260 likes | 276 Views
Learn about malware, detection methods, and network security best practices to safeguard your systems. Discover the importance of defense in depth and stay informed on emerging cybersecurity threats.
E N D
Malwares and Networking MADS 6638 Louai Rahal
Vulnerability: There is no type of defense that is always reliable • Solution: Defense in Depth Give access only to the assets that the user is allowed to access Create records of user’s activity Identify who the user is
Malware: Software that cause harm • "Downloaded software can open files, delete files, or create new files" These files can access the computer's memory and processor
Malware Detection • How are antiviruses developed ? • Experts analyze malwares and identify patterns, signatures • For example, if a malware contains instructions to the computer to install a software called Trojan.exe, then the antivirus will add Trojan.exe to its blacklist
Malware Detection • Not all malware detection tools are based on signatures. • Other tools are based on behavior. • For example, antivirus tools inspect files that allow access by remote users. • If a file gives access to remote users then it is inspected.
Malware Detection • 68 antivirus engines • Constantly being updated with new signatures and new behavioral patterns of malwares • Windows has incorporated VirusTotal in their Process Explorer Tool
1/68 score means that 1 out of the 68 antivirus engines has reported the program as malicious. • The higher the score the more certain we are that the program is malicious. • A low score like 1/68 could be a False Positive • Like any cybersecurity tool, virus total does not guarantee a 100% success rate • A sophisticated malware could still score 0/68. False negative. https://www.csoonline.com/article/2883958/malware/malware-detection-in-9-easy-steps.html
A non malicious program gets a score of 5/65: • False positive or False negative ? • A malicious program gets a score of 0/67 • False positive or False negative ?
https://www.youtube.com/watch?v=wF_44SqldIQ 28:00 • Allows hackers to change the behavior of the program by entering special codes. • Similar to cheat codes in online games. Codes taken from Amoroso, E. G., & Amoroso, M. E. (2017) • Which one is a Trojan program?
"In general, Trojan Horses infect devices through social engineering where the users are deceived into opening an email attachment or clicking a link, or maybe by drive-by-download using a pop-up window. Signs such as low performance and changed settings are indicators that a Trojan horse resides on the victim’s device. Counter measures such as keeping the anti-virus application up to date, avoiding clicking or downloading unknown files from unknown sources, and scanning files can help protecting against Trojan Horses" • The use of open source software protects from Trojan Horse Programs because the code can be inspected by millions of users
Displaying Advertisements to make money • Redirecting you to other websites in order to increase traffic on these websites • Alters browser's security settings • Resetting the browser's Homepage
Creating your own Adware Go to www.louairahal.net/infosec Download the Adware Open it with notepad Modify the code and make the adware produce at least 50 popup windows Save your file as a .html file Open the file in your browser
Users can protect themselves from Adware and remove them in different ways: • "Blocking scripts from running on your browser can help protecting your device from Adware. However, this can also end up blocking other useful scripts since Adware are written in the same scripting language like other legitimate software" • Make sure that your browser is up to date and all security patches are installed. Also, make sure that your firewall is on when using the Internet. • Go to settings in your browser • Check if pop ups are disabled • Check if browser is tracking your activity
Codes taken from Amoroso, E. G., & Amoroso, M. E. (2017) • Which one is a spyware?
Accessing applications and files that control memory, processor and other resources on a device
https://www.avira.com/en/support-virus-lab • Find one Adware, one Trojan and one other type of Malware • For each Malware, find the method of propagation
Assignment-1 Preparation 5 sentences 1 sentence: Hacking Incident you will research 1 sentence: The attackers’ motivation 1 sentence: The vulnerability that was exploited 1 sentence: The technique used by attackers 1 sentence: The incident response Email the 5 sentences to lir01@alumni.ubc.ca
If you want to practice sending and receiving encrypted messages: Download Louai’s public key at http://louairahal.net/infosec/Louai-Public-Key.asc Encrypt and send (1) The Encrypted Message and (2) Your Public Key Louai will send you feedback
Each computer connected to a network (World Wide Web or any other) has an ip address assigned to it • Both servers and clients have ip addresses • IP addresses can be hidden easily • Get your ip address from https://whatismyipaddress.com • Go to http://nl.smarthide.com/ and visit https://whatismyipaddress.com
Client/Server interactions follow different types of protocols in their interactions • HTTP: Hyper Text Transfer Protocol • HTTPS: Hyper Text Transfer Protocol Secure • https://www.makeuseof.com/tag/https-everywhere-use-https-instead-of-http/ HTTPS Everywhere is a Firefox plugin that forces the browser to use HTTPS where possible
The domain name system is the system that maps a name to an ip address • A rudimentary understanding of the domain name system helps detect phishing • Which one is a phishing site http://mystery.ubc.ca/ or http://ubc.ca.mystery/