Which of the following is the most dangerous type of threat when using virtualization?

In this section, SVM refers to an SVM with the Network Threat Protection component installed.

An SVM with the File Threat Protection component installed protects virtual machines on the VMware ESXi hypervisor. The settings that SVMs apply for virtual machine network threat protection are defined by using policies. Kaspersky Security starts protecting virtual machines only after you have configured network threat protection settings in the active policy.

Kaspersky Security protects only virtual machines that meet all the conditions for virtual machine protection against network threats.

The Network Threat Protection component of Kaspersky Security performs the following functions:

  • Intrusion Prevention. Kaspersky Security can scan the traffic of protected virtual machines to detect and block activity typical of network attacks and suspicious network activity that may be a sign of an intrusion into the protected infrastructure.

    Kaspersky Security can scan traffic from IP addresses in IPv4 and IPv6 format.

  • Web Addresses Scan. Kaspersky Security lets you scan web addresses that are requested by a user or application, and block access to web addresses if a threat is detected.

The Network Threat Protection component settings depend on the traffic processing mode selected during registration of the network protection service:

  • If you selected Standard mode, when Kaspersky Security detects signs of intrusions or attempts to access dangerous or undesirable web addresses, it performs the action that is specified in policy settings and relays information about events to the Kaspersky Security Center Administration Server.
  • If you selected Monitoring mode and signs of intrusions or attempts to access dangerous or undesirable web addresses are detected, Kaspersky Security does not take any actions to prevent the threats but only relays information about the events to the Kaspersky Security Center Administration Server.

You can select the traffic processing mode only when registering the network protection service (Kaspersky Network Protection).

You can configure exclusions from Network Threat Protection as follows:

  • Exclude from scanning inbound or outbound traffic of all virtual machines that have been assigned an NSX Security Policy. You can specify which traffic should be scanned in the NSX Security Policy in which the use of the network protection service (Kaspersky Network Protection) is configured. An NSX Security Policy configuration is performed in the VMware vSphere Web Client console.
  • Create network threat protection exclusion rules that Kaspersky Security can use to exclude traffic of specific IP addresses from scans or apply special actions when processing such traffic.

Information about events that occur during protection of virtual machines against network threats is transmitted to the Kaspersky Security Center Administration Server and logged in a report.

Descriptions of currently known types of network attacks, signs of intrusions, and the databases of malicious and phishing web addresses are included in the application databases and are updated during application database updates.

Page top

Detecting System Intrusions

Almantas Kakareka CISSP, GSNA, GSEC, CEH, in Network and System Security (Second Edition), 2014

Vulnerability Window

Zero-day attacks occur during the vulnerability window that exists in the time between when vulnerability is first exploited and when software developers start to develop and publish a counter to that threat. For viruses, Trojans, and other zero-day attacks, the vulnerability window typically follows this time line:

The developer creates software containing an unknown vulnerability.

The attacker finds the vulnerability before the developer does.

The attacker writes and distributes an exploit while the vulnerability is not known to the developer.

The developer becomes aware of the vulnerability and starts developing a fix.

Measuring the length of the vulnerability window can be difficult, as attackers do not announce when the vulnerability was first discovered. Developers may not want to distribute data for commercial or security reasons. They also may not know if the vulnerability is being exploited when they fix it, and so they may not record the vulnerability as a zero-day attack. However, it can be easily shown that this window can be several years long. For example, in 2008, Microsoft confirmed vulnerability in Internet Explorer, which affected some versions that were released in 2001. The date the vulnerability was first found by an attacker is not known; however, the vulnerability window in this case could have been up to seven years.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780124166899000010

Introduction

In Information Security, 2013

The barriers continue to ease for attackers. Emergent (or zero-day) attacks can cover the world in less time than it takes to react. A recent example is the Zeus Trojan Horse, which is responsible for an estimated 3.6 million compromised systems between 2007 and 2013, resulting in compromises to credit data at more than 15 unnamed global banks and an estimated loss in excess of $70 million reported in the United States alone. Unreported losses are rumored to be much larger. Zeus has evolved from its origins as an email-based phishing exploit to now include attacks on mobile devices. It has mutated into family of malware variants since its code was leaked in 2011.3

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780124172326000126

Henry Dalziel, in How to Defeat Advanced Malware, 2015

In the first half of 2014, the growth in zero-day exploitation continued unabated from 2013. Unsurprisingly, all of the zero-day attacks targeted end-user applications such as browsers and applications such as Microsoft® Office. Typically these attacks were launched using classic spear-phishing tactics. Although Microsoft Internet Explorer was the most patched product on the market, it was also the most exploited, surpassing Oracle Java and Adobe Flash. Bromium Labs believes that Microsoft Internet Explorer will likely continue to be the target of choice going forward.

Which of the following is the most dangerous type of threat when using virtualization?

Which of the following is the most dangerous type of threat when using virtualization?

In comparison, Java had no reported zero-day exploitation in the first half of 2014.

Released in late 2013, Microsoft Internet Explorer 11 has seen a quick succession of security patches, compared to its predecessors. Bromium Labs analyzed the timelines for each Internet Explorer patch release and documented when the first critical patch became Generally Available (GA).

Internet Explorer release to patch timeline.

Which of the following is the most dangerous type of threat when using virtualization?

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780128027318000023

Toward realizing self-protecting healthcare information systems: Design and security challenges

Qian Chen, in Advances in Computers, 2019

5.2 Network forensics analysis (NFA)

Network forensics aim at finding out causes and impacts of cyber attacks by capturing, recording, and analyzing of network traffic and audit files [75]. NFA helps to characterize zero-day attacks and has the ability to monitor user activities, business transactions, and system performance. As a result, attack attribution, what attack methods and tactics were used and attack duration, can be analyzed and derived using NFA.

Recent articles claim that self-protecting systems are able to mitigate attack impacts by “static” IRS. Protection mechanisms selected by this type of IRS remain the same during the entire attack period [76]. None of these self-protecting systems, however, contain NAF. Notwithstanding, a static IRS is limited in its ability to fully and efficiently eliminate these attacks. To establish a fully autonomic computing system, as described in Section 2.2, the NFA must be activated once unknown attacks have been identified by the IDS. Some recent research performs the NFA as a postprocess analysis, but live NFA is required to support the 24/7 system availability. In this way using live NFA, the investigation of unknown attack signatures will not disrupt normal client requests. Additionally, live NFA is executed immediately after unknown attacks are detected, which reduce latency and quickly closes the window of vulnerability.

Gunter [77] discussed research on balancing access controls with audit in medical record systems, and using audit logs to understand roles and workflows to develop reliable anomaly detection and safe access controls. Philli [75] illustrated a generic process model for network forensics in real-time and postattack scenarios. The first phase is preparation, which makes sure security solutions such as monitors, firewalls, and IDSs have already been deployed. The second phase is detection, which identifies cyber attacks and captures network traffic, followed by the third incident response phase. The fourth phase is collection and preservation. Traffic data are collected and preprocessed for storage on backup devices for presentation. Together these phases identify attack indicators, classify attack patterns, determine attack paths, and provide documentation offline.

The challenges of next generation state-of-the-art NFAs are described by Philli [78]. The analytical complexity of real-world large-scale HISs grows exponentially, therefore, making full NFA computationally infeasible. In some NFA scenarios accurate vulnerability states are not available by virtue of the fact that the NFA process is fundamentally postcompromise. Also, analyzing an extremely large amount of auditing data in a very short time span is computationally infeasible. Additionally, in NFA it is often very difficult to distinguish primary attack signatures from trivial signatures. Let us examine today's live NFA tools.

Investigating high-volume auditing data in real time depends primarily on the abundance of computational resources. Normally, the size of one-days worth of auditing files for large-scale systems is larger than 100 GB. Data concentrators are used, for example, by data historians within the context of the distribution systems (i.e., the smart grid). Cloud storage platforms are, used to store and process such data. Chen [79] used the cloud storage and computing platform to analyze offline phishing attacks. Phishing filter functions can effectively scale to detect phishing attacks. Research described in [80, 81] adopts the Hadoop map reduce model to analyze a high volume of log files and extracts attack signatures for intrusion detection and prevention.

Contemporary NFA approaches manually investigate attack patterns after HISs are compromised. Real-time and dynamic forensics systems, which investigate attack causes and impacts automatically, have been deployed to address the scalability issue of such manual processes. The utilization of the cloud-based approaches makes NFA more practical to deploy. Nonetheless, the current question about how to realize a dynamic and automatic NFA system is the subject of much research. For example, Wang et al. [78] developed immune agents, which automatically generate crucial evidence of unknown attacks for rapid active responses. An automatic method was proposed by Wang et al. [82] to make regular expression signatures of the HTTP attacks offline. This approach first extracts application session payloads to identify common substrings and their positional constraints. Using these extracts, attack signatures are transformed into regular expressions.

Li et al. [83] designed a network-based signature generator, namely, LESG. The generator automatically analyzes zero-day buffer overflow vulnerabilities and generates length-based signatures via a three-step algorithm. The generator selects field candidate signatures, optimizes the signature lengths, and derives the optimal signature that produces minimal false alarms. The LESG has lower computational overhead than research by Brumley et al. [84], which generates vulnerability signatures using regular expressions. False alarm rates of an IDS applying the LESG are significantly reduced and the attack detection speed is improved. The LESG is also tolerant to noisy traffic.

The utilization of NFA allows the self-protecting system to investigate and learn the causes and impacts of an unknown attack. In the end, the HISs can be protected from both known and unknown attacks autonomously (i.e., without human intervention).

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/S0065245819300130

Connecting the Dots

John Pirc, ... Will Gragido, in Threat Forecasting, 2016

Advanced Threat Detection

Advanced threat detection (ATD) solutions go by several different names, including advanced threat protection, however the goal is always the same. ATD solutions are designed to detect (and prevent in some cases) zero-day attacks and malware by using a combination of detection techniques. These solutions may be comprised of more than one product to provide the comprehensive security coverage the product vendor is looking to supply. This may include a dedicated sandbox/detonation chamber for executing malicious files and accessing malicious URLs as well as dedicated appliances for taking action based on the data provided from both the product vendor’s research team and the results of analysis from the sandbox/detonation chamber.

ATD solutions use a combination of behavior analysis and signature detection, depending on which component of the ATD solution is being discussed. Sandbox/detonation chambers primarily use behavior analysis and look for changes within the environment being monitored. Dedicated protection devices may still use a level of behavior analysis; however, they will also use signature detection to aide in quicker detection thus leading to real-time protection/mitigation of attacks and malware.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780128000069000094

Defining a Firewall

In Firewall Policies and VPN Configurations, 2006

Pros

For a high level of security, an application proxy is the appliance of choice. The detail of control permitted is unmatched by any other device.

High Security

An application proxy is generally far more secure than a gateway. By breaking down each packet to its basic parts and rewriting it, the firewall discovers and drops hidden malicious code. These firewalls can, and have, prevented zero-day attacks.

Refined Control

Application proxies also provide the opportunity to fine tune exactly what you will let into your protected network, and, depending on the design of the firewall, what you will allow out. A reverse proxy handles controlling the outgoing of information. Reverse proxies can play a very important role in high security environments by examining the contents of outgoing packets for sensitive information.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597490887500050

Advanced Security Network Metrics

Ivan Homoliak, ... Petr Hanacek, in Emerging Trends in ICT Security, 2014

Introduction

There is considerable interest in developing novel detection methods based on new metrics that describe network flow to identify connection characteristics, for example, to permit early identification of emerging security incidents, rapid detection of infections within internal networks, and instantaneous prevention of forming attacks. Buffer overflows continue to be one of the most common vulnerabilities prevalent today, especially in undetected and most dangerous "zero-day" attacks. This has motivated researchers to create more or less sophisticated defenses addressing this threat. The first line of defense is based on memory randomization (ASR), which makes the attack harder to accomplish, but unfortunately it is still possible to offset the current process address. The second line of defense is based on automated signature generation techniques that generate filters to block network traffic similar to an attack payload signature. Unfortunately, polymorphic attacks can evade these signatures, and hence subsequent research has focused on behavioral signatures that favor the development of several data mining methods defining sets of network metrics that describe the attack vector by its behavioral features. These methods use either the existing NetFlow standard or network traffic packets. Several earlier research studies left NetFlow to create its own set of network metrics, which provided more information and context in analyzed connections.

Recognizing the importance of the quality of network metrics for successful detection, our approach proposes a new set of metrics with a high detection and low false positive ratio. It is expected that detection algorithms based on these new network behavioral metrics will outperform existing methods and will be applicable to a wider range of intrusion detection and prevention systems.

Our primary goal is to create a network-based system for online defense against zero-day buffer overflow attacks in the production environment. We described the reduction of attack types to buffer overflow in a previous article [1]. The secondary goal of this research is (a) to design the architecture of a detection framework that will enhance the overall network security level with the ability to learn new attack behaviors without human intervention by using expert knowledge from honeypot (or similar) systems; and (b) to find the most suitable set of metrics for describing attack behaviors in network traffic and significantly increasing the detection rate and lowering the false positive rate.

In our previous article [1] we proposed a framework architecture that could be used for the detection of various network threats. The paper presented a novel Automated Intrusion Prevention System (AIPS) that uses honeypot systems for the detection of new attacks and automatic generation of behavioral signatures based on network flow metrics. We have successfully experimented with the architecture of the AIPS system and have defined 112 metrics (recently updated to 167), divided into five categories according to type. These metrics are used to describe properties of a detected attack, based not on the fingerprint of a common signature but on its behavior.

In this chapter we define the method used for generating network behavioral signatures from a set of network security metrics, Advanced Security Network Metrics (ASNM), consisting of 167 metrics enhancing the ability of detecting potential attacks from network traffic.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780124114746000128

Policy Issues Regarding Implementations of Cyber Attack: Resilience Solutions for Cyber Physical Systems

Barry M. Horowitz, in Artificial Intelligence for the Internet of Everything, 2019

5.3 Cybersecurity Role and Certification of the Operators of Physical Systems

An important aspect of the defense of physical systems from cyber attacks is that immediate system-reconfiguration responses to attack detections (including system shut-downs, which can be very expensive) may be necessary in order to provide the desired level of safety. This aspect calls for doctrine regarding immediate responses. Doctrine must include: (1) the allocation of decision-making and response-control roles to specified personnel, (2) selection criteria for and training of those people, (3) exercising for preparedness, and (4) addressing the possibilities of unanticipated confusion regarding operator judgments related to the possibility of missed or incorrect attack detections (including zero-day attacks).

Part of the author’s research on physical system defense included human involvement in cyber attack scenarios. In the UAV case, a desktop simulation environment was used to gain an initial understanding of operator responses to a monitoring system that detects cyber attacks and provides suggested responses to the UAV pilots. In the State Police case, a controlled exercise was conducted involving unsuspecting policemen being dispatched and their cars being attacked and failing to operate properly. The results of these activities highlighted the point that the doctrinal processes to be developed must recognize the fact that cyber attacks on physical systems are an area where people do not and will not have practical experience to rely upon. Furthermore, since attacks are very unlikely to occur, responses may stray from what operators are trained for. The research efforts showed that operators, based on their past experiences, can usually imagine other causes for observed consequences of a cyber attack and, as a result, may not be as responsive to automated decision support as expected.

Consider the case in which a Sentinel detects a cyber attack that consists of an improper digital control message preventing a car from operating properly. From the operator’s perspective there can be many different causes for the car not operating properly (e.g., a failed battery), and these are typically causes they have previously experienced. Consequently, under the immediate pressure of needing to take decisive action, the operator may be more likely to assume these causes of failure, rather than a never-experienced cyber attack. Research results showed that even when an operator accepts a Sentinel’s input as being correct, uncertainty remains regarding the possibility for additional elements of the cyber attack having yet to emerge. This element of uncertainty is escalated when there are high consequences associated with an operator’s decisions, and the operator’s accountability for those decisions can impact behavior, including asking for access to cyber-security experts before making a critical decision. Of course, such calls for help can potentially delay decision making to an undesirable degree. As a result of these scenarios actually emerging during our research experiments, a significant effort has been initiated to better understand human behavior in uncertain circumstances that are likely to exist in scenarios regarding cyber attacks on physical systems. From a policy vantage point, research efforts are needed to address questions regarding selection, certification, and readiness training requirements for operators of physical systems for which cyber attacks could have serious consequences.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780128176368000053

Challenges and Countermeasures

Aditya K Sood, Richard Enbody, in Targeted Cyber Attacks, 2014

8.1.2 Myths About Malware Infections and Protection

There are a number of misconceptions and myths in the industry about malware infections and protection technologies that impact the security countermeasures in fighting malware infections. A number of issues are detailed as follows:

Anti-virus (AV) engines provide robust protection. AV engines are software programs that are installed in the operating systems to prevent the execution of malware and protect legitimate installed applications against any infections. AV engines use techniques such as signature drafting, heuristics, and emulation. Some believe that AV engines protect the end-user system from all types of attacks and malware. For example, some users feel that if an AV solution is installed, they can surf anywhere on the Internet without getting infected. Unfortunately, such users get infected based on this false sense of security. AV engines fall short of providing robust security against zero-day attacks in which attackers use exploits for undisclosed vulnerabilities. Sophisticated malware such as rootkits having administrative access can easily tamper the functioning of AV engines thereby making them inefficient. In addition, AV engines are not considered as a strong security solution to defend against malware classes using polymorphic or metamorphic code which mutates itself on every execution.

Deployment of an Intrusion Prevention System (IPS) or Intrusion Detection System (IDS) protects malicious code from entering my network. The majority of IPS and IDS are signature based, so detecting infection or malicious traffic requires a signature. But attackers can easily bypass IPS and IDS using techniques like unicode encoding, canonicalization, null byte injection, overlapping TCP segments, fragmentation, slicing, and padding [1,2].

Malware is distributed primarily through shady and rogue web sites such as torrents and warez. While rogue sites do distribute malware, many more-trustworthy sites also deliver malware. For example, in targeted attacks based on waterholing (refer to Chapter 3), legitimate and highly ranked web sites are infected with malicious code that downloads malware onto user machines through drive-by download attacks. It is hard to flag sites as secure to ensure users that they are interacting with legitimate web sites free of malware.

Email filtering mechanisms only allow secure and verified attachments to be delivered with emails. Email filtering is a process of filtering out the emails containing malicious attachments and illegitimate links that instantiate infections in the organization network. As described earlier (refer to Chapter 3), social engineered emails are used extensively in targeted attacks. In the corporate world, employees believe that their personal inboxes receive only secure emails with attachments from verified identities. This is not true because attackers can use several tactics such as social engineering with zero-day attacks to slip malware through enterprise email solutions and successfully deliver the malicious emails. The idea is to embed a zero-day exploit inside an attached file that bypasses through the filter and successfully delivers to the target. This technique has been seen in a number of recent targeted attacks.

Malware infections are specific to certain operating systems. For example, Mac OS is much more secure than Windows and is less prone to exploitation. This is false. Mac OS also gets infected with malware and has been targeted by attackers, the recent Flashback [3] malware being one of many. In addition, malware families such as DNS changer [4,5] are platform independent and infect almost all operating systems.

Mobile devices are completely secure. A number of users believe that mobile platforms are secure. Well, that’s not true. There has been a significant growth in Android-based mobile platforms, and attackers are targeting these devices to steal information. In this way, mobile devices provide a plethora of information that can help to carry out targeted attacks. For example, contact information is stolen from the infected mobile devices.

Virtualization technologies are untouched by malware. Virtualization is based on the concept of building security through isolation. Virtualization is implemented using hypervisors which are virtual machine monitors that run Virtual Machines (VMs). Hypervisors can be bare-metal (installed directly on the hardware) and hosted (installed in the operating system running on underlying hardware). In virtualized environments, guest VMs are not allowed to access the resources and hardware used by other guest VMs. Virtualization also helps in building secure networks as access controls can be restricted to target networks. Infected virtualized systems can be reverted back to previous snapshots (system state) in a small period of time as opposed to physical servers. Patching is far easier in virtualized servers, and migration of virtualized servers is easy among infrastructure which shows how virtualization provides portability. A number of users believe that hypervisors are immune from malware infections. Unfortunately, virtualized hypervisor malware does exist in the real world. Malware such as Blue Pill [6] is a VM-based rootkit that exploits the hypervisor layer, so that it can circumvent the virtualization model. Basically, when blue pill type of malware is installed in the operating system, the malware creates a new hypervisor on the fly and this hypervisor is used to control the infected system which is now treated as a virtualized system. As a result, it is very hard to detect the malware as it resides in the hypervisor and has the capability to tamper the kernel. These are sophisticated attacks that are difficult but not impossible to implement. A large set of users use VMs for critical operations such as banking which they think provide a secure mode of Internet surfing. The potential compromise of VMs (guest OS) in a network is vulnerable to the same set of attacks as the host OS. In addition, compromising VMs could result in gaining access to other hosts in the network. Several current families of malware are VM-centric which means they incorporate techniques that can easily detect whether the malware is running inside the virtualized machine or not. Based on this information, malware can alter the execution flow. Full hardware-based virtualization (host OS kernel is different from guest OS kernel) prevents malware from gaining access to the underlying host, but the malware can still control the complete guest OS. Partial virtualization (sharing same OS kernel as host) in which privilege restrictions are heavily used to manage virtual file systems can be easily circumvented by malware, if the kernel is exploited.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780128006047000085

Introduction to practical security and performance testing

Chris Chapman, in Network Performance and Security, 2016

A Baseline Understanding of Security Concepts

What is an attack? It is an attempt to gather information about your organization or an attempt to disrupt the normal working operations of your company (both may be considered malicious and generally criminal). Attacks have all the aspects of regular crime, just oriented toward digital resources, namely your network and its data. A threat uses some inefficiency, bug, hole, or condition in the network for some specific objective. The threat risk to your network is generally in proportion to the value or impact of the data in your network, or the disruption of your services no longer functioning. Let me give a few examples to clarify this point. If your company processed a high volume of credit card transactions (say you were an e-commerce business) then the data stored in your network (credit card numbers, customer data, etc.) is a high target value for theft because the relative reward for the criminals is high. (For example, credit card theft in 2014 was as high as $8.6B [source: http://www.heritage.org/research/reports/2014/10/cyber-attacks-on-us-companies-in-2014].) Or, if your business handles very sensitive data, such as patient medical record (which generally have the patient-specific government issued IDs such as social security numbers attached), you are a prime target. In either case, the value of data in your network warrants the investment and risk of stealing it. Say, you are a key logistics shipping company, the value to the attacker may be to disrupt your business, causing wider economic impact (classic pattern for state-sponsored cyber terrorism [example: http://securityaffairs.co/wordpress/18294/security/fireeye-nation-state-driven-cyber-attacks.html]). On the other hand, if you host a personal information blog, it is unlikely that cyber crime will be an issue. To put it bluntly, it is not worth the effort for the attackers. The one variable in all of this is the people who attack network “because they can.” They tend to use open source exploit tools, and tend to be individuals or very small groups, but can be anywhere on the Internet. We have to be aware of the relative value of our data, and plan security appropriately.

There are many ways of attacking a network, let us spend a few moments and cover some of the basics of security and performance. If we divide attacks into their classification, we can see the spread of class of attacks growing over time. What types of attacks may you experience in the production network?

DDoS Attack

DDoS, or distributed denial of service, attacks are an attack class with the intent to disrupt some element of your network by utilizing some flaw in a protocols stack (eg, on a firewall), or a poorly written security policy. The distributivenes comes into play because these attacks can first affect devices such as personal computer (PC) or mobile device on the Internet, and then at a coordinated time, can attack the intended target. An example would be a TCP SYN flood, where many attempted, but partial, TCP connections are opened with the attempt to crash a service on the target. DDoS attacks may also be blended with other exploits in multistage attacks for some multistage purpose.

Botnet/Worm/Virus Attack

A botnet is a code that first attempts to install its self within the trusted portion of your network, though combined and blended attacks may spread to other resources across your network. A botnet has two possible objectives. First, spread as far and as fast as it can within the target domain and then at a specified time, bring down elements in the network (like PCs). Second, a botnet can quietly sit in the network, collect data, and “phone home” back to a predefined collection site over well-known protocols. This is considered a scrapping attack because data are collected from behind your firewall and sent over known-good protocols such as HTTP/HTTP(S) back home.

Trojan Horse

A trojan horse is a type of attack that embeds the malicious code in some other software that seems harmless. The intent is to get the user to download, install, and run the innocent software, which then will case the code to infect the local resource. Another great example of this is infected content that is downloaded off of P2P networks such as Bittorent; the user runs the content and the malicious code is installed.

Zero-Day Attack

A zero-day attack is a traffic pattern of interest that in general has no matching patterns in malware or attack detection elements in the network. All new attacks are characterized initially as zero-day attacks.

Keyloggers

A keylogger is a code that is installed by malware and sets on a device that has keyboard input (like a PC) and records keystrokes. The hope of the keylogger is that it will capture user login credentials, credit card number, government ID numbers, which can later be sold or used. Keylogger can be deployed by botnets, or themselves be deployed. Variants of keyloggers will look at other inputs and records. For example, variant code may listen to your built-in microphone or record video from the integrated camera (or just take periodic snapshots).

SQL Injection Attack

Chances are you have an SQL database somewhere in your network. Attackers know this and know by its very nature that the database holds valuable data, or at the least is a choke point in the workflow of your business. An SQL injection attack uses malformed SQL queries to perform one of two possible functions. First, the simplest attack is to crash some or part of the database server. This has the obvious effect of stopping business workflows. Second, an SQL attack may be used to selectively knock down part of the SQL server, exposing the tables of data for illicit data mining.

Cross-Site Scripting Attack (XSS Attack)

The modern platform for application is the web. What this means is that the sophistication of what is served and processed has greatly increased. The web has moved from a simple text-based system to a full application API. A cross-site scripting attack takes advantage of this sophistication by attempting to modify the middle ware of the web application. For example, it may insert JavaScript inside of code to bypass a login, capture data, and phone home or become purely malicious. This class of attack is a good example of how attackers desire malicious code to be undetected for as long as possible, especially when the exploit is attempting to collect data.

Phishing Attack

A phishing attack can come in many forms, but generally focus on web content modification and emails. The idea behind a phishing attack is to look legitimate, attempt the target to give sensitive data, and capture/sell the data for profit or use it for malicious means.

Rootkit

A rootkit is a special type of worm that can embed its self deeply into the operating system (thus the “Root”) such that it can take over the system involuntarily. Rootkits can be very difficult to remove and detect.

Firmware Virus

A firmware virus will attempt to reflash elements that have firmware, such as your hard drive or PC EFI. This is related to the rootkit family of attacks and in some cases can physically destroy equipment. For example, a virus inserted in a hard drive firmware can destroy the lower layer formatting of the drive, or corrupt TRIM setting to accessibly use SSD memory cells to failure. On a server, EFI virus could increase CPU core voltage and turn off fans to cause death by heat.

Hijack Attack/Ransomware

This class of attack attempts to take a legitimate active session and insert or redirect data to a collector. For example, imagine an e-commerce session, where users shipping and credit card information is captured. This class of attack is sometimes called a “Man in the Middle” attack. In the case of Ransomware, the attack will shut down the device functions and make the user pay, sometimes even a small amount, to “unlock” their PC. Attackers know that if a user pays, say $5, to “recover” their gear, it may not be worth reporting. This, multiplied by millions, can be big business.

Spoof/Evasion Attack

In this class of attack, the attacker intentionally rewrites Ipv4, UDP, and TCP fields to try to hide from firewall rules. For example, if I take an attack and use IPv4 fragmentation, I might be able to hide the attack from the firewall policy rules, because as the attacker, I hope the firewall pattern matching code does not cover this condition.

Buffer Overflow Attack

Typically, network application, protocol stacks, buffers, and queues expect data request in a structured format. A buffer overflow attack will attempt to intentionally send malformed or excessive data to “crash” some or part of the application, firewall, or any network element in between. Sometimes, this is called a knockdown attack.

Password Attack

This kind of attack uses automation to break a password by many iterations. There are three types of approaches: Brute-force, dictionary, and hybrid attempts. This is always a roll of the dice, but in some cases, especially with a dictionary technique, attackers know users have poor password selection habits, and will try clusters of known combinations first.

Penetration Attacks

A penetration attack is more complicated than other types of attacks, because it tends to be multistage, distributed, and orchestrated. These types of attacks can be the most damaging, because generally they require a level of sophistication and resources to achieve their target. Many security breaches you might hear about in the news are sophisticated penetration attacks, especially if there is a large volume of data theft. Penetration attacks are like high stakes poker. It requires skills, patience, strategy, and stages, but has very large payouts if successful.

Malware

Malware is a generic class of attack that may refer to distributed as trojans, worms, botnets via applications, websites, or emails. Malware is the most prodigious form of attacks, with Q4 millions of variants flowing through the Internet annually. It should be noted that attacks can form hierarchies. For example, malware may be used to insert rootkits or keyloggers. Malware may also insert other malware as a cascading infection through your network.

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780128035849000019

What is the most dangerous type of threat when using virtualization?

Which of the following is the MOST dangerous type of threat when using virtualization? VM escape refers to malware running on a guest OS jumping to another guest or the host. As with any other software type, it is vital to keep the hypervisor code up-to-date with patches for critical vulnerabilities.

What types of risks are typically associated with virtualization?

They are:.
Data Breaches..
Weak Identity, Credential, and Access Management..
Insecure APIs..
System and Application Vulnerabilities..
Account Hijacking..
Malicious Insiders..
Advanced Persistent Threats (APTs).
Data Loss..

Which of the following is the greatest risk of a virtual computer?

The biggest risk of running a virtual computer is that it will go offline immediately if the server that it is housed on fails.

Which of the following is a security concern when dealing with virtual machines?

Virtual machines are also susceptible to viruses, malware, and ransomware attacks. These attacks can come from infected VM images or from users without proper security training. Once a VM is infected, it can spread malware across the entire virtual infrastructure without adequate isolation and security controls.