Security Computing-2-Attacks
Security Computing-2-Attacks
Information Technology
Lecture 2
Security Mechanisms
Attacks Methods
Lecture Schedule
Foundations
1. Introduction
2. Security mechanisms, attack methods
Basic mechanisms
3. Elementary cryptography
4. Authentication
5. Access control
Major computing security areas
6. Operating systems
7. Databases
8. Networks
9. Web
10. Mobile computing
Applications
11. Social networks
SecComp Lecture 212. Internet banking 2
Lecture Topics
SecComp Lecture 2 3
The Security Process
Security is not a static feature
New threats emerge regularly
Technology changes
New vulnerabilities are discovered in old
systems
People change, forget practices, …
Security life cycle (infinite loop)
Plan
Implement
Evaluate
SecComp Lecture 2 4
Evolution of Technology
NASA Space Flight Control Centre
At the time of Moon landing Today
Tomorrow
?
SecComp Lecture 2 5
The Current Landscape
Increased Internet usage
It has become part of everyday infrastructure
SecComp Lecture 2 7
Computer Accounts – Legal Aspects
http://www.rmit.edu.au/compsci/policies/rulesofuse
SecComp Lecture 2 8
Security Mechanisms
Implement security services
Deal with
prevention of incidents
detection of incidents
recovery from incidents
SecComp Lecture 2 9
Security Mechanisms in Computing
SecComp Lecture 2 11
The Cost of Security
Direct costs
Software, equipment, procedures
Indirect costs
Reduced efficiency due to additional
procedures
Savings
Avoiding possible, expensive damage
Potentially: optimisation of procedures
SecComp Lecture 2 12
Security Tradeoffs
Security features may restrict functionality
E.g. certain network connections are not allowed
Security mechanisms may complicate user interaction
E.g. additional procedures can be required for performing
certain operations
Security Functionality
SecComp Lecture 2
Usability 13
Risk Analysis
Potential loss in case of an accident
Value of assets
Replacement value (equipment, software)
Potential damage (loss of data, privacy)
Probability of an accident
Identify potential accidents
Assess their frequency
Risk = asset value * accident probability
Risk assessment
Vulnerability assessment Risk assessment
SecComp Lecture 2 15
Vulnerabilities & Attacks (1)
Terminology
Exploit
Go through hole
Vulnerability
Hole in the fence Threat agent
Thief
Threat
Loss of stereo
SecComp Lecture 2 16
Vulnerabilities & Attacks (2)
Vulnerability
A weakness in the application (design flaw, bug,
misconfiguration …)
Allows an attacker to cause harm
Exploit
Technique that allows the attacker to take
advantage of vulnerabilities
Attack
Use of an exploit
Threat
The potential of a harmful event
Threat agent
Threat Agent = Capabilities + Intentions + Past
Activities
SecComp Lecture 2 17
Attack Motives
Criminal intent
Financial gain
Espionage
Industrial
Military
Prove a point
E.g. disclose a vulnerability
Vendetta, revenge
Terrorism
Hate
SecComp Lecture 2 18
Common Attack Methods
Passive attacks
Obtain information in an unauthorised manner
Privacy violation
Targeted attack
E.g. gain information about a specific bank account
Data harvesting
E.g. collect credit card numbers/email addresses
Publicity attacks
Attack for the sake of publicity, e.g. press
Active attacks
Interfere with the operation (e.g. manipulate
objects)
SecComp Lecture 2 19
Criminal Attacks
Fraud
Deception for personal gain
Scam
Fraud committed after gaining the victim’s confidence
Destructive attacks
E.g. erase a database or parts of it
Theft
Intellectual property
Intangible property, e.g. invention, trade mark, original design
Identity
Someone masquerading as another person
Brand
Using the brand-name of someone else, e.g. in a forged web page
The law changes much slower than life in the digital world
SecComp Lecture 2 20
Most Frequent Attacks
Theft of information
Private data (bank account number, password, …)
Spyware: collects information without the user’s
knowledge (e.g. keyloggers)
Theft of resources
Computer hijacking
Botnet: network of computers that can be remotely
controlled without the lawful owner’s knowledge;
used e.g. for spamming, DoS attacks
Interfering with the operation
Denial of service (DoS)
Overwhelming the target with bogus requests and
making it inaccessible for legitimate users
SecComp Lecture 2 21
Common Attack Strategies
Attacker’s aim
To “own” the target machine
have privileged (root/administrator) access
Infiltration method
Social engineering
Exploit root-level flaws
Exploit lower-level flaws and escalate privileges via
other exploits
Dissemination of malware
Virus (needs a host to spread, e.g. via infected emails,
data, …)
Worm (spreads on its own)
SecComp Lecture 2 22
Other Malware
Trojan horse
Code doing what it is supposed to do, plus
something else
Trapdoor
Access to services by non-standard methods
Logic bomb
Dormant malicious code, waiting for a
triggering event
Easter egg
“Cute” but harmless behaviour triggered by
special input
SecComp Lecture 2 23
Authentication (Password) Attacks
Dictionary attack
Testing correct words (e.g. from a dictionary)
Replay attack
Using data from an earlier, recorded, valid
session
Password guessing
Relies on intuition
Password sniffing
Having access to and monitoring a valid session
SecComp Lecture 2 24
Other Prevalent Attacks
Spoofing
Masquerading as someone else by falsifying data
Spoofing Attacks
Phishing
Tricking the user into volunteering confidential information
Denial of service (DoS) attacks
Ping of death: sending echo (ping) commands
SYN/ICMP/UDP/Application-level floods
Reflected attack: sending a spoofed packet (the
victim is shown as the source) to many hosts, the
responses overwhelming the victim
Distributed DoS (DDoS) attacks
SecComp Lecture 2 Using a network of machines (botnets) for a DoS25
attack
Botnets
Network of compromised computers
Controlled from a single command point
Features
Well organised hierarchy of computers
Workers at the bottom layer
Infected computers are zombies – activated by a central
command
Attack/malicious activity method by the same computer
can vary
Workers back off randomly, to disguise themselves
Use
Honest use - rare
E.g. Distributed computing
Malicious use – most often
Spam mailer
DDoS attack tool
SecComp Lecture 2 26
Attack Techniques
Injection attacks
Exploiting the input vulnerability of data not
being checked or sanitised properly
Rootkits
Malware that hides its presence via
modifying system data
Social engineering
Exploiting human gullibility to extract
confidential information
SecComp Lecture 2 27
Injection Attacks
Code injection
Inserting code that is interpreted by the application
Command
Execute system commands by the application and
have the application’s privileges
SQL injection
Inserting a database query via the input of the
application
XML injection
Inserting XML content or structures into a message,
e.g. to alter the intended logic of the application
Cross-site scripting
Malicious scripts inserted into benign and trusted
SecComp Lecture 2
web sites
28
Rootkits
Attempt to hide the presence of malware
Windows
DLL injection (malware loaded into the victim’s
process), any reference to the malware can be
removed before returning control to the real user
code
Installed as device drivers
Unix (linux)
Simple method: replaces system binaries with the
rootkit’s version of them
Others imitate Windows rootkits
SecComp Lecture 2 29
Social Engineering
Manipulating others into revealing information
that can be used to steal data, access to systems,
money or even your identity
Aims at extracting information without raising any
suspicion
Exploits human “vulnerabilities”
People are the weakest link in the security chain
Social engineering is the most effective method
for getting around security obstacles
The hardest form of attack, it cannot be detected
by hardware or software alone
SecComp Lecture 2 30
Social Engineering Methods
Human based
Methods
Phone call
to helpdesk by impersonating a legitimate (important) user, or
referring to tech support by using names
to a user by impersonating tech support
In person
Shoulder surfing: watching what others are typing
Dumpster driving: going through the trash
Computer based
Phishing: asking the user to verify account details
Methods
Popup windows: pretend to have an error
Spam, hoaxes
Websites offering something free or a chance to win
SecComp Lecture 2 something 31
Psychology of Social Engineering
Preys on human nature’s qualities
desire to be helpful
tendency to trust people
fear of getting into trouble
Uses different methods to facilitate conversation
Humour, compliments
Relies on persuasion
Directly via systematic, logical arguments
To stimulate a favourable response
E.g. “The head of department has asked me to collect …”
Using peripheral cues, misrepresenting objectives
To trigger acceptance without thinking
SecComp Lecture 2
E.g. Person wearing a shirt with a logo of a relevant company
32
Social Engineering Exploits
Contrived situation
Inventing several factors to improve plausibility
(forgot a password, looming deadlines, …)
Personal persuasion
Employed to overcome initial resistance
Seeks voluntary action instead of forcing
compliance
Target believes they are making the decision
Request methods
Direct request
Often challenged and refused, and hence
Rarely used
Context-aware request
The perpetrator sets up a scenario (e.g. cuts a
SecComp Lecture 2 cable) then offers help 33
Summary
Computers have become part of everyday
life, but security awareness is lagging
behind
Computer security is based on protection
against specific threats
Attacks can be based on specifically
crafted programs as well as on old
deception methods
SecComp Lecture 2 34