Info - Security U1 Ch.2 Need For Security
Info - Security U1 Ch.2 Need For Security
18CSE532
Unit1 chapter2
9
Attack / misuse in the decreasing order
10
Common Attack Pattern Enumeration and
Classification ( http://capec.mitre.org/PEC)
• A tool that security professionals can use to
understand attacks is the Common Attack Pattern
Enumeration and Classification (CAPEC) Web site
hosted by Mitre—a nonprofit research and
development organization sponsored by the U.S.
government.
• This online repository can be searched for
characteristics of a particular attack or simply
browsed by professionals who want additional
knowledge of how attacks occur procedurally.
11
The 12 general Categories of Threats to
Information Security
• These represent a clear and present danger to
an organization’s people, information, and
systems.
• Each organization must prioritize the threats it
faces based on the particular security situation
in which it operates, its organizational strategy
regarding risk, and the exposure levels of its
assets.
12
13
Deviations in quality of service :
main terms
• Availability disruption: An interruption in service, usually from a
service provider, which causes an adverse event within an
organization.
• Downtime : The percentage of time a particular service is not
available; the opposite of uptime.
• Service level agreement (SLA): A document or part of a
document that specifies the expected
• Level of service from a service provider: An SLA usually contains
provisions for minimum acceptable availability and penalties or
remediation procedures for downtime.
• Uptime: The percentage of time a particular service is available;
the opposite of downtime.
14
Deviations
• An organization’s information system depends on the
successful operation of support systems including power
grids, data and telecommunications networks, parts suppliers,
service vendors, and janitorial staff and garbage haulers.
• These can be interrupted by severe weather, employee
illnesses, or other unforeseen events.
• Deviations in quality of service can result from such accidents
as a backhoe taking out an ISP’s fiber-optic link. The backup
provider may be online and in service, but may be able to
supply only a fraction of the bandwidth the organization
needs for full service.
• This degradation of service is a form of availability disruption.
Irregularities in Internet service, communications, and power
supplies can affect the availability of information and systems.
15
Internet Service Issues
• In organizations that rely heavily on the Internet and the
WWW to support continued operations, ISP failures can
considerably undermine the availability of information.
• Many organizations have sales staff and telecommuters
working at remote locations.
• When these off-site employees cannot contact the host
systems, they must use manual procedures to continue
operations.
• The U.S. government’s Federal Communications Commission
(FCC) maintains a Network Outage Reporting System (NORS),
which according to FCC regulation 47 C.F.R. Part 4, requires
communications providers to report outages that disrupt
communications at certain facilities, like emergency services
and airports.
16
Internet Service issues ..
• When an organization places its Web servers in the care of a Web
hosting provider, the provider assumes responsibility for all
Internet services and for the hardware and operating system
software used to operate the Web site.
• These Web hosting services are usually arranged with a service
level agreement (SLA). When a service provider fails to meet the
terms of the SLA, the provider may accrue fines to cover losses
incurred by the client, but these payments seldom cover the losses
generated by the outage.
• Vendors may promote high availability or uptime (or low
downtime), but even an availability that seems acceptably high can
cost the average organization a great deal (ref.fig.).
• In August 2013, the Amazon.com Web site went down for 30 to 40
minutes, costing the company between $3 million and $4 million.
17
Average Cost of online service provider
Downtime (per year) according to MegaPath
18
www.megapath.com/blog/blog-archive/
infographic-the-cost-of-downtime
19
Source: Megapath
20
Communications and Other
Service Provider Issues
21
Power Irregularities: main terms
• Blackout : A long-term interruption (outage) in electrical power
availability.
• Brownout: A long-term decrease in electrical power availability.
• Fault: A short-term interruption in electrical power availability.
• Noise: The presence of additional and disruptive signals in
network communications or electrical :power delivery.
• sag : A short-term decrease in electrical power availability.
• Spike: A short-term increase in electrical power availability,
also known as a swell.
• Surge: A long-term increase in electrical power availability.
22
Power irregularities..
• Irregularities from power utilities are common and can lead to fluctuations such as
power excesses, power shortages, and power losses.
• These fluctuations can pose problems for organizations that provide inadequately
conditioned power for their information systems equipment.
• In the United States, supply has 120-volt, 60-cycle power, through 15- and 20-amp
circuits.
• Europe and most of Africa, Asia, South America, and Australia use 230-volt, 50-
cycle power.
• Because of global travel by organizational employees, failure to properly adapt to
different voltage levels can damage computing equipment, resulting in a loss.
• When power voltage levels vary from normal, expected levels, such as during a
spike, surge, sag, fault, noise, brownout, or blackout, an organization’s sensitive
electronic equipment—especially networking equipment, computers, and
computer based systems, which are vulnerable to fluctuations—can be easily
damaged or destroyed.
• With small computers and network systems, quality power-conditioning options
such a surge suppressors can smooth out spikes. The more expensive
uninterruptible power supply (UPS) can protect against spikes and surges as well as
sags and even blackouts of limited duration.
23
Software attacks
• Deliberate software attacks occur when an
individual or group designs and deploys software to
attack a system.
• This attack can consist of specially crafted software
that attackers trick users into installing on their
systems.
• The specially crafted software can be used to
overwhelm the processing capabilities of online
systems or to gain access to protected systems by
hidden means.
24
Software attacks
• Malware: malicious code or malicious software
– Virus: code segments that perform malicious actions.
– Worms: can continue replicating themselves until they completely fill
available resources, such as memory, hard drive space, and network
bandwidth.
– Trojan Horses: can wreck havoc
– Polymorphic Threats: evolving & morphing
– Virus and Worm Hoaxes
• Back Doors: attacker gaining access to system or n/w through
back door
• Denial-of-Service (DoS) and Distributed Denial-of-Service
(DDoS) Attacks
• E-mail Attacks: mail bombs
25
Software attacks..
Communications Interception Attacks:
• Packet Sniffer: monitor data traveling over a network for
good or bad purpose
• Spoofing: obtains trusted IP addresses and then modifies
the packet headers to insert these forged addresses.
• Pharming: uses Trojans, worms, or other virus technologies
to attack an Internet browser’s address bar to make valid
URL to an illegitimate Web site.
• Man-in-the-Middle: an attacker monitors (or sniffs) packets
from the network, modifies them, and inserts them back
into the network. Ex.TCP hijacking / session hijacking.
26
Malware : main terms
• Malware: Computer software specifically designed to perform malicious or
unwanted actions (Malicious code/software).
• Adware: Malware intended to provide undesired marketing and advertising,
including popups and banners on a user’s screens.
• boot virus: Also known as a boot sector virus, a type of virus that targets the
boot sector or Master Boot Record (MBR) of a computer system’s hard drive
or removable storage media.
• macro virus: A type of virus written in a specific macro language to target
applications that use the language. The virus is activated when the
application’s product is opened. A macro virus typically affects documents,
slideshows, e-mails, or spreadsheets created by office suite applications.
• memory-resident virus: A virus capable of installing itself in a computer’s
operating system, starting when the computer is activated, and residing in
the system’s memory even after the host application is terminated. Also
known as a resident virus.
27
• non-memory-resident virus : A virus that terminates after it has been activated,
infected its host system, and replicated itself. NMR viruses do not reside in an
operating system or memory after executing. Also known as a non-resident virus.
• polymorphic threat : Malware (a virus or worm) that over time changes the way it
appears to antivirus software programs, making it undetectable by techniques that
look for preconfigured signatures.
• spyware : Any technology that aids in gathering information about people or
organizations without their knowledge.
• Trojan horse : A malware program that hides its true nature and reveals its
designed behavior only when activated.
• Virus: A type of malware that is attached to other executable programs. When
activated, it replicates and propagates itself to multiple systems, spreading by
multiple communications vectors. For example, a virus might send copies of itself
to all users in the infected system’s e-mail program.
• virus hoax : A message that reports the presence of a nonexistent virus or worm
and wastes valuable time as employees share the message.
• worm : A type of malware that is capable of activation and replication without
being attached to an existing program.
• zero-day attack : An attack that makes use of malware that is not yet known by the
anti-malware software companies.
28
Malware details
• Malware is referred to as malicious code or malicious software.
• Other attacks that use software, like redirect attacks and denial-of-service
attacks, also fall under this threat.
• These software components or programs are designed to damage, destroy,
or deny service to targeted systems.
• Note that the terminology used to describe malware is often not mutually
exclusive; for instance, Trojan horse malware may be delivered as a virus, a
worm, or both.
• Malicious code attacks include the execution of viruses, worms, Trojan
horses, and active Web scripts with the intent to destroy or steal
information.
• The most state-of-the-art malicious code attack is the polymorphic worm,
or multivector worm. These attack programs use up to six known attack
vectors to exploit a variety of vulnerabilities in common information system
devices.
• When an attack makes use of malware that is not yet known by the anti-
malware software companies, it is said to be a zero-day attack.
29
Malware …
• Other forms of malware include covert software applications—bots, spyware,
and adware.
• These are designed to work out of users’ sight or be triggered by an apparently
innocuous user action.
• Bots are often the technology used to implement Trojan horses, logic bombs,
back doors, and spyware.
• Spyware is placed on a computer to secretly gather information about the user
and report it.
– One type of spyware is a Web bug, a tiny graphic that is referenced within the
Hypertext Markup Language (HTML) content of a Web page or e-mail to collect
information about the user viewing the content.
– Another form of spyware is a tracking cookie, which is placed on users’ computers to
track their activity on different Web sites and create a detailed profile of their behavior.
• Each of these hidden code components can be used to collect user information
that could then be used in a social engineering or identity theft attack.
30
Malware study (2016)
Malware with biggest impact on computer users to date.
31
Computer virus
• A computer virus consists of code segments (programming instructions) that
perform malicious actions. This code behaves much like a virus pathogen that
attacks animals and plants, using the cell’s own replication machinery to
propagate the attack beyond the initial target.
• The code attaches itself to an existing program and takes control of the
program’s access to the targeted computer. The virus-controlled target program
then carries out the virus plan by replicating itself into additional targeted
systems.
• Often, users unwittingly help viruses get into a system. Opening infected e-mail
or some other seemingly trivial action can cause anything from random
messages appearing on a user’s screen to the destruction of entire hard drives.
• Computer viruses are passed from machine to machine via physical media, e-
mail, or other forms of computer data transmission.
• When these viruses infect a machine, they may immediately scan it for e-mail
applications or even send themselves to every user in the e-mail address book.
32
Virus..
33
Virus..
• Alternatively, viruses may be classified as memory-resident
viruses or non-memory-resident viruses, depending on whether
they persist in a computer system’s memory after they have been
executed.
• Resident viruses are capable of reactivating when the computer
is booted and continuing their actions until the system is shut
down, only to restart the next time the system is booted.
• In 2002, the author of the Melissa virus, David L. Smith of New
Jersey, was convicted in U.S. federal court and sentenced to 20
months in prison, a $5,000 fine, and 100 hours of community
service upon release.
• Viruses and worms can use several attack vectors to spread
copies of themselves to networked peer computers as shown..
34
Attack replication vectors
35
Worms
• Named for the tapeworm in John Brunner’s novel The
Shockwave Rider, worms can continue replicating themselves
until they completely fill available resources, such as
memory, hard drive space, and network bandwidth.
• Code Red, Sircam, Nimda (“admin” spelled backwards), and
Klez are examples of a class of worms that combine multiple
modes of attack into a single package.
• Figure next shows sample e-mails that contain the Nimda
(garbage in the Subject) and Sircam worms( stilted text, or
with .exe attachment). These newer worm variants contain
multiple exploits (polymorphic) that can use any predefined
distribution vector to programmatically distribute the worm.
36
Nimda and Sircam worms
37
Worms..
38
Klez worm
39
Worms..
• The complex behavior of worms can be initiated with or
without the user downloading or executing the file.
• After infecting a worm can redistribute itself to all e-mail
addresses found on the infected system. Furthermore, a
worm can deposit copies of itself onto all the reachable Web
servers; subsequent users visiting those sites become
infected.
• Worms also take advantage of open shares found on the
network in which an infected system is located. The worms
place working copies of their code onto the server so that
users
In 2003, of theLeeopen
Jeffrey Parson,shares are likely
an 18-year-old to become
high school student frominfected.
Minnesota, was
arrested for creating and distributing a variant of the Blaster worm called W32.Blaster-B. He
was sentenced to 18 months in prison, 3 years of supervised release, and 100 hours of
community service. The original Blaster worm was reportedly created by a Chinese hacker
group. 40
Trojan Horses
41
Trojan Horse attacks
42
Polymorphic Threats
• One of the biggest challenges to fighting
viruses and worms has been the emergence of
polymorphic threats.
• A polymorphic threat actually evolves,
changing its size and other external file
characteristics to elude detection by antivirus
software programs.
43
Virus and Worm Hoaxes
• Virus hoaxes involve waste of time and money for resolving. Well-meaning
people can disrupt the harmony and flow of an organization when they
send group e-mails warning of supposedly dangerous viruses that don’t
exist.
• When people fail to follow virus-reporting procedures in response to a
hoax, the network becomes overloaded and users waste time and energy
forwarding the warning message to everyone they know, posting the
message on bulletin boards, and trying to update their antivirus protection
software.
• Some hoaxes are the chain letters or chain e-mails of the day, which are
designed to annoy or bemuse the reader.
• They are known as “weapons of mass distraction.” One of the most
prominent virus hoaxes was the 1994 “Goodtimes virus,” which reportedly
was transmitted in an e-mail with the header “Good Times” or
“goodtimes.”
• The virus never existed, and thousands of hours of employee time were
wasted retransmitting the e-mail, effectively creating a denial of service. 44
Hoax ..
• At one time, hoaxes amounted to little more than pranks;
although occasionally a sting was attached.
• For example, the Teddy Bear hoax tricked users into
deleting necessary operating system files, which made their
systems stop working.
• Criminals have been able to monetize the hoax virus by
claiming that systems are infected with malware and then
selling a cure for a problem that does not exist.
• The perpetrator of the hoax may then offer to sell a fake
antivirus program to correct the fake malware.
• Several Internet resources enable people to research
viruses and determine if they are fact or fiction.
45
Back doors
• It is a malware payload that provides access to a system by
bypassing normal access controls. It may also be an
intentional access control bypass left by a system designer to
facilitate development. Maintenance hook & trap door are
also important.
• Using a known or newly discovered access mechanism, an
attacker can gain access to a system or network resource
through a back door.
• Viruses and worms can have a payload that installs a back
door or trap door component in a system, allowing the
attacker to access the system at will with special privileges.
• Examples of such payloads include Subseven and Back Orifice.
46
Back doors
• Sometimes these doors are left behind by system
designers or maintenance staff; such a door is referred
to as a maintenance hook.
• More often, attackers place a back door into a system or
network they have compromised, making their return to
the system that much easier the next time.
• A trap door is hard to detect because the person or
program that places it often makes the access exempt
from the system’s usual audit logging features and
makes every attempt to keep the back door hidden from
the system’s legitimate owners.
47
Denial-of-Service (DoS) and Distributed Denial-of-Service
(DDoS) Attacks
49
DDOS
• There are some cooperative efforts to enable DDoS defenses among groups of
service providers;
• an example is the Consensus Roadmap for Defeating Distributed Denial of
Service Attacks.
• To use a popular metaphor, DDoS is considered a weapon of mass destruction
on the Internet.
• The MyDoom worm attack in February 2004 was intended to be a DDoS attack
against www.sco.com, the Web site of a vendor for a UNIX operating system.
• Allegedly, the attack was payback for the SCO Group’s perceived hostility
toward the open-source Linux community.
• Any system connected to the Internet and providing TCP-based network
services (such as a Web server, FTP server, or mail server) is vulnerable to DoS
attacks.
• DoS attacks can also be launched against routers or other network server
systems if these hosts enable other TCP services, such as echo.
50
Denial-of-service attack
51
Prominent DOS attacks
• Prominent in the history of notable DoS attacks are those conducted
by Michael Calce (a.k.a. Mafiaboy) on Amazon.com, CNN.com,
ETrade.com, ebay.com, Yahoo.com, Excite.com, and Dell.com.
• These software-based attacks lasted approximately four hours and
reportedly resulted in millions of dollars in lost revenue.
• The British ISP CloudNine is believed to be the first business “hacked
out of existence” by a DoS attack in January 2002.
• This attack was similar to the DoS attacks launched by Mafiaboy in
February 2000.
• In January 2016, a group calling itself New World Hacking attacked
the BBC’s Web site. If the scope of the attack is verified, it would
qualify as the largest DDoS attack in history, with an attack rate of 602
Gbps (gigabits per second). The group also hit Donald Trump’s
campaign Web site on the same day.
52
E-mail Attacks: mail bombs & spams
Mail bomb: An attack designed to overwhelm the receiver with excessive
quantities of e-mail. It is a kind of DoS attack. It can be done using traditional
e-mailing techniques or by exploiting various technical flaws in the Simple
Mail Transport Protocol (SMTP).
• The target of the attack receives an unmanageably large volume of
unsolicited e-mail.
• By sending large e-mails with forged header information, attackers can take
advantage of poorly configured e-mail systems on the Internet and trick
them into sending many e-mails to an address of the attackers’ choice. If
many such systems are tricked into participating, the target e-mail address
is buried under thousands or even millions of unwanted e-mails.
• Although phishing attacks occur via e-mail, they are commonly associated
with a method of social engineering designed to trick users to perform an
action, rather than simply making the user a target of a DoS e-mail attack.
53
Spam: e-mail attack
• Spam is unsolicited commercial e-mail. While many consider
spam a trivial nuisance rather than an attack, it has been used
as a means of enhancing malicious code attacks.
• In March 2002, there were reports of malicious code
embedded in MP3 files that were included as attachments to
spam.
• The most significant consequence of spam, however, is the
waste of computer and human resources. Many organizations
attempt to cope with the flood of spam by using e-mail
filtering technologies.
• Other organizations simply tell users of the mail system delete
unwanted messages.
54
Communications Interception Attacks
55
Communications attack
• Common software-based communications attacks include
several subcategories designed to intercept and collect
information in transit. These types of attacks include
sniffers, spoofing, pharming, and man-in-the-middle attacks.
• The emergence of the Internet of Things (IoT)—the addition
of communications and interactivity to everyday objects—
increases the possibility of these types of attacks.
• Our automobiles, appliances, and entertainment devices
along with smartphones are being interconnected and
remotely controlled. The security of these devices has not
always been a primary concern.
56
Packet Sniffer
• A packet sniffer (or simply sniffer) can monitor data traveling over
a network. Sniffers can be used both for legitimate network
management functions and for stealing information.
• Unauthorized sniffers can be extremely dangerous to a network’s
security because they are hard to detect and can be inserted
almost anywhere.
• This feature makes them a favorite weapon in the hacker’s arsenal.
Sniffers often work on TCP/IP networks.
• Sniffers add risk to network communications because many
systems and users send information on local networks in clear
text.
• A sniffer program shows all the data going by, including passwords,
the data inside files (such as word-processing documents), and
sensitive data from applications.
57
Spoofing and Pharming
58
IP Spoofing attack
59
Man in the middle attack
• In the well-known man-in-the-middle attack, an attacker monitors
(or sniffs) packets from the network, modifies them, and inserts
them back into the network.
• In a TCP hijacking attack, also known as session hijacking, the
attacker uses address spoofing to impersonate other legitimate
entities on the network. It allows the attacker to eavesdrop as
well as to change, delete, reroute, add, forge, or divert data.
• A variant of TCP hijacking involves the interception of an
encryption key exchange, which enables the hacker to act as an
invisible man in the middle—that is, an eavesdropper—on
encrypted communications. Fig. next illustrates these attacks by
showing how a hacker uses public and private encryption keys to
intercept messages.
60
Man in the middle attack
61
END
62