network viruses

Embed Size (px)

Citation preview

  • 8/7/2019 network viruses

    1/34

  • 8/7/2019 network viruses

    2/34

  • 8/7/2019 network viruses

    3/34

    The most common include:Viruses, worms, and Trojan horses

    IntrudersSpyware and adwareZero-day attacks(zero-hour attacks)

    Denial of service attacks

  • 8/7/2019 network viruses

    4/34

    What are Computer Viruses???

    It is a computer program that can copyitself and infect a computer without

    permission or knowledge of the user.

  • 8/7/2019 network viruses

    5/34

    Some viruses are programmed to damagethe computer by damaging programs,deleting files, or reformatting the harddisk.

    Others are not designed to do any damage,but simply replicate themselves andperhaps make their presence known by

    presenting text, video, or audio messages.

  • 8/7/2019 network viruses

    6/34

    Network Virus

    Logic BombsBoot Virus(Disk Killer & Stone virus)Multipartite Virus(Invader, Flip & Tequila)Macro Virus(DMV, Nuclear)Trojan horseWormsProgram virus(Sunday, Cascade)

  • 8/7/2019 network viruses

    7/34

    An intruder is somebody ("hacker" or

    "cracker") attempting to break into ormisuse your system

  • 8/7/2019 network viruses

    8/34

    Trojan horse programs Back door and remote administration

    programs Denial of service Being an intermediary for another attack Unprotected Windows shares Mobile code (Java/JavaScript/ActiveX) Cross-site scripting Packet sniffing

  • 8/7/2019 network viruses

    9/34

    It is the art of detecting intruders behind

    attacks as unique persons.

    Intruder Detection Systems try to detectwho is attacking a system by analyzing his

    or her computational behavior or biometricbehavior.

  • 8/7/2019 network viruses

    10/34

    Keystroke Dynamics (keystroke patterns, typing pattern,typing behavior)

    Patterns using an interactive command interpreter: Commands used Commands sequence Accessed directories Character deletion

    Patterns on the network usage: IP address used

    ISP

    Country City

    Ports used TTL analysis Operating system used to attack Protocols used Connection times patterns

  • 8/7/2019 network viruses

    11/34

  • 8/7/2019 network viruses

    12/34

    Spyware is a type of malware

    Spyware programs can collect various types ofpersonal information,

    Spyware is known to change computer settings,

  • 8/7/2019 network viruses

    13/34

    Come bundled with other software

    Web browser

    W

    eb Sites

  • 8/7/2019 network viruses

    14/34

    CoolWebSearch,

    Internet Optimizer

    Hunt Bar, aka Win Tools or adware Websearch

    Zango

    Zlob Trojan, or just Zlob

  • 8/7/2019 network viruses

    15/34

    It is a computer threat that tries to exploit

    computer application vulnerabilities that areunknown to others or undisclosed to thesoftware developer.

  • 8/7/2019 network viruses

    16/34

    An attacker attempts to prevent users fromaccessing information or services.

    By targeting your computer and its networkconnection, or the computers and network of thesites you are trying to use, an attacker may be

    able to prevent you from accessing email,websites, online accounts (banking, etc.), or otherservices that rely on the affected computer.

  • 8/7/2019 network viruses

    17/34

    An attacker may use your computer to attackanother computer.

  • 8/7/2019 network viruses

    18/34

    Not all disruptions to service are the result of aDoS. There may be technical problems with aparticular network, or system administrators.

    The following symptoms could indicate a DoS orDDoS attack: unusually slow network performance (opening files or

    accessing websites) unavailability of a particular website inability to access any website dramatic increase in the amount of spam you receive in

    your account

  • 8/7/2019 network viruses

    19/34

  • 8/7/2019 network viruses

    20/34

    Spamming

    What is spam?

    Where does it come from?

    How much of a problem is spam?

    What can we do to stop or minimize spam comingto your computer?

  • 8/7/2019 network viruses

    21/34

  • 8/7/2019 network viruses

    22/34

  • 8/7/2019 network viruses

    23/34

  • 8/7/2019 network viruses

    24/34

    Experts believe that up to 90% of all email isnow generated by spam robots.

    In 2007, for the first time, the total of spamemails surpassed genuine emails: 10.8 trillionto 10.5 trillion.

  • 8/7/2019 network viruses

    25/34

  • 8/7/2019 network viruses

    26/34

    Spam can be used to spread computer viruses,Trojan horses or other malicious software. Theobjective may be identity theft or fraud.

    Some spam attempts to capitalize on human greedwhilst other attempts to use the victims'inexperience with computer technology to trick

    them, eg, phishing.

  • 8/7/2019 network viruses

    27/34

    BAD FOR YOU:

    Wastes bandwidth and YOUR valuable downloadallowance

    Wastes YOUR time dealing with it

    May contain malware than can infect YOUR

    computer

    May cost YOU money if you get tricked into givingout sensitive information

  • 8/7/2019 network viruses

    28/34

    BAD FOR BUSINESS:

    Spam affects productivity, i.e., wastes time and,in business, TIME IS MONEY.

    In Australia, the time and bandwidth lost to spamis estimated to cost business $2 billion a year.

    In the US, a national survey in 2004 found that

    workers spend 2.8 minutes a day deleting spam ata cost to business of $21.6 billion p.a. in lostproductivity.

  • 8/7/2019 network viruses

    29/34

    Spam can be categorized into two main types:

    Emails that try to sell you something, e.g.

    Viagra or a fake Rolex watch, orEmails that try to steal your confidential or

    personal information, eg online banking logindetails, credit card details, or social securitynumber (in the US).

  • 8/7/2019 network viruses

    30/34

    The type of spam that tries to trick you, in orderto steal your personal information, is also knownas phishing.

    The outcome to you can be very costly you canlose a lot of money through fraudulent use of youronline identity by cyber criminals.

  • 8/7/2019 network viruses

    31/34

  • 8/7/2019 network viruses

    32/34

    case study

  • 8/7/2019 network viruses

    33/34

    Google case study

  • 8/7/2019 network viruses

    34/34