Upload
smritisingh12
View
219
Download
0
Embed Size (px)
Citation preview
8/7/2019 network viruses
1/34
8/7/2019 network viruses
2/34
8/7/2019 network viruses
3/34
The most common include:Viruses, worms, and Trojan horses
IntrudersSpyware and adwareZero-day attacks(zero-hour attacks)
Denial of service attacks
8/7/2019 network viruses
4/34
What are Computer Viruses???
It is a computer program that can copyitself and infect a computer without
permission or knowledge of the user.
8/7/2019 network viruses
5/34
Some viruses are programmed to damagethe computer by damaging programs,deleting files, or reformatting the harddisk.
Others are not designed to do any damage,but simply replicate themselves andperhaps make their presence known by
presenting text, video, or audio messages.
8/7/2019 network viruses
6/34
Network Virus
Logic BombsBoot Virus(Disk Killer & Stone virus)Multipartite Virus(Invader, Flip & Tequila)Macro Virus(DMV, Nuclear)Trojan horseWormsProgram virus(Sunday, Cascade)
8/7/2019 network viruses
7/34
An intruder is somebody ("hacker" or
"cracker") attempting to break into ormisuse your system
8/7/2019 network viruses
8/34
Trojan horse programs Back door and remote administration
programs Denial of service Being an intermediary for another attack Unprotected Windows shares Mobile code (Java/JavaScript/ActiveX) Cross-site scripting Packet sniffing
8/7/2019 network viruses
9/34
It is the art of detecting intruders behind
attacks as unique persons.
Intruder Detection Systems try to detectwho is attacking a system by analyzing his
or her computational behavior or biometricbehavior.
8/7/2019 network viruses
10/34
Keystroke Dynamics (keystroke patterns, typing pattern,typing behavior)
Patterns using an interactive command interpreter: Commands used Commands sequence Accessed directories Character deletion
Patterns on the network usage: IP address used
ISP
Country City
Ports used TTL analysis Operating system used to attack Protocols used Connection times patterns
8/7/2019 network viruses
11/34
8/7/2019 network viruses
12/34
Spyware is a type of malware
Spyware programs can collect various types ofpersonal information,
Spyware is known to change computer settings,
8/7/2019 network viruses
13/34
Come bundled with other software
Web browser
W
eb Sites
8/7/2019 network viruses
14/34
CoolWebSearch,
Internet Optimizer
Hunt Bar, aka Win Tools or adware Websearch
Zango
Zlob Trojan, or just Zlob
8/7/2019 network viruses
15/34
It is a computer threat that tries to exploit
computer application vulnerabilities that areunknown to others or undisclosed to thesoftware developer.
8/7/2019 network viruses
16/34
An attacker attempts to prevent users fromaccessing information or services.
By targeting your computer and its networkconnection, or the computers and network of thesites you are trying to use, an attacker may be
able to prevent you from accessing email,websites, online accounts (banking, etc.), or otherservices that rely on the affected computer.
8/7/2019 network viruses
17/34
An attacker may use your computer to attackanother computer.
8/7/2019 network viruses
18/34
Not all disruptions to service are the result of aDoS. There may be technical problems with aparticular network, or system administrators.
The following symptoms could indicate a DoS orDDoS attack: unusually slow network performance (opening files or
accessing websites) unavailability of a particular website inability to access any website dramatic increase in the amount of spam you receive in
your account
8/7/2019 network viruses
19/34
8/7/2019 network viruses
20/34
Spamming
What is spam?
Where does it come from?
How much of a problem is spam?
What can we do to stop or minimize spam comingto your computer?
8/7/2019 network viruses
21/34
8/7/2019 network viruses
22/34
8/7/2019 network viruses
23/34
8/7/2019 network viruses
24/34
Experts believe that up to 90% of all email isnow generated by spam robots.
In 2007, for the first time, the total of spamemails surpassed genuine emails: 10.8 trillionto 10.5 trillion.
8/7/2019 network viruses
25/34
8/7/2019 network viruses
26/34
Spam can be used to spread computer viruses,Trojan horses or other malicious software. Theobjective may be identity theft or fraud.
Some spam attempts to capitalize on human greedwhilst other attempts to use the victims'inexperience with computer technology to trick
them, eg, phishing.
8/7/2019 network viruses
27/34
BAD FOR YOU:
Wastes bandwidth and YOUR valuable downloadallowance
Wastes YOUR time dealing with it
May contain malware than can infect YOUR
computer
May cost YOU money if you get tricked into givingout sensitive information
8/7/2019 network viruses
28/34
BAD FOR BUSINESS:
Spam affects productivity, i.e., wastes time and,in business, TIME IS MONEY.
In Australia, the time and bandwidth lost to spamis estimated to cost business $2 billion a year.
In the US, a national survey in 2004 found that
workers spend 2.8 minutes a day deleting spam ata cost to business of $21.6 billion p.a. in lostproductivity.
8/7/2019 network viruses
29/34
Spam can be categorized into two main types:
Emails that try to sell you something, e.g.
Viagra or a fake Rolex watch, orEmails that try to steal your confidential or
personal information, eg online banking logindetails, credit card details, or social securitynumber (in the US).
8/7/2019 network viruses
30/34
The type of spam that tries to trick you, in orderto steal your personal information, is also knownas phishing.
The outcome to you can be very costly you canlose a lot of money through fraudulent use of youronline identity by cyber criminals.
8/7/2019 network viruses
31/34
8/7/2019 network viruses
32/34
case study
8/7/2019 network viruses
33/34
Google case study
8/7/2019 network viruses
34/34