12.07.2015 Views

Journal of Emerging Technologies in Web Intelligence Contents

Journal of Emerging Technologies in Web Intelligence Contents

Journal of Emerging Technologies in Web Intelligence Contents

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

152 JOURNAL OF EMERGING TECHNOLOGIES IN WEB INTELLIGENCE, VOL. 2, NO. 2, MAY 2010Protect<strong>in</strong>g Data From the Cyber Theft – AVirulent Disease1 Dr. S.N. Panda and 2 Vikram Mangla1 Pr<strong>of</strong>essor & Pr<strong>in</strong>cipal, 2 Assistant Pr<strong>of</strong>essor1 RIMT-IMCT, Mandi Gob<strong>in</strong>d Garh, Punjab.2 Chitkara Institue <strong>of</strong> Eng<strong>in</strong>eer<strong>in</strong>g & Technology, Rajpura, Punjab.1 panda.<strong>in</strong>dia@gmail.com, 2 mangla.vikram@gmail.comAbstract - Network security policies are essential elements <strong>in</strong>Internet security. Network security perimeter devices suchas firewalls, IPSec, and IDS/IPS devices operate based onlocally configured policies. Malware-related data breacheshave reached pandemic proportions as crim<strong>in</strong>als discoverthat Internet crime is easy to commit, highly lucrative, andlargely under-policed. With a few hundred dollars, a cybercrim<strong>in</strong>al can beg<strong>in</strong> a career <strong>of</strong> break<strong>in</strong>g <strong>in</strong>to computers tosteal identity and confidential data for sale to the highestbidder. This paper will cover current and emerg<strong>in</strong>g trends <strong>of</strong>stealth malware, such as mov<strong>in</strong>g primarily to the <strong>Web</strong> s<strong>in</strong>cemost organizations allow <strong>Web</strong> traffic <strong>in</strong>to the network. Itwill also cover new advances <strong>in</strong> network securitytechnologies that use multi-phase heuristic and virtualmach<strong>in</strong>e analysis to detect and mitigate the damages thatresult from malware-related data thefts.Index Terms - Network Security, <strong>Web</strong> Threats, Malware,Phish<strong>in</strong>gI. INTRODUCTIONWith the global connectivity provided by the Internet,network security has ga<strong>in</strong>ed significant attention <strong>in</strong>research and Industrial communities. Due to the<strong>in</strong>creas<strong>in</strong>g threats <strong>of</strong> network attacks, network securitydevices such like firewalls and IPSec gatewaye havebecome important <strong>in</strong>tegrated elements not only <strong>in</strong>enterprise networks but also <strong>in</strong> small size and homenetworks. Motivated by the lure <strong>of</strong> pr<strong>of</strong>its from the sale <strong>of</strong>stolen confidential <strong>in</strong>formation, cyber crim<strong>in</strong>als today areshift<strong>in</strong>g to the <strong>Web</strong> as their chosen attack vector, whichprovides an ideal environment for cyber crime. Malwarerelateddata breaches have reached pandemic proportionsas crim<strong>in</strong>als discover that Internet crime is easy tocommit, highly lucrative, and largely under-policed. Witha few hundred dollars, a cyber crim<strong>in</strong>al can beg<strong>in</strong> a career<strong>of</strong> break<strong>in</strong>g <strong>in</strong>to computers to steal identity andconfidential data for sale to the highest bidder. Fraudsterswho purchase the data have developed a variety <strong>of</strong>schemes to monetize that <strong>in</strong>formation rang<strong>in</strong>g fromtransact<strong>in</strong>g unauthorized stock trades to transferr<strong>in</strong>g fundsto <strong>of</strong>fshore bank accounts. The cyber crime economy is sorobust that there is a vibrant market for pr<strong>of</strong>essionalmalware toolkits available for $500 to $1,000 and comepre-configured with a range <strong>of</strong> attack modules, exploit‘ma<strong>in</strong>tenance’ updates, and 24 x 7 onl<strong>in</strong>e technicalsupport.Many <strong>Web</strong> threats can be deployed unbeknownst to theuser, requir<strong>in</strong>g no additional action than merely open<strong>in</strong>g a<strong>Web</strong> page. Large numbers <strong>of</strong> users, an assortment <strong>of</strong>technologies, and a complex network structure providecrim<strong>in</strong>als with the targets, exploitable weaknesses, andanonymity required for large-scale fraud. <strong>Web</strong> threatspose a broad range <strong>of</strong> risks, <strong>in</strong>clud<strong>in</strong>g f<strong>in</strong>ancial damages,identity theft, and loss <strong>of</strong> confidential bus<strong>in</strong>ess<strong>in</strong>formation, theft <strong>of</strong> network resources, damaged brand orpersonal reputation, and erosion <strong>of</strong> consumer confidence<strong>in</strong> e-commerce. These high stakes, the pervasive use <strong>of</strong>the <strong>Web</strong>, and the complexity <strong>of</strong> protect<strong>in</strong>g aga<strong>in</strong>st <strong>Web</strong>threats comb<strong>in</strong>e to form perhaps the greatest challenge toprotect<strong>in</strong>g personal and bus<strong>in</strong>ess <strong>in</strong>formation <strong>in</strong> a decade.In August 2007, a scene played out as cyber crim<strong>in</strong>als<strong>in</strong>filtrated the monster.com job site through “Monster forEmployers” accounts, compromis<strong>in</strong>g the personal<strong>in</strong>formation <strong>of</strong> 1.6 million users. Many <strong>of</strong> these users thenreceived <strong>of</strong>ficial-look<strong>in</strong>g emails, claim<strong>in</strong>g to be frommonster.com and encourag<strong>in</strong>g them to download a “helperapplication” that turned out to be yet more malware.These attacks were well-researched, us<strong>in</strong>g familiarlanguage and brand<strong>in</strong>g, and coded to transfer data slowly,under the radar <strong>of</strong> IT adm<strong>in</strong>istrators look<strong>in</strong>g for suspiciousnetwork traffic.[1] <strong>Web</strong> threats also <strong>in</strong>clude malware thatis downloaded from an email attachment, but accesses the<strong>Web</strong> to convey <strong>in</strong>formation to the hacker. In 2007,fraudulent emails were sent purport<strong>in</strong>g to be from theFederal Trade Commission. These emails claimed that acompla<strong>in</strong>t had been filed aga<strong>in</strong>st the company andconta<strong>in</strong>ed an attachment. If the recipient opened theattachment, a keylogg<strong>in</strong>g Trojan was deployed thatattempted to steal log<strong>in</strong> <strong>in</strong>formation from the user’scomputer and send it back to the hacker. [2].Phish<strong>in</strong>g is a prevalent <strong>Web</strong> threat, spo<strong>of</strong><strong>in</strong>g legitimatecompanies to trick people <strong>in</strong>to provid<strong>in</strong>g confidential<strong>in</strong>formation. Consumer phish<strong>in</strong>g is wide-spread, send<strong>in</strong>gemails that spo<strong>of</strong> organizations like banks and on-l<strong>in</strong>eretailers. These phish<strong>in</strong>g emails <strong>of</strong>ten use l<strong>in</strong>ks to takerecipients to <strong>Web</strong> sites where confidential <strong>in</strong>formation isgathered. Employees can fall victim to these consumerthreats, but phish<strong>in</strong>g can also affect corporations moredirectly. In 2005, phish<strong>in</strong>g emails targeted CEOs andother high-level executives <strong>of</strong> US credit unions <strong>in</strong> anattempt to ga<strong>in</strong> control <strong>of</strong> millions <strong>of</strong> personal f<strong>in</strong>ancialrecords. The email messages conta<strong>in</strong>ed a l<strong>in</strong>k to a <strong>Web</strong>site where a Trojan was downloaded. Even one successful© 2010 ACADEMY PUBLISHERdoi:10.4304/jetwi.2.2.152-155

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!