Viruses and Worms.

Slides:



Advertisements
Similar presentations
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Advertisements

Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
CSE331: Introduction to Networks and Security Lecture 32 Fall 2002.
Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
Compiled by : S. Agarwal, Lecturer & Systems Incharge, St. Xavier's Computer Centre, Kolkata : Compiled By : S. Agarwal, S. Agarwal, Lecturer.
Chapter 3 (Part 1) Network Security
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
________________ CS3235, Nov 2002 Viruses Adapted from Pfleeger[Chap 5]. A virus is a program [fragment] that can pass on malicious code [usually itself]
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
1 Computer Viruses (and other “Malicious Programs) Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Unit 2 - Hardware Computer Security.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Computer Viruses Preetha Annamalai Niranjan Potnis.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
VIRUS Is a computer program that can copy itself and infect a computer without permission or knowledge of the user or is a program or piece of code that.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
Compiled & Designed by : Presentation Point Idea by: SAAD(CEO Future IT) © 2011 Presentation Point Compiled By & Designed : Presentation Point(
Week 6 - Wednesday.  What did we talk about last time?  Exam 1  Before that?  Program security  Non-malicious flaws.
Administrative: Objective: –Tutorial on Risks –Phoenix recovery Outline for today.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Malicious Code By Diana Peng. What is Malicious Code? Unanticipated or undesired effects in programs/program parts, caused by an agent with damaging intentions.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
30.1 Lecture 30 Security II Based on Silberschatz & Galvin’s slides And Stallings’ slides.
For any query mail to or BITS Pilani Lecture # 1.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
©Ian Sommerville 2004Software Engineering Case Studies Slide 1 The Internet Worm Compromising the availability and reliability of systems through security.
Topic 5: Basic Security.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
All about viruses, hacking and backups By Harriet Thomas.
VIRUS.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
W elcome to our Presentation. Presentation Topic Virus.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
Viruses and Other Malicious Content
computer virus infection & symptoms
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Crisis and Aftermath Morris worm.
What are Computers? C Use this tutorial alongside the numbers coded in your workbook and answer the related questions in each section.
Presentation transcript:

Viruses and Worms

What Is a Virus? A program that attaches itself to another executable (a host program) Whenever the host program is executed, virus code is ran and it can make a copy of itself and infect other executables found in your memory or hard drive Viruses can do any damage they want on your computer

Viruses vs. Worms Viruses don’t break into your computer – they are invited by you They cannot spread unless you run infected application or click on infected attachment Early viruses spread onto different applications on your computer Contemporary viruses spread as attachments through E-mail, they will mail themselves to people from your addressbook Worms break into your computer using some vulnerability, install malicious code and move on to other machines You don’t have to do anything to make them spread

Viruses vs. Trojans Viruses attach themselves to other executables For example, a Word template or a PowerPoint presentation They can infect any executable Trojans claim to be other executables but instead contain malicious code For example, a cool new game is advertised on the Web site but it also contains malicious code Trojan code will not spread to other programs on your machine, it will simply gain access and do malicious stuff

Virus Types File infectors System (boot-sector) infectors Hybrid Attach to executable files or source code Direct action – selects and infects several programs each time host program is run Resident – load themselves into memory whenever a host program is run and then remain in memory infecting any other executable that is executed System (boot-sector) infectors Infect some system area on disk, load themselves on boot and then remain memory-resident Hybrid Infect both files and boot sectors

Virus Types File system (cluster) Kernel Modify directory table entries so that virus code is loaded and executed before the host program Host program is not altered, only directory table is Kernel Target specific features of system files such as location on disk, calling convention etc.

Virus Types Stealth Polymorphic Like rootkits Hide the fact that they have infected the system by modifying replies to system queries Must be resident Can only be detected if we boot the system from clean bootable floppy or CD Polymorphic Change virus code to avoid signature detection Encrypt themselves with variable key – decryption code is always the same Use different encryption schemes

Virus Types Fast infectors Slow infectors Sparse infectors Infect not only those files that are executed but also those that are merely opened (e.g. by a virus scanner) Slow infectors Only infect modified or newly created files – fools integrity checkers Sparse infectors Infect infrequently (e.g. each 10th file) to avoid detection

Virus Types Companions Creates new file with similar name as the host program When host program is called, virus is executed instead Virus calls host program in the end This fools integrity checkers that only look at existing files

Virus Types Cavities Tunneling Overwrites part of the host program that is filled with a constant Does not increase the length of host program and preserves functionality Tunneling Some viruses modify interrupt vectors Tunneling viruses call interrupt handlers directly

How Do Viruses Spread? You receive infected E-mail attachment You download infected code Your thumb drive gets infected

What Can Viruses Do? Wipe your hard drive Modify or delete files Steal files Spread further They frequently delay any malicious actions until they have spread sufficiently

Indicators of Virus Infection Changes in file sizes or checksums Unaccounted resource consumption Changes of interrupt vectors Best detection would be to analyze all files on your system for modifications – impractical

Virus Detection Systems Activity monitoring systems (anomaly detect.) Look for virus-like activity such as attempts to reformat disk May generate false positives Scanners (signature detection) Look for patterns in virus code Use database of known virus signatures Detect polymorphic variations Sometimes they use heuristics to detect new virus signatures Most scanners also include disinfection code

Virus Detection Systems Integrity checkers Remember file hashes Detect file modifications

Virus Detection Systems Usually resident Sometimes can even be added to boot sector to detect boot sector viruses Some virus detection systems will prohibit access to external drives unless they have been scanned before

Virus Detection Hardware Defines non-writable areas of the disk for executable files Sounds alarm and/or requires password in order to modify these areas Might be annoying and generate false alarms

Virus Removal Identify which files have been modified Virus scanners will do this Restore last known good copy of these files from your backup It is not necessary to re-format the disk Some virus scanners can disinfect files – remove the virus code

Can a Virus Infect Data Files? Yes, but it will never be executed because data files do not contain executable code Virus can be hidden in .gif and .jpeg files using steganography but it has to be extracted and run by an executable

Can a Virus Spread To Other OS? No, virus contains OS specific code You may receive virus on another OS but it won’t run and therefore won’t spread How about worms?

Can a Virus Infect Mainframe Computers? Yes but it’s harder Mainframe computers have write protections among users so virus can only infect user A’s files However if user A sends his file to user B then B’s files also get infected If virus is places in shared area then all user’s files may get infected Mainframe computers are generally better maintained and it is hard to write a good mainframe virus – only a few exist so far

How About Self-Checking Code? Add an integrity-checking code to every file so that it checks whether it is infected every time it is run If the file is infected virus will be executed first It can also fiddle with integrity-checking code and disable it Ineffective against companion viruses

Why Are Viruses Perceived As Harmful? They spread beyond our control – there is no way to stop the spread of a virus that you release It is hard to distinguish between viruses and benign code They eat resources They may do malicious things They may disable self-checking programs They may infect cyber-physical systems and do irreparable damage

How About Good Viruses? People have toyed with the idea of useful viruses but this has not been accepted Virus idea simply seems to dangerous Good virus code may be buggy and thus vulnerable Good virus could ask for permission to infect the system – imagine this scenario on a hospital computer Bad virus code could be attached to a good virus to slip detection Legal issues might arise People don’t like the idea that someone takes control over their computer

What Would Good Viruses Do? Detect viruses and fix infected files Compress files and decompress them at run time Encrypt hard drive and require user password for decryption Maintain machines, e.g. delete temporary files – come by invitation People haven’t been able to come up with a controlled way to plant a good virus Asking for acceptance wastes (maybe precious) time Checking for invitation wastes resources People haven’t come up with a compelling use of a good virus

What is a Worm? A program that: Unlike viruses Scans network for vulnerable machines Breaks into machines by exploiting the vulnerability Installs some piece of malicious code – backdoor, DDoS tool Moves on Unlike viruses Worms don’t need any user action to spread – they spread silently and on their own Worms don’t attach themselves onto other programs – they exist as a separate code in memory Sometimes you may not even know your machine has been infected by a worm

Why Are Worms Dangerous? They spread extremely fast They are silent Once they are out, they cannot be recalled They usually install malicious code They clog the network

First Worm Ever – Morris Worm Robert Morris, a PhD student at Cornell, was interested in network security He created the first worm with a goal to have a program live on the Internet in Nov. 1988 Worm was supposed only to spread, fairly slowly It was supposed to take just a little bit of resources so not to draw attention to itself But things went wrong … Worm was supposed to avoid duplicate copies by asking a computer whether it is infected To avoid false “yes” answers, it was programmed to duplicate itself every 7th time it received “yes” answer This turned out to be too much

First Worm Ever – Morris Worm It exploited four vulnerabilities to break in A bug in sendmail A bug in finger deamon A trusted hosts feature (/etc/.rhosts) Password guessing Worm was replicating at a much faster rate than anticipated At that time Internet was small and homogeneous (SUN and VAX workstations running BSD UNIX) It infected around 6,000 computers, one tenth of then-Internet, in a day

First Worm Ever – Morris Worm People quickly devised patches and distributed them (Internet was small then) A week later all systems were patched and worm code was removed from most of them No lasting damage was caused Robert Morris paid $10,000 fine, was placed on probation and did some community work Worm exposed not only vulnerabilities in UNIX but moreover in Internet organization Users didn’t know who to contact and report infection or where to look for patches

First Worm Ever – Morris Worm In response to Morris Worm DARPA formed CERT (Computer Emergency Response Team) in November 1988 Users report incidents and get help in handling them from CERT CERT publishes security advisory notes informing users of new vulnerabilities that need to be patched and how to patch them CERT facilitates security discussions and advocates better system management practices