Antivirus, IDS/IPS, and Honeypot Quiz
39 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Anomalies analysis monitors process, traffic, and ______ actions.

user

A virtual machine on which malware is executed is called a ______.

Sandbox

Only applications on the "______" are allowed.

whitelist

Intrusion detection methods are based on the assumption that the behavior of a hacker is different from that of ______ users.

<p>legal</p> Signup and view all the answers

The choice of the optimal interpretation of illegal activities is the main problem of any method of detecting ______.

<p>intrusions</p> Signup and view all the answers

An ______ identifies, neutralizes, or eliminates malware.

<p>antivirus</p> Signup and view all the answers

Current antiviruses protect against a lot of ______.

<p>malware</p> Signup and view all the answers

A virus ______ is a malware search mechanism.

<p>scanner</p> Signup and view all the answers

One method of detecting malware is the ______-based method.

<p>signature</p> Signup and view all the answers

In a signature method, the signatures are based on manual ______.

<p>creation</p> Signup and view all the answers

A disadvantage of the signature method is that it does not see new or ______ malware.

<p>polymorphic</p> Signup and view all the answers

______ can dublicate each other.

<p>Antiviruses / firewalls / IDS</p> Signup and view all the answers

______ makes the virus think that the file is already infected

<p>Vaccinators</p> Signup and view all the answers

The script checks for the existence of various antivirus programs by looking for their ______ files.

<p>executable</p> Signup and view all the answers

The registry key that is read to determine the program files directory is 'HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion______'.

<p>ProgramFilesDir</p> Signup and view all the answers

The script attempts to delete files related to ______ antivirus programs.

<p>installed</p> Signup and view all the answers

The script creates a text file named '______.vbs'.

<p>mail</p> Signup and view all the answers

The script uses the Outlook 'GetNameSpace' method with the parameter '______' to access mail information.

<p>MAPI</p> Signup and view all the answers

The email subject is set to '______ Game'.

<p>Legion</p> Signup and view all the answers

The ______ object is used to create the email.

<p>leg</p> Signup and view all the answers

The script uses the filesystem object to create and ______ the mail.vbs.

<p>write</p> Signup and view all the answers

Snort is an example of a ______-based intrusion detection method.

<p>rules</p> Signup and view all the answers

In anomaly-based intrusion detection, the initial stage involves collecting information about the typical behavior of legal ______ / resources.

<p>users</p> Signup and view all the answers

Data collected for anomaly detection is statistically processed, and criteria are established that characterize the normal state, such as ______ criteria and profiles.

<p>threshold</p> Signup and view all the answers

[Blank] can be set up for users, groups, or resources in anomaly-based detection.

<p>Profiles</p> Signup and view all the answers

Examples of profiles used in anomaly detection include the number of events in a time interval, time interval, and ______ usage measure.

<p>resource</p> Signup and view all the answers

Intrusion ______ systems are software that implement intrusion detection techniques.

<p>detection</p> Signup and view all the answers

Intrusion detection systems record attack ______ and collect data to prepare security reports.

<p>attempts</p> Signup and view all the answers

Intrusion prevention systems perform the same functions as IDS, but additionally use automated tools to stop possible ______.

<p>attacks</p> Signup and view all the answers

The script uses 'C.Attachments.______' to add the file.

<p>Add</p> Signup and view all the answers

The statement 'C.DeleteAfterSubmit = ______' indicates that the attachment should be deleted after submission

<p>True</p> Signup and view all the answers

A signature for Kaspersky Antivirus Personal/Kaspersky Antivirus Personal Pro contains the string 66696c656578697374732028{-25}202620225c6b6173706572736b79206c61625c6b61737065______...

<p>72736b7920616e7469766972757320706572736f6e616c</p> Signup and view all the answers

The antiviral toolkit pro signature contains 66696c6565786973747328{-25}202620225c616e7469766972616c20______...

<p>746f6f6c6b69742070726f</p> Signup and view all the answers

The signature for AVPersonal contains 66696c656578697374732028{-25}202620225c______...

<p>6176706572736f6e616c</p> Signup and view all the answers

The signature for Trend PC-cillin 98 includes the string 66696c656578697374732028{-25}202620225c7472656e64______...

<p>2070632d63696c6c696e</p> Signup and view all the answers

The code contains a loop using '666f7220{-10}203d203120746f20{-10}2e______...'

<p>61646472657373656e74726965732e636f756e74</p> Signup and view all the answers

The code uses ' ______ {-300}2e6174746163686d656e74732e616464{-150}2e73656e64'

<p>6578697420666f72</p> Signup and view all the answers

A heuristic method is used to detect malware when a signature does not ______ 100%.

<p>match</p> Signup and view all the answers

Heuristic methods can be unreliable and generate ______ positives.

<p>false</p> Signup and view all the answers

Study Notes

Antivirus, IDS/IPS, Honeypot

  • Antivirus software identifies, neutralizes, or eliminates malware.
  • Early antivirus programs focused on protecting against computer viruses.
  • Modern antivirus programs now protect against various types of malware.
  • Virus scanners are a core mechanism within antivirus software to identify malware.
  • Antivirus, firewalls, and intrusion detection systems (IDS) can sometimes overlap in function.
  • Commercial aspects of antivirus software are significant.

Definitions

  • False-positive: A result indicating a threat when no threat exists.
  • False-negative: A result indicating no threat when a threat exists.

Antiviruses

  • Antivirus software identifies, neutralizes, or eliminates malware.
  • Used to protect against computer viruses at the start of the 20th century.
  • Now protect against a wide range of malware.
  • Virus scanners are the key search mechanism.
  • Antiviruses, firewalls, and intrusion detection systems (IDS) sometimes have overlapping functionalities.
  • Antiviruses are commercially available.

Types of Antiviruses

  • Scanners use signature and heuristic methods.
  • Revisionists capture the current state of the file system (FS).
  • Monitors observe potentially dangerous actions.
  • Vaccinators trick viruses into thinking files are already infected.
  • Classification is based on functionality.

Actions

  • Removing infected files.
  • Blocking access to infected files.
  • Quarantine (blocking execution) of infected files.
  • Removing the virus from the file.
  • Actions are performed after moving infected files.

Malware Detection Techniques

  • Signature-based.
  • Heuristic methods.
  • Anomaly analysis.
  • Sandboxing.
  • Whitelisting.
  • Multi-core/combined methods.

Signature Method

  • Based on unique malware code lines.
  • Improves false-positive detection.
  • Signatures are manually created.
  • Advantages include high accuracy and reliability.
  • Disadvantages: Doesn't detect new malware (polymorphic), updates are slow, and increases the signature base and speed of scanning; much manual work needed in creating signatures.

Signature Formats

  • ClamAV: Specific to .ndb files stored in .Idb files.
  • Signature format with details such as the signature's name, description block, logical expression, and sub-signatures.

Example: Worm.Godog - 1

  • Application (API) related to mass mailers, AV killers, and VB-script.
  • Specific registry entries and file actions.

Example: Worm.Godog - 2

  • VBScript code, creating and sending emails with infected files (mail.vbs).

Example of Creating a Signature- 1

  • Specific codes or hash values linked to different software like Kaspersky Antivirus or Anti-viral Toolkit Pro.

Example of Creating a Signature- 2

  • Specific codes or hash values linked to different software like Trend PC-cillin 98.

Example of Creating a Signature- 3

  • Examples of codes or hash values linked to Worm.Godog.

Heuristic Method

  • Designed to detect malware when signatures don't fully match.
  • Useful in detecting a class of malware ('morphic' viruses), but may result in false positives and generally not considered reliable.
  • Detection techniques include monitoring actions, emulating virus behavior, and analyzing code discrepancies.

Anomalies Analysis

  • Detects unusual or unexpected behavior of processes, traffic, or user actions.
  • High potential of false-positives detecting normal, legitimate programs as malicious.

"Sandbox"

  • Executes malware on a virtual machine.
  • Tracks changes to analyze malicious behavior.
  • Advantage: efficient for professional analysis.
  • Disadvantage: significant time consumption of system resources.

"Whitelist"

  • Allows only pre-approved applications to run.
  • Advantages: no need to update signatures, more effective for organizations with security policies.
  • Disadvantages: Not flexible or user-friendly; requiring administrator time and resources to configure.

Intrusion Detection

  • Importance: Protecting against intrusions
  • Problems: distinguishing between actual attacks and legal activities.

Assumptions of Intrusion Detection

  • Intrusion detection systems are based on the idea that attacker behavior differs from normal user behavior.
  • Difficulty distinguishing legal from illegal activity can lead to false positives.
  • Intrusion detection systems may warn of possible attacks but cannot definitively confirm.

Rules-Based Intrusion Detection Methods

  • Example using Snort to monitor network traffic for specific rules and patterns of attacks.

Anomalous-Based Intrusion Detection Methods

  • Records typical behavior of users and resources.
  • Analyzes data statistically to create profiles of normal behavior.
  • Compares observed activity with established profiles to look for unusual behavior.

Methods +/-

  • Rules-based methods
  • Anomaly-based methods

IDS/IPS

  • This is a system designed for monitoring and detecting intrusion attempts.
  • Implementation of intrusion detection techniques for potential security violations.
  • These systems can record attacks and prepare reports.
  • Intrusion prevention systems can stop attacks, terminate sessions, block access, change security device configurations, and remove infected files.

IDS/IPS Components

  • Sensors/agents
  • Management server
  • Database
  • Dedicated Secure Management Network

NIDS - Network-Based

  • Uses software/hardware to detect network-based intrusions.
  • Limitation: Cannot interpret or process encrypted traffic.
  • Attacks on sensors can make this method ineffective in highly complex environments.
  • Example of intrusion detection using Snort to monitor and detect attacks.

HIDS/FIM - Host-Based

  • Tracks activity on individual hosts.
  • Uses software solutions, active/passive agents, and real-time/delayed detection techniques.

Honeypot/Honeynet

  • Honeypot systems are designed as decoys for cybercriminals.
  • There are also different levels of interactivity for these systems.
  • These systems can be used for monitoring, analyzing, testing, and learning.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

Test your knowledge on antivirus software, intrusion detection systems, and honeypots. This quiz covers their functions, definitions, and interactions. Dive into the details of malware protection and learn about false positives and negatives.

More Like This

Antivirus Software Quiz
5 questions

Antivirus Software Quiz

ResoundingCarnelian3976 avatar
ResoundingCarnelian3976
Understanding AntiVirus Software Functions
18 questions
Antivirus Software and Malware Types
10 questions
Use Quizgecko on...
Browser
Browser