A Failure to Learn from the Past Presented by Chad Frommeyer CSC 493/593 Professors Charles E. Frank/James Walden.

Slides:



Advertisements
Similar presentations
Security Issues in Mobile Code Systems David M.Chess, High Integrity Computing Lab, IBM T.J. Watson Research Center Hawthorne, NY, USA Mobile code systems.
Advertisements

Computer Science CSC 405Dr. Peng Ning1 CSC 405 Introduction to Computer Security Topic 3. Program Security -- Part I.
C risis And A ftermath Eugene H. Spafford 발표자 : 손유민.
Communications of the ACM (CACM), Vol. 32, No. 6, June 1989
Lecture: Malicious Code CIS 3360 Ratan K. Guha. Malicious Code2 Overview and Reading Assignments Defining malicious logic Types Action by Viruses Reading.
CSE331: Introduction to Networks and Security Lecture 32 Fall 2002.
Week 6 - Friday.  What did we talk about last time?  Viruses and other malicious code.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Hacking M***********s!!. Who is this guy? John Draper (aka Captain Crunch)
1 Presented by Ahmad Bahaitham Mohammad Felemban.
Chapter 3 (Part 1) Network Security
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
________________ CS3235, Nov 2002 Viruses Adapted from Pfleeger[Chap 5]. A virus is a program [fragment] that can pass on malicious code [usually itself]
Computer Viruses and Worms By Rafael Albuernes What is a Virus? What is a Virus? What is a Worm? What is a Worm? Types of Infections Types of Infections.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
The Internet Worm Crisis and Aftermath Miyu Nakagawa Cameron Smithers Ying Han.
CSE331: Introduction to Networks and Security Lecture 33 Fall 2002.
Hacking Framework Extended: The Role of Vulnerabilities Joseph H. Schuessler Bahorat Ibragimova 8 th Annual Security Conference Las Vegas, Nevada April.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Unit 2 - Hardware Computer Security.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
1 Lecture 7 Security Problems and Virus 2 Contents u How things go wrong u Change in environment u Bound and syntax checking u Convenient but dangerous.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Introducing, Installing, and Upgrading Windows 7 Lesson 7.
PREPAREDNESS AND RESPONSE TO CYBER THREATS REQUIRE A CSIRT By Jaco Robertson, Marthie Lessing and Simon Nare*
W HAT DOES EXPLOIT MEAN ? A ND THE S ASSER WORM Seminar on Software Engineering, Short Presentation Christian Gruber.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
CMSC 414 Computer (and Network) Security Lecture 14 Jonathan Katz.
computer Viruses Ever MAde To Protect What Matters
More Network Security Threats Worm = a stand-alone program that can replicate itself and spread Worms can also contain manipulation routines to perform.
Active Worms CSE 4471: Information Security 1. Active Worm vs. Virus Active Worm –A program that propagates itself over a network, reproducing itself.
Terminology Worm –A computer program that duplicates itself over computer networks. Virus –A computer program that inspects it’s environment and copies.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Administrative: Objective: –Tutorial on Risks –Phoenix recovery Outline for today.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 47 How Viruses Work.
1 Vulnerability Assessment of Grid Software James A. Kupsch Computer Sciences Department University of Wisconsin Condor Week 2007 May 2, 2007.
Page 1 8 Oct 2004 IT Security Awareness Dangers in the Networked World Lai Zit Seng NUS School of Computing.
Recent Internet Viruses & Worms By Doppalapudi Raghu.
©Ian Sommerville 2004Software Engineering Case Studies Slide 1 The Internet Worm Compromising the availability and reliability of systems through security.
November 19, 2008 CSC 682 Use of Virtualization to Thwart Malware Written by: Ryan Lehan Presented by: Ryan Lehan Directed By: Ryan Lehan Produced By:
Crisis And Aftermath Eugene H. Spafford 이희범.  Introduction  How the worm operated  Aftermath Contents.
Mobile Agent Security Presented By Sayuri Yonekawa October 17, 2000.
4061 Session 26 (4/19). Today Network security Sockets: building a server.
Malicious Software.
Ingredients of Security
Understand Malware LESSON Security Fundamentals.
The Internet Worm Incident Eugene H. Spafford  Attack Format –Worm vs. Virus  Attack Specifications –Worm operation –Infection and propagaion  Topics.
Group 9. Exploiting Software The exploitation of software is one of the main ways that a users computer can be broken into. It involves exploiting the.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Ron McFarland, Ph.D. Kaplan University IT200: Software Engineering.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Introduction to Computer Systems. Stacks and Buflab Recitation 3 Monday September 21th, 2009.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Network Attacks Instructor: Dr. X. Outline Worms DoS.
Servers in the Wild… …and the threats that lurk about. DePaul University Information Security Team TLT Presentation 08 May 2002.
The Internet Worm Compromising the availability and reliability of systems through security failure.
Malware Short for malicious software and is typically used as a
Viruses and Other Malicious Content
Internet Worms, SYN DOS attack
Lab 7 – Defeating MALWARE
Intrusion Detection system
Computer Emergency Response Team
Operating System Concepts
Crisis and Aftermath Morris worm.
Presentation transcript:

A Failure to Learn from the Past Presented by Chad Frommeyer CSC 493/593 Professors Charles E. Frank/James Walden

Introduction Internet Worm and its Behavior Consequences to the Creator/Originator Resulting actions taken What have we learned?

Internet Worm October, 1988 Internet Contained 60,000 hosts Worm attack affected (5%- 10%) Infection lasted 3-4 days Only Unix based systems affected

Internet Worms -- Terms Worm – Independent program that can replicate itself Virus – Code that requires a host, and cannot run independently Malware – Malicious Software

Inernet Worm -- Operation Fingerd – Buffer Overflow (C-Language gets() – altering fingerd functionality Sendmail – DEBUG options exploit allowed execution of commands Password discovery Identify Trusted Machines Cleanup after Execution Chronology

Consequences Author Robert T Morris No Prison, 400 Hours Community Service Fine of $13,776 Suspended from graduate studies at Cornell Malicious Intent not proven Ultimately received Ph.D from Harvard, and is currently an associate professor at MIT. Adequate?

Resulting Actions CERT (Computer Emergency Response Team) Central switchboard for computer emergencies on ARPAnet and MILnet Not enough?

What have we learned? Software Flaws Incident Response Laws and Ethics

Learned? (Software Flaws) 95% of reported malware is against Microsoft Trust Relationships –Software –Hardware –Personal Buffer Overflows Default Configurations

Learned? (Incident Response) CERT/CC Delayed Communications Not Comprehensive What communication is good enough?

Laws and Ethics Fewer than a dozen people convicted Expensive/Difficult to Investigate Lack of Tools/Expertise Lack of Foreign Laws Lack of international cooperation

Conclusion Punishment not adequate – Needed precedence Awareness needs to be heightened Software processes need to recognize lack of expertise Security should be a priority to product management