SS ModuleV II
SS ModuleV II
PART-II
INTRUSION AND MALWARE
Intruders and Attacks
External
Internal
• masqueraders
2
Firewalls
• Provide protection to a local network from network-based threats, while
allowing access to the outside world
• Common methodology
• Service control – determine which Internet services can be accessed,
inbound or outbound
• Direction control – determine in which direction service traffic is allowed
to flow
• User control – determine who can access what
• Behaviour control – determine how particular services are used
3
Firewalls
• Types of FW – Packet-filtering routers
4
Firewalls
• More complex (and secure) FW configurations:
• Screened host FW (single-homed bastion host)
5
Firewalls
• More complex (and secure) FW configurations:
• Screened host FW (dual-homed bastion host)
• Now traffic between Internet and the internal network has to physically flow
through the bastion host
6
Firewalls
• More complex (and secure) FW configurations:
• Screened subnet FW
• Malware zoo
• Virus • Scareware
• Backdoor • Adware
• Trojan horse • Spyware (including keyloggers)
• Rootkit • Botnets / zombies
• Worm • …
Terminology quite fuzzy nowadays
8
Malware
• Virus
• Program that can infect other programs by modifying them to include a
(possibly evolved) version of itself
• Some types:
• Polymorphic
• Uses an engine to mutate after each infection, while keeping the
engine intact
• Metamorphic
• Changes (almost) completely after each infection
• Trojan
• Class of malware that appears to perform a desirable function but in fact
performs undisclosed malicious actions that allow unathorised access to
the victim’s computer or data
9
Malware
• Rootkit
• Component that uses stealth to maintain a persistent presence on the
system
• Worm
• Self-replicating computer program that uses a network to send copies of
itself to other nodes without user intervention
10
Malware
• A problem growing beyond control…
Source: www.av-test.org
11
Malware
• Infection methods:
• Executables
• Interpreted files (including built-in scripting languages in applications such
as Office, Acrobat, etc.)
• Kernel & services
• MBR
• Hypervisor
• …
• Propagation methods:
• Exploitation of software vulnerabilities
• Shared folders
• Email
• Faked software (audio/video codecs, antivirus, p2p files, games, …)
• Bluetooth
• USB devices
• Social networks
• …
12
Malware
• Detection
• Signatures
• Find a string that identifies the malware
• Scan files, memory, etc. Detection if match occurs
• Huge problem with poly/meta-morphism
• Doesn’t scale well
• Heuristics
• Analyze program behavior: files opened, network access, attempts
to delete files or modify the boot sector, etc.
• Checksums
• Sandbox analysis
• Run executable in a VM
• Observe behavior and extract file activity, network accesses,
memory usage, etc.
13
• Example of costs due to malware
• Morris worm (1988)
• $10 million in downtime and cleanup
• Internet down
• Slammer (2003)
• ATMs unavailable, phone network overloaded (no 911!), planes
delayed, …
• Crypto virus
• Real costs of most malware remain unknown to the general public