DocumentCode :
3110678
Title :
Enhancing network security by preventing user-initiated malware execution
Author :
Harrison, John V.
Author_Institution :
Center for Cybermedia Res., Nevada Univ., Las Vegas, NV, USA
Volume :
2
fYear :
2005
fDate :
4-6 April 2005
Firstpage :
597
Abstract :
Although organizations have invested significant resources in security hardware, software and training to implement a strategy known as "defense in depth", the attacks they experience are increasing in number, sophistication and cost of recovery and litigation. One difficult class of attack to defend against is user-initiated malicious software (malware) execution. User-initiated malware penetrates the security perimeter with assistance provided, either intentionally or unintentionally, by and enterprise\´s end users. These users assist the attacker by downloading malware from a Web site, invoking malware arriving as e-mail attachments and introducing malware inside the perimeter via the unauthorized use of foreign media, e.g., floppy disks, CD-ROMs, or unauthorized media devices, e.g., USB drives, or unauthorized wireless networking hardware. In this paper, we describe characteristics of the most widely used defense techniques for the blocking of user-initiated malware and why these techniques are insufficient. We then introduce a module verification strategy that eliminates, or at least severely reduce, this problem by extending the classic "defense in depth" network security strategy. We then describe how the augmentation of a standard operating system loader to include references to a database of cryptographic hashes of module executables can be used to implement this strategy. Finally, we describe our efforts towards the creation of a prototype system that implements the module verification strategy.
Keywords :
authorisation; cryptography; operating systems (computers); telecommunication security; computer security; cryptographic hash; malicious software; malware execution; module verification; network security; operating system security; Costs; Cryptography; Data security; Databases; Drives; Electronic mail; Floppy disks; Hardware; Operating systems; Universal Serial Bus; Computer Security; Malicious Software; Network Security; Operating System Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Technology: Coding and Computing, 2005. ITCC 2005. International Conference on
Print_ISBN :
0-7695-2315-3
Type :
conf
DOI :
10.1109/ITCC.2005.146
Filename :
1425209
Link To Document :
بازگشت