Dr. Bhavani Thuraisingham October 9, 2015 Analyzing and Securing Social Media Attacks on Social Media.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Thank you to IT Training at Indiana University Computer Malware.
Protect your PC virus, worm, Trojan horse, phishing, spam, botnet and zombies, spoofing, social engineering, identity theft, spyware, rootkits Click.
Lecture: Malicious Code CIS 3360 Ratan K. Guha. Malicious Code2 Overview and Reading Assignments Defining malicious logic Types Action by Viruses Reading.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Unit 18 Data Security 1.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Threats To A Computer Network
BOTNETS/Cyber Criminals  How do we stop Cyber Criminals.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Chapter Nine Maintaining a Computer Part III: Malware.
A Hybrid Model to Detect Malicious Executables Mohammad M. Masud Latifur Khan Bhavani Thuraisingham Department of Computer Science The University of Texas.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Speaker : YUN–KUAN,CHANG Date : 2009/10/13 Working the botnet: how dynamic DNS is revitalising the zombie army.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
BotNet Detection Techniques By Shreyas Sali
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
 a crime committed on a computer network, esp. the Internet.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Introduction of Internet security Sui Wang IS300.
 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Data Mining for Malware Detection Lecture #2 May 27, 2011 Dr. Bhavani Thuraisingham The University of Texas at Dallas.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Computer Systems Security Part I ET4085 Keamanan Jaringan Telekomunikasi Tutun Juhana School of Electrical Engineering and Informatics Institut Teknologi.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
Malicious Software.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
VIRUS.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Malicious Code Detection and Security Applications Prof. Bhavani Thuraisingham The University of Texas at Dallas October 2008.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
Understand Malware LESSON Security Fundamentals.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari Hazira Hamiza
Botnets A collection of compromised machines
3.6 Fundamentals of cyber security
CYBER SECURITY...
Detecting Malicious Executables
Network security threats
Botnets A collection of compromised machines
Malicious Code Detection and Security Applications
NET 311 Information Security
Risk of the Internet At Home
Chap 10 Malicious Software.
UNIT 18 Data Security 1.
Chap 10 Malicious Software.
When Machine Learning Meets Security – Secure ML or Use ML to Secure sth.? ECE 693.
Presentation transcript:

Dr. Bhavani Thuraisingham October 9, 2015 Analyzing and Securing Social Media Attacks on Social Media

Outline l Malware l Attacks on Social Media l Data mining solutions

Malware l Malware includes viruses, worms, Trojan horses, time and logic bombs, botnets, and spyware. l A number of techniques have been devised by researchers to counter these attacks; however, the more successful the researchers become in detecting and preventing the attacks, the more sophisticated malicious code appears in the wild. l Thus, the arms race between malware authors and malware defenders continues to escalate.

Malware l Virus Computer viruses are malware that piggyback onto other executables and are capable of replicating. l Viruses can exhibit a wide range of malicious behaviors ranging from simple annoyance (such as displaying messages) to widespread destruction such as wiping all the data in the hard drive (e.g. CIH virus). l Viruses are not independent programs. Rather, they are code fragments that exist on other binary files. l A virus can infect a host machine by replicating itself when it is brought in contact with that machine, such as via a shared network drive, removable media, or attachment. l The replication is done when the virus code is executed and it is permitted to write in the memory.

Malware l There are two types of viruses based on their replication strategy: nonresident and resident. l The nonresident virus does not store itself on the hard drive of the infected computer. l It is only attached to an executable file that infects a computer. l The virus is activated each time the infected executable is accessed and run. l When activated, the virus looks for other victims (e.g., other executables) and infects them. l On the contrary, resident viruses allocate memory in the computer hard drive, such as the boot sector. l These viruses become active every time the infected machine starts.

Malware l Worms Computer worms are malware but unlike viruses, they need not attach themselves to other binaries. l Worms are capable of propagating themselves to other hosts though network connections. l Worms also exhibit a wide range of malicious behavior such as spamming, phishing, harvesting and sending sensitive information to the worm writer, jamming or slowing down network connections, deleting data from hard drive and so on. l Worms are independent programs, and reside in the infected machine by camouflage. l Some of the worms open a backdoor in the infected machine allowing the worm writer to control the machine and making it a zombie (or bot) for his malicious activities.

Malware l Trojan Horse Trojan horses have been studied within the context of multilevel databases. l They covertly pass information from a high level process to a low level process. l Good example of a Trojan horse is the manipulation of file locks l A Secret process cannot directly send data to an unclassified process as this will constitute a write down. l However, a malicious Secret process can covertly pass data to an unclassified process by manipulating the file locks as follows. l Suppose both processes want to access say, an unclassified file. l The secret process wants to read from the file while the unclassified process can write into the file.

Malware l However, both processes cannot obtain the read and write locks at the same time. l Therefore, at time T1 let’s assume that the Secret process has the read lock while the unclassified process attempts to get a write lock. l The unclassified process cannot obtain this lock. This means a one bit information say, 0, is passed to the unclassified process. l At time T2, let’s assume the situation does not change. This means one bit information of 0 is passed. l However, at time T3, let’s assume the Secret process does not have the read lock, in which case the unclassified process can obtain the write lock. l This time one bit information of 1 is passed. l Over time a classified string of could be passed from the Secret process to the unclassified process.

Malware l In the software paradigm, time bomb refers to a computer program that stops functioning after a pre-specified time/date has reached. l This is usually imposed by software companies in beta versions of software so that the software stops functioning after a certain date. An example is the Windows Vista Beta 2 that stopped functioning on May 31, 2007 l A logic bomb is a computer program that is intended to perform l This technique is sometimes injected into viruses or worms to increase the chances of survival and spreading before getting caught.

Malware l Botnet Botnet is a network of compromised hosts or bots, under the control of a human attacker known as the botmaster. l The botmaster can issue commands to the bots to perform malicious actions, such as recruiting new bots, launching coordinated DDoS attacks against some hosts, stealing sensitive information from the bot machine, sending mass spam s and so on. l Thus, botnets have emerged as an enormous threat to the internet community.

Malware l Spyware is a type of malware that can be installed on computers, which collects information about users without their knowledge. l For example, spyware observes the websites visited by the user, the s sent by the user and in general the activities carried out by the user in his/her computer. l Spyware is usually hidden from the user. l However, sometimes employers can install spyware to find out the computer activities of the employees. l An example of spyware is keylogger (also called keystroke logging) software.

Attacks on Social Media l There are three types of attacks l One is to attack the social media l The other is to attack the computer systems, networks and infrastructures through social media. T l The third group consists of attacks specially formulated for social media systems.

Attacks on Social Media l De-Anonymization Attacks: In this attack, hackers can exploit the group membership information about the members of the networks and subsequently identify the members. l “Group information is available on social networking sites”. l Specifically they used the web browser attacks to obtain the group membership information. l When a member of a group and the social network visit a malicious website, the website will carry out the attack the de-anonymization attack formulated by the hacker. l Source: on “A Practical Attack to De-Anonymize Social Network Users”, Wondracek et al

Attacks on Social Media l Sourse: Seven Deadly Attacks; Timm and Perez l Seven attacks that could occur including malware attacks, phishing attacks, and identity theft. l For example, for malware attacks they state that there are two ways the malware can compromise the network. l One is a virus that will infect the system and the other is a malware such as a Trojan horse that could conceal information. l They also explain the cross site scripting (XSS) attack where the malware will enable the user’s browser to execute the attacker’s code and cause a compromise to the network.

Attacks on Social Media l COMBOFIX List of Attacks: The COMBOFIX website lists several attacks to social l The Bad SEO attack attracts the user to a website that contains the malware. The users are also lured to fake websites. l The Pornspace malware is a worm that utilized a flaw in the security mailing list of MySpace and stole the profiles of the users and then sent porn-based spam. l In the Over the Rainbow malware attack the hacker’s embedded JavaScript code into Twitter messages that can retweet. l The user as well as the members of his/her network could be directed to porn sites. l In the Dislike Scam on Facebook attack which affected Facebook, the users were given bogus surveys and once they filled the surveys that were attacked by a malware.

Attacks on Social Media l Top Ten Attacks in Social Media: At the RSA conference in 2014, Gary Bahadur, the CEO of KRAA Security describes various attacks to Facebook, Twitter, LinkedIn as well as some other social media attacks. - For example, he explains how an Android malware attack spread through Facebook. - This attack shows that the gadgets we use to connect to a social network site can cause a serious attack to the site. l Top Nine Social Media Threats of 2015: The Zerofox website published the top nine social media threats including executive impersonations, corporate impersonations, account takeover, customer scams and phishing attacks. - An account takeover attack in 2015 was especially sinister as it affected the United States Central Command (CENTCOM).

Attacks on Social Media l Financial Times Report: On July 30, 2015, the Financial Times reported that hackers are using Twitter to conceal intrusions. - For example, the hackers used Twitter images to conceal malware and from there attacked the computers they wanted to compromise. - This attack appears to be similar to a stenographic attack where suspicious messages are embedded into a media such as images and video. l Link Privacy Attacks: In their article on link privacy Effendy et al discuss a version of the link privacy attack. - It is essentially bribing or compromising some of the members (usually a small number) in a social networks and using this obtain the link details (that is, who their friends are) of those members who are non-compromised.

Attacks on Social Media l Evil Twin Attack involves perpetrators pretending to be legitimate users in order to gain something they are not entitled to. - Evil Twin Attacks on social networking site occur when perpetrators impersonate companies to get access to the social network. l Identity Theft is common in social media l Here the attacker hacks into the social media site, gets the identity of the legitimate user and starts posting information on the site. l Cyber Bullying

Data Mining for Malware Detection l Data mining overview l Intrusion detection, Malicious code detection, Buffer overflow detection, worm detection (worms and virus) l Novel Class Detection for polymorphic malware l Reference: - Data Mining Tools for Malware Detection - Masud, Khan and Thuraisingham - CRC Press/Taylor and Francis, 2011

What is Data Mining? Data Mining Knowledge Mining Knowledge Discovery in Databases Data Archaeology Data Dredging Database Mining Knowledge Extraction Data Pattern Processing Information Harvesting Siftware The process of discovering meaningful new correlations, patterns, and trends by sifting through large amounts of data, often previously unknown, using pattern recognition technologies and statistical and mathematical techniques (Thuraisingham, Data Mining, CRC Press 1998)

What’s going on in data mining? l What are the technologies for data mining? - Database management, data warehousing, machine learning, statistics, pattern recognition, visualization, parallel processing l What can data mining do for you? - Data mining outcomes: Classification, Clustering, Association, Anomaly detection, Prediction, Estimation,... l How do you carry out data mining? - Data mining techniques: Decision trees, Neural networks, Market-basket analysis, Link analysis, Genetic algorithms,... l What is the current status? - Many commercial products mine relational databases l What are some of the challenges? - Mining unstructured data, extracting useful patterns, web mining, Data mining, security and privacy

Data Mining for Intrusion Detection: Problem l An intrusion can be defined as “any set of actions that attempt to compromise the integrity, confidentiality, or availability of a resource”. l Attacks are: - Host-based attacks - Network-based attacks l Intrusion detection systems are split into two groups: - Anomaly detection systems - Misuse detection systems l Use audit logs - Capture all activities in network and hosts. - But the amount of data is huge!

Misuse Detection l Misuse Detection

Problem: Anomaly Detection l Anomaly Detection

Our Approach: Overview Training Data Class Hierarchical Clustering (DGSOT) Testing Testing Data SVM Class Training DGSOT: Dynamically growing self organizing tree

Hierarchical clustering with SVM flow chart Our Approach Our Approach: Hierarchical Clustering

Results Training Time, FP and FN Rates of Various Methods Methods Average Accuracy Total Training Time Average FP Rate (%) Average FN Rate (%) Random Selection 52%0.44 hours4047 Pure SVM57.6%17.34 hours SVM+Rocchio Bundling 51.6%26.7 hours SVM + DGSOT69.8%13.18 hours

Introduction: Detecting Malicious Executables using Data Mining l What are malicious executables? - Harm computer systems - Virus, Exploit, Denial of Service (DoS), Flooder, Sniffer, Spoofer, Trojan etc. - Exploits software vulnerability on a victim - May remotely infect other victims - Incurs great loss. Example: Code Red epidemic cost $2.6 Billion l Malicious code detection: Traditional approach - Signature based - Requires signatures to be generated by human experts - So, not effective against “zero day” attacks

Feature Extraction and Hybrid Model ✗ Our Approach ✗ Analyze Binary Code and Assembly Code (Hybrid Model) ✗ Features ✗ Binary n-gram features l Sequence of n consecutive bytes of binary executable ✗ Assembly n-gram features l Sequence of n consecutive assembly instructions ✗ System API call features l Collect training samples of normal and malicious executables. l Extract features l Train a Classifier and build a model l Test the model against test samples

Hybrid Feature Retrieval (HFR): Training and Testing

Binary n-gram features -Features are extracted from the byte codes in the form of n- grams, where n = 2,4,6,8,10 and so on. Example: Given a 11-byte sequence: abcdef012345, The 2-grams (2-byte sequences) are: 0123, 2345, 4567, 6789, 89ab, abcd, cdef, ef01, 0123, 2345 The 4-grams (4-byte sequences) are: , , ab,...,ef and so on.... Problem: -Large dataset. Too many features (millions!). Solution: -Use secondary memory, efficient data structures -Apply feature selection Feature Extraction

Assembly n-gram features -Features are extracted from the assembly programs in the form of n-grams, where n = 2,4,6,8,10 and so on. Example: three instructions “push eax”; “mov eax, dword[0f34]” ; “add ecx, eax”; 2-grams (1) “push eax”; “mov eax, dword[0f34]”; (2) “mov eax, dword[0f34]”; “add ecx, eax”; Problem: -Same problem as binary Solution: -Same solution Feature Extraction

0 Select Best K features 0 Selection Criteria: Information Gain 0 Gain of an attribute A on a collection of examples S is given by Feature Selection

Experiments l Dataset - Dataset1: 838 Malicious and 597 Benign executables - Dataset2: 1082 Malicious and 1370 Benign executables - Collected Malicious code from VX Heavens ( l Disassembly - Pedisassem ( ) l Training, Testing - Support Vector Machine (SVM) - C-Support Vector Classifiers with an RBF kernel

Results l HFS = Hybrid Feature Set l BFS = Binary Feature Set l AFS = Assembly Feature Set

Results l HFS = Hybrid Feature Set l BFS = Binary Feature Set l AFS = Assembly Feature Set

Results l HFS = Hybrid Feature Set l BFS = Binary Feature Set l AFS = Assembly Feature Set

Directions l Malware is evolving continuously l Malware attacking social networks l Data mining solution is one approach to handle the problem.