Introduction To Systems Security: (January 14, 2010)
Introduction To Systems Security: (January 14, 2010)
Systems Security
2
2009 Computer Crime and Security
Survey (2009 CSI Security Report)
Survey conducted by the Computer Security
Institute (http://www.gocsi.com).
Copy of Survey report on course web site
Based on replies from 494 U.S. Computer
Security Professionals.
3
2009 CSI Report: Types of attacks
or Misuse in last 12 months
4
2008 CSI Survey vs 2009 CSI
6
2009 CSI Survey: Security monitoring
7
2009 CSI Survey: Defense Technology
8
2009 Sophos Security Threat Report
Report focused on Sophos’ security software
General discovery
*
9
* Infected USB drives take advantage of computers that have auto-run enabled, which allow the automated
execution of code contained on the flash drive.
2009 Sophos Security Threat Report
Malware* hosted on websites
10
* Malicious software
2009 Sophos Security Threat Report
Malware hosting countries
11
2009 Sophos Security Threat Report
Spam-relaying countries
12
2009 Sophos Security Threat Report
Web server’s software affected
Operating System
Computer hardware
RAM chip
HD Processor
Web server computer
14
Other Empirical Attack Data
SecurityFocus
Data from 10,000 firms in 2001
Attack Targets
31 million Windows-specific attacks
22 million UNIX/LINUX attacks
7 million Cisco IOS attacks
All operating systems are attacked!
15
Summary Questions (Part 1)
1. What does malware refer to?
2. Systems running Microsoft operating systems are
more likely to be attacked than others. T F
3. With Windows OS, you can use IIS or another web
server software like Apache. T F
4. What web server software is most affected by web
threats today?
5. What types of email-attached file could/could not
hide a malware?
6. Could USB drives be used as means for infecting a
system with malware? How?
16
Attackers
Elite Hackers
Corporate employees
Cyber terrorists
17
Systems attackers
Elite Hackers (cont.)
Black hat hackers break in for their own purposes
White hat hackers can mean multiple things
Strictest: Hack only by invitation as part of vulnerability
testing
Some hack without permission but report vulnerabilities
(not for pay)
Ethical hackers
Hack without invitation but have a “code of ethics”
e.g. “Do no damage or limited damage”
e.g.“Do no harm, but delete log files, destroy security settings”
18
Attackers
Elite Hackers
Corporate employees
Cyber vandals
Script Kiddies
Cyber terrorists
19
Attackers
Elite Hackers
Corporate employees
Cyber vandals
Virus Writers and Releasers
Cyber terrorists
20
Attackers
Elite Hackers
Corporate employees
Cyber vandals
Cyber vandals
Cyber terrorists
22
Attacks preps: examining email headers
Received: from hotmail.com (bay103-f21.bay103.hotmail.com [65.54.174.31])
by barracuda1.eiu.edu (Spam Firewall) with ESMTP id B10BA1F52DC
for <[email protected]>; Wed, 8 Feb 2006 18:14:59 -0600 (CST)
Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC;
Wed, 8 Feb 2006 16:14:58 -0800
Message-ID: <[email protected]>
Received: from 65.54.174.200 by by103fd.bay103.hotmail.msn.com with HTTP;
Thu, 09 Feb 2006 00:14:58 GMT
X-Originating-IP: [192.30.202.14] Source IP Address
X-Originating-Email: [[email protected]]
X-Sender: [email protected]
In-Reply-To: <10E30E5174081747AF9452F4411465410C5BB560@excma01.cmamdm.enterprise.corp>
X-PH: V4.4@ux1
From: <[email protected]>
To: [email protected]
X-ASG-Orig-Subj: RE: FW: Same cell#
Subject: RE: FW: Same cell#
Date: Thu, 09 Feb 2006 00:14:58 +0000
Mime-Version: 1.0
Content-Type: text/plain; format=flowed
X-OriginalArrivalTime: 09 Feb 2006 00:14:58.0614 (UTC) FILETIME=[DCA31D60:01C62D0D]
X-Virus-Scanned: by Barracuda Spam Firewall at eiu.edu
X-Barracuda-Spam-Score: 0.00
26
http://www.netscantools.com/nstpro_netscanner.html
Attacks preps: identifying targets
Examining scanning result reveals
IP addresses of potential victims
What services victims are running. Different services have
different weaknesses
Host’s operating system, version number, etc.
Whois database at NetworkSolutions.com also used when
ping scans fail
Social engineering
Tricking employees into giving out info (passwords, keys, etc.)
Deciding the type of attacks to launch given available info
27
Framework for Attacks
Attacks
28
Dialog attack: Eavesdropping
Intercepting confidential message being transmitted
over the network
Dialog
Hello
Client PC
Server
Bob
Alice
Hello
Dialog
Balance = Balance =
Client PC $1 $1,000,000 Server
Bob Alice
Balance =
$1 Balance =
$1,000,000
Attacker (Eve) intercepts 30
and alters messages
Dialog attack: Impersonation
I’m Bob
31
Encryption: Protecting against
eavesdropping and message alteration
3
2 Encrypted 5
Message
Encryption Decryption
software >/??!@#% software
+ Key + Key
Client PC 4
Server
>/??!@#%
1
“Hello” “Hello”
Original Decrypted
Message Message
Attacker intercepts
but cannot read
32
Authentication: Protecting against
Impersonation
I’m Bob
Prove it!
Client PC Attacker (Authenticate Yourself)
Server
Bob (Eve) Alice
33
Secure Dialog System: Protecting
against all dialog attacks
Secure Dialog
Client PC
Automatically Handles: Server
Bob
Authentication Alice
Encryption
Integrity
Attacker cannot
read messages, alter
messages, or impersonate
34
Break-in attack
Attack
Packet
User: jdoe
Password: brave123
Client PC IP addr.: 12.2.10.13
Internet
User: admin
Password: logon123
IP addr.: 12.2.10.13 Attacker
Server
Internal
Corporate
Network
35
Flooding Denial-of-Service (DoS) attack
Message Flood
Server
Attacker
Overloaded By
Message Flood
36
Firewalls: Protecting against
break-ins and DoS
Passed Packet
Hardened Internet
Client PC Firewall Packet
User
Internet
Attack
Packet
Dropped
Packet
Attacker
Hardened Internal
Server Corporate
Log File Network
Firewalls could be hardware or software-based
Firewalls need configuration to implement access policies
37
Security audits need to be performed to fix mis-configuration
Intrusion Detection System (IDS):
Protecting against break-ins and DoS
Software or hardware device that
Capture network activity data in log files
Analysis captured activities
Generate alarms in case of suspicious activities
38
Intrusion Detection System
Intrusion Detection System (IDS):
Protecting against break-ins and DoS
1.
4. Alarm Intrusion Suspicious
Detection Packet
System
Network
2. Suspicious
Administrator Internet
Packet Passed
Attacker
3. Log
Packet
Hardened
Server
Log File
Corporate Network
39
Other defense measures
Good Access Control policies
Strong passwords
Good access rights implementation for
resources (computer, folders, printers, etc.)
Good group policies
Installing patches for
Most
Operating systems important
Application software
40
Summary Questions (Part 3)
1. What do ping messages allow? Why are ping scans
often not effective?
2. What does social engineering mean?
3. What is meant by eavesdropping? Message
alteration?
4. What kind of techniques could be used to protect
against eavesdropping?
5. What is meant by DoS?
6. What kind of tools could be used to protect a
system against DoS?
41