Topics Virus Protection And - Stanford University

1y ago
13 Views
2 Downloads
1.48 MB
12 Pages
Last View : 21d ago
Last Download : 3m ago
Upload by : Gideon Hoey
Transcription

Virus Protection andIntrusion DetectionTopicsu Trojans, worms, and virusesu Virus protection Virus scanning methodsJohn Mitchellu Detecting system compromise Tripwireu Detecting system and network attacks Scanning system call trace Network intrusion detectionWhat is a Virus?u Program embedded in fileu Spreads and does damageThree related dfunctionalityUndesiredfunctionalityHidden incodePropagatesPropagates Replicator– Portion of virus code that reproduces virus Payload– Portion of virus code that does some other functionu Categories Boot virus (boot sector of disk) Virus in executable file Macro virus (in file executed by application)Virus scanner is large collection of many techniquesHidden incode1

Trojan HorseInternet Worm!!! PKZIP Trojan Horse Version (Originally Posted May 1995) !!! a fake version of PKZIP is being distributed asPKZ300B.ZIP or PKZ300.ZIP. It is not an officialversion from PKWARE and it will attempt to eraseyour hard drive if run.u Released November 1988 Program spread through Digital, Sun workstations Exploited Unix security vulnerabilitiesu Consequences No immediate damage from program itself Replication and threat of damage– Load on network, systems used in attack– Many systems shut down to prevent further attackNot a virus since it doesn’t replicateWorm descriptionu Two parts Program to spread worm– look for other machines that might be infected– try to find ways of infiltrating these machines Vector program (99 lines of C)– compiled and run on the infected machines– transferred main program to continue attacku Security vulnerabilities Components of Internet Worm Attacku Sendmail Exploit debug option in sendmail to allow shellaccessu Rsh Exploit trusted hostsu Fingerd Exploit a buffer overflow in the fgets functionfingerd – Unix finger daemonsendmail - mail distribution programPassword crackingTrusted logins2

fingerdu Written in C and runs continuouslyu Array bounds attack Fingerd expects an input string Worm uses long string to overwrite memoryu Attack string Includes machine instructionsOverwrites return addressInvokes a remote shellExecutes privileged commandsRemote shellu Unix trust information /etc/host.equiv – system wide trusted hosts file /.rhosts and /.rhosts – users’ trusted hosts filesendmailu Worm used debug feature Allows a set of commands to be sent to sendmail Send messages to new hosts through the mailsystem without processing normal mail messagesPassword crackingu Dictionary attack Read /etc/passwd Used list of 400 common password stringsDetecting Internet Wormu Files Strange files appeared in infected systems Strange log messages for certain programsu System loadu Worm exploited trust information Examining files that listed trusted machines Assume reciprocal trust Infection generates a number of processes Systems were reinfected number of processesgrew and systems became overloaded– If X trusts Y, then maybe Y trusts XThousands of systems were shut down3

Stopping the wormu System admins busy for several days Devised, distributed, installed modificationsu PerpetratorReferenceu Eugene H. Spafford; The Internet Worm:Crisis and Aftermath; COMMUNICATIONSOF THE ACM; 32(6), pp. 678-687, Jun 1989 Student at Cornell; discovered quickly and charged Sentence: community service, 10,000 fine– Program did not cause deliberate damage– Tried (failed) to control # of processes on host machinesu Lessons? Security vulnerabilities come from system flaws Diversity is useful for resisting attack “Experiments” can be dangerousVirus Examplesu Jerusalem One oldest and most common; many variants Will infect both .EXE and .COM files Every Friday 13th, deletes programs run that dayu Melissa Word macro virus spread by emailInitially distributed in an internet group alt.sexSent in a file called LIST.DOCWhen opened, macro emails to 50 people listed inthe address book of the user.Melissa EmailFrom: (name of infected user)Subject: Important Message From (name of infected user)To: (50 names from alias list)Here is that document you asked for . don't show anyoneelse ;-)Attachment: LIST.DOCu Recipients likely to open a document fromsomeone they know4

Viruses – What’s Out There?u Wild Listhttp://www.wildlist.org/ Industry standard Currently 64 participants– mostly from security companies– keep watch for active viruses About 200 current sightings– Viruses not sighted by two independent participants dropoff listu Virus families Many viruses reuse replicators that have proveneffectiveHow hard is it to do?u Google search: virus construction toolkitu First link: Name: OVCT Type: Virus Creation Kit Info:Overwritting Virus Construction Toolkit is a virus sourcegenerator program designed for makeing overwritting virii.Who writes viruses?u Limited scientific study Sarah Gordon papers htmu Identified four groups by survey Early adolescent, College student,Adult/professiona, Ex-writer of virusesu Trends “Those who have continued a normal ethicaldevelopment have aged out of virus writing” Some are older and more skilled than before– Viruses like Zhengxi and Concept point to an advancedknowledge of programming techniquesSimple File Infecting Virusu Propagate identical copy of itselfu Identified by “signature” Characteristic bit pattern in virus code Often detects family of viruses with similarreplicatorExecutable Fileu Links to 40 other construction kits athttp://www.ebcvg.com/creation labs.php I do not recommend downloading or running these!!Virus5

Performance Issuesu Many files to scan, many signaturesu Optimizations?More General Limitationu Virus must be executed to be effective Most viruses at an entry point or after nonbranching codeu Antivirus programs check entry pointsVirus Many viruses at beginning or end of a file Almost all viruses are less than 4KB Establish a variable E for the program’s entry point Each entry point scans the instruction at thatlocation If it transfers control to another location, set E tothat location and go back to step 2 Search the bytes at location E for virus signaturesReference: Nachenberg articleVirus Encryptionu Writer may encrypted main portion of virus Decryption code Encrypted Virus code– Does not need to be strong encryption– Just something to fool fast checkeru Encrypted code depends on key usedu Identify virus by decryption routine Decryption routines are often unique Most have at least 10-15 distinct bytes Since small, increase probability of ident errorVirus Cleaningu Virus detection Determine whether there is a virusu Virus identification Determine the identity or family of virusu Virus cleaning Remove virus from file Requires some knowledge of how virus works– How many bytes in replicator,– Identify beginning/end of payload,– Identification errors make it harder to clean files6

Polymorphic Virusesu Change “shape” as they propagate Specially designed mutation engines– can generate billions of mutation routines– mutation engine may be more complex than viruses Combine with encryption– change decryption routine by switching the order ofinstructionsPolymorphic Virus Detectionu Sandboxing Run the file on a protected virtual computeru Analyze virus body when decryptedu Many performance problems How long to run each program? Solve the halting problemSophisticated viruses require sophisticated detectionIntrusion detectionOutlineu An intrusion isu Intrusion prevention“any set of actions that attempt to compromise theintegrity, confidentiality or availability of aresource” Network firewall– restrict flow of packets; cover in another lecture System securityu Intrusion detection Discover system modifications– Tripwire[Heady, Luger, et al.] Look for attack in progress– Network traffic patterns– System calls, other system events7

FirewallNetwork Virus Scanningu Separate local area net from internetGateway (Bastion)External nalNetworkAll packets between LAN and internet routed through gatewaySystem intrusion detectionu Many kinds of attacks Network denial of service Attempts to gain user access User attempts to gain root accessu Premise for intrusion detectionGeneral problemu How to detect intrusion? Detect damage to system– Might be too late Detect attack as it is happening?– How to recognize an attack? “Normal” user behavior is different from behaviorof malicious user8

Tripwireu Standard attack Gain user accessGain root accessReplace system binaries to establish backdoorUse backdoor for future activitiesu Tripwire detection point Modification of system binariesIs Tripwire too late?Tripwire Systemu General idea Compute hash of key system binariesCompare current hash to hash stored earlierReport problem if hash is differentStore reference hash codes on read-only mediumu Specialized method Does not catch all intrusions Automates common way of monitoring systemDARPA intrusion detection programu Typical attack on server Gain access Install backdoor– This can be in memory, not on disk!! Use itu Tripwire Is a good idea Wont catch attacks that don’t change system files9

ID Data Sourcesu Host based Audit data from a single host to detect intrusionsu Multihost based Audit data from multiple hosts to detect intrusionsu Network based Network traffic data, along with audit data fromone or more hosts, is used to detect intrusionsID Intrusion Modelsu Anomaly detection model Try to figure out what is “normal” Report anomalous behavioru Misuse detection model Maintain data on known attacks Look for activity corresponding to known intrusiontechniques (signatures) or system vulnerabilitiessee /Port sweep attack and detectionExample (UCD Computer Security Lab)u Many computers have known vulnerabilities Standard software configuration can be attacked Attack specific to certain OS and versionu Attackers sweep net to find certain machines Port sweep will try to connect to many ports onmany IP addressesu This behavior is not “normal”The InternetDiscoveryCoordinator Hosts grouped into neighborhoods Nbhd boundary protected by filtering router/firewall Centralized Discovery Coordinator directs global activity10

SYN-flood Attack from InternetTarget: Mail HubDiscoveryCoordinatorResponse from ID SystemThe InternetSource Attack:SYN-flood to port 25 of central e-mail hub IP-header is forged: random, fake source addresses Result: E-mail effectively blocked by the attackerStatistical methodsu Monitor network traffic, system callsu Compute statistical propertiesu Report errors if statistics are outsideestablished rangeTarget: Mail HubThe InternetDiscoveryCoordinator IDS detects attack, reports to the DC DC correlates the sightings, selects response Result: Attack is prevented at the cost of blockinge-mail communications from arbitrary hostsDifficulties in intrusion detectionu Lack of training data Lots of “normal” network, system call data Little data containing realistic attacks, anomaliesu Data drift Statistical methods detect changes in behavior Attacker can attack gradually and incrementallyu Main characteristics not well understood By many measures, attack may be within boundsof “normal” range of activitiesu False identifications are very costly Sys Admin spend many hours examining evidence11

Strategic Intrusion Assessment [Lunt]u Test over two-week periodNationalReporting CentersRegional ReportingCenters (CERTs)Strategic Intrusion Assessment [Lunt]DoD ReportingCentersInternational/AlliedReporting CentersOrganizationalSecurity Centersu ConclusionLocal h-usa-99/teresa-lunt/tutorial.pptInteresting Approach AFIWC’s intrusion detectors at 100 AFBs alarmedon 2 million sessions After manual review, reduced to 12,000 suspiciousevents After further manual review, these were reducedto four actual incidents Most alarms are false positives Most true positives are trivial incidents Of the significant incidents, most are isolatedattacks to be dealt with locally[Wagner, Dean]u Problem ID Systems may produce too many false alarmsu Approach Deduce a model from program source code– Not just by “learning” from observable behavior Use this model to detect unexpected behavioru Similar to Ashcraft/Engler work in reverse Examine code to produce FSM model of patterns ofsystem callsResults so far: lots better than not using code!12

-Portion of virus code that reproduces virus Payload -Portion of virus code that does some other function uCategories Boot virus (boot sector of disk) Virus in executable file Macro virus (in file executed by application) Virus scanner is large collection of many techniques Three related ideas Undesired functionality Hidden in .

Related Documents:

The followings are the types of computer viruses: a) Boot sector virus b) Program virus c) Multipartite virus d) Polymorphic virus e) Stealth virus f) Macro virus. Q4. What is a Boot sector virus? It is a computer virus designed to infect the boot sector of the disk. It modifies or

BAB 5 PENYAKIT YANG DISEBABKAN OLEH VIRUS DAN FITOPLASMA 159 5.1 Virus Belang Kacang Tanah Peanut Mottle Virus (dicetak miring) 159 5.2 Virus Bilur Kacang Tanah (Peanut Stripe Virus) 166 5.4 Nekrosis Tunas (Bud Necrosis) 184 5.5 Virus Roset Kacang Tanah (Groundnut Rosette Virus) 195 5.6 Virus Kerdil Kacang Tanah (Peanut Stunt Virus) 206

(2) Detecting virus technology . The feature of virus detection evaluation technique is computer virus technology (such as self-calibration, keywords, file size, etc.) to determine the type of virus. (3) Anti -virus technology . Through anti-virus technology's computer virus code analysis, develop new programs to remove

SEISMIC: A Self-Exciting Point Process Model for Predicting Tweet Popularity Qingyuan Zhao Stanford University qyzhao@stanford.edu Murat A. Erdogdu Stanford University erdogdu@stanford.edu Hera Y. He Stanford University yhe1@stanford.edu Anand Rajaraman Stanford University anand@cs.stanford.edu Jure Leskovec Stanford University jure@cs.stanford .

A virus scan provider represents the interface to the virus scan engine in the flavors virus scan adapter and virus scan server. A virus scan adapter is used for VSI library-based communication as explained above, whereas a virus scan server is used when the virus scan engine and SAP NetWeaver are installed on separate server systems.

Figure 2 step 1 sample of encrypted virus code before exec. u-tion. Fig3 Step2 decryption of encrypted virus starts with first . stage. Fig 4 last step . fully decrypted virus code. As a result, not only is the virus body encrypted, but the virus . decryption routine varies from infection to infection. To encrypt the copy of the virus body, an .

Penyakit virus kompleks dapat disebabkan oleh berbagai jenis virus, seperti virus mosaik, virus daun menggulung, virus Y, dll. Pada umumnya penyakit virus ditularkan oleh serangga vektor seperti kutudaun atau oleh tangan, peralatan pertanian, dll. Gejala serangan virus kompleks sangat bervariasi. Namun

English Language Arts and Reading §111.4. Mathematics §112.13. Science §113.13. Social Studies §114.4. Languages Other Than English §115.4. Health Education §116.4. Physical Education §117.108. Art §117.109. Music §117.110. Theatre §126.6. Technology Applications §110.4. English Language Arts and Reading, Grade 2, Adopted 2017. (a) Introduction. (1) The English language arts and .