Comp Sys Sec Unit2
Comp Sys Sec Unit2
The confinement principle deals with preventing a server from disclosing the information that the
user of the service considers confidential. The confinement ensures that the webserver should
allow accessing certain services to authorized users only.
1. Detour is defined as few words about Unix user IDs and IDs associated with Unix processes.
2. Every user in Unix like operating system is identified by different integer number, this unique
number is called as UserID.
3. There are three types of UID defined for a process, which can be dynamically changed as per
the privilege of task.
4. The three different types of UIDS defined are :
À). Real UserID : It is account of owner of this process. It defines which files that this process has
access to.
B). Effective UserID : It is normally same as real UserID, but sometimes it is changed to enable a
non-privileged user to access files that can only be accessed by root.
C). Saved UserID: It is used when a process is running with elevated privileges (generally root)
needs to do some under-privileged work, this can be achieved by temporarily switching to non-
privileged account.
Confinement Techniques
Some attacks discuss in error 404 digital hacking India part 2 chase are:
Israel Power Grid hit by a big hack attack is being called one of the worst cyberattacks
ever.
In 2014 a hydropower plant in upstate New York got hacked.
France in infrastructure including its main nuclear power plant is being targeted by a new
and dangerous powerful cyber worm.
Bangladesh's best group hacked into nearly 20000 Indian websites including the Indian
border security force.
First virus that could crash Power Grid or destroy the pipeline is available online for anyone
to download and Tinker with.
India’s biggest data breach, (the SBI debit card breach) when this happened Bank was
initially in a state of denial but subsequently they had to own up the cyber security breach
that took place in Indian history.
VM isolation
A process VM is a virtual platform created for an individual process and destroyed once the
process terminates. Virtually all operating systems provide a process VM for each one of the
applications running. A VM is an isolated environment with access to a subset of physical resources of
the computer system. Each VM appears to be running on the bare hardware, giving the appearance of
multiple instances of the same computer, though all are supported by a single physical system.
When protecting a computer system, it is often necessary to isolate an untrusted component into
a separate protection domain and provide only controlled interaction between the domain and the
rest of the system. Software-based Fault Isolation (SFI) establishes a logical protection domain by
inserting dynamic checks before memory and control-transfer instructions. In this Program (tb be
isolated), runs inside a dedicated isolated address space, called a sandbox.
What Is a Rootkit?
A rootkit allows someone to maintain command and control over a computer without the computer
user/owner knowing about it. Once a rootkit has been installed, the controller of the rootkit has the
ability to remotely execute files and change system configurations on the host machine. A rootkit
on an infected computer can also access log files and spy on the legitimate computer owner’s
usage.
An Intrusion Detection System (IDS) is a system that monitors network traffic for suspicious
activity and issues alerts when such activity is discovered. It is a software application that scans a
network or a system for the harmful activity or policy breaching. Any malicious venture or violation
is normally reported either to an administrator or collected centrally using a security information
and event management (SIEM) system.
Network intrusion detection systems (NIDS) are set up at a planned point within the network to
examine traffic from all devices on the network. It performs an observation of passing traffic on
the entire subnet and matches the traffic that is passed on the subnets to the collection of known
attacks. Once an attack is identified or abnormal behavior is observed, the alert can be sent to the
administrator. An example of a NIDS is installing it on the subnet where firewalls are located in
order to see if someone is trying to crack the firewall.
Host intrusion detection systems (HIDS) run on independent hosts or devices on the network. A
HIDS monitors the incoming and outgoing packets from the device only and will alert the
administrator if suspicious or malicious activity is detected. It takes a snapshot of existing system
files and compares it with the previous snapshot. If the analytical system files were edited or
deleted, an alert is sent to the administrator to investigate. An example of HIDS usage can be
seen on mission-critical machines, which are not expected to change their layout.
Protocol-based intrusion detection system (PIDS) comprises a system or agent that would
consistently resides at the front end of a server, controlling and interpreting the protocol between
a user/device and the server. It is trying to secure the web server by regularly monitoring the
HTTPS protocol stream and accept the related HTTP protocol. As HTTPS is un-encrypted and
before instantly entering its web presentation layer then this system would need to reside in this
interface, between to use the HTTPS.
Hybrid intrusion detection system is made by the combination of two or more approaches of the
intrusion detection system. In the hybrid intrusion detection system, host agent or system data is
combined with network information to develop a complete view of the network system. Hybrid
intrusion detection system is more effective in comparison to the other intrusion detection system.
Prelude is an example of Hybrid IDS.
Signature-based Method:
Signature-based IDS detects the attacks on the basis of the specific patterns such as number of
bytes or number of 1’s or number of 0’s in the network traffic. It also detects on the basis of the
already known malicious instruction sequence that is used by the malware. The detected patterns
in the IDS are known as signatures. Signature-based IDS can easily detect the attacks whose
pattern (signature) already exists in system but it is quite difficult to detect the new malware
attacks as their pattern (signature) is not known.
Anomaly-based Method:
Anomaly-based IDS was introduced to detect unknown malware attacks as new malware are
developed rapidly. In anomaly-based IDS there is use of machine learning to create a trustful
activity model and anything coming is compared with that model and it is declared suspicious if it
is not found in model. Machine learning-based method has a better-generalized property in
comparison to signature-based IDS as these models can be trained according to the applications
and hardware configurations.