Lesson 4 Networked Computer Security Attacks on Internet Computers.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Computer Viruses.
1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.
Introduction to Security Computer Networks Computer Networks Term B10.
Web Servers Security: What You Should Know. The World Wide Web (WWW) is one of the best ways to develop an e-commerce business presence and interact with.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
CSE331: Introduction to Networks and Security Lecture 31 Fall 2002.
100% Security “ The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Video Following is a video of what can happen if you don’t update your security settings! security.
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Unit 2 - Hardware Computer Security.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Internet Security facilities for secure communication.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
D. Beecroft Fremont High School VIRUSES.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Recent Internet Viruses & Worms By Doppalapudi Raghu.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Topic 5: Basic Security.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
4061 Session 26 (4/19). Today Network security Sockets: building a server.
Viruses a piece of self-replicating code attached to some other code – cf biological virus both propagates itself & carries a payload – carries code to.
CONTENTS What is Virus ? Types of computer viruses.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
MyDoom ☉ Ian Axelrod ☉ Chris Mungol ☉ Antonio Silva ☉ Joshua Sole ☉ Somnath Banerjee Group 5 CS4235/8803.
Understand Malware LESSON Security Fundamentals.
Slammer Worm By : Varsha Gupta.P 08QR1A1216.
W elcome to our Presentation. Presentation Topic Virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
MALICIOUS SOFTWARE Rishu sihotra TE Computer
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Network Protection Against: Worms, Viruses, and Root Kits Ryan Del Vecchio Cosc. 352 October 1, 2008.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
By Thomas Pantone Cosc 380.  A virus is a type of malware that self replicates after being executed and inserts itself into other programs, data files,
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Viruses and Other Malicious Content
Chap 10 Malicious Software.
A Distributed DoS in Action
Chap 10 Malicious Software.
Presentation transcript:

Lesson 4 Networked Computer Security Attacks on Internet Computers

Overview  Malicious Software  Recent Worms/Viruses

Malicious Software  Viruses  Trojan Horse  Worms

Viruses—3 Primary categories  File infectors—now extinct in the wild  Boot sector viruses—died out after hard drives became prevalent  Macro(interpreted)—most common, cross platform…written in scripting languages

Worms—self propagating program  Morris  Pretty Park  ILOVEYOU (Melissa)  CODE RED  NIMDA  Slapper  SQL

Trojan Horse  Trojan Horse: a program that secretly installs itself and does something malicious  Password sniffers  Back Orifice—allows remote users to takeover computer  Plethora of hacker tools

Trends in DoS Attacks: The Evolution of Worms and Other Pesky Varmits

10 Propositions on Network Defense  Networks are critical business support systems...if not the sole reason for the business  Networks exist to operate  Security “should” ensure you operate  All “good” systems have fail safes  Vulnerability Alerts are “not only” a Sys Admin Issue  The threat to our network is real  There is no distant end on a network  There is no distant end in network defense  You are only as good as your weakest link  You do not want to be the weakest link

What is a DoS Attack?  DoS Attacks prevent or impair the legitimate use of computer or network resources  Consistent and Real Threat due to:  Limited and Consumable Resources  Internet Security is Highly Interdependent  Defending Against DoS is not an Exact Science Source: Trends in DOS Attack Technology, Houle et al, CERT/CC

Early Virus/Worms  Melissa (Mar/Apr 99)  Macro Virus affecting Microsoft Word 97/2000 and Microsoft Outlook 97/98 Propagates through an infected attachment in Infected word file attachment when opened replicates the mail message to the first 50 addresses in the recipients address book This Transport Mechanism Still Alive and Well Countermeasure: Filter , Operator Education

Early Virus/Worms  Loveletter (May 00)  Propagates via attachment  When first run, drops copies of itself in several places on the system and adds registry keys in order to run at system startup  Overwrites (and renames) several system files with copies of itself  Uses Microsoft Outlook to send copies of itself to address book entries  Tries to download and install a password stealing program from the Internet; when installed, program will passwords to

 Kournikova (12-13 Feb 01)  Propagates via attachment  Fools users into thinking it is a jpeg picture of Russian tennis player, Anna Kournikova; does this by sending itself as an attached file called AnnaKournikova.jpg.vbs.  Alters registry files on infected computer  Sends copies of itself via address book  Sends itself out again on the 26th of each month  Built using free tool off the Internet that generates worms Early Virus/Worms

Early MOs  Making false claims that a file attachment contains a software patch or update  Implying or using entertaining content to entice a user into executing a malicious file

Early MOs Continued  Using delivery techniques that cause the message to appear to have come from a familiar or trusted source  Packaging malicious files in deceptively familiar ways (e.g., use of familiar but deceptive program icons or file names)

 Code Red Worm (12 July to 24 Oct)  Activates 100 connections at a time looking for new hosts to infect  Initially displayed false web page “Hacked by Chinese”– removed in 2nd version to hide detection  New host search “pseudo-random” – each new instance would start probe at the same first host and continue – corrected in second version  Resulted in hosts at beginning of attack list inundated with connection requests from each infected server  Designed Stealth Periods, vicious Active Periods  Propagation Causes DoS Conditions Present Day Virus/Worms !!!! When present, resides in volatile memory !!!! no disk files to search for with Anti-Virus software

How CODE RED Works First infected system

How CODE RED Works First infected system 100 system probes Scans to find new victims

How CODE RED Works First infected system Scans to find new victims

- Each new victim starts scanning process over again - 20th to EOM, primary target is

 Sir Cam Worm (17 July to ~16 Oct)  Arrives as an attachment  Hi! How are you? Last line: See you later. Thanks  Most significant attribute of the virus is its ability to forward on documents located on an infected host  Sir Cam was programmed with a 1 in 20 chance of deleting all files on an infected host on 16 October  A second payload is also set to fill infected hard drives with junk data  Overshadowed by Nimda Present Day Virus/Worms

 Nimda Worm (18 Sept to 24 Oct)  Multi Axis Attack  Attachment  SMB Networking  Exploited backdoors from Previous Attacks  IE Exploitation  Exploit IIS for Wide Propagation  Propagation Causes DDoS Conditions Present Day Virus/Worms

How NIMDA Works First infected system

How NIMDA Works First infected systemAttacking system tftp Admin.dll from attacking system (contains NIMDA payload)

How NIMDA Works First infected system Sends infected attachment NIMDA attaches to web pages on infected server Infected system scans network for vulnerable IIS web servers NIMDA propagates via open file shares

How NIMDA Works - NIMDA prefers to target its neighbors - Very rapid propagation

Sapphire SQL Worm ref:  Outbound traffic to external addresses on UDP Port 1434  Scanning causes a significant amount of data to be transmitted, all of it aimed at UDP port  Large amount of ICMP Port/Host Unreachable messages aimed at server systems  The worm uses a large number of UDP packets to achieve widespread infection. If the worm aims packets at a non-existant address (or an address that has not opened port 1434), an ICMP Unreachable message may be returned by the router that detected the error.

Sapphire SQL Worm (2)  SQL resolution service failure  Infection causes resolution service to fail  Disables access to SQL services  Effect occurs until the SQL server is restarted.  Performance Degradation  Due to scanning for other systems, and the resultant bandwidth consumption due to outbound UDP packets (or inbound ICMP error messages as outlined above), connection speeds to other services may drop drastically.  Because the worm does not have the facilities to prevent re- infection, systems may have several copies of the worm running simultaneously.

 Melissa  $1.2B  Love Letter  $8.7B, Most of Fortune 500 Companies  Kournikova  Sircam  $1B  Code Red  $2.6B estimated Jul/Aug 01 alone  Nimda Impact

 Filtering at firewalls must be implemented  Recommended configurations must be at mail servers and workstations  Vendor supplied upgrades, updates, patches must be fully employed  Work Force Needs to be Trained Early Lessons Learned

Nimda and CR Lessons Learned  Highlights fact that network defense is not the only defense against interactive hackers  Many “attackers” were unwitting/unpatched zombies in the internet world, out of our control  This was an attack against the network infrastructure  Work Force Still Needs to Practice Safe Computing  Industry Solutions were Varied and Costly

The Future of DDoS Attacks?  Intruder use of Internet Relay Chat (IRC)  Will use established comm routes  Not easy to discern from legitimate traffic  Bogus Domain Names used--STEALTH  Routers used for Dos Attacks  Direct attacks on routing protocols  Less chance of being discovered  Time to exploit is shrinking  Non-disclosure within intruder communities  Increased Blast Zones--collateral damage Source: Trends in DOS Attack Technology, Houle et al, CERT/CC