Malicious Software By Kavita Khanna & Himani Singh

Slides:



Advertisements
Similar presentations
IS 376 NOVEMBER 5, DATA BREACH INVESTIGATIONS REPORT By The Verizon RISK Team Research Investigations Solutions Knowledge.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
30/04/2015Tim S Roberts COIT13152 Operating Systems T1, 2008 Tim S Roberts.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Chapter 3 (Part 1) Network Security
ITMS Information Systems Security 1. Malicious Code Malicious code or rogue program is the general name for unanticipated or undesired effects in.
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
Silberschatz, Galvin and Gagne  Operating System Concepts The Security Problem A system is secure iff its resources are used and accessed as.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
________________ CS3235, Nov 2002 Viruses Adapted from Pfleeger[Chap 5]. A virus is a program [fragment] that can pass on malicious code [usually itself]
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
1. 2 What is security? Computer Security deals with the prevention and detection of, and the reaction to, unauthorized actions by users of a computer.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
CSCE 201 Attacks on Desktop Computers: Malicious Code Hardware attacks.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
CSCE 522 Lecture 12 Program Security Malicious Code.
Administrative: Objective: –Tutorial on Risks –Phoenix recovery Outline for today.
Malicious Code By Diana Peng. What is Malicious Code? Unanticipated or undesired effects in programs/program parts, caused by an agent with damaging intentions.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
For any query mail to or BITS Pilani Lecture # 1.
We are here to help you… Fight something like this Brownies !
Computer security By Isabelle Cooper.
Chap1: Is there a Security Problem in Computing?.
Malicious Software.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
W elcome to our Presentation. Presentation Topic Virus.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Chapter Objectives In this chapter, you will learn:
3.6 Fundamentals of cyber security
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Chap 10 Malicious Software.
Security.
Chap 10 Malicious Software.
Operating System Concepts
G061 - Network Security.
Presentation transcript:

Malicious Software By Kavita Khanna & Himani Singh (CS-265, Fall-2003)

Malicious Software – “Presentation Outline” What is malicious software? Categories of malicious software. Different malicious software – viruses, worms, Trojan Horse etc. More description about viruses : Desirable properties of viruses. Identifying infected files and programs. Where do viruses reside. Identifying and detecting viruses – virus signature. Effect of Virus attack on computer system. Protection against attacks by malicious software – preventing infection. References.

What is Malicious Software:  Software deliberately designed to harm computer systems.  Malicious software program causes undesired actions in information systems.  Spreads from one system to another through: 1. (through attachments) 2.Infected floppy disks 3.Downloading / Exchanging of corrupted files 4.Embedded into computer games

Malicious Software - Categories Malicious Software Viruses Boot VirusesFile Viruses RabbitHoaxesTrojan Horse Time BombLogic Bomb SpywareTrapdoorWorms

Types of Malicious Software Virus : These are the programs that spread to other software in the system.i.e., program that incorporates copies of itself into other programs. Two major categories of viruses: 1.Boot sector virus : infect boot sector of systems. become resident. activate while booting machine 2.File virus : infects program files. activates when program is run.

Categories of Viruses Polymorphic Virus  Produces modified & fully operational code.  Produces new & different code every time when virus is copied & transmitted to a new host.  Difficult to detect & remove. Stealth Virus  Programming tricks make the tracing and understanding the code difficult.  Complex programming methods used to design code, so difficult to repair infected file. Armored Virus  Hides modifications it has made to files or to the disk.  Reports false values to programs as they read files or data from storage media. Companion Virus  Creates new program instead of modifying existing program.  Contains all virus code.  Executed by shell, instead of original program.

Rabbit : This malicious software replicates itself without limits. Depletes some or all the system’s resources.  Re-attacks the infected systems – difficult recovery.  Exhausts all the system’s resources such as CPU time, memory, disk space.  Depletion of resources thus denying user access to those resources.

Hoaxes : False alerts of spreading viruses.  e.g., sending chain letters.  message seems to be important to recipient, forwards it to other users – becomes a chain.  Exchanging large number of messages (in chain) floods the network resources – bandwidth wastage.  Blocks the systems on network – access denied due to heavy network traffic.

Trojan Horse : This is a malicious program with unexpected additional functionality. It includes harmful features of which the user is not aware.  Perform a different function than what these are advertised to do (some malicious action e.g., steal the passwords).  Neither self-replicating nor self-propagating.  User assistance required for infection.  Infects when user installs and executes infected programs.  Some types of trojan horses include Remote Access Trojans (RAT), KeyLoggers, Password-Stealers (PSW), and logic bombs.

 Transmitting medium : 1.spam or 2.a downloaded file 3.a disk from a trusted source 4.a legitimate program with the Trojan inside.  Trojan looks for your personal information and sends it to the Trojan writer (hacker). It can also allow the hacker to take full control of your system.  Different types of Trojan Horses : 1.Remote access Trojan takes full control of your system and passes it to the hacker. 2.The data-sending Trojan sends data back to the hacker by means of . e.g., Key-loggers – log and transmit each keystroke.

3.The destructive Trojan has only one purpose: to destroy and delete files. Unlikely to be detected by anti-virus software. 4.The denial-of-service (DOS) attack Trojans combines computing power of all computers/systems it infects to launch an attack on another computer system. Floods the system with traffic, hence it crashes. 5.The proxy Trojans allows a hacker to turn user’s computer into HIS (Host Integration Server) server – to make purchases with stolen credit cards and run other organized criminal enterprises in particular user’s name. 6.The FTP Trojan opens port 21 (the port for FTP transfer) and lets the attacker connect to your computer using File Transfer Protocol (FTP).

7.The security software disabler Trojan is designed to stop or kill security programs such as anti-virus software, firewalls, etc., without you knowing it. Spyware :  Spyware programs explore the files in an information system.  Information forwarded to an address specified in Spyware.  Spyware can also be used for investigation of software users or preparation of an attack.

Trapdoor : Secret undocumented entry point to the program.  An example of such feature is so called back door, which enables intrusion to the target by passing user authentication methods.  A hole in the security of a system deliberately left in place by designers or maintainers.  Trapdoor allows unauthorized access to the system.  Only purpose of a trap door is to "bypass" internal controls. It is up to the attacker to determine how this circumvention of control can be utilized for his benefit.

Types of Trapdoor Undetectable Trapdoor Virtually undetectable. Hardware Trapdoor Security-related hardware flaws.

Worms :  program that spreads copies of itself through a network.  Does irrecoverable damage to the computer system.  Stand-alone program, spreads only through network.  Also performs various malicious activities other than spreading itself to different systems e.g., deleting files.  Attacks of Worms: 1.Deleting files and other malicious actions on systems. 2.Communicate information back to attacker e.g., passwords, other proprietary information. 3.Disrupt normal operation of system, thus denial of service attack (DoS) – due to re-infecting infected system. 4.Worms may carry viruses with them.

Means of spreading Infection by Worms : Infects one system, gain access to trusted host lists on infected system and spread to other hosts. Another method of infection is penetrating a system by guessing passwords. By exploiting widely known security holes, in case, password guessing and trusted host accessing fails. e.g., A well-known example of a worm is the ILOVEYOU worm, which invaded millions of computers through in 2000.

VIRUSES – More Description Desirable properties of Viruses : Virus program should be hard to detect by anti-virus software. Viruses should be hard to destroy or deactivate. Spread infection widely. Should be easy to create. Be able to re-infect. Should be machine / platform independent, so that it can spread on different hosts.

Detecting virus infected files/programs :  Virus infected file changes – gets bigger.  Modification detection by checksum : > Use cryptographic checksum/hash function e.g., SHA, MD5. > Add all 32-bit segments of a file and store the sum (i.e., checksum).

Identifying Viruses :  A virus is a unique program.  It as a unique object code.  It inserts in a deterministic manner.  The pattern of object code and where it is inserted provides a signature to the virus program.  This virus signature can be used by virus scanners to identify and detect a particular virus.  Some viruses try to hide or alter their signature: Random patterns in meaningless places. Self modifying code – metamorphic, polymorphic viruses. Encrypt the code, change the key frequently.

Places where viruses live :  Boot sector  Memory resident  Disk – Applications and data stored on disk.  Libraries – stored procedures and classes.  Compiler  Debugger  Virus checking program infected by virus – unable to detect that particular virus signature.

Effect of Virus attack on computer system  Virus may affect user’s data in memory – overwriting.  Virus may affect user’s program – overwriting.  Virus may also overwrite system’s data or programs – corrupting it – disrupts normal operation of system.  “Smashing the Stack” – Buffer overflow due to execution of program directed to virus code.

Preventing infection by malicious software : Use only trusted software, not pirated software. Test all new software on isolated computer system. Regularly take backup of the programs. Use anti-virus software to detect and remove viruses. Update virus database frequently to get new virus signatures. Install firewall software, which hampers or prevents the functionality of worms and Trojan horses. Make sure that the attachments are secure. Do not keep a floppy disk in the drive when starting a program, unless sure that it does not include malicious software, else virus will be copied in the boot sector.

References: Webopedia.com. Trojan Horse. Retrieved Nov 8, 2003 from website: Staffordshire University, Information & Security Team (Jun 8, 2002). Information Systems Security Guidelines. Retrieved Nov 10, 2003 from website: M.E.Kabay, Norwich University, VT (2002). Malicious Software. Retrieved Nov 9, 2003 from website: Computer Emergency Response Team (CERT), Information Security (Jul 2, 2002). Malicious Software – general. Retrieved Nov 10, 2003 from website:

References Cont... Rutgers, New Jersey (Oct 10, 2003). Trojan Horses. Retrieved Nov 10, 2003 from website: Dr. Roger R. Schell, Monterey CA (Apr 24, 2000). Malicious Software. Retrieved Nov 11, 2003 from website: Edward F. Gehringer. Computer Abuse – Worms, Trojan Horses, Viruses. Retrieved Nov 12, 2003 from website: Bullguard.com Computer Viruses. Retrieved Nov12, 2003 from website: Google.com. Program Security. Retrieved Nov 12, 2003 from website: