4061 Session 26 (4/19). Today Network security Sockets: building a server.

Slides:



Advertisements
Similar presentations
(Distributed) Denial of Service Nick Feamster CS 4251 Spring 2008.
Advertisements

Communications of the ACM (CACM), Vol. 32, No. 6, June 1989
Lecture: Malicious Code CIS 3360 Ratan K. Guha. Malicious Code2 Overview and Reading Assignments Defining malicious logic Types Action by Viruses Reading.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Suneeta Chawla Web Security Presentation Topic : IP Spoofing Date : 03/24/04.
The Internet and Java Sockets ICW Lecture 5 Tom Chothia.
Introduction to Security Computer Networks Computer Networks Term B10.
Security: Attacks. 2 Trojan Horse Malicious program disguised as an innocent one –Could modify/delete user’s file, send important info to cracker, etc.
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
The Internet Worm Crisis and Aftermath Miyu Nakagawa Cameron Smithers Ying Han.
Information Networking Security and Assurance Lab National Chung Cheng University 1 A Real World Attack: wu-ftp.
Network Security Peter Behrens Seth Elschlager. Computer Security Preventing unauthorized use of your network and information within that network. Preventing.
Web server security Dr Jim Briggs WEBP security1.
100% Security “ The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
1 Computer Security: Protect your PC and Protect Yourself.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
Introduction to Honeypot, Botnet, and Security Measurement
1 Ola Flygt Växjö University, Sweden Malicious Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
13.1 Silberschatz, Galvin and Gagne ©2011 Operating System Concepts Essentials – 8 th Edition Security.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
Honeypot and Intrusion Detection System
More Network Security Threats Worm = a stand-alone program that can replicate itself and spread Worms can also contain manipulation routines to perform.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
1 Chapter 19: Malicious Software Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal, U of Kentucky)
Administrative: Objective: –Tutorial on Risks –Phoenix recovery Outline for today.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Attack Vectors and Mitigations. Attack Vectors ? Network Security2T. A. Yang
1 Firewalls G53ACC Chris Greenhalgh. 2 Contents l Attacks l Principles l Simple filters l Full firewall l Books: Comer ch
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Intrusion Detection Karthikeyan Mahadevan. Intrusion Detection What is Intrusion? Simply put, an intrusion is someone attempting to break into or misuse.
Attack and Malicious Code Andrew Anaruk. Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software.
FTP File Transfer Protocol Graeme Strachan. Agenda  An Overview  A Demonstration  An Activity.
Network Programming and Network Security Lane Thames Graduate Research Assistant.
Worm Defense Alexander Chang CS239 – Network Security 05/01/2006.
Crisis And Aftermath Eugene H. Spafford 이희범.  Introduction  How the worm operated  Aftermath Contents.
Viruses a piece of self-replicating code attached to some other code – cf biological virus both propagates itself & carries a payload – carries code to.
Understand Malware LESSON Security Fundamentals.
Slammer Worm By : Varsha Gupta.P 08QR1A1216.
The Internet Worm Incident Eugene H. Spafford  Attack Format –Worm vs. Virus  Attack Specifications –Worm operation –Infection and propagaion  Topics.
Web Security Firewalls, Buffer overflows and proxy servers.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Intro to Network Security. Vocabulary Vulnerability Weakness that can be compromised Threat A method to exploit a vulnerability Attack Use of one or more.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
CSEN 1001 Computer and Network Security Amr El Mougy Mouaz ElAbsawi.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
Network Attacks Instructor: Dr. X. Outline Worms DoS.
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Viruses and Other Malicious Content
Internet Worms, SYN DOS attack
Security.
Crisis and Aftermath Morris worm.
Presentation transcript:

4061 Session 26 (4/19)

Today Network security Sockets: building a server

Today’s Objectives Name several risks associated with developing network software Explain buffer overflow attack Write a network server in C that implements a simple protocol

Admin Monday’s Lab

Computer Security Some operating systems are more “secure” than others... What are some of the attacks?

Attacks Over Networks We’ll talk about a few exploits that happen across computer networks The lesson: network code is vulnerable to cracks. Code with care.

/*********************/ /* LET THIS EXEC */ /* */ /* RUN */ /* */ /* AND */ /* */ /* ENJOY */ /* */ /* YOURSELF! */ /*********************/ 'VMFCLEAR' SAY ' * ' SAY ' *** ' SAY ' ***** ' SAY ' ******* ' SAY ' ********* ' SAY ' ************* A' SAY ' ******* ' SAY ' *********** VERY' SAY ' *************** ' SAY ' ******************* HAPPY' SAY ' *********** ' SAY ' *************** CHRISTMAS' SAY ' ******************* ' SAY ' *********************** AND MY' SAY ' *************** ' SAY ' ******************* BEST WISHES' SAY ' *********************** ' SAY ' *************************** FOR THE NEXT' SAY ' ****** ' SAY ' ****** YEAR' SAY ' ****** ' /* browsing this file is no fun at all just type CHRISTMAS from cms */

Morris Worm 1988 (Internet still young) Robert Morris discovers some vulnerabilities in Berkeley Unix Wrote a self-replicating program (a worm) that brought down ~6,000 machines –Perhaps 10% of all machines connected to the Internet

Morris Worm Technique: –Use a variety of techniques to find other machines to infect E.g. look at files like /etc/hosts.equiv and /.rhosts –Exploit software vulnerabilities (finger, sendmail, and rsh) to copy a small bootstrap program to remote hosts –Establish network connection with remote host, copy remainder of file over

Finger Daemon Exploit Finger is a program for displaying information about users. Runs as fingerd Classic buffer overflow –Allow execution of arbitrary code Typically, C compilers don’t provide array bounds checks: int i; char c[1024]; i = 12000; c[i] = 0;

Buffer Overflow

Morris Worm When it infected a machine that had already been infected, 1/7 of the time it created another copy, anyhow –To bypass admins creating a fake copy to thwart the worm This is the code that brought down the Internet –Without the 1/7, the worm may have run undetected for a long time!

Worms Evolved Today, worms spread via , instant messaging, IRC, file-sharing, and by targeting TCP/IP ports directly –Some of these require user effort (e.g. the Anna Kournikova worm promised pictures) –Some exploit software vulnerabilities (e.g. Blaster worm exploited remote procedure calls in Windows) Worms can install backdoors on machines, turning them into “zombies” –Thanks for the spam!

DoS I wish to make some service (e.g. a Web server, or DNS services) unavailable –Overwhelm computers with traffic A local example: fork bomb –while (1) fork(); –:(){ :|:& };:

SYN Flood Images from

DDoS Coordinated attacks –Zombies –Computers infected with worm or virus Harder to detect, harder to defeat with bandwidth, harder to stop Anecdotes –“Slashdot Effect” –DNS Server Attacks (2002 and 2007)

Defenses Firewalls –Packet inspection and rejection Switches and routers –Rate limits