Download presentation
Presentation is loading. Please wait.
Published byStuart Hamilton Modified over 9 years ago
1
Analysis of Instant Messenger Programs Celia Hung and Nathan Miller ECE 478/578 Department of Electrical Engineering Oregon State University
2
Introduction What is it?? Features –Instant Messaging –IM Images –Voice/Video Chat –Game Request –File Transfer –Application Sharing/Remote Access
3
AOL Instant Messenger (AIM) 43.6 Million Users Features Instant Messaging IM Images Voice Chat Game Request File Transfer File Sharing FLAP and OSCAR –Authentication Protocol
4
.NET Messenger 18.5 Million Users Features Instant Messaging Voice/Video Chat Application Sharing File Transfer Remote Assistance MSNP –Authentication Protocol
5
ICQ (I Seek You) 7.2 Million Users Features Instant Messaging Voice/Video Chat File Transfer File Sharing FLAP and OSCAR –Authentication Protocol
6
Yahoo! Messenger 11.9 Million Users Features Instant Messaging IM Images Voice Chat Game Request File Transfer File Sharing YMSG –Authentication Protocol
7
Existing Security Blocking –Ignoring –Firewall –Company Policy Warning Software
8
Vulnerabilities Worms Trojan Horses Hijacking Denial of Service Disclosure
9
Solutions Eliminate IM Stronger Cryptography/Software Trillian
10
References [1]“Cyber-attacks Batter Web Heavyweights.” www.cnn.com. February 2002.www.cnn.com [2]“Risk Eposure Through Instant Messaging and Peer-to-Peer (P2P) Networks.” Internet Security Systems. April 2002. [3]“SecureIM.” www.trillian.ccwww.trillian.cc [4]Dalton, Curtis E. and Kannengeisser, William. “Instant Headache.” Info Security Magazine. August 2002. [5]Gaudin, Sharon. “Norton Antivirus Attacks Instant Messaging.” www.instantmessaging.com. August 2002.www.instantmessaging.com [6]Grimes, Roger A. "IM Security Primer." www.secadministrator.com. May 2002. www.secadministrator.com [7]Hindocha, Neal. “Instant Insecurity: Security Issues of Instant Messaging.” www.securityfocus.com. January 2003.www.securityfocus.com [8]Hindocha, Neal. “Threats to Instant Messaging.” Symantec Security Response. January 2003. [9]Hu, Jim. “Worms Find Fertile Ground in IM.” www.cnetnews.com. August 2001.www.cnetnews.com [10]Shinder, Thomas. “How to Block Dangerous Instant Messengers Using ISA Server.” www.windowssecurity.com. July 2002. www.windowssecurity.com [11]Thorsberg, Frank. “Is IM a Sieve for Corporate Secrets?” www.pcworld.com. July 2002.www.pcworld.com [12]Varnosi, Robert. “The Problem with Instant Messaging Apps at Work.” www.cnet.com. August 2002www.cnet.com
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.