BY ANDREA ALMEIDA T.E COMP DON BOSCO COLLEGE OF ENGINEERING.

Slides:



Advertisements
Similar presentations
Chapter 15 Computer Security Techniques
Advertisements

Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Chapter 19: Computer and Network Security Techniques Business Data Communications, 6e.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Malicious Software programs exploiting system vulnerabilities known as malicious software or malware program fragments that need a host program e.g. viruses,
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Chapter 15 Computer Security Techniques Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Lecture 11 Intrusion Detection (cont)
By:Tanvi lotliker TE COMPUTER
Antivirus Software Detects malware (not just viruses) May eliminate malware as well Often sold with firewalls Two approaches: Dictionary-based - Compares.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
eScan Total Security Suite with Cloud Security
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 7 – Malicious Software.
Malicious Software Malicious Software Han Zhang & Ruochen Sun.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Network and Internet Security SYSTEM SECURITY. Virus Countermeasures Antivirus approach ◦Ideal solution: Prevention ◦Not allowing the virus to infect.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Computer Viruses Preetha Annamalai Niranjan Potnis.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Fundamentals of The Internet Learning outcomes After this session, you should be able to: Identify the threat of intruders in systems and networks and.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
10/11/2015 Computer virus By Al-janabi Rana J 1. 10/11/2015 A computer virus is a computer program that can copy itself and infect a computer without.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
IEEE Communications Surveys & Tutorials 1st Quarter 2008.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Dealing with Malware By: Brandon Payne Image source: TechTips.com.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
1 Very Fast containment of Scanning Worms By: Artur Zak Modified by: David Allen Nicholas Weaver Stuart Staniford Vern Paxson ICSI Nevis Netowrks ICSI.
Worm Defense Alexander Chang CS239 – Network Security 05/01/2006.
Information protection Lecture 2. Cryptographic systems We have a source of information and one for keys. The last one sent using a very safe communication.
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
Cryptography and Network Security Sixth Edition by William Stallings.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
Advanced Anti-Virus Techniques
W elcome to our Presentation. Presentation Topic Virus.
Software - Utilities Objectives Understand what is meant by utility software and application software Look at common utilities – Security – Disk organisation.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Malicious Programs (1) Viruses have the ability to replicate themselves Other Malicious programs may be installed by hand on a single machine. They may.
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
Antivirus Software Troy Behmer. Outline Topics covered: – What is Antivirus software (AVS)? – What are the advantages and disadvantages of AVS? – What.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Information Systems Design and Development Security Precautions Computing Science.
Introducing Dell SonicWALL Capture Advanced Threat Protection Service
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
Protecting Computers From Viruses and Similarly Programmed Threats Ryan Gray COSC 316.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
MALWARE.
LECTURE 6 MALICIOUS SOFTWARE
Very Fast containment of Scanning Worms
NET 311 Information Security
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Introduction to Internet Worm
Presentation transcript:

BY ANDREA ALMEIDA T.E COMP DON BOSCO COLLEGE OF ENGINEERING

 Antivirus approaches  Generic decryption  Digital Immune System  Worm counter measures

 Ideal solution to threat of viruses is prevention  Three basic steps:  i)Detection:-determine and locate the virus.  ii)identification:-identify the specific virus that infected the program  iii)removal:-remove all the traces of the virus from the infected program & restore to original state.

 This technology enables the antivirus program to easily detect even the complex virus while maintaining its fast scanning speed.  Executable files run through a GD scanner, which consist of the following elements:  CPU Emulator: -A software based virtual computer -instructions in an executable file are interpreted by emulator rather than executed by underlying cpu

-it includes all register and processor hardware so that underlying cpu is unaffected by programs interpreted by emulator.  Virus signature scanner:- a module that scans the target code looking for known virus signatures.  Emulation control module:- controls the execution of the target code. Disadv with the scanner is to determine how long to run each interpretation.

 It is a comprehensive approach to virus protection developed by IBM.  Motivation is the rising threat of internet based virus propagation.  2 major trends in internet technology that had an impact on virus propagation is: 1.Integrated mail system-systems such as Ms outlook make it simple to send anything to anyone and receive. 2.mobile-program system-capabilities such as java program to move on their own from 1 system to another.

 1. A monitoring program on each PC uses a variety of heuristics based on system behavior, suspicious changes to programs, or family signature to infer that a virus may be present. -The monitoring program forwards a copy of any program thought to be infected to an administrative machine within the organization.  2. The administrative machine encrypts the sample and sends it to a central virus analysis machine.  3. This machine creates an environment in which the infected program can be safely run for analysis.

 Techniques include emulation, or the creation of a protected environment within which the suspect program can be executed and monitored.  The virus analysis machine then produces a prescription for identifying and removing the virus.  4. The resulting prescription is sent back to the administrative machine.  5. The administrative machine forwards the prescription to the infected client.

 6. The prescription is also forwarded to other clients in the organization.  7. Subscribers around the world receive regular antivirus updates that protect them from the new virus.

 Behavior blocking software integrates with the operating system of a host computer and monitors program behavior in real time for malicious actions.  The behavior-blocking software then blocks potentially malicious actions before they have a chance to affect the system.  Monitored behaviors can include  Attempts to open, view, delete, and/or modify files;  Attempts to format disk drives and other unrecoverable disk operations;  Modifications to the logic of executable files or macros;

 Behaviour blocking software runs on any server or software computer and is instructed through policies set by the administrator to benign actions take place when any unauthorized or Suspicious action occurs  The module blocks any suspicious software from executing.  A blocker isolates the code in the sandbox which restricts the codes access to various os resources and applications.  The blocker then sends an alert.

 Requirements for an effective worm countermeasure scheme: 1. Generality-approach taken should be able to handle wide variety of worm attacks. 2. Timeliness-approach should response quickly so as to limit the number of transmission from infected system. 3. resiliency-approach should be resistant to evasion techniques employed by attackers to evade worm countermeasures.

1. Signature-based worm scan filtering  This type of approach generates a worm signature, which is then used to prevent worm scans from entering/leaving a network/host.  Typically, this approach involves identifying suspicious flows and generating a worm signature.  This approach is vulnerable to the use of polymorphic worms 2.Filter-based worm containment  The filter checks a message to determine if it contains worm code.  This approach can be quite effective but requires efficient detection algorithms and rapid alert dissemination.

 3. Payload-classification-based worm containment:  These network-based techniques examine packets to see if they contain a worm.Various anomaly detection techniques can be used, but care is needed to avoid high levels of false positives or negatives.  This approach does not generate signatures based on byte patterns but rather looks for control and data flow structures that suggest an exploit.  4. Threshold random walk (TRW) scan detection:  TRW exploits randomness in picking destinations to connect to as a way of detecting if a scanner is in operation  Suitable for deployment in high-speed, low-cost network devices.  It is effective against the common behavior seen in worm scans.

 E. Rate limiting:  This class limits the rate of scan like traffic from an infected host.  Various strategies can be used, including limiting the number of new machines a host can connect to in a window of time, detecting a high connection failure rate, and limiting the number of unique IP addresses a host can scan in a window of time.  May introduce longer delays for normal traffic.  Not suited for slow, stealthy worms that spread slowly to avoid detection based on activity level

 Question: What is a digital immune system?(5mks) Information provided from txt book opearting system by William stallings Chp 15.(computer security techniques) Pg 686