Analysis of Instant Messenger Programs Celia Hung and Nathan Miller ECE 478/578 Department of Electrical Engineering Oregon State University
Introduction What is it?? Features –Instant Messaging –IM Images –Voice/Video Chat –Game Request –File Transfer –Application Sharing/Remote Access
AOL Instant Messenger (AIM) 43.6 Million Users Features Instant Messaging IM Images Voice Chat Game Request File Transfer File Sharing FLAP and OSCAR –Authentication Protocol
.NET Messenger 18.5 Million Users Features Instant Messaging Voice/Video Chat Application Sharing File Transfer Remote Assistance MSNP –Authentication Protocol
ICQ (I Seek You) 7.2 Million Users Features Instant Messaging Voice/Video Chat File Transfer File Sharing FLAP and OSCAR –Authentication Protocol
Yahoo! Messenger 11.9 Million Users Features Instant Messaging IM Images Voice Chat Game Request File Transfer File Sharing YMSG –Authentication Protocol
Existing Security Blocking –Ignoring –Firewall –Company Policy Warning Software
Vulnerabilities Worms Trojan Horses Hijacking Denial of Service Disclosure
Solutions Eliminate IM Stronger Cryptography/Software Trillian
References [1]“Cyber-attacks Batter Web Heavyweights.” February [2]“Risk Eposure Through Instant Messaging and Peer-to-Peer (P2P) Networks.” Internet Security Systems. April [3]“SecureIM.” [4]Dalton, Curtis E. and Kannengeisser, William. “Instant Headache.” Info Security Magazine. August [5]Gaudin, Sharon. “Norton Antivirus Attacks Instant Messaging.” August [6]Grimes, Roger A. "IM Security Primer." May [7]Hindocha, Neal. “Instant Insecurity: Security Issues of Instant Messaging.” January [8]Hindocha, Neal. “Threats to Instant Messaging.” Symantec Security Response. January [9]Hu, Jim. “Worms Find Fertile Ground in IM.” August [10]Shinder, Thomas. “How to Block Dangerous Instant Messengers Using ISA Server.” July [11]Thorsberg, Frank. “Is IM a Sieve for Corporate Secrets?” July [12]Varnosi, Robert. “The Problem with Instant Messaging Apps at Work.” August 2002www.cnet.com