Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

SPYWARE Presented by The State Security Office November 17, 2004.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
AVG 8.5 Product Line Welcome to a safe world …. | Page 2 Contents  Components Overview  Product Line Overview  AVG 8.0 Boxes.
Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Computer Security and Penetration Testing
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 15: Internet Explorer and Remote Connectivity Tools.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Hacker Zombie Computer Reflectors Target.
Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown,
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
Staying Safe Online Keep your Information Secure.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Honeypot and Intrusion Detection System
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Client Side Vulnerabilities Aka, The Perils of HTTP Lesson 14.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Types of Electronic Infection
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
Protecting Students on the School Computer Network Enfield High School.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
CIS 450 – Network Security Chapter 4 - Spoofing. Definition - To fool. In networking, the term is used to describe a variety of ways in which hardware.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
NetTech Solutions Protecting the Computer Lesson 10.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Web Browsing *TAKE NOTES*. Millions of people browse the Web every day for research, shopping, job duties and entertainment. Installing a web browser.
Understand Malware LESSON Security Fundamentals.
W elcome to our Presentation. Presentation Topic Virus.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Information Systems Design and Development Security Precautions Computing Science.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Computer Security Keeping you and your computer safe in the digital world.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Instructor Materials Chapter 7 Network Security
Firewalls.
Operating System Concepts
Test 3 review FTP & Cybersecurity
Presentation transcript:

Spyware and Trojan Horses Computer Security Seminar Series [SS1] Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai

Your computer could be watching your every move! Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai

Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai Introduction

Seminar Overview Introduction to Spyware / Trojan Horses Spyware – Examples, Mechanics, Effects, Solutions Tracking Cookies – Mechanics, Effects, Solutions Trojan Horses – Mechanics, Effects, More Examples Solutions to the problems posed Human Factors – Human interaction with Spyware “System X” – Having suitable avoidance mechanisms Conclusions – Including our proposals for solutions Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai

Definitions A general term for a program that surreptitiously monitors your actions. While they are sometimes sinister, like a remote control program used by a hacker, software companies have been known to use Spyware to gather data about customers. The practice is generally frowned upon. – Google definition Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai An apparently useful and innocent program containing additional hidden code which allows the unauthorized collection, exploitation, falsification, or destruction of data. – Google definition SPYWARE TROJAN HORSE

Symptoms Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai Targeted Pop-ups Slow Connection Targeted (Spam) Unauthorized Access Spam Relaying System Crash Program Customisation SPYWARE SPYWARE / TROJAN SPYWARE TROJAN HORSE SPYWARE / TROJAN SPYWARE

Summary of Effects Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai Collection of data from your computer without consent Execution of code without consent Assignment of a unique code to identify you Collection of data pertaining to your habitual use Installation on your computer without your consent Inability to remove the software Performing other undesirable tasks without consent

Similarities / Differences Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai SpywareTrojan Horses Commercially Motivated Malicious Internet connection required Any network connection required Initiates remote connection Receives incoming connection Purpose: To monitor activity Purpose: To control activity Collects data and displays pop-ups Unauthorized access and control Legal Illegal Not Detectable with Virus Checker Detectable with Virus Checker Age: Relatively New (< 5 Years) Age: Relatively Old ( > 20 Years) Memory Resident Processes Surreptitiously installed without user’s consent or understanding Creates a security vulnerability

Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Spyware Andrew Brown, Tim Cocks and Kumutha Swampillai

Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai Software Examples GAIN / Gator Gator E-Wallet Cydoor BonziBuddy MySearch Toolbar DownloadWare BrowserAid Dogpile Toolbar

Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai Advantages Precision Marketing –Relevant pop-ups are better than all of them! –You may get some useful adverts! Useful Software –DivX Pro, IMesh, KaZaA, Winamp Pro –(Experienced) people understand what they are installing. Enhanced Website Interaction –Targeted banner adverts –Website customisation User Perspective - I

Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai Disadvantages Browsing profiles created for users without consent –Used for target marketing and statistical analysis Unable to remove Spyware programs or disable them Increased number of misleading / inappropriate pop-ups Invasion of user privacy (hidden from user) Often badly written programs corrupt user system Automatically provides unwanted “helpful” tools “20 million+ people have Spyware on their machines.” Source - Dec ’02 GartnerG2 Report User Perspective - II

Example Pop-up Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai Misleading Pop-up User Perspective - III

Network Overview Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai Technical Analysis - I Push Advertising Pull Tracking Personal data

Client-Side Operation Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai Technical Analysis - II

Server-Side Operation Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai Technical Analysis - III Server-side operation is relatively unknown. However, if we were to develop such a system, it would contain…

Spyware Defence Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai Technical Initiatives... Spyware Removal Programs Pop-up Blockers Firewall Technology Disable ActiveX Controls –Not Sandboxed Filters Download Patches User Initiatives… Issue Awareness Use Legitimate S/W Sources Improved Technical Ability Choice of Browser Choice of OS Legal action taken against breaches of privacy –Oct ’02 Doubleclick

GAIN Case Study Installed IMesh, which includes Gator Installation We accessed multiple internet sites We simultaneously analyzed network traffic (using IRIS) We found the packets of data being sent to GAIN Packets were encrypted and we could not decrypt them See Example -> Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai

Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai

Spyware Removers Ad-aware (by Lavasoft) –Reverse Engineer Spyware –Scans Memory, Registry and Hard Drive for… Data Mining components Aggressive advertising components Tracking components –Updates from Lavasoft –Plug-ins available Extra file information Disable Windows Messenger Service Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai

Vulnerable Systems Those with an internet connection! Microsoft Windows 9x/Me/NT/2000/XP Does not affect Open Source OSs Non - fire-walled systems Internet Explorer, executes ActiveX plug-ins Other browsers not affected Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai

Tracking Cookies Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai

Cookies A Cookie is a small text file sent to the user from a website. –Contains Website visited –Provides client-side personalisation –Supports easy Login Cookies are controlled by… –Website’s Application Server –Client-side Java Script The website is effectively able to ‘remember’ the user and their activity on previous visits. Spyware companies working with websites are able to use this relatively innocent technology to deliver targeted REAL TIME marketing, based on cookies and profiles. Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai

Case Study - DoubleClick Most regular web users will have a “doubleclick.net” cookie. Affiliated sites request the DoubleClick cookie on the users computer. The site then sends… –Who you are –All other information in your cookie file In return for… –All available marketing information on you - collected from other affiliated sites which the you have hit. Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai

Case Study – DoubleClick Site targets banner adverts, s and pop-ups to the user. If the user visits an affiliated site without a DoubleClick cookie, then one is sent to the user. The whole process is ‘opaque’ to the user and occurs without their consent. Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai

Tracking Cookie Implementation Protocol designed to only allow the domain who created a cookie to access it. IE has a number of security holes… –Up to IE 5, domain names specified incorrectly. –Up to IE 6, able to fool IE into believing it is in another domain. Patches and IE 6 solved a number of problems Since then, tracking cookies are still proving a large problem, there are still a number of holes still open. Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai

Tracking Cookie Implementation Spyware Web Server Client Browser Random Web Server Spyware Database Spyware Cookie Cookies Spyware Web page 1. Request Page 2. Return Page 3. Request Image Return Cookie 4. Return Image Return Updated Cookie Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai

Tracking Cookie Defence Replace tracking cookies with write protected zero length files of the same name. DoubleClick offer an opt-out cookie, which can be obtained from their website. Disable cookies –Makes many websites unusable Delete cookies after session Spyware remover (Ad-aware) Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai

Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai Trojan Horses

Installation Secretly installed when an infected executable is run –Much like a virus –Executables typically come from P2P networks or unscrupulous websites ActiveX controls on websites –ActiveX allows automatic installation of software from websites –User probably does not know what they are running –Misleading descriptions often given –Not sandboxed! –Digital signatures used, signing not necessary Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai

Installation Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai Certificate Authority Misleading Certificate Description Who is trusted?

Effects Allows remote access –To spy –To disrupt –To relay a malicious connection, so as to disguise the attacker’s location (spam, hacking) –To access resources (i.e. bandwidth, files) –To launch a DDoS attack Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai

Operation Listen for connections Memory resident Start at boot-up Disguise presence Rootkits integrate with kernel Password Protected Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai

Example: Back Orifice Back Orifice –Produced by the “Cult of the Dead Cow” –Win95/98 is vulnerable –Toast of DefCon 6 –Similar operation to NetBus –Name similar to MS Product of the time Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai

BO: Protocol Modular authentication Modular encryption –AES and CAST-256 modules available UDP or TCP Variable port –Avoids most firewalls IP Notification via. ICQ –Dynamic IP addressing not a problem Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai

BO: Protocol Example (1) Attacker Victim ICQ SERVER CONNECTIONTROJANIP ADDRESS AND PORT INFECTION OCCURS Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai

BO: Protocol Example (2) Attacker CONNECTIONCOMMAND COMMAND EXECUTED REQUEST FOR INFORMATIONINFORMATION Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai Victim

BO: Protocol Example (3) Attacker CLEANUP COMMAND EVIDENCE DESTROYED Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai Victim

Trojan Horse Examples M$ Rootkit –Integrates with the NT kernel –Very dangerous –Virtually undetectable once installed –Hides from administrator as well as user –Private TCP/IP stack (LAN only) Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai

Trojan Horse Examples iSpyNOW –Commercial –Web-based client Assassin Trojan –Custom builds may be purchased –These are not found by virus scanners –Firewall circumvention technology Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai

Trojan Horse Examples Hardware –Key loggers –More advanced? Magic Lantern –FBI developed –Legal grey area (until recently!) –Split virus checking world Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai

Demonstration Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai

Vulnerable Systems DANGEROUS Number of trojans in common use… RELATIVELY SAFE Linux/Unix Win 9x MacOS WinNT MacOS X WinNT refers to Windows NT 4, 2000, XP and Server Win9x refers to Windows 95, 95SE, 98 and ME. Source: McAfee Security Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai

Vulnerable Systems DANGEROUS Ease of compromise… RELATIVELY SAFE Win 9x Linux/Unix WinNTMacOS MacOS X WinNT refers to Windows NT 4, 2000, XP and Server Win9x refers to Windows 95, 95SE, 98 and ME. Source: McAfee Security Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai

Conclusions Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai

Security Implications Divulge personal data Backdoors into system System corruption Disruption / Irritation Aids identity theft Easy virus distribution Increased spam Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai Mass data collection Consequences unknown Web becomes unusable Web cons outweigh pros Cost of preventions More development work More IP addresses (IPv6) Short TermLong Term

Solutions Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai Firewall Virus Checker Spyware Remover Frequent OS updates Frequent back-up Learning problems Add Spyware to Anti-Virus Automatic maintenance Legislation Education on problems Biometric access Semantic web (and search) Short TermLong Term

Firewalls 3 Types… –Packet Filtering – Examines attributes of packet. –Application Layer – Hides the network by impersonating the server (proxy). –Stateful Inspection – Examines both the state and context of the packets. Regardless of type; must be configured to work properly. Access rules must be defined and entered into firewall. Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai Network / Standalone

Web ServerFirewall http - tcp 80 telnet - tcp 23 ftp - tcp 21 http - tcp 80 Allow only http - tcp 80 Firewalls Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai Network / Standalone PC Firewall : : 1025 Only allows reply packets for requests made out Blocks other unregistered traffic : : 1025 Packet Filtering Stateful Inspection

Intrusion Detection Systems Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai Network PC Server IDSFirewall Switch Intrusion Detection – A Commercial Network Solution An “Intelligent Firewall” – monitors accesses for suspicious activity Neural Networks trained by Backpropagation on Usage Data Could detect Trojan Horse attack, but not designed for Spyware Place IDS before the firewall to get maximum detection In a switched network, place IDS on a mirrored port (gets all traffic) Ensure all network traffic passes the IDS host

“System X” Composed of… –Open Source OS –Mozilla / Opera / Lynx (!) Browser (Not IE) –Stateful Inspection Firewall –Anti-Virus Software –Careful and educated user –Secure permissions system –Regularly updated (possibly automatically) Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai Network / Standalone

Questions… Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai

Bibliography / Links [1] "Spyware" - Google Definition Tool – [2] "Trojan Horse" - Google Definition Tool – [3] Zeinalipour-Yazti, D. “Exploiting the Security Weaknesses of the Gnutella Protocol”, University of California. [4] Joshi, R. “Network Security Applications”, Merchantile Communications, CANIT Conference [5] CERT Advisory CA [6] Spyware Guide – [7] Trojan Horses - [8] Trojan Horse - Back Orifice - [9] NetBus - [10] BBC News - [11] Wired News – “Judge takes bite out of Gator” [12] Tracking Cookies – Demonstration at [13] BonziBuddy - [14] Unwanted Links (Spyware) – [15] Ad-aware - Spyware and Trojan Horses – Computer Security Seminar 12 th February 2004 Andrew Brown, Tim Cocks and Kumutha Swampillai