Malware in Popular Networks Dmitry O. Gryaznov. The Big Change ► Mostly viruses, few trojans ► Obvious destructive or annoying payload ► Mischief and.

Slides:



Advertisements
Similar presentations
Primary Threats to Computer Security
Advertisements

Woodland Hills School District Computer Network Acceptable Use Policy.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
 What is a botnet?  How are botnets created?  How are they controlled?  How are bots acquired?  What type of attacks are they responsible for? 
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Security+ Guide to Network Security Fundamentals, Third Edition
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Securing Instant Messaging Matt Hsu. Outline Introduction Instant Messaging Primer Instant Messaging Vulnerabilities and Exploits Securing Instant Messaging.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
1 Computer Security: Protect your PC and Protect Yourself.
Viruses & Destructive Programs
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Peer-to-Peer network systems Distributed Data Processing Paulina Pasek.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
Unit 2 - Hardware Computer Security.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Cs423-cotter1 P2P Discovering P2P (Miller) Internet.
1 INTERNET AND eBUSINESS (I) BUS Abdou Illia, Fall 2012 (October 29, 2012)
CERN’s Computer Security Challenge
1 INTERNET AND WORLD WIDE WEB TECHNOLOGIES BUS Abdou Illia, Spring 2007 (Week 11, Thursday 3/22/2007)
Computer Viruses.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Information Collection, Storage and Sharing. The use of computers have made it easier than before, to collect, store and share large amounts of information.
8 1 ADVANCED COMMUNICATION TOOLS Using Chat, Virtual Worlds, and Newsgroups New Perspectives on THE INTERNET.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Introduction to Internet Communications Pn. Jamilah Binti Yusof.
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
ICT Functional Skills Viruses and other malware. What is malware? software which is specifically designed to disrupt or damage a computer system – Viruses,
Made by : Mohamed kullab DR. Sanaa el sayegh.  Most personal computers are now connected to the Internet and to local area networks, facilitating the.
Brandon Resheske. What is Malware? Code designed to interfere with normal computer operation The correct general term, instead of ‘virus.’ Basically,
1 CERN’s Computer Security Challenges Denise Heagerty CERN Computer Security Officer Openlab Security Workshop, 27 Apr 2004.
By: Gloria Watkins.  Use antivirus software and keep it up-to-date. You should check for new definition updates daily. Most antivirus software can.
Chapter 4 Communicating on the Internet. How Works? Most used Feature TCP breaks & reassembles messages into packets IP delivers packets to the.
Operational Circular No 5 Use of CERN Computing Facilities.
What is Spam? d min.
Internet 1) John R. Levine, Margaret Levine Young, The Internet for Dummies. Wiley Publishing, 12 th Edition, 2010.
Brownie Girl Guides Guide to Computer Security Part1 Confused with viruses? Look no further and listen then ;)
By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.
Internet safety By Suman Nazir
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Traffic Analysis and Risk Assessment of a Medium-Sized ISP Alan W. Rateliff, II Florida Internet Service Provider Approximately 2000 ADSL users Connections.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Woodland Hills School District Computer Network Acceptable Use Policy.
Vocabulary Cassandra Peoples. Pharming the practice of redirecting computer users from legitimate websites to fraudulent ones for the purposes of extracting.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
FILE SHARING TECHNOLOGIES By R. Li Casanova COSC
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
Internet Acceptable Use Policy
INTERNET AND eBUSINESS (I)
Computer Worms & Viruses
How did the internet develop?
Woodland Hills School District
Presentation transcript:

Malware in Popular Networks Dmitry O. Gryaznov

The Big Change ► Mostly viruses, few trojans ► Obvious destructive or annoying payload ► Mischief and vandalism ► Nothing gained but “glory” ► Mostly non-replicating malware ► Trying to stay inconspicuous ► Theft and control ► Monetary gains ThenNow

Malware “Highways” ► ► Usenet ► Internet Relay Chat (IRC) ► Peer-to-peer (P2P) ► Instant Messaging (IM)

Usenet ► Since early 1980s ► Over 100,000 newsgroups ► Millions of users ► Over 2 Terabytes daily ► Mostly binaries – video, audio, software

Top Ten Malware Detections in Usenet in 2005 BackDoor-AZV46963 W32/Spybot.worm.gen.b 4876 BackDoor-CQZ1381 MultiDropper-DC183 W32/Kelvir.worm.gen75 BackDoor-ACH72 BackDoor-Sub7.svr44

Internet Relay Chat (IRC) ► Since early 1990s ► Dozens of networks (EFNet, DALnet, Undernet, etc.) ► Millions of users ► Direct file spamming (via DCC Send) ► URL spamming (via text messages) ► Used by numerous malwares even when no IRC software was ever installed by user

Top Ten Malware Detections in IRC in 2005 W32/Drefir.worm453 IRC/Flood319 IRC-Contact224 VBS/Gedza143 Downloader-TS107 BackDoor-JZ71 W32/Pate.b42 W32/Jeefo40 Nuke-Vai40

Peer-to-peer networks (P2P) ► File sharing: movies, music, software ► Numerous networks (Kazaa, eDonkey, BitTorrent, Gnutella, etc.) ► Millions of users ► “Bridging” between different networks

Top Ten Malware detections in Gnutella in 2005 Downloader-TS7540 W32/Tibick!p2p1764 W32/Generic.d!p2p1597 W32/Sndc.worm!p2p1438 VBS/Gedza1029 Exploit-MS W32/Pate.b649 W32/Sdbot.Worm.gen566

Protection ► Antivirus software ► Security patches ► Firewalls ► Strict policies – enforced ► Keep your fingers crossed…

Questions?