240 likes | 422 Views
The Networking and Communications Group. Security Threats Worms and Viruses. Cyril Onwubiko Networking and Communications Group http://ncg.kingston.ac.uk. Overview. Networking and Communications Group. Background Theory Detection Mechanisms Countermeasures Q/A.
E N D
The Networking and Communications Group Security Threats Worms and Viruses • Cyril Onwubiko • Networking and Communications Group • http://ncg.kingston.ac.uk
Overview Networking and Communications Group • Background • Theory • Detection Mechanisms • Countermeasures • Q/A
Networking and Communications Group Background
Security Threats Networking and Communications Group Exploit Vulnerabilities in:: • Computer Systems • Network Systems • Information & Content Asset Causes:: • Disruption of Service • Degradation of Service • Denial of Service • Manipulation/Theft of Information Effect
Worms/Viruses Networking and Communications Group • Worms • Malicious software with the capability of self-replication • May not require another software to be activated • Propagates through networks • Viruses • Malicious software that attaches itself to other software • Requires another software to be activated • Replicates within Computer systems, not necessarily networks
1 Type of Worms/Viruses Networking and Communications Group • Time Bomb: A type of worm that remains dormant in the host until a certain time is reached. Example: <if time Eq 22/03/2006 then start> • Logic Bomb: A type of worm that remains dormant in a host until a certain condition, or an event occurs (logic), and then deletes files, slows down or crashes the host system etc. Example: < if license_expires then start> • Trojan Horse: A type of worm (malicious logic) performing, or able to perform, an illegitimate action while giving the impression of being legitimate; the illegitimate action can be disclosure or modification of information. Example: Internet pop-ups: <Your system is running very slow, Do you want to Speed Up?> [Click]
2 Type of Worms/Viruses Networking and Communications Group • Rabbit: A type of worm when activated replicates itself until a point of system exhaustion: Example: Consumes CPU and network resources • Bacterium: A type of virus that attaches itself on the OS (rather than application). It causes and consumes system’s resources to the point of exhaustion. Similar to ‘Rabbit’ • Aggressive Worms: A type of worm that spreads across the network faster than normal worms. They are continuously activated!
Worm/Virus Security Threats Countermeasures General Concept Networking and Communications Group Worms and Viruses are subsets of security threats. To appropriately mitigate against them, we need effective countermeasures!
Susceptible Infected Susceptible Infected Recovered Susceptible Infected Removed quarantine Recovered Worm Models Networking and Communications Group SI Model SIR Model No countermeasures applied A single set of countermeasure SIRQR Model A couple of countermeasures Recovered: infected systems that have been treated Removed: susceptible systems that are disconnected and patched
Classification of Worms Networking and Communications Group Worms Viruses • Innocuous, Humorous, Deceptive, Data Altering, & Catastrophic • Innocuous, Humorous, Data Altering & Catastrophic Behaviour • Operational, external, human-made, software, malicious, deliberate and permanent • Operational, external, human-made, software, malicious, deliberate and permanent Design • Emphasis on Computer • Up to date DAT patches required • Emphasis on Network • Early warning/detection possible Medium
Phases of Worm Propagation Networking and Communications Group Early stage Penetration Stage • Worm activated • Hits the ‘hitlist’ – a list of systems with target vulnerability: E.g.: Win32.Blaster exploits flaw in MS RPC • Propagation rate is gradual and linear • Dormant and inactive • Waits for a condition, or time to start: E.g.: Code Red II, Slammer Worms Perpetuation Stage Exhaustion Stage • External systems targeted (outside the ‘hitlist’) • Propagation rate is quadratic or near exponential • Combined efforts from compromised systems • Hard to stop at this stage • Near termination/completion • Countermeasures known and patches released • Program termination time very close
Symptomatic Effect (Behaviour) Networking and Communications Group • High CPU • System may crash intermittently • Increased/Abnormal traffic on egress routers/interfaces • Abnormal system behaviour (slows down, performance issues, freezes and hangs often) • Increased/Abnormal protocol usage high peer_contact sent/received traffic • System halt and may not start • Missing or corrupt/destroy files/ System register may be affected/altered
Networking and Communications Group Detection
Proactive Monitoring Networking and Communications Group • Early Detection Mechanisms • Ingress ACL • Rate Limiting at gateway devices • Security Information Management Systems • Automated Filtering • Filtering of known security ports and protocols. Example: Ingress traffic using port UDP 137, TCP 135,139 445 etc
Early Warning Systems Networking and Communications Group Proactive-Based Systems Early warning System • Traffic analysis and • Probabilistic analysis • Pattern analysis and speculative evidences
Networking and Communications Group Countermeasures
1 Remediation Services Networking and Communications Group Basic Techniques: • Stay up to date with latest software patches • Harden your operating systems (SP/personal FW etc) • Disable unused services • Consider filtering on ingress gateway devices • Consider disconnecting infected systems …
2 Enterprise Initiatives Networking and Communications Group Admission Control Mechanisms: • Microsoft NAP (Network Access Protection) • Cisco NAC (Network Admission Control) • Access Control Mechanisms.
3 Open Source Initiatives Networking and Communications Group Proactive Monitoring Technique: • OS-SIM (Open Source Security Information Management) • PADS (Passive Asset Detection Systems) • SNORT – Open Source IDS • BASE (Basic Analysis Security Engine (Alert Management)
Conclusion Networking and Communications Group • Worms and Viruses are major security threats to information and network asset. • Worms (unlike viruses) can be detected early if adequate security mechanisms are in place. • Effects of worm/virus infection ranges from service disruption to system crash • Proactive monitoring and early warning systems are recommended detection mechanisms. • Remediation services, OS hardening, patching, ingress filtering and disconnecting of infected systems are recommended countermeasures!
Resources/References Networking and Communications Group • Microsoft NAP:http://www.microsoft.com/windowsserver2003/technologies/networking/nap/beta.mspx • Cisco NAC:http://www.cisco.com/warp/public/cc/so/neso/sqso/csdni_wp.htm • Cisco CiscoWorks SIMS:http://www.cisco.com/en/US/products/sw/cscowork/ps5209/index.html • Additional Resource:http://www.research-series.com/cyril/resources.html • IETF: EAP (Extensible Authentication Protocol): https://datatracker.ietf.org/public/idindex.cgi?command=id_detail&id=8369 • Desktop FW/IDS. E.g. Blackice defender (ISS); ZoneAlarm etc • NCG: NCG Publications: http://ncg.kingston.ac.uk/research/publications/publications.htm
Contact Details Networking and Communications Group Networking & Communications Group Kingston University http://ncg.kingston.ac.uk Email: k0327645@kingston.ac.uk or cyril@colt.net Tel: Not Applicable