro Viruses  Memory-resident viruses  File infector viruses  Boot Viruses  Trojan Horses  Hoaxes.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Malware and Spyware Attacking Cell Phones Chris Gooch, Jessica Russell, Destiny Logan.
Hacker Zombie Computer Reflectors Target.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Seminar On Cellular Virus
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
 a crime committed on a computer network, esp. the Internet.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
JEnterprise Suite For Network Monitoring and Security Dr. Sureswaran Ramadass, Dr. Rahmat Budiarto, Mr. Ahmad Manasrah, Mr. M. F. Pasha.
Dr. V.N.Sastry Professor, IDRBT & Executive Secretary, MPFI to 84 October 30,
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
INTRODUCTION TO VIRUS Prepaid by ParthPatel(06ce69)
Behavioral Detection of Malware on Mobile Handsets Abhijit Bose IBM TJ Watson Research Xin Hu University of Michigan Kang G. Shin University of Michigan.
KAIST Internet Security Lab. CS710 Behavioral Detection of Malware on Mobile Handsets MobiSys 2008, Abhijit Bose et al 이 승 민.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Topic 5: Basic Security.
Lei Liu, Department of Computer Science, George Mason University Guanhua Yan, Information Sciences Group, Los Alamos National Laboratory Xinwen Zhang,
BY FIOLA CARVALHO TE COMP. CONTENTS  Malicious Software-Definition  Malicious Programs Backdoor Logic Bomb Trojan Horse Mobile Code Multiple-Threat.
Malicious Software.
Computer Skills and Applications Computer Security.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Copyright © 2015 Cyberlight Global Associates Cyberlight GEORGIAN CYBER SECURITY & ICT INNOVATION EVENT 2015 Tbilisi, Georgia19-20 November 2015 Hardware.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
MIS323 – Business Telecommunications Chapter 10 Security.
Bay Ridge Security Consulting (BRSC). Importance in Securing System  If don’t keep up with security issues or fixes Exploitation of root access Installation.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari Hazira Hamiza
Chapter 40 Internet Security.
Ilija Jovičić Sophos Consultant.
Seminar On Cellular Virus
Various Types of Malware
How to Get Rid of Online Threats Impacting your Computer Device?
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
In Order To Get Error Free Internet Browsing Contact Avira Online Support Number Avira provides the users with the best security protection to their computer.
MacAfee product keyMacAfee product key,
Computer Security.
Introduction to Internet Worm
Presentation transcript:

Mobile Viruses and Worms (Project Group 6) Amit Kumar Jain Amogh Asgekar Jeevan Chalke Manoj Kumar Ramdas Rao

31 st October 2006Mobile Worms and Viruses Outline Introduction Classification Threats posed by mobile worms and viruses Case Studies Futuristic Threats Protective Measures

Introduction

31 st October 2006Mobile Worms and Viruses Introduction What is a Mobile Virus? –Mobile : pertaining to mobile devices cell phones, smart phones, PDAs,... Mobile Virus vs. Computer Virus Mobile Malware: –Malware: Malicious Software –All kinds of unwanted malicious software

31 st October 2006Mobile Worms and Viruses Differences with PC Although similar OSes are being used, differences exist: Lesser users of mobiles are less tech literate Implies that it is difficult to rollout security patches to phones already sold Mobiles are always connected and switched on Environment keeps changing Imagine one infected phone in a stadium full of people

31 st October 2006Mobile Worms and Viruses Differences... On the positive side: Several variants of phones exist A malware for one type of phone may not necessarily be able to infect others E.g., A virus that uses an MMS exploit cannot infect a phone that does not have that facility at all Mobile malware not yet causing critical harm At most they increase the user's billing, or cause the mobile phone to stop working (can be restored by a factory reset)

Classification of Mobile Worms and Viruses

31 st October 2006Mobile Worms and Viruses Classification Behavior Virus Worm Trojan Environment Operating System Vulnerable Application Family name and Variant identifier

31 st October 2006Mobile Worms and Viruses Classification (examples) Source: Kaspersky Labs

31 st October 2006Mobile Worms and Viruses Mobile Virus Families The increase of known mobile malware variants Increases in known mobile malware families Complete (as of 30th August 2006) list of mobile virus families according to Kaspersky Lab classification.

31 st October 2006Mobile Worms and Viruses Current threats by mobile malware For financial gain / loss Unnecessary calls / SMS / MMS Send and sell private information Cause phones to work slowly or crash Wipe out contact books and other information on the phone Remote control of the phone Install false applications

Case Studies

31 st October 2006Mobile Worms and Viruses Case Study – CABIR First mobile worm Only as Proof-Of-Concept Spread vector – Bluetooth Infected file – caribe.sis 15 new variants exist

31 st October 2006Mobile Worms and Viruses Case Study - ComWar Second landmark in mobile worms Spread vector - Bluetooth and MMS Large spread area due to MMS Not as proof of concept – Intention to harm by charging the mobile user Multiple variants detected

31 st October 2006Mobile Worms and Viruses Case Study - CardTrap First cross-over mobile virus found Can migrate from mobile to PC Propogates as infected mobile application as well as Windows worm 2 variants found – Both install with legitimate applications – Black Symbian and Camcorder Pro

Futuristic Threats

31 st October 2006Mobile Worms and Viruses Futuristic Developments Location Tracking Camera and Microphone Bug Leaking Sensitive Information DDOS attack on Mobile Service Provider

Protective Measures

31 st October 2006Mobile Worms and Viruses Securing against attacks System level security MOSES Network Level Security Proactive approach

31 st October 2006Mobile Worms and Viruses MOSES MObile SEcurity processing System –Ravi (2005) Two levels of defenses – Hardware and Software Hardware – Application Fencing Software – Encryption

31 st October 2006Mobile Worms and Viruses MOSES Secure boot and run-time memory protection –prevents software (virus) and physical (code modication) attacks Provides crypto functions and meets performance and power targets Provides protection to any sensitive data or cryptographic keys against common attacks

31 st October 2006Mobile Worms and Viruses Proactive Approach Paper by Bose, Shin Reduce the impact of an attack Generate Behavior Vectors Form Behavioral Clusters

31 st October 2006Mobile Worms and Viruses Proactive Approach Virus Throttling Algorithm Quarantine Source: Bose, Shin (2006)

31 st October 2006Mobile Worms and Viruses Questions???

31 st October 2006Mobile Worms and Viruses References Kaspersky Labs' Report on Mobile Viruses (September 2006) – – – Bluetooth vulnerabilities –Haataja, K., Two practical attacks against Bluetooth security using new enhanced implementations of security analysis tools, CNIS 2005, Arizona, USA, November 14-16, – – Protective Measures: –MOSES: sravi/security.htmhttp:// –Bose, Shin, Proactive Security for Mobile Messaging Networks, WiSe '06, September 29, 2006.

Thank You