SlideShare a Scribd company logo
WELCOME
Submitted by,
Devika.S
Social Science
Mannam Foundation Centre for
Education Technology
Reg. No: 16915373002
Malware
Welcome to the zoo
• What malware are
• How do they infect hosts
• Zoo visit !
• How to detect them
• Worms
What is a malware ?
• A Malware is a set of instructions that
run on your computer and make your
system do something that an attacker
wants it to do.
What it is good for ?
• Steal personal information
• Delete files
• Click fraud
• Steal software serial numbers
• Use your computer as relay
The Malware Zoo
• Virus
• Backdoor
• Trojan horse
• Rootkit
• Scareware
• Adware
• Worm
What is a Virus ?
• a program that can infect other programs by
modifying them to include a, possibly
evolved, version of itself
• Fred Cohen 1983
Some Virus Type
• Polymorphic : uses a polymorphic
engine to mutate while keeping the
original algorithm intact (packer)
• Methamorpic : Change after each
infection
What is a trojan
A trojan describes the class of malware that appears
to perform a desirable function but in fact performs
undisclosed malicious functions that allow
unauthorized access to the victim computer
Wikipedia
What is rootkit
• A root kit is a component that uses
stealth to maintain a persistent and
undetectable presence on the machine
• Symantec
What is a worm
A computer worm is a self-replicating computer
program. It uses a network to send copies of itself
to other nodes and do so without any user
intervention.
Macro virus
• Use the builtin script engine
• Example of call back used (word)
• AutoExec()
• AutoClose()
• AutoOpen()
• AutoNew()
MBR/Bootkit
• Bootkits can be used to avoid all
protections of an OS, because OS
consider that the system was in trusted
stated at the moment the OS boot loader
took control.
Detection
Outline
• What malware are
• Zoo visit !
• How to detect them
• Worms
Anti-virus
• Analyze system
behavior
• Analyze binary to
decide if it a virus
• Type :
• Scanner
• Real time monitor
Worms
Outline
• What malware are
• How do they infect hosts
• How do they propagate
• Zoo visit !
• How to detect them
• Worms
19
Some historical worms of
note
Worm Date Distinction
Morris 11/88 Used multiple vulnerabilities, propagate to “nearby” sys
ADM 5/98 Random scanning of IP address space
Ramen 1/01 Exploited three vulnerabilities
Lion 3/01 Stealthy, rootkit worm
Cheese 6/01 Vigilante worm that secured vulnerable systems
Code Red 7/01 First sig Windows worm; Completely memory resident
Walk 8/01 Recompiled source code locally
Nimda 9/01 Windows worm: client-to-server, c-to-c, s-to-s, …
Scalper 6/02
11 days after announcement of vulnerability; peer-to-peer
network of compromised systems
Slammer 1/03 Used a single UDP packet for explosive growth
Kienzle and Elder
20
How do worms propagate?
Scanning worms : Worm chooses “random” address
Coordinated scanning : Different worm instances scan different addresses
Flash worms
 Assemble tree of vulnerable hosts in advance, propagate along tree
 Not observed in the wild, yet
 Potential for 106 hosts in < 2 sec ! [Staniford]
Meta-server worm :Ask server for hosts to infect (e.g., Google for
“powered by phpbb”)
Topological worm: Use information from infected hosts (web server logs,
email address books, config files, SSH “known hosts”)
Contagion worm : Propagate parasitically along with normally initiated
communication
Consequences
• ATM systems not available
• Phone network overloaded (no 911!)
• 5 DNS root down
• Planes delayed
22
Worm Detection and Defense
Detect via honeyfarms: collections of “honeypots” fed
by a network telescope.
 Any outbound connection from honeyfarm = worm.
• (at least, that’s the theory)
 Distill signature from inbound/outbound traffic.
 If telescope covers N addresses, expect detection when worm
has infected 1/N of population.
Thwart via scan suppressors: network elements that
block traffic from hosts that make failed connection
attempts to too many other hosts
5 minutes to several weeks to write a signature
Several hours or more for testing
23
1 (B)1 (A)
Address Dispersion Table
Sources Destinations
1
Prevalence Table
Detector in
network
A
B
cnn.com
C
DE
(Stefan Savage, UCSD *)
24
1 (A)1 (C)
1 (B)1 (A)
Address Dispersion Table
Sources Destinations
1
1
Prevalence Table
Detector in
network
A
B
cnn.com
C
DE
(Stefan Savage, UCSD *)
25
1 (A)1 (C)
2 (B,D)2 (A,B)
Address Dispersion Table
Sources Destinations
1
2
Prevalence Table
Detector in
network
A
B
cnn.com
C
DE
(Stefan Savage, UCSD *)
26
Challenges
Computation
 To support a 1Gbps line rate we have 12us to process each
packet, at 10Gbps 1.2us, at 40Gbps…
 Dominated by memory references; state expensive
 Content sifting requires looking at every byte in a packet
State
 On a fully-loaded 1Gbps link a naïve implementation can easily
consume 100MB/sec for table
 Computation/memory duality: on high-speed (ASIC)
implementation, latency requirements may limit state to
on-chip SRAM
(Stefan Savage, UCSD *)
Thank You

More Related Content

Viewers also liked

Output
OutputOutput
Output
galaxy201
 
Output
OutputOutput
Output
galaxy201
 
Output
OutputOutput
Output
galaxy201
 
Malware
MalwareMalware
Malware
galaxy201
 
Output
OutputOutput
Output
galaxy201
 
Output
OutputOutput
Output
galaxy201
 
Output
OutputOutput
Output
galaxy201
 
Output
OutputOutput
Output
galaxy201
 
Presentation1
Presentation1Presentation1
Presentation1
galaxy201
 
Devika presentation
Devika presentationDevika presentation
Devika presentation
sudha softisland
 
Power Point Presentation
Power Point PresentationPower Point Presentation
Power Point Presentation
sudha softisland
 
Output
OutputOutput
Output
galaxy201
 
Akshayaprojectppt
AkshayaprojectpptAkshayaprojectppt
Akshayaprojectppt
galaxy201
 
Emailppt 111110054525-phpapp02
Emailppt 111110054525-phpapp02Emailppt 111110054525-phpapp02
Emailppt 111110054525-phpapp02
galaxy201
 

Viewers also liked (14)

Output
OutputOutput
Output
 
Output
OutputOutput
Output
 
Output
OutputOutput
Output
 
Malware
MalwareMalware
Malware
 
Output
OutputOutput
Output
 
Output
OutputOutput
Output
 
Output
OutputOutput
Output
 
Output
OutputOutput
Output
 
Presentation1
Presentation1Presentation1
Presentation1
 
Devika presentation
Devika presentationDevika presentation
Devika presentation
 
Power Point Presentation
Power Point PresentationPower Point Presentation
Power Point Presentation
 
Output
OutputOutput
Output
 
Akshayaprojectppt
AkshayaprojectpptAkshayaprojectppt
Akshayaprojectppt
 
Emailppt 111110054525-phpapp02
Emailppt 111110054525-phpapp02Emailppt 111110054525-phpapp02
Emailppt 111110054525-phpapp02
 

Similar to 10 malware

Network administration
Network administrationNetwork administration
Network administration
JobUrban.com
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
rajakhurram
 
Malware
MalwareMalware
Malware
Tuhin_Das
 
Botnets Attacks.pptx
Botnets Attacks.pptxBotnets Attacks.pptx
Botnets Attacks.pptx
MuhammadRehan856177
 
Virus vs worms vs trojans
Virus vs worms vs trojansVirus vs worms vs trojans
Virus vs worms vs trojans
Sreekanth Narendran
 
10-malware.ppt
10-malware.ppt10-malware.ppt
10-malware.ppt
KANNANT30
 
10-malware.ppt
10-malware.ppt10-malware.ppt
10-malware.ppt
KANNANT30
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
diarfirstdiarfirst
 
Phases of penetration testing
Phases of penetration testingPhases of penetration testing
Phases of penetration testing
Abdul Rahman
 
Netforts
Netforts Netforts
Internet Security
Internet SecurityInternet Security
Internet SecurityManoj Sahu
 
Алексей Старов - Как проводить киберраследования?
Алексей Старов - Как проводить киберраследования?Алексей Старов - Как проводить киберраследования?
Алексей Старов - Как проводить киберраследования?
HackIT Ukraine
 
Malicious software group 24
Malicious software group 24Malicious software group 24
Malicious software group 24
Muhammad Zain
 
Viruses &amp; worms
Viruses &amp; wormsViruses &amp; worms
Viruses &amp; worms
vivek pratap singh
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
patelripal99
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System ThreatsReddhi Basu
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9koolkampus
 
Dealing with legacy code
Dealing with legacy codeDealing with legacy code
Dealing with legacy code
G Prachi
 
Computer worm
Computer wormComputer worm
Computer wormzelkan19
 

Similar to 10 malware (20)

Network administration
Network administrationNetwork administration
Network administration
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
Malware
MalwareMalware
Malware
 
Botnets Attacks.pptx
Botnets Attacks.pptxBotnets Attacks.pptx
Botnets Attacks.pptx
 
Virus vs worms vs trojans
Virus vs worms vs trojansVirus vs worms vs trojans
Virus vs worms vs trojans
 
10-malware.ppt
10-malware.ppt10-malware.ppt
10-malware.ppt
 
10-malware.ppt
10-malware.ppt10-malware.ppt
10-malware.ppt
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Phases of penetration testing
Phases of penetration testingPhases of penetration testing
Phases of penetration testing
 
Netforts
Netforts Netforts
Netforts
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Rapid malware defenses
Rapid malware defensesRapid malware defenses
Rapid malware defenses
 
Алексей Старов - Как проводить киберраследования?
Алексей Старов - Как проводить киберраследования?Алексей Старов - Как проводить киберраследования?
Алексей Старов - Как проводить киберраследования?
 
Malicious software group 24
Malicious software group 24Malicious software group 24
Malicious software group 24
 
Viruses &amp; worms
Viruses &amp; wormsViruses &amp; worms
Viruses &amp; worms
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System Threats
 
Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9Intruders and Viruses in Network Security NS9
Intruders and Viruses in Network Security NS9
 
Dealing with legacy code
Dealing with legacy codeDealing with legacy code
Dealing with legacy code
 
Computer worm
Computer wormComputer worm
Computer worm
 

More from Suresh Palace

Img006
Img006Img006
Img005
Img005Img005
Innovative lesson avani krishna
Innovative lesson  avani krishnaInnovative lesson  avani krishna
Innovative lesson avani krishna
Suresh Palace
 
Innovative work avani krishna
Innovative work avani krishnaInnovative work avani krishna
Innovative work avani krishna
Suresh Palace
 
From a railway carriage
From a railway carriageFrom a railway carriage
From a railway carriage
Suresh Palace
 
Power point dying river new
Power point dying river   newPower point dying river   new
Power point dying river new
Suresh Palace
 
Online Assignment Language Forums
Online Assignment Language ForumsOnline Assignment Language Forums
Online Assignment Language Forums
Suresh Palace
 
Online Assignment Language Forums
Online Assignment Language ForumsOnline Assignment Language Forums
Online Assignment Language Forums
Suresh Palace
 
Presentation
PresentationPresentation
Presentation
Suresh Palace
 
Presentation
PresentationPresentation
Presentation
Suresh Palace
 
Innovative Teaching Manuel
Innovative Teaching Manuel Innovative Teaching Manuel
Innovative Teaching Manuel
Suresh Palace
 
Sentrifugation
SentrifugationSentrifugation
Sentrifugation
Suresh Palace
 
Simple pendulam
Simple pendulamSimple pendulam
Simple pendulam
Suresh Palace
 

More from Suresh Palace (13)

Img006
Img006Img006
Img006
 
Img005
Img005Img005
Img005
 
Innovative lesson avani krishna
Innovative lesson  avani krishnaInnovative lesson  avani krishna
Innovative lesson avani krishna
 
Innovative work avani krishna
Innovative work avani krishnaInnovative work avani krishna
Innovative work avani krishna
 
From a railway carriage
From a railway carriageFrom a railway carriage
From a railway carriage
 
Power point dying river new
Power point dying river   newPower point dying river   new
Power point dying river new
 
Online Assignment Language Forums
Online Assignment Language ForumsOnline Assignment Language Forums
Online Assignment Language Forums
 
Online Assignment Language Forums
Online Assignment Language ForumsOnline Assignment Language Forums
Online Assignment Language Forums
 
Presentation
PresentationPresentation
Presentation
 
Presentation
PresentationPresentation
Presentation
 
Innovative Teaching Manuel
Innovative Teaching Manuel Innovative Teaching Manuel
Innovative Teaching Manuel
 
Sentrifugation
SentrifugationSentrifugation
Sentrifugation
 
Simple pendulam
Simple pendulamSimple pendulam
Simple pendulam
 

Recently uploaded

Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 

Recently uploaded (20)

Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 

10 malware

  • 1. WELCOME Submitted by, Devika.S Social Science Mannam Foundation Centre for Education Technology Reg. No: 16915373002
  • 3. Welcome to the zoo • What malware are • How do they infect hosts • Zoo visit ! • How to detect them • Worms
  • 4. What is a malware ? • A Malware is a set of instructions that run on your computer and make your system do something that an attacker wants it to do.
  • 5. What it is good for ? • Steal personal information • Delete files • Click fraud • Steal software serial numbers • Use your computer as relay
  • 6. The Malware Zoo • Virus • Backdoor • Trojan horse • Rootkit • Scareware • Adware • Worm
  • 7. What is a Virus ? • a program that can infect other programs by modifying them to include a, possibly evolved, version of itself • Fred Cohen 1983
  • 8. Some Virus Type • Polymorphic : uses a polymorphic engine to mutate while keeping the original algorithm intact (packer) • Methamorpic : Change after each infection
  • 9. What is a trojan A trojan describes the class of malware that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the victim computer Wikipedia
  • 10. What is rootkit • A root kit is a component that uses stealth to maintain a persistent and undetectable presence on the machine • Symantec
  • 11. What is a worm A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes and do so without any user intervention.
  • 12. Macro virus • Use the builtin script engine • Example of call back used (word) • AutoExec() • AutoClose() • AutoOpen() • AutoNew()
  • 13. MBR/Bootkit • Bootkits can be used to avoid all protections of an OS, because OS consider that the system was in trusted stated at the moment the OS boot loader took control.
  • 15. Outline • What malware are • Zoo visit ! • How to detect them • Worms
  • 16. Anti-virus • Analyze system behavior • Analyze binary to decide if it a virus • Type : • Scanner • Real time monitor
  • 17. Worms
  • 18. Outline • What malware are • How do they infect hosts • How do they propagate • Zoo visit ! • How to detect them • Worms
  • 19. 19 Some historical worms of note Worm Date Distinction Morris 11/88 Used multiple vulnerabilities, propagate to “nearby” sys ADM 5/98 Random scanning of IP address space Ramen 1/01 Exploited three vulnerabilities Lion 3/01 Stealthy, rootkit worm Cheese 6/01 Vigilante worm that secured vulnerable systems Code Red 7/01 First sig Windows worm; Completely memory resident Walk 8/01 Recompiled source code locally Nimda 9/01 Windows worm: client-to-server, c-to-c, s-to-s, … Scalper 6/02 11 days after announcement of vulnerability; peer-to-peer network of compromised systems Slammer 1/03 Used a single UDP packet for explosive growth Kienzle and Elder
  • 20. 20 How do worms propagate? Scanning worms : Worm chooses “random” address Coordinated scanning : Different worm instances scan different addresses Flash worms  Assemble tree of vulnerable hosts in advance, propagate along tree  Not observed in the wild, yet  Potential for 106 hosts in < 2 sec ! [Staniford] Meta-server worm :Ask server for hosts to infect (e.g., Google for “powered by phpbb”) Topological worm: Use information from infected hosts (web server logs, email address books, config files, SSH “known hosts”) Contagion worm : Propagate parasitically along with normally initiated communication
  • 21. Consequences • ATM systems not available • Phone network overloaded (no 911!) • 5 DNS root down • Planes delayed
  • 22. 22 Worm Detection and Defense Detect via honeyfarms: collections of “honeypots” fed by a network telescope.  Any outbound connection from honeyfarm = worm. • (at least, that’s the theory)  Distill signature from inbound/outbound traffic.  If telescope covers N addresses, expect detection when worm has infected 1/N of population. Thwart via scan suppressors: network elements that block traffic from hosts that make failed connection attempts to too many other hosts 5 minutes to several weeks to write a signature Several hours or more for testing
  • 23. 23 1 (B)1 (A) Address Dispersion Table Sources Destinations 1 Prevalence Table Detector in network A B cnn.com C DE (Stefan Savage, UCSD *)
  • 24. 24 1 (A)1 (C) 1 (B)1 (A) Address Dispersion Table Sources Destinations 1 1 Prevalence Table Detector in network A B cnn.com C DE (Stefan Savage, UCSD *)
  • 25. 25 1 (A)1 (C) 2 (B,D)2 (A,B) Address Dispersion Table Sources Destinations 1 2 Prevalence Table Detector in network A B cnn.com C DE (Stefan Savage, UCSD *)
  • 26. 26 Challenges Computation  To support a 1Gbps line rate we have 12us to process each packet, at 10Gbps 1.2us, at 40Gbps…  Dominated by memory references; state expensive  Content sifting requires looking at every byte in a packet State  On a fully-loaded 1Gbps link a naïve implementation can easily consume 100MB/sec for table  Computation/memory duality: on high-speed (ASIC) implementation, latency requirements may limit state to on-chip SRAM (Stefan Savage, UCSD *)