Unit II (CS)
Unit II (CS)
1) Remote backup
2) Centralized backup
3) Backup on demand
Internet Security considerations:
1) Network secure
2) Application secure
3) Virus free
4) Worm free
5) Trojan free
6) Port secure
7) Protocol secure
8) IP authentication
Electronic mail security:
Network-based IDS: Monitors network traffic for particular segments and analyzes
network, transport, and application protocols to identify suspicious activity
Basic Principles:
Early detection – very important to confine the damage
An effective IDS can serve as a deterrent (thus discouraging intrusion
attempts)
Intrusion detection enables data collection about intrusion techniques
which, in turn, can be used to strengthen intrusion prevention measures.
Intrusion Detection
Assumption: the behavior of the intruder differs from the legitimate user.
But, there is overlap. A loose interpretation of intruder may lead to false
positives ; on the other hand, a tight interpretation may lead to false
negatives (risky!)
Host-Based Intrusion Detection
Can detect both external and internal intrusions which is not possible with
network-based IDSs or firewalls.
General approaches:
Anomaly detection – Collect data related to the behavior of legitimate users over a
period of time. Then, apply statistical tests to determine if the observed behavior is not
legitimate
Threshold detection: defines thresholds for the freq. of occurrence for various events
Profile based: a profile of normal activity is developed for each user; used to detect
changes
Audit records
Native audit records
All OSs include accounting software that collects information on user activity
Detection-specific audit records
Generate audit records containing only that information required by the IDS
Disadvantage: two accounting packages run on the system
Malware Defense
Antivirus Approaches – (1) Detection (2) Identification (3) Removal
As virus arms race has evolved, antivirus software have grown more complex.
Two sophisticated ones are: Generic Decryption and Digital Immune System
1. Each PC runs a
monitoring program to
detect unusual behavior
4. Prescription is sent
back to Adm.Machine
There are always new rootkits and modified versions of existing rootkits
that display novel signatures. For these cases, a system needs to look for
behaviors that could indicate the presence of a rootkit, such as the
interception of system calls or a keylogger interacting with a keyboard
driver. Such behavior detection is far from straightforward. For example,
antivirus software typically intercepts system calls.
Access Control
based on the ID of the requestor. Traditional.
Discretionary
access control
(DAC)
Access Control
Traffic analysis - encryption can mask the contents but message size,
transmission frequency, location and id of communicating hosts can
still be extracted
Communication Lines and Networks
Active Attacks
Replay : passive capture of a data
unit and its retransmission to
produce an unauthorized effect
Criminals
Insider attacks
Malicious Software (malware)
Backdoor (Trapdoor)
Entry point into a program that allows someone who is aware of trapdoor to gain
access
Anyone watched the movie War Games ?
used by programmers to be able to debug and test programs while skipping a
lengthy setup/authentication process during development
Avoids necessary setup and authentication
Ensures that there is a method of activating program if something wrong with the
authentication procedure
Logic Bomb
Code embedded in a legitimate program that is set to “explode” when certain
conditions are met
Presence or absence of certain files, particular day of the week, particular user running
application
• One of the oldest types of program threat, predating viruses and worms
Trojan Horse
Useful program that contains hidden code that when invoked performs some
unwanted or harmful function
Can be installed through software downloads, bundling, email attachments, websites
with executable content, etc. Trojan-type malware is on the rise, accounting for 83-
percent of the global malware.
Viruses
Program that can “infect” other programs by modifying them in
such a way that the infected program can infect other programs
Virus Stages
• Dormant phase: Virus is idle
• Propagation phase: Virus places an identical copy of itself into other
programs or into certain system areas on the disk
• Triggering phase: Virus is activated to perform the function (usually
harmful)
• Execution phase: Function is performed
Macro Viruses
• macro - an executable program embedded in a word document or
other type of file
• Easily spread; platform independent; infects documents, not the
.exe
Viruses
E-mail Virus
• Activated when recipient opens the e-mail attachment
(e.g. Melissa virus). A new version that came out in 1999
was activated by opening the e-mail itself.
• Sends itself to everyone on the mailing list of the
infected user
Classification by Target
Boot sector infector - Infects boot record and spreads when
system is booted from the disk containing the virus
File infector - Infects executable files
Macro virus - Infects files with macro code that is interpreted
by an application
Classification by concealment strategy
Encrypted virus – a portion of the virus encrypts
its main body and stores the key with itself. When an
infected program is executed, the virus decrypt itself
and then replicates. At each replication, a different
random key is selected making the detection more
difficult.
Stealth - Designed to hide itself from detection by
antivirus software. May use compression
Polymorphic - Mutates with every infection,
making detection by the “signature” of the virus
impossible
Metamorphic – same as polymorphic, but rewrites
itself completely making the detection even more
difficult. May change functionality as well as
appearance.
Malicious Software (cont.)
Worms
Exhibits similar characteristics as an e-mail virus, but
worm does not need a host program and it is not
passive, it actively seeks out more machines to infect
via
Electronic mail facility: A worm mails a copy of itself to
other systems
Remote execution: A worm executes a copy of itself on
another system
Remote log-in: A worm logs on to a remote system as a
user and then copies itself from one system to the
other
Bots (Zombie or drone)
Program that secretly takes over another Internet-
attached computer and uses it to launch attacks
that are difficult to trace to the bot’s creator
planted on hundreds of computers belonging to
unsuspecting third parties and then used to
overwhelm a target Web site by launching an
overwhelming onslaught of Internet traffic
The collection of bots acting in a coordinated
manner is called botnet
Uses of Bots
DDoS (Distributed Denial of Service attacks),
spamming, sniffing traffic on a compromised
machine, keylogging, spreading new malware,
manipulating online polls/games/clicks for ads
(every bot has a distinct IP address), etc.
BOTS
Bots (Zombie or drone)
Program that secretly takes over another Internet-attached computer and uses it to launch
attacks that are difficult to trace to the bot’s creator
Typically, rootkits act to obscure their presence on the system through subversion or
evasion of standard OS security mechanisms.
Techniques used to accomplish this can include concealing running processes from
monitoring programs, or hiding files or system data from the OS
Often, they are Trojans as well, thus fooling users into believing they are safe to run on
their systems.
Rootkits may also install a "back door" in a system by replacing the login mechanism
(such as /bin/login) with an executable that steals a login combination, which is used to
access the system illegally.
With root access, an attacker has complete control of the system to do anything
Rootkit Installation
Usually via a Trojan horse. A user is induced to load a Trojan horse which then installs
the rootkit.
Another means of rootkit installation is by hacker activity which is a rather lengthy
process.
Terminology of Malicious Programs
Terminology of Malicious Programs
Denial of service attack
It is victim resource identification when
someone is interrupting, disturbing, scooping,
snapping, hacking in the network.
Their nature are as follows:
1) DDOS (Distributed Denial of Service)
2) By DNS server as a third party.
3) By http services.
4) Buffer overflow.
5) Ping of death (POD)
6) By hacking TCP
7) Volumetric DOS attack.