2012
Table of Context
1. INTRODUCTION ................................................................................................................................... 3 2. MAIN TYPES OF MALWARE ................................................................................................................. 4 2.1. Computer Viruses ............................................................................................................................. 4 2.1. Computer Worms ............................................................................................................................. 5 2.3. Trojan Horses.................................................................................................................................... 6 2.4. Spyware ............................................................................................................................................ 6 2.5. Backdoor........................................................................................................................................... 6 2.6. Spams ............................................................................................................................................... 7 2.7. Keyloggers ........................................................................................................................................ 7 2.8. Browser Hijacking ............................................................................................................................. 7 2.9. Dialers ............................................................................................................................................... 7 2.10 Rootkit ............................................................................................................................................. 7 2.11. Exploits ........................................................................................................................................... 7 3. UP-TO-DATE MALWARE ...................................................................................................................... 8 3.1. Adware ............................................................................................................................................. 8 3.2. Parasiteware ..................................................................................................................................... 8 3.3. Thiefware.......................................................................................................................................... 8 3.4. Pestware ........................................................................................................................................... 8 3.5. Browser Helper Object, BHO ............................................................................................................ 8 3.6. Remote Administration Tool, RAT .................................................................................................... 8 3.7. Commercial RAT ............................................................................................................................... 8 3.8. Botnet ............................................................................................................................................... 9 3.9. Flooder ............................................................................................................................................. 9 3.10. Hostile ActiveX................................................................................................................................ 9 3.11 Hostile Java ...................................................................................................................................... 9 3.12. Hostile Script .................................................................................................................................. 9 3.13. IRC Takeover War ........................................................................................................................... 9 3.14. Nuker .............................................................................................................................................. 9 3.15. Packer ............................................................................................................................................. 9 3.16. Binder ............................................................................................................................................. 9 3.17. Password Capture and Password Hijacker ................................................................................... 10 3.18. Password Cracker ......................................................................................................................... 10 3.19. Key Generator .............................................................................................................................. 10 1 EVREN KUCUKKAYA
3.20. E-mail Bomber .............................................................................................................................. 10 3.21. Mass Mailer .................................................................................................................................. 10 3.22. E-mail Harvester ........................................................................................................................... 10 3.23. Web Bugs ...................................................................................................................................... 10 3.24. Hoax .............................................................................................................................................. 10 3.25. Phishing ........................................................................................................................................ 10 3.26. Web Scam and Fraud.................................................................................................................... 10 4. PROVIDING ONLINE SECURITY........................................................................................................... 11 4.1. Firewall ........................................................................................................................................... 11 4.1.1 Types of Firewall ........................................................................................................................... 11 4.1.2. Positive Effects of the Firewall .................................................................................................... 11 4.1.3. Negative Effects of the Firewall................................................................................................... 11 4.2. Data Encryption .............................................................................................................................. 12 4.2.1. Symmetric-key Encryption .......................................................................................................... 12 4.2.2. Asymmetric-key Encryption ........................................................................................................ 12 4.3. Antivirus Software .......................................................................................................................... 12 4.3.1. Historical Development of Antivirus Software ............................................................................ 13 4.3.1.1. First-generation software ......................................................................................................... 13 4.3.1.2. The second-generation software ............................................................................................. 13 4.3.1.3. Third-generation software ....................................................................................................... 13 4.3.1.4. The fourth-generation software............................................................................................... 13 4.3.2. Advanced anti-virus techniques .................................................................................................. 14 4.3.2.1. General analysis........................................................................................................................ 14 4.3.2.2. Digital immune system ............................................................................................................. 14 4.4. Internet Protocol Security (IPSec) .................................................................................................. 14 5. CONCLUSIONS ................................................................................................................................... 14 REFERENCES .......................................................................................................................................... 15
2 EVREN KUCUKKAYA
1. INTRODUCTION
Information security can be defined as protection of knowledge as an asset for any damages, prevention of acquisition by unwanted users of the right technology, properly using the right purpose and in all kinds of information. The purpose of security in computer technology, individuals and organizations face in using these technologies taking measures by making threats and advance hazards analysis. Recently with the development of computer technology in information and computer security at the beginning of the most serious threats come from malicious software. Malicious software or Malware is the general name for unwanted software designed to cause damage on or disrupt the work on the other machines on an infected computer system or network [1]. Malwares are infecting to the other systems without the knowledge the user or user systems by tricking them [2]. Scum ware referred to as malware, be formed with almost any programming or scripting language, or can be transported in several files [3]. In terms of historical development, types of malware, can be examined in four generations [2, 4]: 1. Generation (1987-1995): Computer viruses, especially in this period that dominated by DOS viruses, malicious software was infecting through the files and floppy disks. In 1995, their age closed by Windows 95, the first operating system with protected-mode operating system. 2. Generation (1995-2000): In light of recent developments in the personal computer world especially on images, audio and video files with support for multi-media containing materials such as using Microsoft Word, Excel, and powerful capabilities that comes with office programs such as the macro language of a generation that uses the density of malware. The macro language of this period gave an huge opportunity to people who cannot able to use the machine language of Win32 platform. Macros are still in use, although this period ended with the spread of virus-scanning programs. 3. Generation (1999-2002): Especially with the increase in Internet usage and e-mail communication amount of mass mailers increased in this generation, especially benefiting from the vulnerabilities of e-mail and internet browser programs. During this period, malware, are benefiting from the opportunities offered by the various scripting languages, or has chosen the path of transmission systems in the files attached to e-mails. E-mail filtering programs to block this kind of malicious software reached a certain saturation. 4. Generation (2001 -): The most important difference from other generations on this generation which is still ongoing, no need for the assistance of a significant user to spread. This period begins with Code Red worm in 2001, malware, benefits from vulnerabilities in the system and programs. With this term types of malware has started to spread, especially serious consequences with the illegal and criminal damages. With this generation, types of malware that cannot replicate itself started to be seen such as keyboard listening systems.
3 EVREN KUCUKKAYA
Malware that threaten ordinary users and systems are rapidly growing up, especially with the ease of motion brought by the Internet and network systems [1]. This situation can be likened to a war with technology that the good and the bad guys faced. During this fight, data, might be productive time and money has been lost while people find and cleaning, "structures of evil". For the prevention of malware and spyware, researchers and professional security experts identify such harmful elements, to develop new ways to destroy; users trained, educating, determined to close gaps in security and protection, the use of scanner and software and updating them, despite of all these efforts, attacks by malicious people and attack methods are increasing day by day [5].
File viruses are types of virus that uses the file system to spread by copying themselves to executable files various directories, or contaminate the viral code on operating system. Boot viruses, by changing hard disk or floppy disk "Master Boot Record" make it work the code each time the computer viral sequences. Macro viruses use the macros which are starting to run with the programs that have strong macro support and using the desktop programs to start their files such as Microsoft Word and Excel. Script viruses can be written by using scripting languages like, VB (Visual Basic), JavaScript, BAT (batch file), PHP.
5 EVREN KUCUKKAYA
2.4. Spyware
In Information and computer security, spyware is generally used in an ambiguous sense. Spyware is defined as software that provides a collection of the important information and the actions of the user and send this information to malicious people, without the user's information. Spyware, infect to the systems, especially by Internet users unwittingly, differently from the other malwares. Spyware, after infected the target system once do not need to spread or creating your own copy unlike viruses and worms. The purpose of spyware is to collect the requested information remain confidential on the selected system. Sometimes this information may even be important information such as a credit card number or identification [14]. In addition, commercial companies in order to determine user habits on the Internet can radiate spyware on the Internet [15]. Transmitted without the knowledge of users' systems, spyware, one of the most important attacks carried out against privacy [10].
2.5. Backdoor
Backdoors are the methods that enable a person to skip the normal authentication process or enable remotely access to that computer who are aware to this structure established by cannot found by the standard examinations. Hackers who show a very laborious effort to infiltrate a system, they want to add an easier way to access the system again. The most common backdoor method is to keep open a door (port) that attached a listening agent on the target system. Backdoors, often confused with Trojans.
6 EVREN KUCUKKAYA
2.6. Spams
Spams, perhaps is one of the malware the most frequently encountered by users and have troubles in daily life. Spams are making peoples e-mail accounts busy with messages they do not want including advertising, product promotion and selling, or other bad purposes. To avoid the damage caused by spam type of e-mails, e-mail filtering software programs work as integrated.
2.7. Keyloggers
These are the spywares which is capturing, holding, and sending the entries of users which is using keyboard to the attacker. Keyboard listening systems, except for the use of extremely dangerous consequences of malicious purposes, very useful application areas are also available [1]. As one of the most effective methods of obtaining information the keyboard listening systems are actually used since 1980s [17]. Most of the anti-spyware and antimalware programs do not consider about the Keyloggers.
2.9. Dialers
Dialers are often changes the target users internet providers number with an international phone number to make the user to pay large amount of call fee. After the dial-up connections this type of software are not using anymore.
2.10 Rootkit
Admin on UNIX operating systems, which means "root" name teams from the root user, the attacker after seizing control of a system, attached to the computer system software. Among the tools the team, deleting record (log) entries or hiding the attacker processes, tools to remove the traces of the attack and the attacker's system regulating the vehicles backdoors to facilitate the subsequent entries can be counted.
2.11. Exploits
Malicious software that can produce types of security attacks that target the specific vulnerability. This type of software is written in order to show the world just like the existence of this vulnerability, can also be used as a method of transmission of malicious programs, such as network worms [19].
7 EVREN KUCUKKAYA
3. UP-TO-DATE MALWARE
There are many types of malware type of malware, except as described above. There is not sufficient number of collectively source and study on this software. Only a small number of resources mention this software on the Internet can be found. The new generation of malware, changes shape by following the emerging technology or innovations.
3.1. Adware
Adware is not necessarily malware, but this kind of software would be using the methods, beyond the expected concept of freeware or shareware advertising. These types of programs make advertising by using pop-up windows or banners.
3.2. Parasiteware
Parasiteware is a type of advertising software that deletes links of the other companies that generate revenue by mediating trail sites by using membership (affiliate) method to sell products.
3.3. Thiefware
Steal the membership of the commission by typing on the trail making cookies, redirecting directing to different sites applications, the current traffic on Internet browsers by opening new browser windows.
3.4. Pestware
Is a adware type of malicious software.
8 EVREN KUCUKKAYA
3.8. Botnet
Bot network (botnet) which is a type of remote management software is a network of a number of captured computers can be used for by malicious people to send spam, or sending worms or Trojan horses.
3.9. Flooder
DoS attacks, which causes disruption of service, by the methods of sending serial PING and SYN packages, intentionally excessive loads on the machine or a network connection software, is named by Ping of Death and SYN Flooder [15].
3.14. Nuker
Windows operating system properly unpatched or without firewall, DoS attack WinNuke machines used for the "nuke" the term (nuke: nuclear weapons), for the moment a variety of TCP / IP as the common name used for DoS attacks.
3.15. Packer
Utility programs that encrypting a file compression into a process. When the program runs automatically adds a header of the process file in memory [21].
3.16. Binder
Software that brings multiple files into one file that may be different types. Hiding Trojan horse like files in this software is too easy [22].
9 EVREN KUCUKKAYA
3.24. Hoax
Aiming to users convince a non-existence of things all kinds of "trick", is classified as a hoax.
3.25. Phishing
Phishing (identity theft) to obtain bank account numbers, personal information such as credit card numbers, bank official, such as a message sent from an official institution that seems really e-mails from people.
10 EVREN KUCUKKAYA
And the some other known up-to-date malware are; Phreaking, Phone Breaking, Port Scanner, Probe Tool, Search Hijacker, Sniffer, Spoofer, Spyware Cookie, Tracking Cookie, PIE, Trickler, War Dialer and Wabbit.
11 EVREN KUCUKKAYA
In cases where the transition between networks only through a firewall, if the firewall is not configured correctly problems in traffic flow between networks can be experienced. All firewalls' need of continuous administrative support, general maintenance, software upgrades, security patches adds an additional burden on managers.
12 EVREN KUCUKKAYA
Advances in the virus and antivirus technology pass from hand to hand. As well as international competition grows about viruses and antivirus software, virus and antivirus programs have become complicated.
13 EVREN KUCUKKAYA
The fourth-generation software safety measures and the defence area extends more generalpurpose computer, used an extensive defence strategy.
Interpretation of the destination code in the computer and cannot harm the environment. Because they are interpreted completely controlled environment.
5. CONCLUSIONS
The importance of information security, development and deployment of information and communication technologies are rapidly increasing in parallel. Especially the Internet is used every aspect of life, although make a powerful communication environment has resulted in information security are at stake in. This result, forced persons or institutions to devote more resources to ensure the security of information.
14 EVREN KUCUKKAYA
REFERENCES
1. 2. 3. 4. Canbek, G., Klavye Dinleme ve nleme Sistemleri Analiz, Tasarm ve Gelitirme, Yksek Lisans Tezi, Gazi niversitesi, Fen Bilimleri Enstits, 13, 31-32, 43, 50, 58, 154, Eyll 2005. Heiser, J. G., Understanding Todays Malware, Information Security Technical Report. Vol. 9, No. 2, 47-64, http://www.amazon.com/Understanding-todays-malware-Information-Technical/dp/B000RR1HS0 Calder, A., Watkins, S., It Governance: A Manager's Guide to Data Security & BS 7799/ISO 17799, Kogan Page, 14, 163, http://books.google.fr/books?id=0nIFflHd8xsC&printsec=frontcover&hl=tr#v=onepage&q&f=false Thompson, R., The Four Ages of Malware, Infosecurity Today, 47-48, http://books.google.fr/books?id=vRG7QgAACAAJ&dq=Thompson,+R.,+The+Four+Ages+of+Malware,+Infosecurity+T oday,&hl=tr&sa=X&ei=MVd7T4uaJoqi8QOg9oWoCA&ved=0CDUQ6AEwAQ Grimes, R. A., Malicious Mobile Code, O'Reilly, 3,201-203, 226-228, 238-244, 467-468, http://books.google.fr/books?id=mczgkqHSIXUC&pg=PA81&dq=Grimes,+R.+A.,+Malicious+Mobile+Code,+O'Reilly,& hl=tr&sa=X&ei=b1d7TjwB9L_8QO2hOmjCA&ved=0CC4Q6AEwAA#v=onepage&q=Grimes%2C%20R.%20A.%2C%20Malicious%20Mobile%2 0Code%2C%20O'Reilly%2C&f=false nternet: Symantec, Symantec Internet Security Threat Report, 2010, http://eval.symantec.com/mktginfo/enterprise/white_papers/bwhitepaper_internet_security_threat_report_xv_04-2010.en-us.pdf Peikari, C., Fogie, S., Maximum Wireless Security, Sams Publishing, 153, 164, Skoudis, E., Malware: Fighting Malicious Code, Prentice Hall PTR, 13, 96, 123-125, 149-151, 179, http://books.google.fr/books?id=JHgX8_pVPpEC&printsec=frontcover&dq=Skoudis,+E.,+Malware:+Fighting+Malicio us+Code,+Prentice+Hall+PTR,&hl=tr&sa=X&ei=9Fh7T9_TLsSt8QOBieHXCA&ved=0CC4Q6AEwAA#v=onepage&q=Sko udis%2C%20E.%2C%20Malware%3A%20Fighting%20Malicious%20Code%2C%20Prentice%20Hall%20PTR%2C&f=fals e nternet: Symantec Security Response - W95.CIH, http://www.symantec.com/avcenter/venc/data/cih. Html Gustin, J., Cyber Terrorism, Marcel Dekker, 26-27, http://books.google.fr/books?id=joIgMFbbJMC&pg=PP1&lpg=PP1&dq=Gustin,+J.,+Cyber+Terrorism,+Marcel+Dekker&source=bl&ots=gJ4cnaqMp6&sig =xLCZ-4LmYuaQ2ugnQbpEttLa6oY&hl=tr&sa=X&ei=x-J6T5P8HYP_8QOJxcThCA&redir_esc=y#v=onepage&q&f=false Russell, D., Gangemi, Sr. G.T., Computer Security Basics, O'Reilly, 82, http://books.google.fr/books?id=DyrLV0kZEd8C&printsec=frontcover&dq=Russell,+D.,+Gangemi,+Sr.+G.T.,+Comput er+Security+Basics,&hl=tr&sa=X&ei=a-Z6T7ryH8mA8wOkqaidCA&ved=0CDUQ6AEwAA#v=onepage&q&f=false Thompson, D. P., The Trojan War: Literature and Legends from the Bronze Age to the Present, McFarland & Company, 33, http://books.google.fr/books?id=OuuEAAAAIAAJ&q=Thompson,+D.+P.,+The+Trojan+War:+Literature+and+Legends +from+the+Bronze+Age+to+the+Present,+McFarland+%26+Company&dq=Thompson,+D.+P.,+The+Trojan+War:+Lit erature+and+Legends+from+the+Bronze+Age+to+the+Present,+McFarland+%26+Company&hl=tr&sa=X&ei=ix6T5vsCdSC8gO-roHRCA&ved=0CC4Q6AEwAA nternet: Trojan Programs, VirusList, http://www.viruslist.com/en/virusesdescribed?chapter=152540521 Hansen, J. B., Young, S., The Hacker's Handbook, CRC Press, 72-74, 126, 530, 714, http://books.google.fr/books?id=U9pY5GfzqsIC&pg=PA59&dq=Hansen,+J.+B.,+Young,+S.,+The+Hacker's+Handbook ,+CRC+Press,&hl=tr&sa=X&ei=NVp7T6WJBcej8gOByrixCA&ved=0CDcQ6AEwAA#v=onepage&q=Hansen%2C%20J.%2 0B.%2C%20Young%2C%20S.%2C%20The%20Hacker's%20Handbook%2C%20CRC%20Press%2C&f=false Conway, R., Cordingley, J., Code Hacking: A Developer's Guide to Network Security, Charles River Media, 55-56, 92, http://books.google.fr/books?id=nLjvT1OgSZ8C&dq=Conway,+R.,+Cordingley,+J.,+Code+Hacking:+A+Developer's+G uide+to+Network+Security,+Charles+River+Media,&hl=tr&sa=X&ei=gFp7T8bQNser8QPI1ZG9CA&ved=0CC4Q6AEwA A Cole, E., Hackers Beware: The Ultimate Guide to Network Security, Sams Publishing, 104-108, 191-193, 544, 550, http://books.google.fr/books?id=fNRuUrhyd4QC&printsec=frontcover&dq=Cole,+E.,+Hackers+Beware:+The+Ultima te+Guide+to+Network+Security,+Sams+Publishing,&hl=tr&sa=X&ei=zlp7T76ZLsen8QPApmYCw&ved=0CDUQ6AEwAQ#v=onepage&q&f=false Mohay, G., Collie, B., Vel, O., McKemmish, R., Anderson, A., Computer and Intrusion Forensics, Artech House, 226,
5.
6.
7. 8.
9. 10.
11.
12.
13. 14.
15.
16.
17.
15 EVREN KUCUKKAYA
25.
http://books.google.fr/books?id=KRwXEHTK3OwC&pg=PA122&dq=Mohay,+G.,+Collie,+B.,+Vel,+O.,+McKemmish,+R .,+Anderson,+A.,+Computer+and+Intrusion+Forensics,+Artech+House,&hl=tr&sa=X&ei=FFt7T8_DLs_f8QPxuKmfCA& ved=0CC4Q6AEwAA#v=onepage&q=Mohay%2C%20G.%2C%20Collie%2C%20B.%2C%20Vel%2C%20O.%2C%20McKe mmish%2C%20R.%2C%20Anderson%2C%20A.%2C%20Computer%20and%20Intrusion%20Forensics%2C%20Artech %20House%2C&f=false Caloyannides, M. A., Privacy Protection and Computer Forensics, Artech House, 118-120, Russell, R., Hack Proofing Your Network, Syngress Publishing, 78, http://books.google.fr/books?id=flaI_VVftE0C&printsec=frontcover&hl=tr#v=onepage&q&f=false Hausman, K. K., Barrett, D., Weiss, M., Exam Cram 2 Security +: Exam Cram SYO-101, Que Publishing, 59, Mandia, K., Prosise, C., Incident Response Second Edition: Computer Forensics, McGraw- Hill Professional, 389390, nternet: Binder, SearchWin2000, TechTarget. http://searchwin2000.techtarget.com/sDefinition/0,sid1_gci948478,00.html Poole, O., Network Security: A Practical Guide, Elsevier, 69-71, Pipkin, D. L., Halting the Hacker - A Practical Guide to Computer Security, Prentice Hall PTR, 52, http://books.google.fr/books?id=M6sfthR8huQC&printsec=frontcover&dq=Pipkin,+D.+L.,+Halting+the+Hacker++A+Practical+Guide+to+Computer+Security,+Prentice+Hall+PTR&hl=tr&sa=X&ei=tFx7T7LjIs38QObxbHQCA&ved=0CCwQ6AEwAA#v=onepage&q&f=false Bennett, J., Digital Umbrella: Technology's Attack on Personal Privacy in America, Brown Walker Press (FL), 47-50
16 EVREN KUCUKKAYA