Life in a Dangerous World: Developing effective strategies against Virus, Worms and Other Threats Marshall Breeding Vanderbilt University
The Threat v Computers are under attach more than ever before v As computer operating systems become more powerful, they also become more vulnerable v Original Viruses were transmitted by files and diskettes v Macro viruses are cross platform
The Threat... v Most current viruses transmitted by v Mail attachments common vehicles v Some viruses live within message body v Scripting engines are vulnerable
What is a virus v Transmit v Replicate v Attack v Mutate
Major virus outbreaks v 1980’s: attacks begin on COM, EXE, boot sectors –Jerusalemz (Friday the 13th) –AIDS (trojan) v 1988: Internet worm v 1992: Michelangelo v 1994 Good Times hoax v 1996 Concept (Macro virus)
...Major Virus outbreaks v 1998: Chernobyl/CIH (activates v 1998: Chernobyl/CIH (activates 26th of April) v 1999: Melissa (Macro virus/propagates through Outlook) v 2000: ILOVEYOU, Stages (VBX) v 2000: Phage; Vapor: Palm Virus
Observations v Over 50,000 viruses and variants v Major outbreaks more frequent v Microsoft products targeted v Fast propagation through v Very complex to manage: e.g. Microsoft
Trends v Current generation requires active role by user v Emerging viruses: passive victim v Future/present concern for wireless devices v Wider range of targets: Computers, PDA, Cell Phones
Anti-virus solutions v User behavior v Technical
The #1 Anti-virus strategy involves human behavior v Be aware and cautious v Train computer users to be wary v Never access files from an unchecked disk –any removable media v Do not download software from untrusted sources v Know the true source of all software
Be careful with v Don’t open obviously suspicious messages v Don’t open attachments unless you know the sender and are expecting that specific attachment v Ensure that your mail client displays extensions of attachments –Avoid: VBX, EXE, v Never send attachments from listserves v Never open attachments from listserves
What users should do when a virus is found or suspected v Notify system administrator v Don’t panic v Don’t restart computer v Don’t send spam warnings
Technical solutions
Implement a multi-layer approach v Desktop: dynamic inspection, regular scanning v Network Server v Mail scanning/interception
Anvi-virus Architecture Mail Serve r Local Network INTERNET Firewall File Server Dynamic Scan-on-access File Scanning Desktop Computers Mail Scanning Current Virus Signatures Regular scanning of Disks
Desktop layer v Inspect files on access v Regularly scan all permanent disks v Scan all removable media with each use v Regularly update virus signature database
Desktop Anti-virus software v Norton Anti Virus v McAfee ActiveShield v Command Anti-Virus (was Fprot) v Data Fellows F-Secure v Dr. Solomons Anti-Virus
Network Fileserver layer v Regularly scan all disk volumes v Shared folders easily missed by desktop scanning
scanning v Inspect incoming messages v Inspect outgoing messages v Inspect messages from one local user to another within mail system
Scanning software v Trend Micro Virus Wall v Sybari Antigen
Virus signature database v the key to the current generation of anti- virus software v must be current v can’t be current enough
Firewalls v Part of a general computer security plan, but also helpful with viruses v Institutional firewalls imperative –CheckPoint FireWall-1 v Consider personal/workstation-level firewalls –BlackIce –ZoneAlarm
What software should do when it detects a virus v clean file/message when possible v remove if it can’t be cleaned v warn system administrator v warn recipient v warn sender
Need to identify the signature of each virus –distinguish malicious items v Original products scanned after the fact v Scanning of files as they are accessed
Mitigate vulnerability v Avoid being logged in with workstation/network administrative rights v Minimize the number of network drives mapped at any given time –Web document directories –shared network drives v Turn off features not needed: –e.g. Windows Scripting Host from –Do we need support for VBX or JavaScript in ?
Web-oriented vulnerabilities v Java applets v Active-X
More advanced anti-virus software v rely less on specific virus signatures v rely more on trapping unwanted behaviour
Future expectations v No end in sight v The world is becoming more dangerous v Enormous dependence on commercial anti- virus applications v Future computer OS will be designed to be less vulnerable...