L8 - L9 Malicious Software and Firewalls Flashcards
What is malware?
Programs designed to exploit vulnerabilities in computer systems.
Name 4 types of malware that need hosts.
- Virus
- Trapdoor
- Trojan Hourses
- Logic Bombs
Name to types of malware that do not need a host.
- Worm
- Zombie
Name three types of malware that do not replicate.
- Trapdoors
- Logic bombs
- Trojan horses
Name three types of malware that do replicate.
- Viruses
- Worms
- Zombies
What is a Trap door?
- A secret entry point into a program
- Sometimes trap doors are added to facilitate programmers to debug and test.
- Become a threat when used to gain unauthorized access
What is a logic bomb?
Code embedded in a legitimate program that is triggered when certain conditions are met.
Triggers include
Particular date
Presence of absence of a file
Particular user running a particular program
The code is said to ‘explode’, the damage it causes
include:
Deleting data or files
Causing machine to halt
What is a Trojan horse?
- Program that has hidden code which when invoked performs an unwanted of harmful action
What is a Zombie?
- Program that takes over another networked computer.
- Used to launch an attack which is subsequently difficult to trace back to the creator of the zombie.
- Denial of Service attack, many computers infected by the zombie are used to overwhelm a target website
What is a Virus?
- A program that inserts itself into one or more programs bymodifying them.
- This modification includes a copy of the virus program.
- This enables the virus to spread
- The virus is attached to another program and executes when this host program is run.
- The virus does not just copy itself, it can perform other actions such a deleting files, etc.
- Most viruses often designed for specific operating systems, possibly specific hardware. They are designed to take advantage of the weaknesses of particular systems.
What are the four phases of a virus?
- Dormant Phase - Virus is idle and waiting for an activation event, e.g. a date. Not all viruses have this stage
- Propagation Phase - Virus copies itself into other programs or system areas
- Triggering Phase - Virus is activated to perform an action. The trigger can be any number of events, such as a count of the number of times it has replicated
- Execution Phase - The action is performed. This can range from harmless such as a message, to destruction of data and programs
Name 5 types of viruses
- Parasitic
- Memory Resident
- Boot Sector
- Stealth
- Polymorphic
What are worms?
- A malicious program that replicates itself but does not require a host program. It is a stand-alone program.
- It actively seeks to infect other machines.
- Network worms use network connections to spread.
- Exhibit similar characteristics (the phases of a virus).
- Inn addition, once a worm is active it can perform a destructive action in the infected system.
- One of the first worms was written at Xerox PARC: aprogram looking for idle processors assigning them tasks
What is a firewall?
- A firewall is a machine standing between the local network and the Internet filtering out traffic that might be harmful
- All traffic from inside to outside must pass through the firewall, which is achieved by physically blocking all access to the local network except via the firewall
- Only authorized traffic, which is defined by the local security policy, will be allowed to pass
- The firewall is immune to penetration.
- A firewall defines a single choke point, this simplifies
security management because the security capabilities are consolidated on a single system (or set of systems). - Audits and alarms can be implemented on the firewall
system.The firewall can also be used for non-security related functions. For example Internet usage logs.
Name the three levels / types of firewalls
Filtering can be done at three levels
- Packet Filtering
- Circuit Gateway
- Application Gateway
What is Packet Filtering?
- Data transmitted over the Internet is split into packets.
- Each packet has a header containing several pieces of information including source and destination IP address.
- The firewall applies a set of rules to the contents of the header from each IP packet.
- Depending on the outcome of the rules, the firewall either forwards or discards the packet
- Note packets can be filtered in both directions, (incoming and outgoing data).
What is Application Level Filtering?
- This firewall works as a proxy for one or more services.
- It acts as an intermediary between the internal networkand the Internet. No direct communication between machines within
- Works at the level of applications.
- Examples include a mail filter that attempts to remove spam, or web proxies that block content.
- Tends to be more secure than packet filters
What is a Circuit- Level Gateway?
- Acts as an intermediary, similar to the Application Gateway.
- Not so in depth monitoring as Application-Level, it examines only packet address and port information
- Data not requested from a machine within the firewall will be automatically discarded
- Home DSL routers are typically of this type. Since it is easy to combine it with Internet sharing capabilities.
What is a DMZ?
- You can have more than one firewall in a system, first firewall creates a demilitarized zone (DMZ)
- DMZ is then connected to internal networks via further filters
Which two parts typically comprise a virus?
- a replication mechanism
- a payload
What is a polymorphic virus?
- Polymorphic - Creates copies of itself that are functionally equivalent but are different programs.
- This is can be achieved by
- randomly inserting superfluous instructions and changing order of instructions.
- Encryption can be used to change the program.
- A random key is generated by a part of the virus called the mutation Engine. This is used to encrypt the remainder of the virus.
- The key is stored with the virus and the mutation engine is itself altered.
- When the virus replicates, a different key is randomly chosen
What is a Stealth Virus?
- A type of virus that attempts to hide itself fromdetection.
- The virus may intercept I/O routines, so when these routines are called the virus presents back the original uninfected program details
- When a virus appends itself to a program, the file gets longer. So an infected program is easy to detect through the change in file size.
- A stealth approach is to compress the host program such that the combined virus length and compressed host program length is the same as the original uninfected program.
- The virus contains decompress capability so that the host program will execute properly once the virus itself has completed running.
What is the payload of a virus?
- This will usually be activated by a trigger, such as a date, and then do a number of bad things:
- Make selective (or random) changes to the machine’s protection state
- Make changes to user data
- Lock the network
- Install spyware or adware
- Install a rootkit
What is the most common way for a virus to replicate itself?
- The most common way for a virus to replicate is to append itself to an executable file and patch itself in:
- The execution path jumps to the virus code and then back o the original program

What is a parasitic virus?
Most common type. It attaches itself to executable files and when the program is executed, the virus replicates by finding other executables to infect.
What is a memory resident virus?
Remains in main memory and infects
every program that executes
What is a boot sector virus?
Spread whenever a system is booted from a disk containing the virus. This virus infects the master boot record.
Name the three levels countermeasures act on once a virus has entered a system
- Detection, determine that a virus is in the system and locate it.
- Identification, Identify the specific virus
- Removal, Once identified remove all traces of the virus code and restore the infected host program(s) to their original state.
What are two advanced antivirus techniques?
- Generic Decryption
- Digital Immune System
What is Behaviour Blocking?
- It is software that monitors program behaviour in real-time for malicious actions. It then blocks the action before it can do any damage.
- Monitored behaviour includes
- Attempts to open, edit or delete files
- Attempts to format disk drives and other unrecoverable disk
- operations
- Attempts to modify critical system settings such as startup
- settings
- Attempts to modify executable files scripts and macros
- attempts to send executable files via email or instant
- messaging
- Attempts to initiate network communications
- The software not just block actions it can also terminate the
- program that is initiating the actions
What is Generic Decryption?
- Generic Decryption is used to identify complex polymorphic viruses that use encryption to disguise themselves.
- It does this by having a complete software based virtual computer.
- A program to be scanned , is executed within this emulator.
- If the program contains a polymorphic virus, then at some point the main body of the viruses will be decrypted
- Periodically the emulator will be halted and the code is scanned for virus signatures.
- The actual computer is safe because the code is being run in a completely controlled environment
What is a digital immune system?
Objective is to provide fast response times so that novel
viruses can be detected and removed as soon as they
introduced
- Each client machine has its own virus monitoring program. This program forwards any program deemed to besuspicious to an administration machine
- The administration machine sends via encryption the program to a central virus analysis machine
- This machine then runs the program in a protected environment and monitors it. It then produces a prescription for identifying and removing the virus
- This prescription is sent back to the administrative machine which in turn, sends it to the infected machine, and all the other machines in the network.
- The virus analysis machine also sends this prescription to other organisations. Individual subscribers would also receive this prescription with the next antivirus update.