Term Paper on "Fast Flux Service Networks or Polymorphic Malware or Rootkit"
Term Paper 6 pages (2179 words) Sources: 4
[EXCERPT] . . . .
Polymorphic MalwareThe threat presented to business through viruses and other forms of malware is a serious one, with losses in the U.S. estimated at billions of dollars (Sulaiman et al., 2005). It has been estimated that one in three computers has malicious code running on it (Hsu et al., 2006). There are many difficulties associated with not only the detection of polymorphic malware, but also the removal and subsequent system repair. There are however various methods to reduce the risk of system infiltration by such malware, most of which centers around rigorous vigilance as to the way in which the system is used by employees, and regularly updating anti-malware software to ensure that the most current versions are always available. Although there are still large deficits with regard to polymorphic malware detection in the current programs, it is an area of much research, and it is essential that all it professionals ensure that they keep abreast of such research in order to implement new measures as soon as they are available.
Introduction
Internet connectivity, which is today such a vital part of business, may also open the door to frequent attacks, allowing exposure and loss of critical information, potentially costing huge amounts in damage. This threat usually takes the form of viruses, or other malicious code known as malware, which embeds itself in the computer. Polymorphic malware presents a particular danger in that the nature of the malware often allows it to replicate unchecked once it has infiltrated a system, and is notoriously difficult to remove even if it is detected. Further to this, even upon removal of the malicious code, the syste
download full paper ⤓
Definition of Malware
Malware is the name given to any harmful, destructive or intrusive computer software; these include such entities as viruses, worms, Trojans or spyware. The most common type of virus is that which infects files or program libraries on an operating system. Macro viruses can be hidden in the macros of documents and self execute when the file is opened; boot viruses infect the master boot record of the hard disk and will self execute the next time the computer is booted. A worm is a self-replicating code which does not need to be part of another program to propagate across a network. Trojans are disguised as legitimate software programs, but perform undesirable functions, which usually involve spying, or allowing back-door access. Current Trojans often behave like viruses, self-replicating and infiltrating the system to ensure that even if the software is removed they are still embedded within the system (Rice and Martin, 2007).
Polymorphic malware
Polymorphic malware is specifically malware which is able to constantly morph, or change, which increases the difficulty in detection through common anti-malware programs. The morphing which the malware undergoes involves changing of the malicious code, and can take a variety of forms, such as filename changes, compression and encryption with variable keys (Xu et al., 2004).
Despite the changes in the code which the polymorphic malware will undergo, the essential function of the code will usually be preserved. Polymorphic malware is particularly effective at infecting large networks due to the ability to replicate undetected for short periods each time the code morphs, if the system is not suitably equipped to detect the malware immediately upon morphing (Rice and Martin, 2007).
The Threat from Polymorphic Malware
Malicious code can affect the secrecy, integrity, data and control flow and functionality of the system; if a company's network is compromised in any of these ways there is the potential to cripple a business, or at least inflict large damages to company (Sulaiman et al., 2005). One of the greatest threats currently comes from automatic, pre-scanned, self-propagating attacks; these are able to scan at random until they find a suitable niche in which to place a piece of malicious code onto a host server. This is then used as a base from which to attack other vulnerable servers, and can result in exponential growth of the malware, particularly if left unchecked. The number and intensity of malware attacks is on the increase, and so computer security companies, researchers and users are hard-pressed to find new services to defend against such attacks (Xu et al., 2004).
Difficulties with Polymorphic Malware
The difficulties relating to established malware lie not only in the detection, but also in the removal and subsequent system repair which must take place; polymorphic malware may extensively modify a system. Although running an anti-malware program should be able to remove all the components of a piece of malware, it is not able to remove all polymorphic variants, nor restore infected data. Therefore it is crucial that the polymorphic malware be intercepted before it is able to establish itself and morph within the system (Hsu et al., 2006).
The main reason for which the malware is so difficult to guard against is that traditional anti-malware programs are unable to recognize any detected malware once it has morphed. Even if the anti-malware program discovers the malware and adds its signature to the downloadable database for that program, the anti-malware program will still fail to detect the harmful code once the signature has changed by morphing; the anti-malware program will simply treat the code as an entirely new threat and will not be able to recognize that it has encountered the same piece of malware before.
Protecting the Network
Many of the ways in which polymorphic malware is currently able to enter any system is due to a lack of vigilance on behalf of the user. There are several methods by which to decrease the risk to your network of malware infiltration; the most common of these are detailed here.
The increasing use of wireless communication devices has provided expanded opportunities for the spread of malware, and for this reason it is important to ensure that all hardware which has access to the network after using external wireless networks should be screened before being allowed access (Rice and Martin, 2007).
There is growing concern that attackers are increasingly using e-mail as a method by which to spread polymorphic malware server-side without being detected by anti-virus tools. The use of e-mail is a particularly effective method for mass distribution of malicious code across the Internet. The attackers are able to achieve this by creating a large number of variants of a malware and releasing them in short bursts, allowing new variants to be released before signatures are created to protect against the virus. Another technique used by such attackers is an approach similar to that used by spammers, in which recipients are lured into opening the email and attachments by tabloid-style subject headers on the e-mail ("Commtouch: Malware Writers' Tactics Evolving," 2007).
The best method to head off e-mail malware attacks is to only open e-mail from recognized senders and to immediately discard all other email. This may not always be practical however, so one other approach would be to head off all email which does not originate from a recognized source, and send it to one account which is not on the trusted side of the network's firewall. This would allow all such mail to assessed properly in a safer environment before allowing it to go through into the system ("Commtouch: Malware Writers' Tactics Evolving," 2007).
There are companies who offer services to secure email communications by blocking incoming connections from malicious IP addresses, and it may be preferable for companies without the resources available for such it operations to employ such external services ("Commtouch: Malware Writers' Tactics Evolving," 2007).
It is essential that no software is installed upon any system within the network that does not come from a reputable source. There are many users who naively disable detection programs in order to install programs which are bundled with malware - there is no anti-malware program available which is able to protect the user from actively running malware programs if it is disabled (Hsu et al., 2006).
Damage Limitation
Aside from the methods detailed above by which the threat from polymorphic malware can be directly reduced, there are other methods which may help to limit the damage from any such malware which is able to enter the system.
The best method for dealing with the threat of such polymorphic malware programs is to employ multiple protective measures. A diverse range of blocking, filtering, detection and removal programs should be used to ensure that even if a piece of code morphs in such a way as to make it unrecognizable to one program, another program may still intercept the rogue code and remove it from the system.
It has been found that… READ MORE
Quoted Instructions for "Fast Flux Service Networks or Polymorphic Malware or Rootkit" Assignment:
Internet crime poses a sizeable threat to individuals and organizations today. The purpose of this report is to assess the relative significance of currently emerging means of Internet-based criminal activities.
Choose one of the topics listed below. Write a report informing network administrators and information security professionals to what extent they should be concerned by your topic. Critically assess potential risks, threats and vulnerabilities associated with your topic relative to the security of an organization*****s network and/or network users. Provide any recommended mitigation strategies.
Topic choices include
1. Fast flux service networks
2. Polymorphic malware
3. Rootkit malware
Submit a typed, double-spaced, six-page report of your assessment to the instructor at the start of class time on September 11. If you cannot attend class, send your report by the start of class time to. Your report should contain at least four references with a minimal amount of direct quotations. Include any tables, figures, or diagrams in the Appendix. The Reference and Appendix sections will not be counted towards your six page requirement.
The report format should closely follow the sample report posted in Blackboard. Do not include a separate cover sheet. Use 1***** margins with a Times Roman 12 font. Proofread your report and correct all spelling and grammar mistakes.
Your report will be evaluated on factual details and an accurate assessment of associated risks, threats and vulnerabilities. Points will be deducted for obvious spelling and grammar errors.
.
*****
How to Reference "Fast Flux Service Networks or Polymorphic Malware or Rootkit" Term Paper in a Bibliography
“Fast Flux Service Networks or Polymorphic Malware or Rootkit.” A1-TermPaper.com, 2007, https://www.a1-termpaper.com/topics/essay/polymorphic-malware-threat-presented/1200. Accessed 5 Oct 2024.
Related Term Papers:
Service Level Attributes Research Paper
Service Level Attributes
Marketing is so ingrained in the modern way of life we almost do not notice it -- yet we are all ingrained and enraptured by its very… read more
Research Paper 4 pages (1619 words) Sources: 4 Topic: Business / Corporations / E-commerce
Network Design Term Paper
Network Design
Scenario
Straight Sales Service Company is a small business company with three locations. Presently, the company is using a business class DSL service to achieve the internet connection… read more
Term Paper 4 pages (1313 words) Sources: 4 Topic: Business / Corporations / E-commerce
Network Design Essay
Network Design
Network engineers together with the users develop the ability to deal with network design challenges that prove difficult compared to a similar level they were created. The predicament… read more
Essay 3 pages (995 words) Sources: 3 Topic: Transportation / Mass Transit
Network Plan for ABC Corporation Essay
Network Plan for ABC Corp
Scenario
ABC Corporation has just recently installed new routers onto the network and intends to design the appropriate network security to prevent the malicious and… read more
Essay 9 pages (2595 words) Sources: 8 Topic: Computers / IT / Internet
Network Management System Assessment
Network Management
Define network management
The planning, implementing, securing and managing network systems across an enterprise are the foundational elements of effective network management. As information technologies (IT) have become… read more
Assessment 3 pages (909 words) Sources: 4 Topic: Management / Organizations
Sat, Oct 5, 2024
If you don't see the paper you need, we will write it for you!
We can write a new, 100% unique paper!