ISDS 418 Midterm 2

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/134

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 10:20 PM on 3/20/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

135 Terms

1
New cards

Advanced Persistent Threat (APT)

Cybercrime directed at business and political targets, using a wide variety of intrusion technologies and malware, applied persistently and effectively to specific targets over an extended period, often attributed to state-sponsored organizations.

2
New cards

Adware

Advertising that is integrated into software. It can result in pop-up ads or redirection of a browser to a commercial site.

3
New cards

Attack kit

Set of tools for generating new malware automatically using a variety of supplied propagation and payload mechanisms.

4
New cards

Auto-rooter

Malicious hacker tools used to break into new machines remotely.

5
New cards

Backdoor (trapdoor)

Any mechanism that bypasses a normal security check; it may allow unauthorized access to functionality in a program, or onto a compromised system.

A secret entry point into a program that allows someone who is aware of the backdoor to gain access without going through the usual security access procedures.

6
New cards

Downloaders

Code that installs other items on a machine that is under attack. It is normally included in the malware code first inserted on to a compromised system to then import a larger malware package.

7
New cards

Drive-by-download

Spreads when user visits malicious website

The malware does not propagate

8
New cards

Flooders (DoS client)

Used to generate a large volume of data to attack networked computer systems, by carrying out some form of denial-of-service (DoS) attack.

9
New cards

Keyloggers

Captures keystrokes on a compromised system.

10
New cards

Logic bomb

Code embedded in some legitimate program that is set to "explode" when certain conditions are met:

- Presence/absence of certain files

- Particular day of the week or date

- Particular user running the application

11
New cards

Macro virus

A type of virus that uses macro or scripting code, typically embedded in a document, and triggered when the document is viewed or edited, to run and replicate itself into other such documents.

12
New cards

Mobile code

Software (e.g., script, macro, etc) that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics.

13
New cards

Rootkit

Set of hacker tools used after attacker has broken into a computer system and gained root-level access.

14
New cards

Spammer programs

Used to send large volumes of unwanted e-mail.

15
New cards

Spyware

Software that collects information from a computer and transmits it to another system by monitoring keystrokes, screen data, and/or network traffic; or by scanning files on the system for sensitive information.

16
New cards

Trojan horse

A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes it.

*Malware that do not replicate*

17
New cards

Virus

Malware that, when executed, tries to replicate itself into other executable machine or script code; when it succeeds, the code is said to be infected. When the infected code is executed, the virus also executes

*Parasitic code that needs a host program*

*Malware that replicate*

18
New cards

Worm

A computer program that can run independently and can propagate a complete working version of itself onto other hosts on a network, usually by exploiting software vulnerabilities in the target system.

- exploit software vulnerabilities in client or server programs

- can use network connections to spread from system to system

- can spread through shared media (USB drives, CD, DVD data disks)

19
New cards

Worm Technology

Multiplatform: Windows and UNIX

Multi-exploit: Penetrates systems in various ways, including Web servers, browsers, email, file sharing, etc.

Ultrafast spreading: First find IP addresses of vulnerable machines, then attack

Polymorphic: Adopt virus' polymorphic technique (change worm's appearance) to evade detection

Metamorphic: Change its own behavior patterns to evade detection

Transport vehicles: Worms are ideal for spreading distributed attack tools (e.g. DDoS bots)

Zero-day exploit: Most dreaded by security pros. It exploits a previously unknown vulnerability that only becomes known when the worm is launched

20
New cards

Zombie, bot

Program activated on an infected machine that is activated to launch attacks on other machines.

21
New cards

Blended attack

Uses multiple methods of infection or propagation, to maximize the speed of contagion and the severity of the attack.

22
New cards

Infection mechanism

The means by which a virus spreads or propagates, enabling it to replicate. The mechanism is also referred to as the infection vector

23
New cards

Trigger

The event or condition that determines when the payload is activated or delivered, sometimes known as a logic bomb.

24
New cards

Payload

Based on actions or payloads it performs once a target is reached

25
New cards

Propagates

Based on how it spreads or propagates to reach desired targets

26
New cards

Dormant phase

The virus is idle. The virus will eventually be activated by some event, such as a date, the presence of another program or file, or the capacity of the disk exceeding some limit. Not all viruses have this stage.

27
New cards

Propagation phase

The virus places a copy of itself into other programs or into certain system areas on the disk. The copy may not be identical to the propagating version; viruses often morph to evade detection. Each infected program will now contain a clone of the virus, which will itself enter a propagation phase.

- Scanning or fingerprinting: searches for access mechanisms to other systems to infect

- uses the access mechanisms found to transfer a copy of itself to the remote system

- causes the copy to be run

28
New cards

Triggering phase

The virus is activated to perform the function for which it was intended. As with the dormant phase, the triggering phase can be caused by a variety of system events, including a count of the number of times that this copy of the virus has made copies of itself.

29
New cards

Execution phase

The function is performed. The function may be harmless, such as a message on the screen, or damaging, such as the destruction of programs and data files.

30
New cards

Boot sector infector

Infects a master boot record or boot record and spreads when a system is booted from the disk containing the virus.

31
New cards

File infector

Infects files that the operating system or shell consider to be executable.

32
New cards

Multipartite virus

Infects files in multiple ways

33
New cards

Encrypted virus

A form of virus that uses encryption to obscure it's content. A portion of the virus creates a random encryption key and encrypts the remainder of the virus. The key is stored with the virus. When an infected program is invoked, the virus uses the stored random key to decrypt the virus. When the virus replicates, a different random key is selected. Because the bulk of the virus is encrypted with a different key for each instance, there is no constant bit pattern to observe.

34
New cards

Stealth virus

Designed to hide itself from detection by anti-virus software. It may use code mutation, compression, or rootkit techniques to achieve this.

35
New cards

Polymorphic virus

Mutates with every infection.

Creates copies during replication that are functionally equivalent but have distinctly different bit patterns, in order to defeat programs that scan for viruses.

Mutates with every infection, making detection by virus "signature" impossible

Changes its "appearance"

36
New cards

Metamorphic virus

Mutates with every infection.

Rewrites itself completely at each iteration, using multiple transformation techniques, increasing the difficulty of detection.

Change its behavior and appearance.

37
New cards

Electronic mail or instant messenger facility

A worm e-mails a copy of itself to other systems, or sends itself as an attachment via an instant message service, so that its code is run when the e-mail or attachment is received or viewed.

38
New cards

File sharing

A worm either creates a copy of itself or infects other suitable files as a virus on removable media such as a USB drive; it then executes when the drive is connected to another system using the autorun mechanism by exploiting some software vulnerability, or when a user opens the infected file on the target system

39
New cards

Remote execution capability

A worm executes a copy of itself on another system, either by using an explicit remote execution facility or by exploiting a program flaw in a network service to subvert its operations

40
New cards

Remote file access or transfer capability

A worm uses a remote file access or transfer service to another system to copy itself from one system to the other, where users on that system may then execute it.

41
New cards

Remote login capability

A worm logs onto a remote system as a user and then uses commands to copy itself from one system to the other, where it then executes.

42
New cards

Scanning (fingerprinting)

The first function in the propagation phase for a network worm is for it to search for other systems to infect

Worms must identify potential systems running vulnerable services.

Network address scanning strategies:

Random strategy

Hit list strategy

Topological strategy

Local subnet strategy

43
New cards

Random strategy

Each compromised host probes random addresses in the IP address space, using a different seed.

44
New cards

Hit-List strategy

- Attacker first compiles a long list of potentially vulnerable machines

- Once the list is compiled the attacker begins infecting machines on the list

- Each infected machine is provided with a portion of the list to scan

- This results in a very short scanning period which may make it difficult to detect that infection is taking place

45
New cards

Topological strategy

Use info contained on an infected victim machine to find more hosts to scan

46
New cards

Local subnet strategy

f a host is infected behind firewall, then host looks for targets on that subnet behind firewall.

47
New cards

Worm Propagation Model

dI(t)/dt = bI(t)S(t)

where

I(t) = number of individuals infected as of time t

S(t) = number of susceptible individuals (susceptible to infection but not yet infected) at time t

b = infection rate

N = size of the population, N = I(t) + S(t)

Initial phase (slow start phase) -> Middle phase (fast spread phase) -> Finish phase (slow finish phase)

48
New cards

Ransomware

As an alternative to just destroying data, some malware encrypts the user's data, and demands payment in order to access the key needed to recover this information.

49
New cards

Botnet

The collection of bots often is capable of acting in a coordinated manner

50
New cards

Spamming

With the help of a botnet and thousands of bots, an attacker is able to send massive amounts of bulk e-mail (spam).

51
New cards

Sniffing traffic

Bots can also use a packet sniffer to watch for interesting cleartext data passing by a compromised machine. The sniffers are mostly used to retrieve sensitive information like usernames and passwords.

52
New cards

Installing advertisement add-ons and browser helper objects (BHOs):

Botnets can also be used to gain financial advantages. This works by setting up a fake Web site with some advertisements

53
New cards

Attacking IRC chat networks

Botnets are also used for attacks against Internet Relay Chat (IRC) networks. Popular among attackers is called clone attack.

54
New cards

Manipulating online polls/games

Since every bot has a distinct IP address, every vote will have the same credibility as a vote cast by a real person. Online games can be manipulated in a similar way.

55
New cards

Phishing

Exploits social engineering to leverage user's trust by masquerading as communications from a trusted source

56
New cards

Spear-phishing

This again is an e-mail claiming to be from a trusted source. However, the recipients are carefully researched by the attacker.

57
New cards

denial-of-service (DoS)

an attempt to compromise availability by hindering or blocking completely the provision of some service.

an action that prevents or impairs the authorized use of networks, systems, or applications by exhausting resources such as central processing units (CPU), memory, bandwidth, and disk space

58
New cards

Flooding attacks

in the 50 GBps range are powerful enough to exceed the bandwidth capacity of almost any intended target, including perhaps the core Internet Exchanges or critical DNS name servers, but even smaller attacks can be surprisingly effective

59
New cards

SYN spoofing

This attacks the ability of a network server to respond to TCP connection requests by overflowing the tables used to manage such connections.

It is an attack on system resource

60
New cards

Poison packet

Another form of system resource attack uses packets whose structure triggers a bug in the system's network handling software, causing it to crash. This means the system can no longer communicate over the network until this software is reloaded, generally by rebooting the target system.

61
New cards

Source address spoofing

A common characteristic of packets used in many types of DoS attacks is the use of forged source addresses.

If using spoofed source addresses, then trace is difficult

62
New cards

Backscatter traffic

The ICMP echo response packets generated in response to a ping flood using randomly spoofed source addresses

63
New cards

Three-way handshake

SYN, SYN/ACK, ACK

Figure 7.2

64
New cards

TCP SYN spoofing attack

Figure 7.3

Step 1: Client sends SYN (client seq=x) to server

Step 2: Server sends SYN-ACK (server seq=y, client seq "ack"=x+1) to client.

Step 3: Client sends ACK (server seq "ack"=y+1) to server

Server seq is incremented to mark the connection as established at client. Server receives ACK (server seq "ack"=y+1) from client

Connection is now established; data transfer begins

But sometimes things can go wrong

Both client and server keep track of which packet they have sent

If no response is received in a reasonable time, a machine will resend packet (that's why TCP is "reliable")

SYN spoofing exploits this behavior

65
New cards

ICMP flooding

- ping flood using ICMP echo request packets

66
New cards

UDP Flood

uses UDP packets directed to some port number on the target system

67
New cards

TCP SYN Flood

normal TCP connection requests, with either real or spoofed source addresses

68
New cards

Reflection attack (newer attack method)

The attacker sends packets to a known service on the intermediary with a spoofed source address of the actual target system. When the intermediary responds, the response is sent to the target. Effectively this reflects the attack off the intermediary, which is termed the reflector.

in other words: Send to intermediary a packet with a spoofed source address = target address

Intermediary servers can generate high volumes of traffic

Intermediary servers should be:

High-capacity networked servers

Routers connected to high-capacity links

Disadvantage of reflection attack: One response (backscatter) packet for each attack packet

69
New cards

Distributed DoS (DDoS) attacks (newer attack method)

Using multiple systems at target

- zombies with backdoor programs installed

- forming a botnet

70
New cards

Amplification attacks (newer attack method)

a variant of reflector attacks and also involve sending a packet with a spoofed source address for the target system to intermediaries.

They are different in generating multiple response packets for each original packet sent. All hosts on that network can potentially respond to the request, generating a flood of responses to target

71
New cards

Attack prevention and preemption (before the attack)

Enforcing policies for resource consumption

Providing backup resources available on demand

72
New cards

Attack detection and filtering (during the attack)

Detection looks for suspicious patterns of behavior

Response filters out likely attack packets

73
New cards

Attack source traceback and identification (during and after the attack)

Identify attack source to prevent future attacks

Does not yield results fast enough, if at all, to mitigate ongoing attack

74
New cards

Attack reaction (after the attack)

This is an attempt to eliminate or curtail the effects of an attack.

75
New cards

Security Intrusion

A security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts to gain, access to a system (or system resource) without having authorization to do so.

76
New cards

Intrusion Detection

A security service that monitors and analyzes system events for the purpose of finding, and providing real-time or near real-time warning of, attempts to access system resources in an unauthorized manner.

77
New cards

Sensors

Collects data

78
New cards

Analyzers

Receive input from sensors to determine if an intrusion has occurred.

output = indication that an intrusion has occurred.

79
New cards

User interface

Enables a user to view output from the system or control the behavior of the system

80
New cards

Host-based IDS (HIDS)

Monitors single host and the events occurring within that host, such as process identifiers and the system calls they make, for evidence of suspicious activity.

81
New cards

Network-based IDS (NIDS):

Monitors network traffic for particular network segments or devices and analyzes network, transport, and application protocols to identify suspicious activity.

82
New cards

Distributed or hybrid IDS

Combines information from a number of sensors, often both host and network-based, in a central analyzer that is able to better identify and respond to intrusion activity.

83
New cards

false positives and false negatives

false positives: false alarms where authorized users are identified as intruders.

false negative: intruders not identified as intruders.

84
New cards

Figure 8.1 Profiles of Behavior of Intruders and Authorized Users

Figure 8.1 suggests, in abstract terms, the nature of the task confronting the designer of an IDS. Although the typical behavior of an intruder differs from the typical behavior of an authorized user, there is an overlap in these behaviors.

85
New cards

Anomaly detection

Involves the collection of data relating to the behavior of legitimate users over a period of time.

Then current observed behavior is analyzed to determine with a high level of confidence whether this behavior is that of a legitimate user or alternatively that of an intruder.

86
New cards

Signature or Heuristic detection

Uses a set of known malicious data patterns (signatures) or attack rules (heuristics) that are compared with current behavior to decide if is that of an intruder. It is also known as misuse detection.

87
New cards

Anomaly Detection Classifications

Statistical Analysis: of the observed behavior using univariate, multivariate, or time-series models of observed metrics.

Knowledge based Approaches: use an expert system that classifies observed behavior according to a set of rules that model legitimate behavior.

Machine-learning Approaches: automatically determine a suitable classification model from the training data using data mining techniques.

88
New cards

Machine-learning approaches

Bayesian networks: Encode probabilistic relationships among observed metrics.

Markov models: Develop a model with sets of states, some possibly hidden, interconnected by transition probabilities.

Neural networks: Simulate human brain operation with neurons and synapse between them, that classify observed data.

Fuzzy logic: Uses fuzzy set theory where reasoning is approximate, and can accommodate uncertainty.

Genetic algorithms: Uses techniques inspired by evolutionary biology, including inheritance, mutation, selection and recombination, to develop classification rules.

Clustering and outlier detection: Group the observed data into clusters based on some similarity or distance measure, and then identify subsequent data as either belonging to a cluster or as an outlier.

89
New cards

Signature approaches

Match a large collection of known patterns of malicious data against data stored on a system or in transit over a network.

90
New cards

Rule-based heuristic identification

Involves the use of rules for identifying known penetrations or penetrations that would exploit known weaknesses.

91
New cards

Host-based IDSs (HIDSs) Data Sources and Sensors

System call traces: A record of the sequence of systems calls by processes on a system.

Audit (log file) records: Most modern operating systems include accounting software that collects information on user activity.

File integrity checksums: A common approach to detecting intruder activity on a system is to periodically scan critical files for changes from the desired baseline, by comparing a current cryptographic checksums for these files, with a record of known good values.

Registry access: An approach used on Windows systems is to monitor access to the registry, given the amount of information and access to it used by programs on these systems. However this source is very Windows specific, and has recorded limited success.

92
New cards

Inline sensor

Inserted into a network segment so that the traffic that it is monitoring must pass through the sensor.

93
New cards

Passive sensor

Monitors a copy of network traffic; the actual traffic does not pass through the device.

94
New cards

Intrusion Detection Message Exchange Requirements (RFC 4766)

Intrusion Detection Message Exchange Format (IDMEF)

95
New cards

The Intrusion Detection Message Exchange Format (RFC 4765)

Extensible Markup Language (XML)

96
New cards

The Intrusion Detection Exchange Protocol (RFC 4767)

Intrusion Detection Exchange Protocol (IDXP)

97
New cards

Figure 8.7 Model for Intrusion Detection Message Exchange

Data source - raw data

Sensor - collects data from data source

Analyzer - analyze data by sensor

Administrator - human

Manager - operator manages ID component

Operator - human

98
New cards

Honeypots

Decoy systems that are designed to lure a potential attacker away from critical systems.

99
New cards

Figure 8.8 Example of Honeypot Deployment

Honeypots can be deployed in a variety of locations

location 1 - external firewall

location 2 - service network (web, mail, dns)

location 3 - internal network

100
New cards

IP Address and Protocol Values

Controls access based on the source or destination addresses and port numbers, direction of flow being inbound or outbound, and other network and transport layer characteristics.

Explore top flashcards

flashcards
APUSH Progressive Era PEDLIGS
84
Updated 907d ago
0.0(0)
flashcards
US History Chapter 10 Test
32
Updated 98d ago
0.0(0)
flashcards
Latin and Greek Roots List 1-3
75
Updated 333d ago
0.0(0)
flashcards
Numbers 1 - 20
20
Updated 528d ago
0.0(0)
flashcards
Business Law - Midterm
126
Updated 186d ago
0.0(0)
flashcards
La inmigración
45
Updated 488d ago
0.0(0)
flashcards
APUSH Progressive Era PEDLIGS
84
Updated 907d ago
0.0(0)
flashcards
US History Chapter 10 Test
32
Updated 98d ago
0.0(0)
flashcards
Latin and Greek Roots List 1-3
75
Updated 333d ago
0.0(0)
flashcards
Numbers 1 - 20
20
Updated 528d ago
0.0(0)
flashcards
Business Law - Midterm
126
Updated 186d ago
0.0(0)
flashcards
La inmigración
45
Updated 488d ago
0.0(0)