Malicious Software programs exploiting system vulnerabilities known as malicious software or malware...

24
Malicious Software programs exploiting system vulnerabilities known as malicious software or malware program fragments that need a host program e.g. viruses, logic bombs, and backdoors independent self-contained programs e.g. worms, bots Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW
  • date post

    19-Dec-2015
  • Category

    Documents

  • view

    218
  • download

    0

Transcript of Malicious Software programs exploiting system vulnerabilities known as malicious software or malware...

Page 1: Malicious Software programs exploiting system vulnerabilities known as malicious software or malware program fragments that need a host program e.g. viruses,

Malicious Software

• programs exploiting system vulnerabilities

• known as malicious software or malware• program fragments that need a host

program• e.g. viruses, logic bombs, and backdoors

• independent self-contained programs• e.g. worms, bots

• replicating or not• sophisticated threat to computer

systems

Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Page 2: Malicious Software programs exploiting system vulnerabilities known as malicious software or malware program fragments that need a host program e.g. viruses,

Malware Terminology

• Virus• Worm• Logic bomb• Trojan horse• Backdoor (trapdoor)• Mobile code• Auto-rooter Kit (virus generator)• Spammer and Flooder programs• Keyloggers• Rootkit• Zombie, bot Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Page 3: Malicious Software programs exploiting system vulnerabilities known as malicious software or malware program fragments that need a host program e.g. viruses,

Viruses• piece of software that infects programs

• modifying them to include a copy of the virus• so it executes secretly when host program is

run• specific to operating system and hardware

• taking advantage of their details and weaknesses

• a typical virus goes through phases of:• dormant• propagation• triggering• executionBased on slides by Dr. Lawrie Brown of the Australian

Defence Force Academy, University College, UNSW

Page 4: Malicious Software programs exploiting system vulnerabilities known as malicious software or malware program fragments that need a host program e.g. viruses,

Virus Structure

• components:• infection mechanism - enables

replication• trigger - event that makes payload

activate• payload - what it does, malicious or

benign• prepended / postpended / embedded • when infected program invoked,

executes virus code then original program code

• can block initial infection (difficult)• or propogation (with access controls)

Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Page 5: Malicious Software programs exploiting system vulnerabilities known as malicious software or malware program fragments that need a host program e.g. viruses,

Virus Structure

Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Page 6: Malicious Software programs exploiting system vulnerabilities known as malicious software or malware program fragments that need a host program e.g. viruses,

Compression Virus

Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Page 7: Malicious Software programs exploiting system vulnerabilities known as malicious software or malware program fragments that need a host program e.g. viruses,

Virus Classification

• boot sector• file infector• macro virus• encrypted virus• stealth virus• polymorphic virus• metamorphic virus

Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Page 8: Malicious Software programs exploiting system vulnerabilities known as malicious software or malware program fragments that need a host program e.g. viruses,

Macro Virus• became very common in mid-1990s

since• platform independent• infect documents• easily spread

• exploit macro capability of office apps• executable program embedded in office

doc• often a form of Basic

• more recent releases include protection

• recognized by many anti-virus programs

Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Page 9: Malicious Software programs exploiting system vulnerabilities known as malicious software or malware program fragments that need a host program e.g. viruses,

Virus Countermeasures

• prevention - ideal solution but difficult

• realistically need:• detection• identification• removal

• if detect but can’t identify or remove, must discard and replace infected program

Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Page 10: Malicious Software programs exploiting system vulnerabilities known as malicious software or malware program fragments that need a host program e.g. viruses,

Anti-Virus Evolution

• virus & antivirus tech have both evolved• early viruses simple code, easily

removed• as become more complex, so must the

countermeasures• generations

• first - signature scanners• second - heuristics• third - identify actions• fourth - combination packages

Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Page 11: Malicious Software programs exploiting system vulnerabilities known as malicious software or malware program fragments that need a host program e.g. viruses,

Generic Decryption

• runs executable files through GD scanner:• CPU emulator to interpret instructions• virus scanner to check known virus

signatures• emulation control module to manage

process• lets virus decrypt itself in interpreter• periodically scan for virus signatures• issue is long to interpret and scan

• tradeoff chance of detection vs time delayBased on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Page 12: Malicious Software programs exploiting system vulnerabilities known as malicious software or malware program fragments that need a host program e.g. viruses,

Digital Immune System

Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Page 13: Malicious Software programs exploiting system vulnerabilities known as malicious software or malware program fragments that need a host program e.g. viruses,

Behavior-Blocking Software

Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Page 14: Malicious Software programs exploiting system vulnerabilities known as malicious software or malware program fragments that need a host program e.g. viruses,

Worms/Email virus

• replicating program that propagates over net• using email, remote exec, remote login

• has phases like a virus:• dormant, propagation, triggering, execution• propagation phase: searches for other systems,

connects to it, copies self to it and runs• may disguise itself as a system process• concept seen in Brunner’s “Shockwave

Rider”• implemented by Xerox Palo Alto labs in

1980’sBased on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Page 15: Malicious Software programs exploiting system vulnerabilities known as malicious software or malware program fragments that need a host program e.g. viruses,

Morris Worm

• one of best know worms• released by Robert Morris in 1988• various attacks on UNIX systems

• cracking password file to use login/password to logon to other systems

• exploiting a bug in the finger protocol• exploiting a bug in sendmail

• if succeed have remote shell access• sent bootstrap program to copy worm over

Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Page 16: Malicious Software programs exploiting system vulnerabilities known as malicious software or malware program fragments that need a host program e.g. viruses,

Worm Propagation Model

Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Page 17: Malicious Software programs exploiting system vulnerabilities known as malicious software or malware program fragments that need a host program e.g. viruses,

Recent Worm Attacks• SQL Slammer

• early 2003, attacks MS SQL Server• compact and very rapid spread

• Mydoom• mass-mailing e-mail worm that appeared in

2004• installed remote access backdoor in infected

systems• Valentin E and Nuwar OL

• Spread by email• Users ‘enticed’ by romantic messages• Activity disguised by the display of a greetings

cardBased on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Page 18: Malicious Software programs exploiting system vulnerabilities known as malicious software or malware program fragments that need a host program e.g. viruses,

Worm Technology

• multiplatform• multi-exploit• ultrafast spreading• polymorphic• metamorphic• transport vehicles• zero-day exploit

Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Page 19: Malicious Software programs exploiting system vulnerabilities known as malicious software or malware program fragments that need a host program e.g. viruses,

Worm Countermeasures• overlaps with anti-virus techniques• once worm on system A/V can detect• worms also cause significant net

activity• worm defense approaches include:

• signature-based worm scan filtering• filter-based worm containment• payload-classification-based worm

containment• threshold random walk scan detection• rate limiting and rate haltingBased on slides by Dr. Lawrie Brown of the Australian

Defence Force Academy, University College, UNSW

Page 20: Malicious Software programs exploiting system vulnerabilities known as malicious software or malware program fragments that need a host program e.g. viruses,

Proactive Worm Containment

Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Page 21: Malicious Software programs exploiting system vulnerabilities known as malicious software or malware program fragments that need a host program e.g. viruses,

Network Based Worm Defense

Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Page 22: Malicious Software programs exploiting system vulnerabilities known as malicious software or malware program fragments that need a host program e.g. viruses,

Bots

• program taking over other computers• to launch hard to trace attacks• if coordinated form a botnet• characteristics:

• remote control facility• via IRC/HTTP etc

• spreading mechanism• attack software, vulnerability, scanning

strategy• various counter-measures applicable

Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Page 23: Malicious Software programs exploiting system vulnerabilities known as malicious software or malware program fragments that need a host program e.g. viruses,

Summary

• introduced types of malicous software• incl backdoor, logic bomb, trojan horse,

mobile• virus types and countermeasures• worm types and countermeasures• bots

Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW

Page 24: Malicious Software programs exploiting system vulnerabilities known as malicious software or malware program fragments that need a host program e.g. viruses,

Useful Resources Most of the anti virus vendors

maintain web sites with information about current malware e.g. Symantec http://www.symantec.com

CERT has lots of useful information at:http://www.cert.org

• Also NIST at:http://csrc.nist.gov/

Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College, UNSW