Describe a malware attack that causes the victim to receive physical advertisement. P.219 Question C-4.9 Suppose that a metamorphic virus, DoomShift, is 99% useless bytes and 1% useful bytes....

1 answer below »
Describe a malware attack that causes the victim to receive physical advertisement. P.219 Question C-4.9 Suppose that a metamorphic virus, DoomShift, is 99% useless bytes and 1% useful bytes. Unfortuntely, DoomShift has infected the Login program on your Unix system and increased its seize from 54K bytes to 1054K bytes;hence, 1,000K bytes of login program now consists of the DoomShift viruss.


Document Preview:

P.217 Question C-4.2 Describe a malware attack that causes the victim to receive physical advertisement. P.219 Question C-4.9 Suppose that a metamorphic virus, DoomShift, is 99% useless bytes and 1% useful bytes. Unfortuntely, DoomShift has infected the Login program on your Unix system and increased its seize from 54K bytes to 1054K bytes;hence, 1,000K bytes of login program now consists of the DoomShift viruss. Barb has a cleanup program, DoomSweap, that is able to prune away the useless bytes of the Doomshift virus, so that in any infected file it will consist of 98% useless bytes and 2% useful bytes. If you apply DoomSweep to the infected login program, what will be its new size? P.266 Question C-5.11 Show how to defend against the DOS attack of Exercise C5-10. 5.10 You are the system administrator for an provider that owns a large network (eg. At least 64,000 IP addresses). Show how you can use SYN cookies to perform DOS attack on a web server. P.266 Question C-5.12 Describe how to modify a NAT router to prevent packets with spoofed IP addresses from exiting a private network. P.322 Question R-6.2 Suppose the transaction ID of DNS queries can take values from 1 to 65,536 and is randomly chosen for each DNS request. If an attacker sends 1,024 false replies per request, how many requests should he trigger to compromise the DNS cache of the victim with probability 99%? P.324 Question C-6.13 Describe a modification to the random port scan, as describe in previous exercise, so that it still use a randomly generated sequence of port numbers but will now have exactly the same number of attempted TCP connections as a sequential port scan. P.383 Question C-7.2 Describe a method for protecting users against URL obfuscation attacks. P.441 Question C-8.1 What is the plaintext for the following ciphertext, which was encrypted using a simple substation cipher: CJBT COZ NPON ZJV FTTK TWRTUYTFGT NG DTN O XJL. Y COZ ZJV CPJVIK DTN O XJL MYUCN.



Answered Same DayDec 23, 2021

Answer To: Describe a malware attack that causes the victim to receive physical advertisement. P.219 Question...

Robert answered on Dec 23 2021
132 Votes
P
P.217 Question C-4.2
Describe a malware attack that causes the victim to receive physical advertisement.
Solution:
These malware programs often change browser settings, alter system files and create new default Web pages. Typically, infected systems are plagued with new tool bars and a constant barrage of popup ads. Scores of useless and annoying Web sites can be added to your "favorites" folders without you having selected them!

Typically, malware will also collect personal information from users' systems regarding their Web activities, transferring it to advertising and data-research companies. These companies determine the Web sites that users frequent and employ the information to tailor the ads they send to individual users as email attachments as physical advertisements. A malware author may intend to attack only a few organizations,
seeking crucial financial data or banking credentials, and carefully preparing the attack with up-front research and reconnaissance . They may launch an attack with a spoofed
email containing an infected document attachment crafted to tempt specific recipients .
Several malware programs even regularly update their own program codes on infected computers. Popup and popunder ads are another great nuisance originated by adware, but more importantly, malware also causes computers to perform poorly. Frequently, infected systems freeze up or crash.
For example, a financial decision-maker might receive an infected spreadsheet promising quarterly sales data . If the targeted person opens the infected document without it
being flagged and the malware is installed, it may sit quietly until a user logs onto the company’s online banking site . At this point, the malware may steal credentials
through keystroke logging or by intercepting the second authentication factor in a two-factor authentication system .The attacker then can use the login for a future attack .
The most common way for malware to work its way into your system is to piggyback on a free program that is downloaded from the Internet. Most users click on an "I agree" or "I accept" button without reading the long and complex license agreement that expresses consent to place the malware onto their systems.
These days, most users have been warned about not clicking into unknown attachments or accepting downloaded programs. Unfortunately, at this point, a "wrong click" is not all you have to be worried about. More sophisticated malware programs are now employing the so-called "drive-by downloads." All you have to do to become infected with malware these days is visit a popular and presumably safe Web site, where malware can automatically latch onto your system and thus their advertisements are poped up.
P.219 Question C-4.9
Suppose that a metamorphic virus, DoomShift, is 99% useless bytes and 1% useful bytes. Unfortuntely, DoomShift has infected the Login program on your Unix system and increased its seize from 54K bytes to 1054K bytes;hence, 1,000K bytes of login program now consists of the DoomShift viruss. Barb has a cleanup program, DoomSweap, that is able to prune away the useless bytes of the Doomshift virus, so that in any infected file it will consist of 98% useless bytes and 2% useful bytes. If you apply DoomSweep to the infected login program, what will be its new size?
Solution:
The login program size is 54k
Therefore the size of virus code is 1000k bytes of which 99% is 0.99 x 1000k = 990k bytes is useless and only the remaining 1000k – 990k =10k bytes are useful
When the cleanup program downsweep is run and it prunes away the useless bytes of the virus code and make it contain 98% of useless bytes and 2% useful bytes.
This implies the 10k bytes of useful bytes now form 2% of the virus code ie., the total size of the viruscode = 10k/ 0.02 = 500K bytes (of which 500k – 10k = 490k are useless bytes).
P.266 Question C-5.11
Show how to defend against the DOS attack of Exercise C5-10.
5.10 You are the system administrator for an provider that owns a large network (eg. At least 64,000 IP addresses). Show how you can use SYN cookies to perform DOS attack on a web server.
Solution:
Denial-of-service (often abbreviated as DoS) is a class of attacks in which an attacker attempts to prevent legitimate users from accessing an Internet service, such as a web site. This can be done by exercising a...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here