Term Paper on "Fast Flux Service Networks or Polymorphic Malware or Rootkit"

Term Paper 6 pages (2179 words) Sources: 4

[EXCERPT] . . . .

Polymorphic Malware

The threat presented to business through viruses and other forms of malware is a serious one, with losses in the U.S. estimated at billions of dollars (Sulaiman et al., 2005). It has been estimated that one in three computers has malicious code running on it (Hsu et al., 2006). There are many difficulties associated with not only the detection of polymorphic malware, but also the removal and subsequent system repair. There are however various methods to reduce the risk of system infiltration by such malware, most of which centers around rigorous vigilance as to the way in which the system is used by employees, and regularly updating anti-malware software to ensure that the most current versions are always available. Although there are still large deficits with regard to polymorphic malware detection in the current programs, it is an area of much research, and it is essential that all it professionals ensure that they keep abreast of such research in order to implement new measures as soon as they are available.

Introduction

Internet connectivity, which is today such a vital part of business, may also open the door to frequent attacks, allowing exposure and loss of critical information, potentially costing huge amounts in damage. This threat usually takes the form of viruses, or other malicious code known as malware, which embeds itself in the computer. Polymorphic malware presents a particular danger in that the nature of the malware often allows it to replicate unchecked once it has infiltrated a system, and is notoriously difficult to remove even if it is detected. Further to this, even upon removal of the malicious code, the syste
Continue scrolling to

download full paper
m may be left with many irreparable data files that have been destroyed by the malware, or leaked to competitors. For this reason, it is critical that it professionals within enterprise are aware of the current methods of protection against such a threat, as well as staying abreast of advances in the field, to ensure that the most up-to-date protection is always in place.

Definition of Malware

Malware is the name given to any harmful, destructive or intrusive computer software; these include such entities as viruses, worms, Trojans or spyware. The most common type of virus is that which infects files or program libraries on an operating system. Macro viruses can be hidden in the macros of documents and self execute when the file is opened; boot viruses infect the master boot record of the hard disk and will self execute the next time the computer is booted. A worm is a self-replicating code which does not need to be part of another program to propagate across a network. Trojans are disguised as legitimate software programs, but perform undesirable functions, which usually involve spying, or allowing back-door access. Current Trojans often behave like viruses, self-replicating and infiltrating the system to ensure that even if the software is removed they are still embedded within the system (Rice and Martin, 2007).

Polymorphic malware

Polymorphic malware is specifically malware which is able to constantly morph, or change, which increases the difficulty in detection through common anti-malware programs. The morphing which the malware undergoes involves changing of the malicious code, and can take a variety of forms, such as filename changes, compression and encryption with variable keys (Xu et al., 2004).

Despite the changes in the code which the polymorphic malware will undergo, the essential function of the code will usually be preserved. Polymorphic malware is particularly effective at infecting large networks due to the ability to replicate undetected for short periods each time the code morphs, if the system is not suitably equipped to detect the malware immediately upon morphing (Rice and Martin, 2007).

The Threat from Polymorphic Malware

Malicious code can affect the secrecy, integrity, data and control flow and functionality of the system; if a company's network is compromised in any of these ways there is the potential to cripple a business, or at least inflict large damages to company (Sulaiman et al., 2005). One of the greatest threats currently comes from automatic, pre-scanned, self-propagating attacks; these are able to scan at random until they find a suitable niche in which to place a piece of malicious code onto a host server. This is then used as a base from which to attack other vulnerable servers, and can result in exponential growth of the malware, particularly if left unchecked. The number and intensity of malware attacks is on the increase, and so computer security companies, researchers and users are hard-pressed to find new services to defend against such attacks (Xu et al., 2004).

Difficulties with Polymorphic Malware

The difficulties relating to established malware lie not only in the detection, but also in the removal and subsequent system repair which must take place; polymorphic malware may extensively modify a system. Although running an anti-malware program should be able to remove all the components of a piece of malware, it is not able to remove all polymorphic variants, nor restore infected data. Therefore it is crucial that the polymorphic malware be intercepted before it is able to establish itself and morph within the system (Hsu et al., 2006).

The main reason for which the malware is so difficult to guard against is that traditional anti-malware programs are unable to recognize any detected malware once it has morphed. Even if the anti-malware program discovers the malware and adds its signature to the downloadable database for that program, the anti-malware program will still fail to detect the harmful code once the signature has changed by morphing; the anti-malware program will simply treat the code as an entirely new threat and will not be able to recognize that it has encountered the same piece of malware before.

Protecting the Network

Many of the ways in which polymorphic malware is currently able to enter any system is due to a lack of vigilance on behalf of the user. There are several methods by which to decrease the risk to your network of malware infiltration; the most common of these are detailed here.

The increasing use of wireless communication devices has provided expanded opportunities for the spread of malware, and for this reason it is important to ensure that all hardware which has access to the network after using external wireless networks should be screened before being allowed access (Rice and Martin, 2007).

There is growing concern that attackers are increasingly using e-mail as a method by which to spread polymorphic malware server-side without being detected by anti-virus tools. The use of e-mail is a particularly effective method for mass distribution of malicious code across the Internet. The attackers are able to achieve this by creating a large number of variants of a malware and releasing them in short bursts, allowing new variants to be released before signatures are created to protect against the virus. Another technique used by such attackers is an approach similar to that used by spammers, in which recipients are lured into opening the email and attachments by tabloid-style subject headers on the e-mail ("Commtouch: Malware Writers' Tactics Evolving," 2007).

The best method to head off e-mail malware attacks is to only open e-mail from recognized senders and to immediately discard all other email. This may not always be practical however, so one other approach would be to head off all email which does not originate from a recognized source, and send it to one account which is not on the trusted side of the network's firewall. This would allow all such mail to assessed properly in a safer environment before allowing it to go through into the system ("Commtouch: Malware Writers' Tactics Evolving," 2007).

There are companies who offer services to secure email communications by blocking incoming connections from malicious IP addresses, and it may be preferable for companies without the resources available for such it operations to employ such external services ("Commtouch: Malware Writers' Tactics Evolving," 2007).

It is essential that no software is installed upon any system within the network that does not come from a reputable source. There are many users who naively disable detection programs in order to install programs which are bundled with malware - there is no anti-malware program available which is able to protect the user from actively running malware programs if it is disabled (Hsu et al., 2006).

Damage Limitation

Aside from the methods detailed above by which the threat from polymorphic malware can be directly reduced, there are other methods which may help to limit the damage from any such malware which is able to enter the system.

The best method for dealing with the threat of such polymorphic malware programs is to employ multiple protective measures. A diverse range of blocking, filtering, detection and removal programs should be used to ensure that even if a piece of code morphs in such a way as to make it unrecognizable to one program, another program may still intercept the rogue code and remove it from the system.

It has been found that… READ MORE

Quoted Instructions for "Fast Flux Service Networks or Polymorphic Malware or Rootkit" Assignment:

Internet crime poses a sizeable threat to individuals and organizations today. The purpose of this report is to assess the relative significance of currently emerging means of Internet-based criminal activities.

Choose one of the topics listed below. Write a report informing network administrators and information security professionals to what extent they should be concerned by your topic. Critically assess potential risks, threats and vulnerabilities associated with your topic relative to the security of an organization*****s network and/or network users. Provide any recommended mitigation strategies.

Topic choices include

1. Fast flux service networks

2. Polymorphic malware

3. Rootkit malware

Submit a typed, double-spaced, six-page report of your assessment to the instructor at the start of class time on September 11. If you cannot attend class, send your report by the start of class time to. Your report should contain at least four references with a minimal amount of direct quotations. Include any tables, figures, or diagrams in the Appendix. The Reference and Appendix sections will not be counted towards your six page requirement.

The report format should closely follow the sample report posted in Blackboard. Do not include a separate cover sheet. Use 1***** margins with a Times Roman 12 font. Proofread your report and correct all spelling and grammar mistakes.

Your report will be evaluated on factual details and an accurate assessment of associated risks, threats and vulnerabilities. Points will be deducted for obvious spelling and grammar errors.

.

*****

How to Reference "Fast Flux Service Networks or Polymorphic Malware or Rootkit" Term Paper in a Bibliography

Fast Flux Service Networks or Polymorphic Malware or Rootkit.” A1-TermPaper.com, 2007, https://www.a1-termpaper.com/topics/essay/polymorphic-malware-threat-presented/1200. Accessed 5 Oct 2024.

Fast Flux Service Networks or Polymorphic Malware or Rootkit (2007). Retrieved from https://www.a1-termpaper.com/topics/essay/polymorphic-malware-threat-presented/1200
A1-TermPaper.com. (2007). Fast Flux Service Networks or Polymorphic Malware or Rootkit. [online] Available at: https://www.a1-termpaper.com/topics/essay/polymorphic-malware-threat-presented/1200 [Accessed 5 Oct, 2024].
”Fast Flux Service Networks or Polymorphic Malware or Rootkit” 2007. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/polymorphic-malware-threat-presented/1200.
”Fast Flux Service Networks or Polymorphic Malware or Rootkit” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/polymorphic-malware-threat-presented/1200.
[1] ”Fast Flux Service Networks or Polymorphic Malware or Rootkit”, A1-TermPaper.com, 2007. [Online]. Available: https://www.a1-termpaper.com/topics/essay/polymorphic-malware-threat-presented/1200. [Accessed: 5-Oct-2024].
1. Fast Flux Service Networks or Polymorphic Malware or Rootkit [Internet]. A1-TermPaper.com. 2007 [cited 5 October 2024]. Available from: https://www.a1-termpaper.com/topics/essay/polymorphic-malware-threat-presented/1200
1. Fast Flux Service Networks or Polymorphic Malware or Rootkit. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/polymorphic-malware-threat-presented/1200. Published 2007. Accessed October 5, 2024.

Related Term Papers:

Service Level Attributes Research Paper

Paper Icon

Service Level Attributes

Marketing is so ingrained in the modern way of life we almost do not notice it -- yet we are all ingrained and enraptured by its very… read more

Research Paper 4 pages (1619 words) Sources: 4 Topic: Business / Corporations / E-commerce


Network Design Term Paper

Paper Icon

Network Design

Scenario

Straight Sales Service Company is a small business company with three locations. Presently, the company is using a business class DSL service to achieve the internet connection… read more

Term Paper 4 pages (1313 words) Sources: 4 Topic: Business / Corporations / E-commerce


Network Design Essay

Paper Icon

Network Design

Network engineers together with the users develop the ability to deal with network design challenges that prove difficult compared to a similar level they were created. The predicament… read more

Essay 3 pages (995 words) Sources: 3 Topic: Transportation / Mass Transit


Network Plan for ABC Corporation Essay

Paper Icon

Network Plan for ABC Corp

Scenario

ABC Corporation has just recently installed new routers onto the network and intends to design the appropriate network security to prevent the malicious and… read more

Essay 9 pages (2595 words) Sources: 8 Topic: Computers / IT / Internet


Network Management System Assessment

Paper Icon

Network Management

Define network management

The planning, implementing, securing and managing network systems across an enterprise are the foundational elements of effective network management. As information technologies (IT) have become… read more

Assessment 3 pages (909 words) Sources: 4 Topic: Management / Organizations


Sat, Oct 5, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!