The document discusses various types of malicious software including viruses, worms, and Trojan horses. It describes how viruses can infect files and spread, the different phases of viruses. It also covers worm propagation techniques, target discovery methods used by worms, and examples of Trojan horse models. The document provides terminology for different types of malware and classifications for viruses. It discusses mobile phone Trojans and potential adversaries and motivations for attacks.
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
9 views
Chapter 2
The document discusses various types of malicious software including viruses, worms, and Trojan horses. It describes how viruses can infect files and spread, the different phases of viruses. It also covers worm propagation techniques, target discovery methods used by worms, and examples of Trojan horse models. The document provides terminology for different types of malware and classifications for viruses. It discusses mobile phone Trojans and potential adversaries and motivations for attacks.
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 30
Ministry Of Higher Education 1
Paktia University Faculty of Computer Science
Chapter 2
SUB: NETWORK SECURITY
Malicious software(Malware) 2 Malicious software, or malware, arguably constitutes one of the most significant categories of threats to computer systems. malware as “a pro gram that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim’s data, applications, or operating system or otherwise annoying or disrupting the victim.” we are concerned with the threat malware poses to application programs, to utility programs, such as editors and compilers, and to kernel-level programs. We are also concerned with its use on compromised or malicious Web sites and servers, or in especially crafted spam e-mails or other messages, which aim to trick users into revealing sensitive personal information. Terminology for Malicious Software 3 Terminology for Malicious Software… 4 5 Viruses A computer virus is a piece of software that can “infect” other programs, or indeed any type of executable content, by modifying them. The modification includes injecting the original code with a routine to make copies of the virus code, which can then go on to infect other content. Computer viruses first appeared in the early 1980s, and the term itself is attributed to Fred Cohen. 6 Viruses… a computer virus carries in its instructional code the recipe for making perfect copies of itself. A virus that attaches to an executable program can do anything that the program is permitted to do. It executes secretly when the host program is run. Once the virus code is executing, it can perform any function, such as erasing files and programs, that is allowed by the privileges of the current user. 7 Virus parts Infection mechanism: The means by which a virus spreads or propagates, enabling it to replicate. The mechanism is also referred to as the infection vector. Trigger:The event or condition that determines when the payload is activated or delivered, sometimes known as a logic bomb. Payload: What the virus does, besides spreading. The payload may involve damage or may involve benign but noticeable activity. 8 Viruses Phases Dormant phase: The virus is idle. Propagation phase: The virus places a copy of itself into other programs or into certain system areas on the disk. Triggering phase: The virus is activated to perform the function for which it was intended. Execution phase: The function is performed. 9 Viruses classification A virus classification by target includes the following categories: Boot sector infector: Infects a master boot record or boot record and spreads when a system is booted from the disk containing the virus. File infector: Infects files that the operating system or shell consider to be executable. Macro virus: Infects files with macro or scripting code that is interpreted by an application. Multipartite virus: Infects files in multiple ways. Typically, the multipartite virus is capable of infecting multiple types of files, so 10 Viruses classification… A virus classification by concealment strategy includes the following categories: Encrypted virus: A form of virus that uses encryption to obscure it’s content. A portion of the virus creates a random encryption key and encrypts the remainder of the virus. Stealth virus: A form of virus explicitly designed to hide itself from detection by anti-virus software. Polymorphic virus: A form of virus that creates copies during replication that are functionally equivalent but have distinctly different bit patterns, in order to defeat programs that scan for viruses. Metamorphic virus: As with a polymorphic virus, a metamorphic virus 11 Worms Worm programs exploit software vulnerabilities in client or server programs to gain access to each new system. They can use network connections to spread from system to system. They can also spread through shared media. The concept of a computer worm was introduced in John Brunner’s 1975. The first known worm implementation was done in Xerox Palo Alto Labs in the early 1980s. 12 Worms… To replicate itself, a worm uses some means to access remote systems. Electronic mail or instant messenger facility: A worm e-mails a copy of itself to other systems, or sends itself as an attachment via an instant message service, so that its code is run when the e-mail or attachment is received or viewed. File sharing: A worm either creates a copy of itself or infects other suitable files as a virus on removable media such as a USB drivee; it then executes when the drive is connected to another system 13 Worms… Remote execution capability: A worm executes a copy of itself on another system, either by using an explicit remote execution facility Remote file access or transfer capability: A worm uses a remote file access or transfer service to another system to copy itself from one system to the other, where users on that system may then execute it. Remote login capability: A worm logs onto a remote system as a user and then uses commands to copy itself from one system to the other, where it then executes. Target Discovery(worm) 14
The first function in the propagation phase for a network worm is
for it to search for other systems to infect, a process known as scanning or fingerprinting. whichexploit software vulnerabilities in remotely accessible network services, it must identify potential systems running the vulnerable service, and then infect them. Then, typically, the worm code now installed on the infected machines repeats the same scanning process, until a large distributed network of infected machines is created. Target Discovery(worm)… 15 lists the following types of network address scanning strategies that such a worm can use: Random: Each compromised host probes random addresses in the IP address space, using a different seed. This technique produces a high volume of Internet traffic, which may cause generalized disruption even before the actual attack is launched. Hit-List: The attacker first compiles a long list of potential vulnerable machines. This can be a slow process done over a long period to avoid detection that an attack is underway. Target Discovery(worm)… 16 Topological: This method uses information contained on an infected victim machine to find more hosts to scan. Local subnet: If a host can be infected behind a firewall, that host then looks for targets in its own local network. The host uses the subnet address structure to find other hosts that would otherwise be protected by the firewall. 17 Trojan horses A Trojan horse is a useful, or apparently useful, program or utility containing hidden code that, when invoked, performs some unwanted or harmful function. Trojan horse programs can be used to accomplish functions indirectly that the attacker could not accomplish directly. 18 Trojan horses Model Continuing to perform the function of the original program and additionally performing a separate malicious activity. Continuing to perform the function of the original program but modifying the function to perform malicious activity Performing a malicious function that completely replaces the function of the original program. 19 Mobile Phone Trojans Mobile phone Trojans also first appeared in 2004 with the discovery of Skuller. Trojans targeted Symbian phones. More recently, a significant number of Trojans have been detected that target Android phones and Apple iPhones. These Trojans are usually distributed via one or more of the app marketplaces for the target phone O/S. Adversaries 20 To defend against attacks on information and information systems, organizations must begin to define the threat by identifying potential adversaries. These adversaries can include the following: Nation or states Terrorists Criminals Hackers Corporate competitors Disgruntled employees Motivation 21 To defend against attacks on information and information systems, organizations must define the threat in terms of motivation. Motivations can include: intelligence gathering theft of intellectual property denial of service (DoS) embarrassment of the company or clients pride in exploiting a notable target. Attack Methods 22 Attack Methods… 23 IP spoofing Attack 24 The prime goal of an IP spoofing attack is to establish a connection that allows the attacker to gain root access to the host and to create a backdoor entry path into the target system. IP spoofing is a technique used to gain unauthorized access to computers whereby the intruder sends messages to a computer with an IP address that indicates the message is coming from a trusted host. IP spoofing can also provide access to user accounts and passwords. IP spoofing Attack 25 The prime goal of an IP spoofing attack is to establish a connection that allows the attacker to gain root access to the host and to create a backdoor entry path into the target system. IP spoofing is a technique used to gain unauthorized access to computers whereby the intruder sends messages to a computer with an IP address that indicates the message is coming from a trusted host. IP spoofing can also provide access to user accounts and passwords. Technical Discussion on IP Spoofing 26 The client selects and transmits an initial sequence number. The server acknowledges the initial sequence number and sends its own sequence number. The client acknowledges the server sequence number, and the connection is open to data transmission. Man-in-the-Middle Attacks 27 A complex form of IP spoofing is called man-in-the-middle attack, where the hacker monitors the traffic and introduces himself as a stealth intermediary between the sender and the receiver. Hackers use man-in-the-middle attacks to perform many security violations: Theft of information Hijacking of an ongoing session to gain access to your internal network resources Analysis of traffic to derive information about your network and its users DoS Corruption of transmitted data Confidentiality Attack 28 Confidentiality breaches can occur when an attacker attempts to obtain access to read sensitive data. These attacks can be extremely difficult to detect because the attacker can copy sensitive data without the knowledge of the owner and without leaving a trace. A confidentiality breach can occur simply because of incorrect file protections. For instance, a sensitive file could mistakenly be given global read-access. Unauthorized copy ing or examination of the file would probably be difficult to track without having some type of audit mechanism running that logs every file operation. Confidentiality Attack 29 If a user had no reason to suspect unwanted access, however, the audit file would probably never be examined. Confidentiality Attack Methods 30 Packet sniffing Port scanning Dumpsite Diving Emanation Capturing Wiretapping Social Engineering Overt Channel Covert Channel