Top Banner
Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown
32

Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.

Jan 01, 2016

Download

Documents

Pierce Wright
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.

Fourth Editionby William Stallings

Adapted form lecture slides by Lawrie Brown

Page 2: Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.

Chapter 19 – Malicious SoftwareWhat is the concept of defense: The parrying of

a blow. What is its characteristic feature: Awaiting the blow.—On War, Carl Von Clausewitz

Page 3: Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.

Viruses and Other Malicious Contentcomputer viruses have got a lot of publicity one of a family of malicious software effects usually obvious have figured in news reports, fiction, movies

(often exaggerated) getting more attention than deserve are a concern though

Page 4: Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.

Malicious ProgramsLack of universal terminologyMalicious software can be divided into two

categoriesDependent software

Program fragments which require some application program, utility, or system program

Viruses, Logic Bombs, Backdoors, etcIndependent software

Self-contained programs run by the OSWorms, zombies, etc

Page 5: Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.

Malicious Software

Page 6: Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.

Terminology of Malicious Programs

Page 7: Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.

Backdoor or Trapdoorsecret entry point into a programallows those who know access bypassing

usual security procedureshave been commonly used by developersa threat when left in production programs

allowing exploited by attackersvery hard to block in O/Srequires good s/w development & update

Page 8: Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.

Logic Bombone of oldest types of malicious softwarecode embedded in legitimate programactivated when specified conditions met

eg presence/absence of some fileparticular date/timeparticular user

when triggered typically damage systemmodify/delete files/disks, halt machine, etc

Page 9: Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.

Trojan Horseprogram with hidden side-effects which is usually superficially attractive

eg game, s/w upgrade etc when run performs some additional tasks

allows attacker to indirectly gain access they do not have directly

often used to propagate a virus/worm or install a backdoor

or simply to destroy data

Page 10: Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.

Zombieprogram which secretly takes over another

networked computerthen uses it to indirectly launch attacksoften used to launch distributed denial of

service (DDoS) attacksexploits known flaws in network systems

Page 11: Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.

Viruses

Page 12: Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.

Virusesa piece of self-replicating code attached to

some other codecf biological virus

both propagates itself & carries a payloadcarries code to make copies of itselfas well as code to perform some covert task

Page 13: Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.

Virus Operationvirus phases:

dormant – waiting on trigger eventpropagation – replicating to programs/diskstriggering – by event to execute payloadexecution – of payload

details usually machine/OS specificexploiting features/weaknesses

Page 14: Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.

Virus Structureprogram V :=

{goto main;1234567;subroutine infect-executable := {loop:

file := get-random-executable-file;if (first-line-of-file = 1234567) then goto loopelse prepend V to file; }

subroutine do-damage := {whatever damage is to be done}subroutine trigger-pulled := {return true if condition holds}main: main-program :={infect-executable;

if trigger-pulled then do-damage;goto next;}

next:}

Page 15: Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.

Types of Viruses

can classify on basis of how they attack parasitic virusmemory-resident virusboot sector virus stealthpolymorphic virus metamorphic virus

Page 16: Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.

Macro Virusmacro code attached to some data file interpreted by program using file

eg Word/Excel macrosesp. using auto command & command macros

code is now platform independent is a major source of new viral infectionsblur distinction between data and program

filesclassic trade-off: "ease of use" vs "security”have improving security in Word etc are no longer dominant virus threat

Page 17: Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.

Email Virusspread using email with attachment

containing a macro viruscf Melissa

triggered when user opens attachmentor worse even when mail viewed by using

scripting features in mail agenthence propagate very quicklyusually targeted at Microsoft Outlook mail

agent & Word/Excel documentsneed better O/S & application security

Page 18: Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.

Wormsreplicating but not infecting program typically spreads over a network

cf Morris Internet Worm in 1988led to creation of CERTs

using users distributed privileges or by exploiting system vulnerabilities

widely used by hackers to create zombie PC's, subsequently used for further attacks, esp DoS

major issue is lack of security of permanently connected systems, esp PC's

Page 19: Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.

Worm Operationworm phases like those of viruses:

dormantpropagation

search for other systems to infect establish connection to target remote system replicate self onto remote system

triggeringexecution

Page 20: Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.

Morris Wormbest known classic wormreleased by Robert Morris in 1988targeted Unix systemsusing several propagation techniques

simple password cracking of local pw fileexploit bug in finger daemonexploit debug trapdoor in sendmail daemon

if any attack succeeds then replicated self

Page 21: Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.

Recent Worm Attacksnew spate of attacks from mid-2001Code Red - used MS IIS bug

probes random IPs for systems running IIShad trigger time for denial-of-service attack2nd wave infected 360000 servers in 14 hours

Code Red 2 - installed backdoor Nimda - multiple infection mechanismsSQL Slammer - attacked MS SQL serverSobig.f - attacked open proxy serversMydoom - mass email worm + backdoor

Page 22: Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.

Worm Techologymultiplatformmultiexploitultrafast spreadingpolymorphicmetamorphictransport vehicleszero-day exploit

Page 23: Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.

Virus Countermeasuresbest countermeasure is preventionbut in general not possible hence need to do one or more of:

detection - of viruses in infected system identification - of specific infecting virusremoveal - restoring system to clean state

Page 24: Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.

Anti-Virus Softwarefirst-generation

scanner uses virus signature to identify virusor change in length of programs

second-generation uses heuristic rules to spot viral infectionor uses crypto hash of program to spot changes

third-generation memory-resident programs identify virus by

actions fourth-generation

packages with a variety of antivirus techniqueseg scanning & activity traps, access-controls

arms race continues

Page 25: Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.

Advanced Anti-Virus Techniquesgeneric decryption

use CPU simulator to check program signature & behavior before actually running it

digital immune system (IBM)general purpose emulation & virus detectionany virus entering org is captured, analyzed,

detection/shielding created for it, removed

Page 26: Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.

Digital Immune System

Page 27: Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.

Behavior-Blocking Softwareintegrated with host O/Smonitors program behavior in real-time

eg file access, disk format, executable mods, system settings changes, network access

for possibly malicious actionsif detected can block, terminate, or seek ok

has advantage over scannersbut malicious code runs before detection

Page 28: Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.

Distributed Denial of Service Attacks (DDoS)

Distributed Denial of Service (DDoS) attacks form a significant security threat

making networked systems unavailableby flooding with useless trafficusing large numbers of “zombies” growing sophistication of attacksdefense technologies struggling to cope

Page 29: Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.

Distributed Denial of Service Attacks (DDoS)

Page 30: Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.

Contructing the DDoS Attack Network

must infect large number of zombies needs:1. software to implement the DDoS attack2. an unpatched vulnerability on many

systems3. scanning strategy to find vulnerable

systems random, hit-list, topological, local subnet

Page 31: Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.

DDoS Countermeasures three broad lines of defense:

1. attack prevention & preemption (before)2. attack detection & filtering (during)3. attack source traceback & ident (after)

huge range of attack possibilities hence evolving countermeasures

Page 32: Fourth Edition by William Stallings Adapted form lecture slides by Lawrie Brown.

Summaryhave considered:

various malicious programstrapdoor, logic bomb, trojan horse, zombieviruseswormscountermeasuresdistributed denial of service attacks