SlideShare a Scribd company logo
1 of 22
Information SystemsInformation Systems
SecuritySecurity
Lecture 9Lecture 9
Malicious Software, Intrusion Detection,Malicious Software, Intrusion Detection,
and Firewallsand Firewalls
22
OutlineOutline
1.1. Malicious codeMalicious code
2.2. Trojan horsesTrojan horses
3.3. VirusesViruses
4.4. WormsWorms
5.5. Other malicious codesOther malicious codes
6.6. CountermeasuresCountermeasures
7.7. Intrusion DetectionIntrusion Detection
8.8. FirewallsFirewalls
33
What is Malicious Code?What is Malicious Code?
 Any code which:Any code which:
– Modifies or destroys dataModifies or destroys data
– Steals dataSteals data
– Allows unauthorized accessAllows unauthorized access
– Exploits or damages a systemExploits or damages a system
– Does something user did not intend to doDoes something user did not intend to do
 Malware is a MALicious softWAREMalware is a MALicious softWARE
 Malware can be any things: viruses, worms, trojan horses, etc.Malware can be any things: viruses, worms, trojan horses, etc.
44
Trojan HorseTrojan Horse
 A Trojan horse is a program that appears to be useful orA Trojan horse is a program that appears to be useful or
harmless but that contains hidden code designed to exploit orharmless but that contains hidden code designed to exploit or
damage the system on which it is run.damage the system on which it is run.
 Originally Trojan horses were not designed to spreadOriginally Trojan horses were not designed to spread
themselves.themselves.
 A Trojan horse tricks user into executing malicious code.A Trojan horse tricks user into executing malicious code.
 Examples:Examples:
– A simple example of a Trojan Horse would be a program namedA simple example of a Trojan Horse would be a program named
“Bush.EXE" that is posted on a website with a promise to be a fun“Bush.EXE" that is posted on a website with a promise to be a fun
animation.animation.
– On the Microsoft Windows platform, an attacker might attach a TrojanOn the Microsoft Windows platform, an attacker might attach a Trojan
horse with an innocent-looking filename to an email message whichhorse with an innocent-looking filename to an email message which
entices the recipient into opening the file.entices the recipient into opening the file.
– Phish-BuyPhone (1/7/2007).Phish-BuyPhone (1/7/2007).
55
66
77
VirusVirus
 A virus uses code written with the express intention ofA virus uses code written with the express intention of
replicating itself.replicating itself.
 A virus attempts to spread from computer to computer byA virus attempts to spread from computer to computer by
attaching itself to a host program.attaching itself to a host program.
 It may damage hardware, software, or data. When the host isIt may damage hardware, software, or data. When the host is
executed, the virus code also runs, infecting new hosts andexecuted, the virus code also runs, infecting new hosts and
sometimes delivering an additional malicious actions.sometimes delivering an additional malicious actions.
 Example:Example:
– Melissa: MacrovirusMelissa: Macrovirus
88
Virus structureVirus structure
Program V:=
{goto main;
1234567;
subroutine infect-executable :=
{loop:
file := get-random-executable-file;
if (first-line-of-file = 1234567)
then goto loop
else prepend V to file;
subroutine do-damage :=
{what ever damage to be done}
subroutine trigger-pulled :=
{return true if some condition
holds}
Main: main-program :=
{infect-executable;
if trigger-pulled then do-damage;
goto next;}
next:
}
 (on right) A virus structure
that is prepended to infected
programs
 Type of this virus: File
virus.
 A virus can be prepended orA virus can be prepended or
postpended to an executablepostpended to an executable
programprogram
 When an infected programWhen an infected program
(containing a virus) is invoked,(containing a virus) is invoked,
will first execute the virus codewill first execute the virus code
then execute the original code tothen execute the original code to
the programthe program..
99
Types of virusesTypes of viruses
1.1. File virus, also called parasitic virus.File virus, also called parasitic virus.
2.2. Boot sector infectors: Infects a master boot record or boot record andBoot sector infectors: Infects a master boot record or boot record and
spreads when a system is booted from the disk containing the virus.spreads when a system is booted from the disk containing the virus.
3.3. Macro virus: infects macro programming environment (e.g., MicrosoftMacro virus: infects macro programming environment (e.g., Microsoft
office application such as Word) rather than specific operating systems .office application such as Word) rather than specific operating systems .
– A macro is a an executable program embedded in a word processing documentA macro is a an executable program embedded in a word processing document
or other types of files.or other types of files.
– A macros is an executable file that can modify commands within the applicationA macros is an executable file that can modify commands within the application
menu.menu.
– Macro virus infects data files rather than executable files.Macro virus infects data files rather than executable files.
1.1. Stealth virus: a form of virus explicitly designed to hide itself fromStealth virus: a form of virus explicitly designed to hide itself from
detection by antivirus softwares.detection by antivirus softwares.
2.2. Polymorphic virus: a virus that mutates with every infection, making itsPolymorphic virus: a virus that mutates with every infection, making its
detection impossible.detection impossible.
3.3. ……
1010
WormsWorms
 A worm uses self-propagating malicious code that canA worm uses self-propagating malicious code that can
automatically distribute itself from one computer to anotherautomatically distribute itself from one computer to another
through network connections.through network connections.
– i.e.i.e., Worms can execute and spread without user intervention., Worms can execute and spread without user intervention.
 A worm can take harmful actions, such as:A worm can take harmful actions, such as:
– consuming network or local system resourcesconsuming network or local system resources
– causing a denial of service attack.causing a denial of service attack.
– deleting data, spying users, …deleting data, spying users, …
1111
WormsWorms
 By denition, a worm is supposed to hop from machine to
machine on its own, it needs to come equipped with considerable
networking support.
 With regard to autonomous network hopping, the important
question to raise is: What does it mean for a program to hop
from machine to machine?
 A program may hop from one machine to another by a variety of
means:
– By using the remote shell facilities, as provided by rsh and rexec in Unix,
to execute a command on the remote machine.
– By cracking the passwords and logging in as a regular user on a remote
machine.
 Example: The Slammer Worm (online info)
1212
Other malwaresOther malwares
 Trap door: a secret entry point into a program that allowsTrap door: a secret entry point into a program that allows
someone that is aware of the trapdoor to gain access withoutsomeone that is aware of the trapdoor to gain access without
going through the usual security procedures.going through the usual security procedures.
 Logic bomb: is a code embedded in some legitimate programLogic bomb: is a code embedded in some legitimate program
that is set to explode when certain conditions are met (time, orthat is set to explode when certain conditions are met (time, or
data).data).
 Zombie: is a program that secretly takes over another Internet-Zombie: is a program that secretly takes over another Internet-
attached computer and then uses this computer to launch attacksattached computer and then uses this computer to launch attacks
1313
Other malwaresOther malwares
 What is not malware?What is not malware?
– Spyware (also calledSpyware (also called spybotspybot oror tracking software)tracking software). programs that conduct. programs that conduct
certain activities (collecting personal information) on a computer withoutcertain activities (collecting personal information) on a computer without
obtaining appropriate consent from the user.obtaining appropriate consent from the user.
– Adware:Adware: pop-up advertisementspop-up advertisements
– Spam: is unsolicited e-mail generated to advertise some service orSpam: is unsolicited e-mail generated to advertise some service or
productproduct
– Scams: An e-mail message that attempts to trick the recipient intoScams: An e-mail message that attempts to trick the recipient into
revealing personal information that can be used for unlawful purposesrevealing personal information that can be used for unlawful purposes
1414
Virus countermeasuresVirus countermeasures
 The antivirus approach: the ideal solution to the threat of virusesThe antivirus approach: the ideal solution to the threat of viruses
is prevention:is prevention:
– Don’t allow malware to get into the systemDon’t allow malware to get into the system
 This is difficult (even impossible) to achieveThis is difficult (even impossible) to achieve
 Follow the following approach:Follow the following approach:
– Detection: once the infection has occurred, locate the virus.Detection: once the infection has occurred, locate the virus.
– Identification: identify the specific virus that has infected a program.Identification: identify the specific virus that has infected a program.
– Removal: remove all traces of the virus from the infected program andRemoval: remove all traces of the virus from the infected program and
restore it to its original state.restore it to its original state.
 Follow Virus Alert’s website: (eg, next slide)Follow Virus Alert’s website: (eg, next slide)
 Example:Example:
– The Windows case (the antivirus Defense-in-Depth Guide, Ch4)The Windows case (the antivirus Defense-in-Depth Guide, Ch4)
1515
1616
Windows’s antivirus Defense-Windows’s antivirus Defense-
in-Depth Guidein-Depth Guide
1.1. Active processes and servicesActive processes and services
– Task Manager, Ps Tools, Process ExplorerTask Manager, Ps Tools, Process Explorer
1.1. The local registryThe local registry
– Regedit (the registry editor)Regedit (the registry editor)
1.1. Files in the Microsoft Windows system folders.Files in the Microsoft Windows system folders.
– Use the “Windows Search”Use the “Windows Search”
1.1. New user or group accounts, especially with AdministratorNew user or group accounts, especially with Administrator
privilegesprivileges
2.2. Shared folders (including hidden folders).Shared folders (including hidden folders).
3.3. Newly created files with normal looking file names but inNewly created files with normal looking file names but in
unusual locationsunusual locations
4.4. Opened network portsOpened network ports
– Netstat, FPortNetstat, FPort
1717
Intrusion Detection
1818
Intrusion detectionIntrusion detection
 Viruses and intrusion are the most publicized threats to systemViruses and intrusion are the most publicized threats to system
securitysecurity
 Intrusion: illegally gaining access to systemsIntrusion: illegally gaining access to systems
 Intrusion techniques: acquiring protected information (often userIntrusion techniques: acquiring protected information (often user
passwords)passwords)
– Passwords are associated with users in filesPasswords are associated with users in files
 Password files must be protectedPassword files must be protected
 Countermeasures: prevention and detectionCountermeasures: prevention and detection
– If intrusion prevention fails,If intrusion prevention fails,
– Intrusion detection is the real defense line.Intrusion detection is the real defense line.
1919
Intrusion detectionIntrusion detection
 Intrusion detection is based on the assumption that the behaviorIntrusion detection is based on the assumption that the behavior
of the intruder differs from that of a legitimate user in ways thatof the intruder differs from that of a legitimate user in ways that
can be quantified.can be quantified.
 Intrusion detection approaches:Intrusion detection approaches:
– Statistical anomaly detectionStatistical anomaly detection
– Rule-based detectionRule-based detection
 Audit Records: is a fundamental tool for intrusion detectionAudit Records: is a fundamental tool for intrusion detection
– A detection record may contain subject (user, process), action (login,A detection record may contain subject (user, process), action (login,
read, write), object (files, programs), resource usage, timestampread, write), object (files, programs), resource usage, timestamp
 Examples of IDS:Examples of IDS:
– Cisco’s Secure IDSCisco’s Secure IDS
– ISS RealSecureISS RealSecure
– SnortSnort
2020
Firewall
2121
FirewallFirewall
 A firewall is any device used as a network-level access controlA firewall is any device used as a network-level access control
mechanism for a particular network or a set of networksmechanism for a particular network or a set of networks
– Firewall is used to prevent outsiders from accessing an internal network.Firewall is used to prevent outsiders from accessing an internal network.
 Firewalls may be stand-alone computers, routers, or firewallFirewalls may be stand-alone computers, routers, or firewall
appliances (sometimes with their own OS)appliances (sometimes with their own OS)
 They serve as control points to and from networksThey serve as control points to and from networks
 They check whether or not network traffic should be allowedThey check whether or not network traffic should be allowed
according to sets of rules or policies.according to sets of rules or policies.
 Pitfalls: slowing data transmission, impairing networkingPitfalls: slowing data transmission, impairing networking
2222
Types of firewallsTypes of firewalls
 Packet filtering routersPacket filtering routers
 Stateful-inspection firewallsStateful-inspection firewalls
 Application-level gateway (also called proxy server)Application-level gateway (also called proxy server)
 Circuit-level gatewayCircuit-level gateway
 Examples:Examples:
– CheckPoint’s Firewall-1: Stateful-inspection-basedCheckPoint’s Firewall-1: Stateful-inspection-based
– Cisco’s PIX:stateful packet filter-basedCisco’s PIX:stateful packet filter-based
– Border’s FireWall Server: Proxy-basedBorder’s FireWall Server: Proxy-based
– Tiny Software’s Tiny Personal Firewall: Packet filter-basedTiny Software’s Tiny Personal Firewall: Packet filter-based

More Related Content

What's hot

Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remediesManish Kumar
 
Malicious software
Malicious softwareMalicious software
Malicious softwaremsdeepika
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Malicious Software and Virus
Malicious Software and Virus Malicious Software and Virus
Malicious Software and Virus Tasif Tanzim
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptOsama Yousaf
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To MalwaresCyber Vignan
 
Malicious software
Malicious softwareMalicious software
Malicious softwareCAS
 
5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malwaredrewz lin
 
Remote File Inclusion
Remote File InclusionRemote File Inclusion
Remote File InclusionImperva
 
Computer viruses
Computer virusesComputer viruses
Computer virusesMDAZAD53
 

What's hot (20)

Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
Malicious
MaliciousMalicious
Malicious
 
Malewareanalysis
Malewareanalysis Malewareanalysis
Malewareanalysis
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Malicious Software and Virus
Malicious Software and Virus Malicious Software and Virus
Malicious Software and Virus
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Logic bomb virus
Logic bomb virusLogic bomb virus
Logic bomb virus
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
Computer virus
Computer virusComputer virus
Computer virus
 
Codigo Malicioso
Codigo MaliciosoCodigo Malicioso
Codigo Malicioso
 
Computer virus 2
Computer virus 2Computer virus 2
Computer virus 2
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
5 worms and other malware
5   worms and other malware5   worms and other malware
5 worms and other malware
 
Remote File Inclusion
Remote File InclusionRemote File Inclusion
Remote File Inclusion
 
Viruses notes1
Viruses notes1Viruses notes1
Viruses notes1
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 

Viewers also liked

Anonymous Connections And Onion Routing
Anonymous Connections And Onion RoutingAnonymous Connections And Onion Routing
Anonymous Connections And Onion RoutingAli Habeeb
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)Ali Habeeb
 
Opinion Mining
Opinion MiningOpinion Mining
Opinion MiningAli Habeeb
 
Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Ali Habeeb
 
Adhoc and Sensor Networks - Chapter 05
Adhoc and Sensor Networks - Chapter 05Adhoc and Sensor Networks - Chapter 05
Adhoc and Sensor Networks - Chapter 05Ali Habeeb
 
Adhoc and Sensor Networks - Chapter 08
Adhoc and Sensor Networks - Chapter 08Adhoc and Sensor Networks - Chapter 08
Adhoc and Sensor Networks - Chapter 08Ali Habeeb
 
Exam II Review Session Information Security 365/765
Exam II Review Session Information Security 365/765Exam II Review Session Information Security 365/765
Exam II Review Session Information Security 365/765Nicholas Davis
 
Demystifying Professional Certifications
Demystifying Professional CertificationsDemystifying Professional Certifications
Demystifying Professional CertificationsNicholas Davis
 
Iss letcure 7_8
Iss letcure 7_8Iss letcure 7_8
Iss letcure 7_8Ali Habeeb
 
Word numeração de_páginas
Word numeração de_páginasWord numeração de_páginas
Word numeração de_páginasClausia Antoneli
 
Cyberwarfare focusing on higher education as a prime target
Cyberwarfare focusing on higher education as a prime targetCyberwarfare focusing on higher education as a prime target
Cyberwarfare focusing on higher education as a prime targetNicholas Davis
 
Seg da Informação e Comp Movel Novos Desafios
Seg da Informação e Comp Movel Novos DesafiosSeg da Informação e Comp Movel Novos Desafios
Seg da Informação e Comp Movel Novos DesafiosGilberto Sudre
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...Nicholas Davis
 

Viewers also liked (20)

Iss lecture 1
Iss lecture 1Iss lecture 1
Iss lecture 1
 
Iss lecture 5
Iss lecture 5Iss lecture 5
Iss lecture 5
 
Iss lecture 6
Iss lecture 6Iss lecture 6
Iss lecture 6
 
Anonymous Connections And Onion Routing
Anonymous Connections And Onion RoutingAnonymous Connections And Onion Routing
Anonymous Connections And Onion Routing
 
Iss lecture 4
Iss lecture 4Iss lecture 4
Iss lecture 4
 
Iss lecture 3
Iss lecture 3Iss lecture 3
Iss lecture 3
 
Iss lecture 2
Iss lecture 2Iss lecture 2
Iss lecture 2
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)
 
Opinion Mining
Opinion MiningOpinion Mining
Opinion Mining
 
Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03Adhoc and Sensor Networks - Chapter 03
Adhoc and Sensor Networks - Chapter 03
 
Adhoc and Sensor Networks - Chapter 05
Adhoc and Sensor Networks - Chapter 05Adhoc and Sensor Networks - Chapter 05
Adhoc and Sensor Networks - Chapter 05
 
Adhoc and Sensor Networks - Chapter 08
Adhoc and Sensor Networks - Chapter 08Adhoc and Sensor Networks - Chapter 08
Adhoc and Sensor Networks - Chapter 08
 
Exam II Review Session Information Security 365/765
Exam II Review Session Information Security 365/765Exam II Review Session Information Security 365/765
Exam II Review Session Information Security 365/765
 
Demystifying Professional Certifications
Demystifying Professional CertificationsDemystifying Professional Certifications
Demystifying Professional Certifications
 
Iss letcure 7_8
Iss letcure 7_8Iss letcure 7_8
Iss letcure 7_8
 
Word numeração de_páginas
Word numeração de_páginasWord numeração de_páginas
Word numeração de_páginas
 
Cyberwarfare focusing on higher education as a prime target
Cyberwarfare focusing on higher education as a prime targetCyberwarfare focusing on higher education as a prime target
Cyberwarfare focusing on higher education as a prime target
 
Seg da Informação e Comp Movel Novos Desafios
Seg da Informação e Comp Movel Novos DesafiosSeg da Informação e Comp Movel Novos Desafios
Seg da Informação e Comp Movel Novos Desafios
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
 
The Deep Hidden Web
The Deep Hidden WebThe Deep Hidden Web
The Deep Hidden Web
 

Similar to Iss lecture 9

PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws descriptionranaanish11062001
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2Saud G
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
Viruses ppt finale
Viruses ppt  finaleViruses ppt  finale
Viruses ppt finalemishrasb4
 
Presentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxPresentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxitsamuamit11
 
Computer viruses
Computer virusesComputer viruses
Computer virusesDark Side
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-MalwareArpit Mittal
 
malwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfmalwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfitsamuamit11
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptxPragatiKachhi1
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antivirusesSanguine_Eva
 

Similar to Iss lecture 9 (20)

PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Virus
VirusVirus
Virus
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Viruses ppt finale
Viruses ppt  finaleViruses ppt  finale
Viruses ppt finale
 
Presentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxPresentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptx
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
virus
virusvirus
virus
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
malwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfmalwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdf
 
Ch19
Ch19Ch19
Ch19
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Cybercrime: Virus and Defense
Cybercrime: Virus and DefenseCybercrime: Virus and Defense
Cybercrime: Virus and Defense
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
DISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptxDISHA PATEL COMPUTER VIRUS PPT.pptx
DISHA PATEL COMPUTER VIRUS PPT.pptx
 
Malware
MalwareMalware
Malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer viruses and antiviruses
Computer viruses and antivirusesComputer viruses and antiviruses
Computer viruses and antiviruses
 

More from Ali Habeeb

Cloud Security
Cloud SecurityCloud Security
Cloud SecurityAli Habeeb
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyAli Habeeb
 
Secure erasure code based distributed storage system with secure data forwarding
Secure erasure code based distributed storage system with secure data forwardingSecure erasure code based distributed storage system with secure data forwarding
Secure erasure code based distributed storage system with secure data forwardingAli Habeeb
 
Organizing User Search Histories
Organizing User Search HistoriesOrganizing User Search Histories
Organizing User Search HistoriesAli Habeeb
 
Detecting and Resolving Firewall Policy Anomalies
Detecting and Resolving Firewall Policy AnomaliesDetecting and Resolving Firewall Policy Anomalies
Detecting and Resolving Firewall Policy AnomaliesAli Habeeb
 
Bit Torrent Protocol
Bit Torrent ProtocolBit Torrent Protocol
Bit Torrent ProtocolAli Habeeb
 
A study of Data Quality and Analytics
A study of Data Quality and AnalyticsA study of Data Quality and Analytics
A study of Data Quality and AnalyticsAli Habeeb
 
Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10Ali Habeeb
 
Adhoc and Sensor Networks - Chapter 09
Adhoc and Sensor Networks - Chapter 09Adhoc and Sensor Networks - Chapter 09
Adhoc and Sensor Networks - Chapter 09Ali Habeeb
 
Adhoc and Sensor Networks - Chapter 07
Adhoc and Sensor Networks - Chapter 07Adhoc and Sensor Networks - Chapter 07
Adhoc and Sensor Networks - Chapter 07Ali Habeeb
 
Adhoc and Sensor Networks - Chapter 06
Adhoc and Sensor Networks - Chapter 06Adhoc and Sensor Networks - Chapter 06
Adhoc and Sensor Networks - Chapter 06Ali Habeeb
 
Adhoc and Sensor Networks - Chapter 04
Adhoc and Sensor Networks - Chapter 04Adhoc and Sensor Networks - Chapter 04
Adhoc and Sensor Networks - Chapter 04Ali Habeeb
 
Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02Ali Habeeb
 
Adhoc and Sensor Networks - Chapter 11
Adhoc and Sensor Networks - Chapter 11Adhoc and Sensor Networks - Chapter 11
Adhoc and Sensor Networks - Chapter 11Ali Habeeb
 

More from Ali Habeeb (18)

WAP
WAPWAP
WAP
 
USB 3.0
USB 3.0USB 3.0
USB 3.0
 
Blue Eyes
Blue EyesBlue Eyes
Blue Eyes
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
 
Web Security
Web SecurityWeb Security
Web Security
 
Secure erasure code based distributed storage system with secure data forwarding
Secure erasure code based distributed storage system with secure data forwardingSecure erasure code based distributed storage system with secure data forwarding
Secure erasure code based distributed storage system with secure data forwarding
 
Organizing User Search Histories
Organizing User Search HistoriesOrganizing User Search Histories
Organizing User Search Histories
 
Detecting and Resolving Firewall Policy Anomalies
Detecting and Resolving Firewall Policy AnomaliesDetecting and Resolving Firewall Policy Anomalies
Detecting and Resolving Firewall Policy Anomalies
 
Bit Torrent Protocol
Bit Torrent ProtocolBit Torrent Protocol
Bit Torrent Protocol
 
A study of Data Quality and Analytics
A study of Data Quality and AnalyticsA study of Data Quality and Analytics
A study of Data Quality and Analytics
 
Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10Adhoc and Sensor Networks - Chapter 10
Adhoc and Sensor Networks - Chapter 10
 
Adhoc and Sensor Networks - Chapter 09
Adhoc and Sensor Networks - Chapter 09Adhoc and Sensor Networks - Chapter 09
Adhoc and Sensor Networks - Chapter 09
 
Adhoc and Sensor Networks - Chapter 07
Adhoc and Sensor Networks - Chapter 07Adhoc and Sensor Networks - Chapter 07
Adhoc and Sensor Networks - Chapter 07
 
Adhoc and Sensor Networks - Chapter 06
Adhoc and Sensor Networks - Chapter 06Adhoc and Sensor Networks - Chapter 06
Adhoc and Sensor Networks - Chapter 06
 
Adhoc and Sensor Networks - Chapter 04
Adhoc and Sensor Networks - Chapter 04Adhoc and Sensor Networks - Chapter 04
Adhoc and Sensor Networks - Chapter 04
 
Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02
 
Adhoc and Sensor Networks - Chapter 11
Adhoc and Sensor Networks - Chapter 11Adhoc and Sensor Networks - Chapter 11
Adhoc and Sensor Networks - Chapter 11
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Iss lecture 9

  • 1. Information SystemsInformation Systems SecuritySecurity Lecture 9Lecture 9 Malicious Software, Intrusion Detection,Malicious Software, Intrusion Detection, and Firewallsand Firewalls
  • 2. 22 OutlineOutline 1.1. Malicious codeMalicious code 2.2. Trojan horsesTrojan horses 3.3. VirusesViruses 4.4. WormsWorms 5.5. Other malicious codesOther malicious codes 6.6. CountermeasuresCountermeasures 7.7. Intrusion DetectionIntrusion Detection 8.8. FirewallsFirewalls
  • 3. 33 What is Malicious Code?What is Malicious Code?  Any code which:Any code which: – Modifies or destroys dataModifies or destroys data – Steals dataSteals data – Allows unauthorized accessAllows unauthorized access – Exploits or damages a systemExploits or damages a system – Does something user did not intend to doDoes something user did not intend to do  Malware is a MALicious softWAREMalware is a MALicious softWARE  Malware can be any things: viruses, worms, trojan horses, etc.Malware can be any things: viruses, worms, trojan horses, etc.
  • 4. 44 Trojan HorseTrojan Horse  A Trojan horse is a program that appears to be useful orA Trojan horse is a program that appears to be useful or harmless but that contains hidden code designed to exploit orharmless but that contains hidden code designed to exploit or damage the system on which it is run.damage the system on which it is run.  Originally Trojan horses were not designed to spreadOriginally Trojan horses were not designed to spread themselves.themselves.  A Trojan horse tricks user into executing malicious code.A Trojan horse tricks user into executing malicious code.  Examples:Examples: – A simple example of a Trojan Horse would be a program namedA simple example of a Trojan Horse would be a program named “Bush.EXE" that is posted on a website with a promise to be a fun“Bush.EXE" that is posted on a website with a promise to be a fun animation.animation. – On the Microsoft Windows platform, an attacker might attach a TrojanOn the Microsoft Windows platform, an attacker might attach a Trojan horse with an innocent-looking filename to an email message whichhorse with an innocent-looking filename to an email message which entices the recipient into opening the file.entices the recipient into opening the file. – Phish-BuyPhone (1/7/2007).Phish-BuyPhone (1/7/2007).
  • 5. 55
  • 6. 66
  • 7. 77 VirusVirus  A virus uses code written with the express intention ofA virus uses code written with the express intention of replicating itself.replicating itself.  A virus attempts to spread from computer to computer byA virus attempts to spread from computer to computer by attaching itself to a host program.attaching itself to a host program.  It may damage hardware, software, or data. When the host isIt may damage hardware, software, or data. When the host is executed, the virus code also runs, infecting new hosts andexecuted, the virus code also runs, infecting new hosts and sometimes delivering an additional malicious actions.sometimes delivering an additional malicious actions.  Example:Example: – Melissa: MacrovirusMelissa: Macrovirus
  • 8. 88 Virus structureVirus structure Program V:= {goto main; 1234567; subroutine infect-executable := {loop: file := get-random-executable-file; if (first-line-of-file = 1234567) then goto loop else prepend V to file; subroutine do-damage := {what ever damage to be done} subroutine trigger-pulled := {return true if some condition holds} Main: main-program := {infect-executable; if trigger-pulled then do-damage; goto next;} next: }  (on right) A virus structure that is prepended to infected programs  Type of this virus: File virus.  A virus can be prepended orA virus can be prepended or postpended to an executablepostpended to an executable programprogram  When an infected programWhen an infected program (containing a virus) is invoked,(containing a virus) is invoked, will first execute the virus codewill first execute the virus code then execute the original code tothen execute the original code to the programthe program..
  • 9. 99 Types of virusesTypes of viruses 1.1. File virus, also called parasitic virus.File virus, also called parasitic virus. 2.2. Boot sector infectors: Infects a master boot record or boot record andBoot sector infectors: Infects a master boot record or boot record and spreads when a system is booted from the disk containing the virus.spreads when a system is booted from the disk containing the virus. 3.3. Macro virus: infects macro programming environment (e.g., MicrosoftMacro virus: infects macro programming environment (e.g., Microsoft office application such as Word) rather than specific operating systems .office application such as Word) rather than specific operating systems . – A macro is a an executable program embedded in a word processing documentA macro is a an executable program embedded in a word processing document or other types of files.or other types of files. – A macros is an executable file that can modify commands within the applicationA macros is an executable file that can modify commands within the application menu.menu. – Macro virus infects data files rather than executable files.Macro virus infects data files rather than executable files. 1.1. Stealth virus: a form of virus explicitly designed to hide itself fromStealth virus: a form of virus explicitly designed to hide itself from detection by antivirus softwares.detection by antivirus softwares. 2.2. Polymorphic virus: a virus that mutates with every infection, making itsPolymorphic virus: a virus that mutates with every infection, making its detection impossible.detection impossible. 3.3. ……
  • 10. 1010 WormsWorms  A worm uses self-propagating malicious code that canA worm uses self-propagating malicious code that can automatically distribute itself from one computer to anotherautomatically distribute itself from one computer to another through network connections.through network connections. – i.e.i.e., Worms can execute and spread without user intervention., Worms can execute and spread without user intervention.  A worm can take harmful actions, such as:A worm can take harmful actions, such as: – consuming network or local system resourcesconsuming network or local system resources – causing a denial of service attack.causing a denial of service attack. – deleting data, spying users, …deleting data, spying users, …
  • 11. 1111 WormsWorms  By denition, a worm is supposed to hop from machine to machine on its own, it needs to come equipped with considerable networking support.  With regard to autonomous network hopping, the important question to raise is: What does it mean for a program to hop from machine to machine?  A program may hop from one machine to another by a variety of means: – By using the remote shell facilities, as provided by rsh and rexec in Unix, to execute a command on the remote machine. – By cracking the passwords and logging in as a regular user on a remote machine.  Example: The Slammer Worm (online info)
  • 12. 1212 Other malwaresOther malwares  Trap door: a secret entry point into a program that allowsTrap door: a secret entry point into a program that allows someone that is aware of the trapdoor to gain access withoutsomeone that is aware of the trapdoor to gain access without going through the usual security procedures.going through the usual security procedures.  Logic bomb: is a code embedded in some legitimate programLogic bomb: is a code embedded in some legitimate program that is set to explode when certain conditions are met (time, orthat is set to explode when certain conditions are met (time, or data).data).  Zombie: is a program that secretly takes over another Internet-Zombie: is a program that secretly takes over another Internet- attached computer and then uses this computer to launch attacksattached computer and then uses this computer to launch attacks
  • 13. 1313 Other malwaresOther malwares  What is not malware?What is not malware? – Spyware (also calledSpyware (also called spybotspybot oror tracking software)tracking software). programs that conduct. programs that conduct certain activities (collecting personal information) on a computer withoutcertain activities (collecting personal information) on a computer without obtaining appropriate consent from the user.obtaining appropriate consent from the user. – Adware:Adware: pop-up advertisementspop-up advertisements – Spam: is unsolicited e-mail generated to advertise some service orSpam: is unsolicited e-mail generated to advertise some service or productproduct – Scams: An e-mail message that attempts to trick the recipient intoScams: An e-mail message that attempts to trick the recipient into revealing personal information that can be used for unlawful purposesrevealing personal information that can be used for unlawful purposes
  • 14. 1414 Virus countermeasuresVirus countermeasures  The antivirus approach: the ideal solution to the threat of virusesThe antivirus approach: the ideal solution to the threat of viruses is prevention:is prevention: – Don’t allow malware to get into the systemDon’t allow malware to get into the system  This is difficult (even impossible) to achieveThis is difficult (even impossible) to achieve  Follow the following approach:Follow the following approach: – Detection: once the infection has occurred, locate the virus.Detection: once the infection has occurred, locate the virus. – Identification: identify the specific virus that has infected a program.Identification: identify the specific virus that has infected a program. – Removal: remove all traces of the virus from the infected program andRemoval: remove all traces of the virus from the infected program and restore it to its original state.restore it to its original state.  Follow Virus Alert’s website: (eg, next slide)Follow Virus Alert’s website: (eg, next slide)  Example:Example: – The Windows case (the antivirus Defense-in-Depth Guide, Ch4)The Windows case (the antivirus Defense-in-Depth Guide, Ch4)
  • 15. 1515
  • 16. 1616 Windows’s antivirus Defense-Windows’s antivirus Defense- in-Depth Guidein-Depth Guide 1.1. Active processes and servicesActive processes and services – Task Manager, Ps Tools, Process ExplorerTask Manager, Ps Tools, Process Explorer 1.1. The local registryThe local registry – Regedit (the registry editor)Regedit (the registry editor) 1.1. Files in the Microsoft Windows system folders.Files in the Microsoft Windows system folders. – Use the “Windows Search”Use the “Windows Search” 1.1. New user or group accounts, especially with AdministratorNew user or group accounts, especially with Administrator privilegesprivileges 2.2. Shared folders (including hidden folders).Shared folders (including hidden folders). 3.3. Newly created files with normal looking file names but inNewly created files with normal looking file names but in unusual locationsunusual locations 4.4. Opened network portsOpened network ports – Netstat, FPortNetstat, FPort
  • 18. 1818 Intrusion detectionIntrusion detection  Viruses and intrusion are the most publicized threats to systemViruses and intrusion are the most publicized threats to system securitysecurity  Intrusion: illegally gaining access to systemsIntrusion: illegally gaining access to systems  Intrusion techniques: acquiring protected information (often userIntrusion techniques: acquiring protected information (often user passwords)passwords) – Passwords are associated with users in filesPasswords are associated with users in files  Password files must be protectedPassword files must be protected  Countermeasures: prevention and detectionCountermeasures: prevention and detection – If intrusion prevention fails,If intrusion prevention fails, – Intrusion detection is the real defense line.Intrusion detection is the real defense line.
  • 19. 1919 Intrusion detectionIntrusion detection  Intrusion detection is based on the assumption that the behaviorIntrusion detection is based on the assumption that the behavior of the intruder differs from that of a legitimate user in ways thatof the intruder differs from that of a legitimate user in ways that can be quantified.can be quantified.  Intrusion detection approaches:Intrusion detection approaches: – Statistical anomaly detectionStatistical anomaly detection – Rule-based detectionRule-based detection  Audit Records: is a fundamental tool for intrusion detectionAudit Records: is a fundamental tool for intrusion detection – A detection record may contain subject (user, process), action (login,A detection record may contain subject (user, process), action (login, read, write), object (files, programs), resource usage, timestampread, write), object (files, programs), resource usage, timestamp  Examples of IDS:Examples of IDS: – Cisco’s Secure IDSCisco’s Secure IDS – ISS RealSecureISS RealSecure – SnortSnort
  • 21. 2121 FirewallFirewall  A firewall is any device used as a network-level access controlA firewall is any device used as a network-level access control mechanism for a particular network or a set of networksmechanism for a particular network or a set of networks – Firewall is used to prevent outsiders from accessing an internal network.Firewall is used to prevent outsiders from accessing an internal network.  Firewalls may be stand-alone computers, routers, or firewallFirewalls may be stand-alone computers, routers, or firewall appliances (sometimes with their own OS)appliances (sometimes with their own OS)  They serve as control points to and from networksThey serve as control points to and from networks  They check whether or not network traffic should be allowedThey check whether or not network traffic should be allowed according to sets of rules or policies.according to sets of rules or policies.  Pitfalls: slowing data transmission, impairing networkingPitfalls: slowing data transmission, impairing networking
  • 22. 2222 Types of firewallsTypes of firewalls  Packet filtering routersPacket filtering routers  Stateful-inspection firewallsStateful-inspection firewalls  Application-level gateway (also called proxy server)Application-level gateway (also called proxy server)  Circuit-level gatewayCircuit-level gateway  Examples:Examples: – CheckPoint’s Firewall-1: Stateful-inspection-basedCheckPoint’s Firewall-1: Stateful-inspection-based – Cisco’s PIX:stateful packet filter-basedCisco’s PIX:stateful packet filter-based – Border’s FireWall Server: Proxy-basedBorder’s FireWall Server: Proxy-based – Tiny Software’s Tiny Personal Firewall: Packet filter-basedTiny Software’s Tiny Personal Firewall: Packet filter-based

Editor's Notes

  1. Windows is sometimes configured by default to hide filename extensions from a user, the Trojan horse's extension might be "masked" by giving it a name such as 'Readme.txt.exe'. With file extensions hidden, the user would only see 'Readme.txt' and could mistake it for a harmless text file