12.07.2015 Views

Journal of Emerging Technologies in Web Intelligence Contents

Journal of Emerging Technologies in Web Intelligence Contents

Journal of Emerging Technologies in Web Intelligence Contents

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

154 JOURNAL OF EMERGING TECHNOLOGIES IN WEB INTELLIGENCE, VOL. 2, NO. 2, MAY 2010now enter via the <strong>Web</strong> and IBM Internet Security Systems(ISS) estimates that nearly 100% <strong>of</strong> <strong>Web</strong> attacks nowutilize obfuscated JavaScript as a very effective techniqueto bypass antivirus and <strong>in</strong>trusion prevention.Today, once a PC is <strong>in</strong>fected with stealth malware, ittypically opens two-way communications to a “commandand control” (C&C) server to establish a channel back tothe cyber crim<strong>in</strong>al. This allows the “bot” (as <strong>in</strong> “robotcomputer”) to report status as well as any valuable<strong>in</strong>formation that is immediately accessible. Groups <strong>of</strong>these remotely controlled, malware-<strong>in</strong>fected computersare commonly called botnets, and serve as the foundation<strong>of</strong> most cybercrime on the Internet.How do victims get <strong>in</strong>fected? A user may be drawn bya phish<strong>in</strong>g e-mail to a <strong>Web</strong> site hosted on a hijackedserver, which serves up a browser exploit; this downloadsand <strong>in</strong>stalls a bot on the user’s PC. The bot thendownloads more malware like “keyloggers” that silentlyrecord keyboard and mouse activities to execute furthercrim<strong>in</strong>al activities, such as steal<strong>in</strong>g user credentials andcaptur<strong>in</strong>g other sensitive <strong>in</strong>formation. All <strong>of</strong> this takesplace without the knowledge <strong>of</strong> the user or adm<strong>in</strong>istrator.As their prevalence has <strong>in</strong>creased, remote-controlmalware/botnets have become serious concerns forsecurity adm<strong>in</strong>istrators.The recent January, 2009 malware-related data thefts atHeartland Payment Systems and earlier malwareRecent Research[14] Has Found:11 % <strong>of</strong> the world’s computers are enmeshed <strong>in</strong> at leastone botnet23 % <strong>of</strong> home computers become <strong>in</strong>fected despite hav<strong>in</strong>gsecurity enabled72 % <strong>of</strong> corporate networks larger than 100 PC’s have an<strong>in</strong>fection<strong>in</strong>filtrations at Hannaford Supermarkets, University <strong>of</strong>Florida Medical Center, and NASA underscore theescalat<strong>in</strong>g threat <strong>of</strong> malware-related data breaches. TheIdentity Theft Resource Center, a nonpr<strong>of</strong>it group focusedon understand<strong>in</strong>g and prevent<strong>in</strong>g identity theft, reportedthat 656 known security breaches had taken place <strong>in</strong> 2008,reflect<strong>in</strong>g a 47 percent <strong>in</strong>crease over 2007’s total. As <strong>of</strong>March 17, 2009 the resource center had already reported110 breaches <strong>in</strong> 2009.V. STEALTH MALWARE ATTACKS ARE OUTMANEUVERINGCONVENTIONAL DEFENSESDefend<strong>in</strong>g corporate networks from today’s malwarerelateddata thefts requires modern protection that goesbeyond current signature- and heuristic-based detectiontechniques. Modern threats exploit the <strong>in</strong>ability <strong>of</strong>conventional network protection to provide a unifieddefense aga<strong>in</strong>st a crim<strong>in</strong>al who attacks on multiple fronts,from OS and browser vulnerabilities to social eng<strong>in</strong>eer<strong>in</strong>g.The anachronistic concept <strong>of</strong> detect<strong>in</strong>g <strong>in</strong>fections with as<strong>in</strong>gle technique, such as signatures, has left manybus<strong>in</strong>esses and consumers open to attack, despite theirdeployment <strong>of</strong> antivirus and IPS (<strong>in</strong>trusion preventionsystems). The sheer volume and escalat<strong>in</strong>g danger <strong>of</strong>modern attacks are overwhelm<strong>in</strong>g limited IT resourcesand outmaneuver<strong>in</strong>g conventional defenses that mayalready be <strong>in</strong> place. To enable a more efficient IT securityprocess, accurate and timely identification <strong>of</strong> <strong>in</strong>fectedmach<strong>in</strong>es is the first step <strong>in</strong> prevent<strong>in</strong>g malware-relateddata breaches. And, the only viable solutions are thosethat provide thorough coverage across the many vectorsthat are used <strong>in</strong> attacks.VI. CONVENTIONAL APPROACHES FAIL TO PROTECTAGAINST WEB THREATS<strong>Web</strong> threat scann<strong>in</strong>g has specific requirements that arenot met by the traditional approach to virus scann<strong>in</strong>g.Conventional antivirus s<strong>of</strong>tware <strong>in</strong>stalled on clientmach<strong>in</strong>es, for example, while crucial to the protection <strong>of</strong>these mach<strong>in</strong>es from a variety <strong>of</strong> threats, does notadequately protect aga<strong>in</strong>st the evolv<strong>in</strong>g set <strong>of</strong> <strong>Web</strong> threats.One reason is that the conventional approach to virusprotection <strong>in</strong>volves collect<strong>in</strong>g samples <strong>of</strong> viruses,develop<strong>in</strong>g patterns, and quickly distribut<strong>in</strong>g thesepatterns to users. Because many <strong>Web</strong> threats are targetedattacks and span many variants, collect<strong>in</strong>g samples isalmost impossible.The large numbers <strong>of</strong> variants use multiple deliveryvehicles (for example, spam, <strong>in</strong>stant messag<strong>in</strong>g, and <strong>Web</strong>sites), render<strong>in</strong>g the conventional sample collection,pattern creation, and deployment process <strong>in</strong>sufficient.Another reason that conventional virus detectionprocesses fall short <strong>in</strong>volves a fundamental differencebetween these viruses and evolv<strong>in</strong>g <strong>Web</strong> threats.Conventional viruses were fundamentally designed tospread as quickly as possible, and were therefore <strong>of</strong>teneasy to spot. With the advent <strong>of</strong> <strong>Web</strong> threats, malware hasevolved from this outbreak model to stealthy “sleeper”<strong>in</strong>fections that are therefore difficult to detect viaconventional antivirus techniques.Recover<strong>in</strong>g from <strong>in</strong>fections also presents newchallenges. In some cases, <strong>Web</strong> threats may result <strong>in</strong> asystem <strong>in</strong>fection that is so extensive (for example, via arootkit <strong>in</strong> which the system file is replaced) thatconventional un<strong>in</strong>stall or system clean<strong>in</strong>g approachesbecome useless. Infected systems <strong>of</strong>ten require a completesystem recovery, <strong>in</strong> which the hard drive is wiped and theoperat<strong>in</strong>g system, applications, and user data arere<strong>in</strong>stalled.VII. FUTURE WORKA New Approach Is Needed: Integrated, Multi-Layered Protection - Clearly, users need a newapproach to address<strong>in</strong>g <strong>Web</strong> threats that complementsexist<strong>in</strong>g techniques.The most effective approach willemploy multiple layers <strong>of</strong> protection and <strong>in</strong>corporate arange <strong>of</strong> protective measures. In addition, the evolv<strong>in</strong>gnature <strong>of</strong> the threat necessitates some form <strong>of</strong> <strong>in</strong>formationfeedback and <strong>in</strong>tegration, <strong>in</strong> which <strong>in</strong>formation gathered<strong>in</strong> one portion <strong>of</strong> the protection network is used to update<strong>in</strong>formation <strong>in</strong> other layers. Any effective approach© 2010 ACADEMY PUBLISHER

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!