Telecommunications Networking II Lecture 41f Viruses and Worms.

Slides:



Advertisements
Similar presentations
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Advertisements

Smita Thaker 1 Polymorphic & Metamorphic Viruses Presented By : Smita Thaker Dated : Nov 18, 2003.
Dr. Richard Ford  Szor 7  Another way viruses try to evade scanners.
Chapter 3 (Part 1) Network Security
Polymorphic Viruses A brief survey Joseph Hamm Shirlan Johnson.
Cryptography and Network Security Malicious Software Third Edition by William Stallings Lecturer: Dr. Saleem Alzoubi.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
________________ CS3235, Nov 2002 Viruses Adapted from Pfleeger[Chap 5]. A virus is a program [fragment] that can pass on malicious code [usually itself]
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Polymorphism in Computer Viruses CS265 Security Engineering Term Project Puneet Mishra.
After this session, you should be able to:
Chapter 9 Security Malware Defenses. Malware Can be used for a form of blackmail. Example: Encrypts files on victim disk, then displays message.
1 Computer Viruses (and other “Malicious Programs) Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
Viruses A virus is a self-replicating program which attaches to other files or disc/floppy sectors and spreads in this way. A virus may have a payload.
Hofstra University – Network Security Course, CSC290A
1 Ola Flygt Växjö University, Sweden Malicious Software.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Network and Internet Security SYSTEM SECURITY. Virus Countermeasures Antivirus approach ◦Ideal solution: Prevention ◦Not allowing the virus to infect.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
Computer Network Forensics Lecture - Virus © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
Fundamentals of The Internet Learning outcomes After this session, you should be able to: Identify the threat of intruders in systems and networks and.
VIRUSES - Janhavi Naik. Overview Structure Classification Categories.
Structure Classifications &
Windows PE files Infections and Heuristic Detection Nicolas BRULEZ / Digital River PACSEC '04.
1 Chapter 19: Malicious Software Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal, U of Kentucky)
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
Administrative: Objective: –Tutorial on Risks –Phoenix recovery Outline for today.
Viruses and Related Threats. 2 Summary  have considered:  various malicious programs  trapdoor, logic bomb, trojan horse, zombie  viruses  worms.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
信息处理技术 Technology of Information Processing 潘晟旻 Instructor: Pan Shengmin 潘晟旻 Computer Center. Kun Ming University of Science & Technology.
30.1 Lecture 30 Security II Based on Silberschatz & Galvin’s slides And Stallings’ slides.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Viruses a piece of self-replicating code attached to some other code – cf biological virus both propagates itself & carries a payload – carries code to.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Chapter 19 – Malicious Software What is the concept of defense: The parrying of a blow. What is its characteristic feature: Awaiting the blow. —On War,
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
METAMORPHIC VIRUS NGUYEN LE VAN.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
MALICIOUS SOFTWARE Rishu sihotra TE Computer
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Malicious Programs (1) Viruses have the ability to replicate themselves Other Malicious programs may be installed by hand on a single machine. They may.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
Computer Viruses Author: Alyse Allen.
Chapter Objectives In this chapter, you will learn:
MALWARE.
Viruses and Other Malicious Content
Techniques, Tools, and Research Issues
Chap 10 Malicious Software.
CSC 382/582: Computer Security
CSCD 303 Essential Computer Security Fall 2018
Chap 10 Malicious Software.
Malicious Program and Protection
Presentation transcript:

Telecommunications Networking II Lecture 41f Viruses and Worms

Viruses (and Worms) references: William Stallings-Cryptography and Network Security Chapter 15.2

Viruses and Worms Virus: “A program that can “infect” other programs by modifying them; the modification includes a copy of the virus program, which can then go on to infect other programs” (ref: Stallings p504) Worm “Network worm programs use network connections to pass from system to system” (ref: Stalling p504)

Viruses and Worms Virus: extraneous executable code that attaches itself to a file or an application, and that can reproduce itself to infect other files or applications Worm: a stand-alone executable program that can replicate itself, and that can utilize system resources to spread to multiple systems

Simple Virus Structure (ref Stalling p 506) Program V:= {goto main; ; subroutine infect executable := {loop: file := get random executable file if (first-line-of-file = ) then goto loop else prepend V to file;} main: main-program := {infect-executable; goto next;} next: }

Viruses and Worms The simple virus (prior slide) postpends or prepends a fixed executable set of instructions to a file or application Changes the size of the file

Viruses and Worms If we know how long a file is supposed to be, then we can detect the infection by noting the mismatch between the length of the infected file and the length of an un- infected file. However, it is relatively easy to defeat the above detection method…e.g., by compressing the original file

Compression Virus (Stalling p 507) 1. Compress next victim file 2. Prepend virus code to compressed victim file ….. 3. Execute virus code (infect new files, etc.) 4. Decompress current victim file file 5. Run, decompressed file

Viruses and Worms Parasite virus: Attaches itself to an executable file; replicates and infects another file when the executable file is executed Memory-resident virus: lodges in main memory and infects every program that executes Boot sector virus:

Viruses and Worms Polymorphic virus: transforms (morphs) itself every time it replicates..to avoid detection of its signature Macro virus: infects documents (non- executable + macros) that are opened using Microsoft Word or other Office applications; and which can, iteratively, infect other documents, delete files, etc.

Polymorphic Viruses Polymorphic viruses attempt to hide themselves from virus signature detection by changing (morphing) themselves every time they replicate

Polymorphic Viruses Change with each new infection Are (for example) comprised of two parts –A decryptor –An encrypted virus file Both the decryptor and the encrypted file change each time the virus replicates…so that neither one has a fixed signature

Infected application Decryptor Encrypted virus file App. 1

How does it work1? Decryptor Encrypted virus file App. 1 Infected app. Decryptor App. 1 Mutator Engine Virus version xyz Executing 1 1. The decryptor executable will decrypt the encrypted virus file

How does it work2? App. 1 Decryptor Mutator Engine New Decryptor Decryptor Encrypted virus file Decryptor Encrypted virus file App Virus1 finds the victim(App.2) 3. Mutator Engine creates a new Decryptor, a new virus file, and encrypts the new virus file 4. Virus2 is prepended to App. 2 Virus version xyz+1 Mutator Engine Virus version xyz

“The Black Baron’s” Tutorial ( MOV SI,jumbled_data; Point to the jumbled data MOV CX,10 ; Ten bytes to decrypt main_loop: XOR BYTE PTR [SI],55 ; (unscramble) a byte INC SI ; Next byte LOOP main_loop ; Loop for the 9 remaining bytes In other words: encrypt by XOR’ing 55 with each byte of the virus file; and decrypt by XOR’ing 55 again ultra-simple decryptor

“The Black Baron’s” Tutorial MOV CX,10 MOV SI,jumbled_data main_loop: XOR BYTE PTR [SI],55 INC SI LOOP main_loop Permuted ultra-simple decryptor

“The Black Baron’s” Tutorial MOV CX,10 NOP MOV SI,jumbled_data NOP main_loop: NOP NOP XOR BYTE PTR [SI],55 NOP INC SI NOP LOOP main_loop NOP’s added to Decryptor

“The Black Baron’s” Tutorial MOV DX,10 ;Real part of the decryptor! MOV SI,1234 ;junk AND AX,[SI+1234] ;junk CLD ;junk MOV DI,jumbled_data ;Real part of the decryptor! TEST [SI+1234],BL ;junk OR AL,CL ;junk main_loop: ADD SI,SI ;junk instruction, real loop! XOR AX,1234 ;junk XOR BYTE PTR [DI],55 ;Real part of the decryptor! SUB SI,123 ;junk INC DI ;Real part of the decryptor! TEST DX,1234 ;junk AND AL,[BP+1234] ;junk DEC DX ;Real part of the decryptor! NOP ;junk XOR AX,DX ;junk SBB AX,[SI+1234] ;junk AND DX,DX ;Real part of the decryptor! JNZ main_loop ;Real part of the decryptor! Junk added to Decrpytor

Detecting Viruses ref: Stalling pp Look for a known virus signature Heuristic methods: look for structures in a file that look like they may be associated with a virus (e.g., an decryption loop) Checksums (easily defeated using compression and de-compression techniques or by changing the checksum) Digital signatures

Virus Signature Detection Example: 20,000 files to check x 30,000 virus signatures to test against = 600,000,000 tests to 1 test per microsecond => 10 minutes to perform the virus check

Heuristic Intuitive: e.g., seems like it might work Plausible: seems to make sense Not proven: but, then again, its hard to say how effective it will be Example: Stock analysts present heuristic arguments to support their predictions

Detecting Viruses ref: Stalling pp Identify viruses by the actions they cause Pre-execute all programs in an emulator (I.e., interpret the instructions one at a time, under control of the virus detection engine) to observe such things as decryption processes and the signatures of decrypted viruses