Department
Electrical and Computer Engineering
Major
Information Science and Technology
Research Advisor
Miller, Ann
Advisor's Department
Electrical and Computer Engineering
Abstract
Many different methods exist for infiltrating a PC locally or over the internet. This can be done through the use of malicious software such as viruses, worms, malicious applets, spammers, keyloggers, rootkits, and the like. The purpose of our study was to, first off, study the effects of malicious software downloaded and installed onto a PC running Windows XP Professional, and the ways the software hijacks the machine and spreads from the user's PC. The second half of our project utilized everything we learned from analyzing this malicious software and applying it to a real-life scenario. For our scenario, we coded a specific kind of virus (aptly named a "cryptovirus") and attacked from one machine over the network to another machine. After the attack was carried out, forensics were applied, and ways of defending against the attack in the future were determined. The victim machine then assumed the role of the attacker PC, and a stronger cryptovirus was created to attack the other PC. Forensics and a defense strategy were also applied to this attack.
Biography
Daniel is a junior attending the University of Missouri-Rolla, majoring in Information Science & Technology with an emphasis in Computer Science. He is the son of Jay and Patricia Nieters and is from St. Louis, Missouri. On campus, he is actively involved in UMR's music department and is one of the founding fathers of UMR's newest fraternity, Delta Sigma Phi. Off campus, he became an Eagle Scout under Boy Scout troop 169, and enjoys playing music in his spare time.
David is a sophomore undergraduate student attending the University of Missouri-Roi/a. He is majoring in Information Science & Technology with a minor in Business. He is the son of Jerome and Penny Trupiano and is from St. Charles, MO. He was a member of the Beta Sigma Psi fraternity and was Athletic Chairman of the fraternity for a semester. He plans to pursue a career in Information Technology.
Research Category
Management and Information Systems
Presentation Type
Poster Presentation
Document Type
Poster
Location
Havener Center, Carver-Turner Room
Presentation Date
11 April 2007, 9:00 am - 11:45 am
Computer Network Attack, Defense, and Forensics in Two Scenarios
Havener Center, Carver-Turner Room
Many different methods exist for infiltrating a PC locally or over the internet. This can be done through the use of malicious software such as viruses, worms, malicious applets, spammers, keyloggers, rootkits, and the like. The purpose of our study was to, first off, study the effects of malicious software downloaded and installed onto a PC running Windows XP Professional, and the ways the software hijacks the machine and spreads from the user's PC. The second half of our project utilized everything we learned from analyzing this malicious software and applying it to a real-life scenario. For our scenario, we coded a specific kind of virus (aptly named a "cryptovirus") and attacked from one machine over the network to another machine. After the attack was carried out, forensics were applied, and ways of defending against the attack in the future were determined. The victim machine then assumed the role of the attacker PC, and a stronger cryptovirus was created to attack the other PC. Forensics and a defense strategy were also applied to this attack.