SECURING A SCHOOL network AND MAKING IT MALWARE

SECURING A SCHOOL NETWORK AND MAKING IT MALWAREFREE WITH LIMITED RESOURCES.
BASED ON MY EXPERIENCE IN MOUNTAINS OF THE MOON UNIVERSITY
PROMOTOR: MR. IVO DE PAUW
RESEARCH TOPIC CONDUCTED BY
DYLAN DECEULAER
TO ACHIEVE THE BACHELOR’S DEGREE IN
NEW MEDIA AND COMMUNICATION TECHNOLOGY
HOWEST | 2015-2016
SECURING A SCHOOL NETWORK AND MAKING IT MALWAREFREE WITH LIMITED RESOURCES.
BASED ON MY EXPERIENCE IN MOUNTAINS OF THE MOON UNIVERSITY
PROMOTOR: MR. IVO DE PAUW
RESEARCH TOPIC CONDUCTED BY
DYLAN DECEULAER
TO ACHIEVE THE BACHELOR’S DEGREE IN
NEW MEDIA AND COMMUNICATION TECHNOLOGY
HOWEST | 2015-2016
PREFACE
From February until May I was able to do an internship at Mountain of the Moon University
in Fort Portal, Uganda. It was a unique experience and I’m very grateful I got this chance.
During my internship I got to enjoy the very friendly people of Uganda, the breathtaking
sights and I got to work together with amazing colleagues. In this environment I was able
to research and write this paper.
I wouldn’t be able to do all of this without the help of others. First of all, I would like to
thank the province West-Vlaanderen and VLIR for their financial help, I really wouldn’t be
able to finance the trip on my own. Secondly, I would like to thank Howest and the
organizer, Ivo De Pauw, in particular for offering and organizing this internship. Without all
the help of organizing and planning this international experience, I wouldn’t have taken
the big step of doing an internship in Africa.
During my internship and during the research I did for this paper, I was helped by my
colleagues at Mountains of the Moon University, Madjiid Mugenyi and Donozio Mucunguzi.
To successfully complete my internship and my thesis, I received a lot of help from my
mentor, Ivo De Pauw and my technical mentor, Tom Decavele. And lastly, I want to thank
Wannes De Smet for his help during his visit at Mountain of the Moon University and the
help he offered with the technical content of this paper.
ABSTRACT
This paper covers the implementation of security within a school network and making it
malware free. This is accomplished with limited resources as this paper should offer an
alternative to all the expensive software on the market. This paper also covers what
dangers an unprotected network could face. And it gives an overview of all the different
malware with their respective characteristics. The network of the Saaka campus at
Mountains of the Moon University was used as a reference to base this research on.
This paper concludes that network security can be lacking because of the lack of correctly
configured network devices, flawed firewall configurations, the lack of good policies and
the lack of threat protection on appropriate devices. This paper points out that to achieve
a secure network environment and to keep it malware free, a solid security strategy is
needed throughout the network. A solid security solution can be realized by implementing
proper vulnerability and threat mitigation. With the help of open-source software and
companies offering their software for free to schools, this can be done with limited
resources.
TABLE OF CONTENTS
Introduction ...................................................................................................................................... 1
1.
The current state of network Security ..................................................................................... 2
1.1.
2.
3.
1.1.1.
The network .................................................................................................................. 2
1.1.2.
The servers .................................................................................................................... 2
1.1.3.
Other hardware ............................................................................................................ 3
1.2.
Overview of the current security ...................................................................................... 4
1.3.
Possible threats .................................................................................................................... 4
1.3.1.
The Network and hardware ........................................................................................ 5
1.3.2.
The servers .................................................................................................................... 5
1.3.3.
Windows Virtual Machines ......................................................................................... 5
1.3.4.
Linux Virtual Machines ................................................................................................ 6
1.3.5.
Malware on Windows .................................................................................................. 7
Detecting an infection............................................................................................................... 10
2.1.
Commercial software ........................................................................................................ 10
2.2.
Other Software................................................................................................................... 13
2.3.
The Follow up...................................................................................................................... 14
Securing the network environment ........................................................................................ 15
3.1.
Educating the users ........................................................................................................... 15
3.2.
Minimizing vulnerabilities ................................................................................................. 15
3.2.1.
The users...................................................................................................................... 15
3.2.2.
Least-privilege implementation .............................................................................. 16
3.2.3.
Network segmentation ............................................................................................. 19
3.2.4.
The Firewall ................................................................................................................. 21
3.2.5.
Patching ....................................................................................................................... 22
3.2.6.
A correct configuration ............................................................................................. 22
3.3.
Protecting against threats................................................................................................ 23
3.3.1.
Firewall Protection .................................................................................................... 23
3.3.2.
Server Protection ....................................................................................................... 24
3.3.3.
Client Protection ........................................................................................................ 27
3.4.
4.
Overview of the Infrastructure .......................................................................................... 2
Todo...................................................................................................................................... 28
Conclusion ................................................................................................................................... 29
TABLE OF FIGURES AND TABLES
Figure 1. Results of a malware removal software comparison performed in 2014. Source:
www.av-test.org ................................................................................................................................. 10
Figure 2. Results of a malware removal software comparison performed in 2015. Source:
www.av-test.org ................................................................................................................................. 11
Figure 3. Saaka’s active directory structure with an example of a user account. ................... 16
Figure 4.The prompt that shows when a user without administrative rights tries to install a
program. .............................................................................................................................................. 17
Figure 5. The implementation of restricted groups for LibraryAdmins ................................... 18
Figure 6. Enabling the “turn off autoplay” group policy ............................................................. 18
Figure 7. An example of the FTP server configuration. ............................................................... 19
Figure 8. A list of WLANs on the wireless controller ................................................................... 19
Figure 9. The access-list configuration on the Layer 3 switch that blocks access to
management addresses on the servers VLAN to every other VLAN except for the admin
VLAN..................................................................................................................................................... 20
Figure 10. The DMZ configuration restricting DMZ traffic to the WAN interface and the
internal network. By default all traffic is denied. The DMZ only has an ftp server, which is
accessible to the internal network. SSH and RDP is only accessible to the admin VLAN...... 21
Figure 11. The LAN configuration ................................................................................................... 21
Figure 12. Example of a blocked site. ............................................................................................. 22
Figure 13. The part of the SquidGuard GUI to add new entries. ................................................ 22
Figure 14. The Snort package allows you to choose different IPS security levels. These
settings are a tradeoff between security and the amount of false positives. ........................ 24
Figure 15. Enabling ClamAV in the Squid package ....................................................................... 24
Figure 16. vSphere Replication setting window ........................................................................... 27
Table 1. Source: http://www.av-comparatives.org/wpcontent/uploads/2015/10/avc_rem_2015_en.pdf.........................................................................10
Table 2. Comparison of enterprise antivirus software..................................................................24
GLOSSARY
AD: Active Directory
BYOD: Bring Your Own Device
Botnet: A collection of computers that is controlled by 1 entity, that’s usually used to
perform coordinated attacks.
DDOS: Distributed Denial Of Service, an attack performed by multiple computers, aimed to
disable a system.
DHCP: Dynamic Host Configuration Protocol, a protocol that distributes IP-addresses on a
network.
DNS: Domain Name System, a system that provides the association between domain
names and IP-addresses.
ESXI: A hypervisor by VMware. It is a piece of software that runs directly on hardware
which can run Virtual Machines.
GPO: Group Policy Object
IDS: Intrusion Detection System
IPS: Intrusion prevention System
Keylogger: This is a piece of software that captures the keystrokes of a user. The
information gained from a keylogger is usually used for malicious purposes.
LAN: Local Area Network, the internal network.
MMU: Mountains of the Moon University
PSK: Pre-Shared Key, a shared password to authenticate on a wireless network.
Phishing: It’s a social engineering practice. It’s the act of manipulating people to steal
sensitive information.
VLAN: Virtual LAN, a virtual network.
VMware vSphere: The virtualization platform of VMware. It’s a suite that contains
VMWare’s virtualization products.
WAN: Wide Area network, a network that spans a large distance, like the internet.
WLAN: Wireless LAN
WPA2-enterprise: A network standard that provides to ability to authenticate on a
network through username and password based on a RADIUS server.
INTRODUCTION
This paper is based on my experience of my internship at Mountains of the Moon
University in Uganda. My internship continued the work of two Howest interns that built
the current network infrastructure at MMU’s Saaka campus. While they did a very good job,
security was not a part of their assignment. And unfortunately security wasn’t part of our
internship assignment neither.
The security at school networks are often overlooked. But it is very important though.
According to Risk Based Security 14% of all the security breaches in 2015 happened at
educational facilities.1 A university in Uganda might not be the biggest target. But just like
most universities, Mountains of the Moon University is planning to automate most of the
administrative work. This includes storing sensitive information on their servers. When you
work with sensitive information of over 1000 students, it is best store this information
safely.
The reason I chose this subject was because I saw the security was seriously lacking in the
infrastructure we were working with. Antivirus warnings were common on devices
connected to the domain. Almost no countermeasures were taken to combat threats on
the servers and the clients. But the importance of this matter goes beyond this specific
case. According to a Websense Security Labs study, users in the education sector are twice
as likely to visit malicious websites. These users are also twice as likely to be impacted by
Spyware and Adware2.
Without thorough protection, malware could potentially cripple a school network. As
today’s schools are very integrated with IT, the potential for loss of data or denial of
service is high in a school environment. There have been cases of a school having to close
because of a severe malware attack3.
This paper will cover the importance of security in a school network, the possible threats a
school network can encounter and how to protect the network against external threats
like malware. For this case it is essential it can be done with limited resources as the
university has no budget for additional software licenses.
1
Risk Based Security. (2016, January). Data Breach QuickView 2015. Retrieved from
https://www.riskbasedsecurity.com/: https://www.riskbasedsecurity.com/2015-data-breachquickview/
2
Websense Security Labs. (2015, July 7). Today’s Lesson: End Users in the Education Sector Are Twice
as Likely to Visit Malicious Sites. Retrieved from Websense:
http://community.websense.com/blogs/securitylabs/archive/2015/07/07/the-company-you-keepmatters.aspx
3
Warfield, B. (2015, March 3). Malware Attack Cripples Cloquet Schools' Network. Retrieved from
wdio.com: http://www.wdio.com/news/cloquet-schools-closed-virus-malware-computerattack/4077895/
Page | 1
1.
THE CURRENT STATE OF NETWORK SECURITY
We continue the work of last year’s Howest interns. They built the complete network
infrastructure for Mountains of the Moon University’s Saaka campus from scratch. Next to
the network infrastructure they also installed a new server rack made up of 6 servers.
These servers host a complete VMware vSphere environment. This virtual environment
hosts multiple Windows and Linux servers. Each system has different potential
vulnerabilities. So in order to assess the potential threats we face we need to know which
systems we are working with.
1.1.
OVERVIEW OF THE INFRASTRUCTURE
In order to assess the potential risks the infrastructure can encounter we need a
comprehensive overview of the infrastructure.
1.1.1.
THE NETWORK
The backbone of the network in the business campus is the Layer 3 switch located in the
server room. This is a Cisco 3560-x switch. This switch connects all the network connected
equipment together. This managed switch enables the configuration and routing between
Virtual LANs. This is a virtual separation of networks. When configured correctly this can be
an essential security feature. In the case of our network, multiple VLANs were
implemented for easy management, but no additional security features were
implemented.
To connect the desktop computers in the computer lab, the computers in the library and
the access points to the network, layer 2 switches are connected to the layer 3 switch.
These Layer 2 switches are unmanaged switches. This means there isn’t very much to
configure in terms of security on a Layer 2 switch.
To provide wireless access to the network, wireless access points are used. These are
connected to a wireless controller. The wireless controller is a Cisco 5500 wireless
controller. The wireless controller provides the ability to broadcast multiple wireless
networks through the same access point. In our case, each wireless network is connected
to a VLAN. VLANs can provide security features, as discussed before.
The wireless controller had a separate student network but it was disabled. Instead the
students were connected to the staff network. This network was protected with PSK. This
means it is protected with just 1 password. And the password was happily shared with
everybody. The admin network is protected with WPA2-enterprise, which is a good way to
protect a network.
1.1.2.
THE SERVERS
The server rack is made up of 6 HP servers. Every server runs an ESXI installation. These
ESXI servers are managed by a vCenter Server installation. This vSphere environment hosts
multiple virtual machines that makes up the school network infrastructure. The setup of
this infrastructure is common in schools and businesses, either in a virtual environment or
as physical servers.
Page | 2
A windows server called DC1 acts as the domain controller. The domain controller is
responsible for authenticating and managing permissions for users and machines within
the domain. The domain controller uses an active directory. The active directory contains
all the users and machines and their respective rights and groups. This server provides the
authentication for a lot of other services within the network, so it’s a vital part of the
network. For safety there is a second domain controller that acts as a backup domain
controller. This server is called DC2. The AD in this server is in read-only mode. When data
gets modified in DC1, the changes are pushed to DC2. When DC1 fails, DC2 automatically
takes over. DC1 also acts as a DNS server and a DHCP server. DC2 also acts as a backup DNS
and DHCP server.
A pfSense installation is responsible for routing the LAN and WAN traffic. pfSense is a free
and open source router and firewall software based on FreeBSD. It has various extra
features, but on our installation it’s just used as a router and a firewall. A firewall is an
essential first line of defense within a network. The firewall is completely configurable
with rules. Our pfSense installation had nothing but the default rules configured. By
default it drops all the incoming connections at the WAN interface and allows all traffic at
the LAN interface. This is fine to stop some external threats, but a lot more can be done
with this.
File storage within the network is handled by 2 windows servers. One Windows server runs
Windows file server. This is mainly for personal file storage for users on the network. The
other Windows server runs an ftp server. The file server is used inside the network only.
Currently the ftp server is only used on the internal network, but in the future this should
be accessible on the internet too. There were no security measures taken on these 2
servers. There was no DMZ configured on the network to accommodate the external
access for the ftp server.
1.1.3.
OTHER HARDWARE
Aside from the network equipment and the servers there is another important part of the
network that can pose serious security risks, the clients. There are about 60 desktop
computers in the library and the computer lab. These all run Windows 7. The computers in
the library are used freely by students without guidance or supervision. The ones in the
computer lab are only used by students during classes. There is no thorough security
present on these computers. These computers showed the most visible signs of the lack of
security on the network. These computers used to freeze, files got corrupted, flash disks
got infected and files got tempered. But aside from these obvious signs, other malicious
software, like spyware, might be running without showing any obvious signs.
In response to these malware threats the IT team has implemented Deep Freeze on these
desktops. This was the only solution against the malware on the desktop computers, aside
from some policies. Deep Freeze is a utility that restores computers back to a predefined
state. So when a computer gets infected it can be restored to a previous state. This is a
good a way to protect computers when you don’t want to restricts students during labs for
example. But Deep Freeze lacks as an anti-malware solution. Usually the system gets
restored at the end of the day. This leaves the users of that computer vulnerable if the
computer gets infected during the day. There are also viruses that can manifest in the BIOS
of a system or in firmware. These viruses won’t be gone after a Deep Freeze restore.
Page | 3
Some malware, like worms, might also spread through the network in short notice. These
worms can spread to devices on the network that aren’t configured with Deep Freeze.
Lastly, another category of devices that can potentially pose a threat to the network are
the staff’s and students’ own devices. The concept of BYOD is known to give headaches to
network and system administrators. You have no control of the software running on these
devices. In our case, most of the staff have their own laptops and Android phones
connected to the network. As for the students, they usually don’t have their own laptops,
but most do have Android phones connected to the network. There were no policies in
place to manage these devices.
1.2. OVERVIEW OF THE CURRENT SECURITY
Currently there aren’t a lot of security measures implemented, as security wasn’t part of
last year’s interns. The pfSense firewall has no additional rules defined. Students are able
to surf and connect to any external server. While the network is segmented into different
VLANs, there are no additional security measures taken to benefit from the VLAN features.
The VLANs are currently only for easy management.
Nowhere on the servers or the clients is an antivirus installed. The clients in the library and
the computer lab all have Deep freeze installed. As discussed earlier it does not provide
full protection. It makes the clients act like a sandbox, as all changes are undone after a
reset. But the clients are not isolated. They are all connected to the same network and to
the Domain controller. So malware is still able to propagate through the network. Deep
freeze is a good way of keeping the clients clean, but it is insufficient as the only
countermeasure against malware.
Another countermeasure taken by the administrators was implementing group policies.
These can be used to restrict user actions within the domain on the desktop computers.
The policies currently implemented are: software restriction policy to prevent the
installation of software and a policy to prevent AutoRun execution. These policies provide
a simple solution against some malware.
1.3. POSSIBLE THREATS
The previous sections gave an overview of everything that makes up our network. In order
to secure these systems we need to know which potential threats we can face. The main
focus of this paper is securing against malware. But when you want to implement thorough
security against malware, you will find you first need to implement good general security
on the network. For example: When a user with an infected device has restricted access to
important networks, there is less chance that this user can infect important devices. So
implementing good general security will be the first step to secure our network.
A good guideline to tackle security is the CIA triad. CIA stands for Confidentiality, Integrity
and Availability. This is the heart of information security. When looking at potential risks a
system can face, it is a good idea to keep the CIA triad in mind.
Page | 4
1.3.1.
THE NETWORK AND HARDWARE
First of all it is important the hardware is secured physically. Exposed networking devices
like switches can pose potential threats like unauthorized access. When you have physical
access to a switch you are able to reset it and alter the configuration. The same goes for
access to machines with elevated rights, like management PCs or the laptops of
administrators. Access to these machines could provide access to important systems like
servers and switches. And it could either intentionally or unintentionally damage these
systems. Damage could be done unintentionally through malware on a memory stick for
example.
The network itself can be a treat to security in terms of spreading infections between
systems. The network also provides access to the internet through the router. The internet
is a major source of threats. Young students or students that aren’t very familiar with the
internet, like there are many in the universities here in Uganda, are more likely to access
unsafe sites, download malicious software or expose devices to malware. So providing
unrestricted access to the internet in a school environment is not a good idea.
Aside from restricting access to certain sites, it’s also important to only allow users access
to the networks they really need access to. For example, students don’t need access to the
management network. By not restricting this access, important systems, like ESXI servers
or management servers, are left vulnerable to unauthorized access or malware. A system
cannot infect another system it cannot reach.
And maybe even a bigger threat than the internal users are external users, users that
shouldn’t be on your network in the first place. Certainly in Uganda, where having access to
the internet isn’t very common, people might go lengths to get access to the network. As
this could be anyone, it’s hard to know what this person’s intentions are. As Wi-Fi signals
are not contained within the school’s border, securing the signal is important. The use of
pre-shared keys in a school environment is often ineffective, since students don’t have
anything to lose by sharing those.
1.3.2.
THE SERVERS
In our case, most servers run visualized in a vSphere environment. Access to these virtual
servers are centralized through the vCenter server, but the virtual servers can also be
accessed through their respective ESXI server. The lack of securing access to the vCenter
server or the ESXI servers can compromise the integrity of these virtual servers.
While the vSphere software itself is very well secured, the systems can be left venerable
due to misconfiguration. The lack of strong passwords, or worse, using the default
passwords for the root and administrator accounts leaves the system unprotected against
unauthorized access or malicious software. Just like any system, new vulnerabilities are
found from time to time. By not updating vSphere services you leave your systems open
for attackers and malicious software to exploit any new vulnerabilities.
1.3.3.
WINDOWS VIRTUAL MACHINES
In our case, a lot of important systems are running on Windows Server 2012. Just like
Windows for client computers, Windows Server struggles with a wide array of
Page | 5
vulnerabilities. Linux suffers from vulnerabilities as well. But misconfiguration can
potentially even be a bigger problem.
In our case, Windows Server is used as a Domain Controller, a DNS server, a DHCP server, a
file server and as an ftp server. Aside from all the different kinds of malware Windows can
face, which I will cover later, there are vulnerabilities that target specific kinds of servers.
Skeleton Key, for example, infects the domain controller and enables it to bypass
authentication within the domain. This makes that services that use the infected Domain
Controller’s Active Directory could get compromised too.
This is just a single example of which there are many. Malware like this can seriously cripple
a school or a business network. Some IT staff might be hesitant to install anti-malware
software on servers like a domain controller. This is because anti-malware software might
influence the stability or the performance of an operating system. If there is no antimalware software installed, good security practices might reduce the chance of an
infection. But in both cases a system is never a 100% safe. There is always a chance of
infection despite of the security measures taken. Without periodic scans, which will be
covered later on, a system might host malware without even being noticed.
1.3.4.
LINUX VIRTUAL MACHINES
A common misconception is that Linux machines are less venerable then their Windows
counterparts. It is true that there is less malware on Linux systems. This is due to the use of
signed packages on its repositories, its fast updates and the malware’s lack of root access.
But these systems often do suffer from vulnerabilities due to misconfiguration, the lack of
hardening, the lack of maintenance or outdated third-party applications4.
Misconfiguration of Linux systems often occur when a system administrator is not very
familiar with Linux systems or is more Windows-minded. While Linux systems are very
flexible, evident security measures might not always come right out of the box. A common
misconfiguration are the user rights on folders and files. For example, when installing a
webserver, the user rights of some folders might be changed to a less secure setting to
allow the software to have access. But these user rights could allow any user that has
access to the server to have read, write and execute rights on the files in this folder.
But even worse is an outdated system. Not periodically updating the Linux OS or the
applications that are running on that system, leaves the system vulnerable for inevitable
exploits. Certainly servers running network-based software like Apache, PHP or MySQL are
more prone to exploits when these applications aren’t updated. Some of these exploits
might grand elevated access to not just that specific application but also to the OS or other
applications5.
4
Beaver, K. (2009, february 1). Five common Linux security vulnerabilities you may be overlooking.
Retrieved from searchenterpriselinux.techtarget.com:
http://searchenterpriselinux.techtarget.com/tip/Five-common-Linux-security-vulnerabilities-youmay-be-overlooking
5
Gite, V. (2009, October 30). 20 Linux Server Hardening Security Tips. Retrieved from cyberciti.biz:
http://www.cyberciti.biz/tips/linux-security.html
Page | 6
1.3.5.
MALWARE ON WINDOWS
Malware on Windows is a big topic to cover. Malware comes in a lot of kinds and flavors.
Each kind of malware behaves differently, spreads in a different way and can harm in a
different way. So it doesn’t hurt to cover each kind of malware if you want to detect and
combat malware.
Virus
The most famous kind of malware. The term virus is often used as a broad term to describe
malicious software instead of the correct term, malware. But technically a virus is defined
as a piece of malware that relies on executable code to infect a computer. A virus can hide
in seemingly innocent software and can infect other programs and files on the infected
machine. A virus spreads to other machines through unknowingly users executing copies of
infected software. The goal of a virus is usually to disable computer functions or to destroy
data. The presence of a virus can be noticed by the system being slowed down, system
functions not working properly or by data getting corrupted.
Macro virus
A macro virus is similar to a regular virus but instead of hiding in executables, it hides in
data files like Word documents or PDFs. A macro virus relies on the macro language
programming functionalities within certain text editors. This macro code gets executed
when the file gets opened. These infected files are often shared through email
attachments. Due to security improvements in Microsoft Office, like blocking macros by
default, macro viruses aren’t as prevalent anymore as they once were. But there are still
some micro viruses in the wild, which use different techniques now6.
Computer worm
A worm is similar to a virus but instead of attaching to other programs, it is a standalone
piece of malware. Usually a worm’s main goal is not to disrupt a single client but rather to
infect as much clients as possible. A worm does not rely on human interaction to propagate
but it uses a network to spread. Email, for example is often used to spread worms.
Some worms may carry a payload. A payload is an action by malware other than the act of
spreading itself. The payload of a worm can be similar to a virus, but usually it isn’t as
destructive, as it might hinder the ability to spread. A common payload is to install a
backdoor on the infected client to allow the author to control that client, which could be
used to create a botnet. As worms rely on a network to spread they can be potentially be
very dangerous to a school network if there is no proper security in place. Even when a
worm does not carry a payload it can still cause a lot of traffic and potentially cripple the
internal network.
Trojan horse
Similar to a virus, a Trojan horse requires executable code to infect a computer. A Trojan
infects a computer by disguising as genuine and useful software. It differs from a virus that
it generally doesn’t attempt to infect other files on the system. The purpose of a Trojan
horse can be anything. It can destroy or temper data, disable system functions, steal data,
6
Szappanos, G. (2014, July 02). VBA is not dead! Retrieved from www.virusbulletin.com:
https://www.virusbulletin.com/virusbulletin/2014/07/vba-not-dead
Page | 7
spy, ransom or spread malware on the network. Trojans can propagate through email
attachments or more often through shady download sites.
Spyware
Spyware is software that collects information of the user without the user’s knowledge or
consent. Spyware can come as a payload of the malware described above. But spyware can
also be bundled with genuine software. Some free software uses bundled spyware as a
way of income by mining the user’s data. As websites, and social media in particular, often
use the same tactic to make money, this practice is getting more common. But as a school
or a company you don’t want to share too much information. So it is good to be informed
about what software and sites are allowed to be used within the school environment.
Some spyware that is shipped with genuine software can sometimes not be flagged as
malicious by some antivirus software.
The information spyware can gather depends on the spyware. Most malicious spyware is
hard to detect as it tries to survive as long as possible. This malicious spyware can gather
private information through different means. Often a keylogger is used, this can gather
secret information like banking information or passwords by sending the keystrokes to the
spyware’s author. Some keyloggers can even send screenshots.
Some spyware can degrade the performance of the infected system or can cause
unwanted traffic on the network. While spyware often doesn’t cause any nuisance, it is
very unwanted within a school or company network and it should be seen as a serious
threat. And it should be clear that some spyware can only be detected through good
malware remove software.
Adware
Adware is a form of spyware that often displays unwanted advertisement. Adware can also
redirect web traffic or replace advertisement on websites. A computer can get infected by
adware through genuine free software or as a payload of the malware described above.
Usually it is quite obvious when a computer is infected by adware. Aside from being a
nuisance, adware can also seriously degrade a computer’s performance. Some genuine
companies exist by only providing adware. Zango for example, became a large company by
just spreading their adware.
Backdoor
While not malware itself, a backdoor can be the result of malware. A backdoor is a way to
gain remote access to a machine without authentication. A backdoor can be installed by
malware, but it can also be the result of misconfiguration, like the use of the default
password on a system for example. Some backdoors are provided by manufactures, like
backdoors that allow to reset the password. Backdoors can cause increased traffic, as the
infected client can be used as a zombie computer or used to send spam. If the infected
machine is used to send spam through the corporate email, it might lead to the mail server
being blacklisted by other mail providers.
Rootkit
A rootkit is a collection of software that can be installed by other malware or by an
attacker exploiting vulnerabilities in a system. The attacker might also have obtained
credentials through spyware or phishing and use that to gain access to deploy the rootkit.
The goal of the rootkit is to maintain privileged access while staying undetected by antiPage | 8
malware software. A rootkit manages to stay undetected by using the lower layers of the
operating system. Unlike normal malware that runs on top of the operating system, a
rootkit behaves more like a driver. This makes detection and removal by common antimalware software very difficult. A rootkit can use a whole arsenal of tricks to stay
undetected. Rootkits are notorious for being very difficult to completely remove from a
system.
Page | 9
2. DETECTING AN INFECTION
Even when a network has good security and the clients are provided with decent antimalware software, it is never a 100% safe. Some security aspects might have been
overlooked while securing a network. This could lead to unknown vulnerabilities in the
network. And an antivirus isn’t completely foolproof. Some antiviruses might lack certain
definitions or don’t consider some malware as a threat. New vulnerabilities in software are
always found, and it can take time before these are fixed, leaving the software vulnerable.
Malware infections or attacks by a person are always possible. The consequences of an
infection or an attack aren’t always as obvious. That’s why it is important to regularly scan
systems with malware scanning and removal software. Most antivirus software provides
this functionality. But if an antivirus allowed a system to get infected, there’s a chance it
won’t be able to find the infection by scanning it.
There is a lot of malware scanning and removal software on the market. Some of these
products are for free. Some products provide detection for all kinds of malware and some
are specialized for specific threats. This specialized software might be better to deal with a
grave situation, like a stubborn rootkit for example.
2.1. COMMERCIAL SOFTWARE
The following table shows the results of a comparison of commercial malware removal
software conducted by av-test.org.
Figure 1. Results of a malware removal software comparison performed in 2014. Source: www.av-test.org
According to the article7 these software packages have been thoroughly tested over a
period of 10 months. The test shows that most of this software is competent in removing
malware and cleaning up the threats. Two of the free solutions seem to be lacking. Avira
7
Selinger, M. ( 2014, July 29). 17 software packages in a repair performance test after malware
attacks. Retrieved from av-test.org: https://www.av-test.org/en/news/news-single-view/17software-packages-in-a-repair-performance-test-after-malware-attacks/
Page | 10
fails to detect a threat and so does Microsoft Security Essentials. The latter seems to do a
bad job at cleaning up the malware components too.
A more recent test from av-test.org shows similar results:
Figure 2. Results of a malware removal software comparison performed in 2015. Source: www.av-test.org
Unfortunately this test does not include Malwarebytes Anti-malware, which was the best
solution according the 2014 test. But it does show that Avira has made improvements.
Av-comparatives.org is another website that does antivirus comparison tests. They also
have a relatively recent test on malware removal tools:
Product name
Avast
AVG
Avira
Bitdefender
BullGuard
Emsisoft
eScan
ESET
F-Secure
Fortinet
Kaspersky
Lavasoft
Microsoft
Panda
Sophos
ThreatTrack
Removal failed
1
1
2
2
2
4
1
2
3
6
1
4
3
1
6
2
Malware
components
remaining
2
2
1
1
1
2
2
1
1
2
1
1
2
3
1
3
Some traces
remaining
5
7
7
4
17
9
12
10
11
6
0
7
5
11
10
11
Complete
removal
Number of
malware samples
27
25
25
28
15
20
20
22
20
21
33
23
25
20
18
14
35
35
35
35
35
35
35
35
35
35
35
35
35
35
35
35
Table 1. Source: http://www.av-comparatives.org/wp-content/uploads/2015/10/avc_rem_2015_en.pdf
Based on these test results, the best paid solutions seems to be either Kaspersky or
Bitdefender. But the focus of this paper is to find a cost effective solution. As there are
enough competent free solutions, the paid software will not be considered. The free
solutions will be covered in more detail.
Page | 11
Malwarebytes Anti-malware
Malwarebytes Anti-malware is often recommended by IT sites and IT magazines. Also by
the community it is often praised as one of the best malware removal software solutions
around. The software shows very favorable results on the 2014 av-test.org tests.
Unfortunately Malwarebytes’ software does not feature in any of the more recent tests.
The on-demand scanning and removal component is completely free and does not differ
from the paid product. The only difference with the paid product is that the paid version
offers real-time protection. This makes Malwarebytes anti-malware a solid choice as a
malware removal tool.
AVG Antivirus Free
Next to its free real-time scanning component, it also offers competent free malware
scanning and removal software. It shows good results in the above comparisons.
According to av-comparatives’ false alarm test8, it does suffer from quite some false
positives. But according to another test9 by the same website it scores very well on
performance tests. A low impact can be important when you plan to run this software on
critical systems.
Avast Free Antivirus
Avast is, according to opswat.com, the most used antivirus on the market10 and according
to the av-comparatives test also a very good choice to use as a malware removal tool. The
av-comparatives performance test also shows very good results, with Avast being just
behind Avira at the top. But it performs as the worst antivirus software in the false
positives test. It has 17 false positives, while Avira has 9. A popular paid counterpart like
Kaspersky only has 3. This false positive rate shows that the software might be not very
reliable. As false positives could lead to data loss or system unavailability it is an important
factor to keep in mind. Certainly on critical systems within a network.
Avira Free Antivirus
Avira performs quite similar to AVG. It scores a bit better on the false alarm test and it has
the best result on av-comparatives’ performance test.
In conclusion: All of the free software mentioned above is sufficient to use as malware
detection and removal software. It is mainly a trade-off between the performance and the
amount of false positives.
8
av-comparatives. (2016, March). False-Alarm-Test March 2016. Retrieved from www.avcomparatives.org: http://www.av-comparatives.org/wpcontent/uploads/2016/04/avc_fps_201603_en.pdf
9
av-comparitives. (2015, October). Performance Tests. Retrieved from www.av-comparatives.org:
http://www.av-comparatives.org/wp-content/uploads/2015/11/avc_per_201510_en.pdf
10
OPSWAT . (2015, August). Anti-malware Vendor Market Share. Retrieved from www.opswat.com:
https://www.opswat.com/resources/reports/anti-malware-market-share-security-august-2015#antimalware-vendor-market-share
Page | 12
2.2. OTHER SOFTWARE
Next to the popular commercial programs discussed before, there are some less
conventional malware detection programs around. These tools might be useful when the
commercial software fails.
Conventional anti-malware software scans the computer and compares the files and
processes with a database containing the signatures of malicious files. This method can be
lacking. When a computer gets infected with new malware that is not consistent with
previously known threats, the database of the antivirus will not contain the signature of
this malware. And won’t be able to detect this as a threat. Some malware even prevents
internet connection, this could prevent the antivirus to update its database. The following
software uses different methods to detect threats.
Spybot - Search & Destroy
Spybot - Search & Destroy is community favorite. The free version can detect and remove
malware and repair the system if need be. It does not focus on the functions of a
traditional antivirus, as it was originally not intended to replace an antivirus. But now there
is a paid version which delivers a complete antivirus. The free version of Spybot-S&D
focuses on just detection and removal of Spyware and adware. It’s often used as a second
opinion after scanning with Malwarebytes.
ClamWin Free Antivirus
ClamWin is a free and open source virus and spyware scanner. It works like a traditional
antivirus as it detects threats through definitions. ClamWin uses the definition database of
ClamAV, which will be discussed in chapter 3, so it might not be very effective to use when
the network is already protected by ClamAV. This is one of the few free solutions that
natively supports Windows Server.
HitmanPro
HitmanPro provides free malware detection for all kinds of threats. The paid version also
offers removal and repair functions. HitmanPro analyzes suspicious files on its own servers
instead of analyzing it on the computer itself, this minimizes the performance impact. Next
to relying on malware definitions like conventional antivirus software, HitmanPro actively
looks for suspicious behavior to detect threats that are not defined in the databases.
HitmanPro is good software to use as a second option after scanning with conventional
antivirus software.
HijackThis
HijackThis is a free and open-source tool. This tool is mostly used to detect spyware and
adware. It is effective in detecting browser hijackers. The tool scans configurations, the
registry and the most common locations of malware, and it produces a log file. The result
shows both legitimate and unwanted files. It is up to the user to determine whether the
detected items pose a threat or not. There are tools to analyze the log file, but these are
not recommended as these detections can possibly be critical files for the operation
system. This tool should only be used as a last resort, or you should really know what you
are doing.
Page | 13
GMER
GMER rootkit detector and remover works in a similar way to HijackThis as it scans for
potential rootkits based on common locations and behavior and generate a log file. Just
like HijackThis the log needs to be analyzed to determine whether the result is a threat or
not. Removing entries that are not actual threats can potentially damage the system. Avast
Antivirus uses GMER to combat rootkits.
AdwCleaner
AdwCleaner is a free and lightweight utility that is used to remove adware, toolbars and
hijackers.
TDSSKiller - Rootkit Removal
TDSSKiller is a free and lightweight utility provided by Kaspersky. It is able to detect and
remove rootkits in under a minute. The tool is useful when a rootkit impedes the ability to
run conventional antivirus software.
2.3. THE FOLLOW UP
When you detect a system is infected, you have to consider whether it is actually useful to
try to remove the threat with malware removal software. As the tests have pointed out,
there’s always a chance harmful components will be left behind on the system. Some
malware, like adware for example, is often easy to remove. But some malware, like
rootkits, is almost impossible to remove. This means it would be necessary to reinstall the
system. Smart partitioning, like keeping the OS and user data separated, minimizes data
loss.
Reinstalling the system might be a viable solution for home users, but in a school or
company environment it is not desirable. Certainly when it is a critical system like the
domain controller or a file server. That’s where backups come in. Perhaps one of the best
solutions to recover from a grave malware infection. With a good backup policy, recovery
can be fast and data loss can be minimized. It is important that malware is not able to
affect the backup data.
An efficient backup rotation scheme is also important. A backup every month can lead to a
lot of data loss. Just retaining one backup of day before can be inefficient as it could take
multiple days before the infection is detected, making the backup useless. Keeping too
much backups can take up too much space. A good balance is key, and it’s useful to make it
work together with a malware scanning policy.
Page | 14
3. SECURING THE NETWORK ENVIRONMENT
The previous chapter covered how to detect infections and how to deal with them.
Malware attacks can always occur. But implementing thorough security on the network,
servers and clients can minimize the risk. Securing against malware goes further than just
installing antivirus software. An antivirus is never a 100% safe. And an antivirus does not
always protect against targeted attacks or unauthorized access.
3.1. EDUCATING THE USERS
Before going into technical details on how to secure a network, it’s useful to cover the
importance of educating users about proper usage of the computers and the internet. This
is for both the students and the staff. Young students lack experience and are more prone
to be subjected to sites that host malicious content. This is the same for older students
that lack computer experience because they don’t have a computer of their own.
It’s very important for the staff to be educated too. The staff usually has more privileges
on the network than the students do. This makes them favorable targets for phishing.
Phishing is getting ever more popular to breach systems. As systems are getting more
secure, manipulating users to get access to the systems is often more successful than
finding and exploiting vulnerabilities. When an attacker gains access through phishing, the
systems are vulnerable for a whole range of attacks.
Clear policies on how students should use school computers should be made. Students
should also be educated on how to protect their own devices against threats, as this could
be an entry point for malware within a network.
3.2. MINIMIZING VULNERABILITIES
Both malware and targeted attacks succeed in breaching systems by exploiting
vulnerabilities. A vulnerability can be misconfigured network equipment, a poorly
configured firewall, an outdated operating system or outdated applications. But the users
can also be a vulnerability. By minimizing the vulnerabilities within a network, the attack
surface gets reduced.
While it’s impossible to eliminate every single vulnerability within a network infrastructure,
it’s still important to have a solid strategy to mitigate as much vulnerabilities as possible.
When new vulnerabilities are found that can potentially affect your systems, like the
recent Heartbleed bug for example, appropriate steps should be taken to minimize the
potential harm the exploit could cause. These steps could be patching the systems or
disabling susceptible functionalities in anticipation of updates.
3.2.1.
THE USERS
The users of a network can be a vulnerability. Privileged users like the staff are a
vulnerability as they are a potential target for phishing. Other users can be a vulnerability
as their own devices might not be properly secured against threats. These unsafe devices
could spread infections through the network.
Page | 15
The first problem can be minimized through assigning proper privileges to the users. This is
the least-privilege principle. It means giving a user only those privileges the user needs to
perform its tasks on the network. This minimizes the potential damage that can be
inflicted when a user account gets compromised. Least-privilege also helps to dramatically
reduce the spread of malware11. In most cases malware relies on the user privileges to
propagate. By limiting user privileges you can limit the ability for malware to propagate.
3.2.2.
LEAST-PRIVILEGE IMPLEMENTATION
Windows domain is allows to implement the least-privilege principle within a domain.
Through active directory, users can be identified and authorized. For easy manageability
users can join groups to which privileges can be assigned. All staff should have their own
accounts. The staff should be divided into groups according to their respective functions.
Teachers, administrative staff, human resources and library personnel all have different
needs, require access to different resources and use different software.
Figure 3. Saaka’s active directory structure with an example of a user account.
In the above image, the left side shows grouping into organizational units. This improves
manageability, it's not for applying privileges. The right side shows the properties of a
single user. It shows that the user is a member of 3 groups. These groups can be used to
apply privileges and restrictions to the group’s members.
Some privileges, restrictions and roles can be applied to users and groups with Group
Policies. Services that use active directory to authenticate users should be properly
configured to give its users the appropriate privileges.
11
Magalhaes, R. M. (2014, June 11). Improving security through least-privilege practices. Retrieved
from windowsecurity.com: http://www.windowsecurity.com/articlestutorials/authentication_and_encryption/improving-security-through-least-privilege-practices.html
Page | 16
When they’re created, user accounts have limited permissions by default. The account
Windows users have on their personal computers usually run in Administrative mode. The
default user accounts used on the domain don’t have that. A lot of malware need
administrative rights to propagate. Without administrative rights a user cannot install new
software which could potentially be malicious. To give administrative rights to a domain
user account, this user account needs to be a member of the Administration group.
Figure 4.The prompt that shows when a user without administrative rights tries to install a program.
Group policies
Group policies can enforce a whole range of restrictions and rights. When a user needs
more privileges than what the default user account offers, they can be granted through
group policies.
The example in figure 3 is a member of LibraryAdmins. The members of this group should
only have administrative rights on the library computers. It would be easy to just make
them join the Administration group. But in line with the Least-privilege principle, it is better
to use the Restricted Groups group policy. This group policy allows you to grand
administrative rights to groups and users for certain groups or computers. In figure 5, the
members of the LibraryAdmins group will have the privileges of Administrators on the
computers that are a member of the LibraryComputers group.
Page | 17
Figure 5. The implementation of restricted groups for LibraryAdmins
In terms of restriction though group policies, is blocking AutoRun an essential group policy
to protect against malware. Some malware might use the AutoRun feature to trick users to
execute malicious files. The Conflicker worm for example, used the AutoRun feature to
propagate.
Figure 6. Enabling the “Turn off autoplay” GPO
Services
Some services within the domain use the Active Directory to authenticate the user. The
FTP server is one of them. Correct read, write and execute rights should be configured for
the appropriate groups and users. Administrators have the right to access everything. Staff
can access their own folder, the documentation folder and the student software folder, so
they are able to add software. Students only have read rights on the student software
folder.
Page | 18
Figure 7. An example of the FTP server configuration.
3.2.3.
NETWORK SEGMENTATION
The Active Directory can also be used to authenticate users on the network. Together with
a managed layer 3 switch and a wireless controller you can separate the networks.
Network segmentation improves the security and reduces congestion of network traffic. It
improves security by reducing the potential targets of malware that propagates through
the network, like worms for example. But also when a network gets breached, through
social engineering for example, the attacker will have limited access.
Figure 8. A list of WLANs on the wireless controller
The VLANs used for security purposes in Saaka are the staff network, the admin network
and the student network. The routing of these VLANs is done on the layer 3 switch. Access
between these VLANs are limited through the use of access-lists. Access-lists allows IPbased and port-based restrictions between VLANs. Routing between VLANs can also be
done through pfSense. In Saaka this feature was used to route the DMZ traffic. This is done
because the DMZ needs different rules to route to the WAN compared to the other VLANs.
Page | 19
Figure 9. The access-list configuration on the Layer 3 switch that blocks access to management addresses on the
servers VLAN to every other VLAN except for the admin VLAN.
The wireless controller can create a WLAN for every VLAN. Saaka’s configuration can be
seen on figure 8. The computerclass and the library WLAN are mainly for manageability. The
staff and admin VLANs are protected with WPA2-enterprise. WPA2-enterprise uses Active
Directory to authenticate the users. The student network is protected with PSK. This is a
shared password, which is not very secure. Such a network should be treated as a guest
network. Protecting the student network with WPA2-enterprise was not possible as not
every student has their own entry on the AD. It is planned to be implemented in the future.
Next to separating the user VLANs, it’s always good to have a (virtual) network to
accommodate servers that provide services for users outside of the local network. Like the
institution’s website or an FTP server. This network is the DMZ and it requires different
firewall rules than the other VLANS. These servers are also more prone to attacks. If they
wouldn’t be on a different network they could function as a gateway to infect the clients
on the internal network.
Page | 20
Figure 10. The DMZ configuration restricting DMZ traffic to the WAN interface and the internal network. By
default all traffic is denied. The DMZ only has an ftp server, which is accessible to the internal network. SSH and
RDP is only accessible to the admin VLAN
3.2.4.
THE FIREWALL
When students and staff bring their own device, they usually have administrative rights on
their own devices. This makes their devices more susceptible to malware compared to the
managed desktops of the university that use domain user accounts. As you cannot force
these users to install antivirus software and if they are free to surf wherever they like, they
are more likely to propagate malware through the network. A way to minimize this threat
is to educate the users about safe behavior on the internet. Next to this, it can be very
beneficial block access to certain websites that are known to distribute malicious software.
This is where the firewall configuration comes in.
The default rules of the pfSense firewall is to deny any incoming connections that aren’t
initiated from inside the network. This protects against a range of external threats. By
default, pfSense provides “allow all” rules for outbound connections. It is good practice to
use deny all traffic for outgoing connections as well and only allow traffic that is really
needed. This prevents the propagation of malware through services that aren’t used, thus
reducing the attack surface.
Figure 11 contains the LAN configuration. By default all incoming connections are blocked.
Ports 80 and 443 are opened to allow web traffic. DNS traffic is only allowed from the
internal network. With this rule, users cannot use external DNS servers. This allows the
administrator to have full control over the DNS traffic. The other DNS rule allows DNS
traffic from the server VLAN to the external network. This way the DNS server can forward
DNS traffic. The other rules allow services like email, ftp traffic and management traffic.
Figure 11. The LAN configuration
As said before, it can be beneficial to block unsafe websites. Blocking websites can be done
for free through a pfSense package called SquidGuard. With SquidGuard you can use
predefined lists like Shallalist, URLBlacklist or the Toulouse university blacklist. These offer
big lists of sites that that contain unsafe or indecent content. These blacklists come in
Page | 21
categories, so you can fine-tune which categories to allow or to deny. URLBlacklist’s
blacklist is currently the most complete list and still gets updated regularly.
Figure 12. Example of a blocked site.
SquidGuard also allows you to define your own filters to whitelist sites that are blocked by
the predefined blacklist. And you can also add extra blacklist entries.
Figure 13. The part of the SquidGuard GUI to add new entries.
3.2.5.
PATCHING
Patching is a very important way of protecting systems against vulnerabilities. There are
always new vulnerabilities found in applications and operating systems. Some
vulnerabilities may take some time before they are patched. If there is a vulnerability which
hasn’t been patched yet and is a candidate to be exploited by malware, measures should
be taken to prevent an infection. This can be done by disabling the vulnerable service or by
isolating the service from unsafe sources, like the internet. When there is a critical
vulnerability, a patch might be carried out faster. These patches might not always be as
stable as a patch that has been thoroughly tested. But even when a patch has been
thoroughly tested, it might still cause instability. That’s why it’s advised to wait before
installing new patches and to first look for information about possible bugs or test the
patch on non-critical systems.
Nevertheless is keeping software up-to-date one of the best ways to protect against
malware and other attacks.
3.2.6.
A CORRECT CONFIGURATION
It’s very important for network equipment to be configured correctly. Incorrect or badly
configured equipment can leave gaps in the security. The best way to ensure that the
configuration is done well, is to consult the documentation delivered by the manufacturer.
A second opinion of the configuration by a coworker might also eliminate overlooked
misconfigurations.
Page | 22
Certainly for Linux machines is a solid configuration important. Man pages and online
documentation should be consulted to ensure a good configuration. Community websites
often have good examples, but these have to be used with care, as they might not always
be as reliable.
3.3. PROTECTING AGAINST THREATS
Even with good vulnerability mitigation, there will always be vulnerabilities that can be
exploited by malware. These are the threats. Next to good vulnerability mitigation, a
network should have protection against threats. As the network has already been
protected against known vulnerabilities, these treats will likely exploit unknown
vulnerabilities. So the protection against these threats should be handled by specialized
software. This protection typically comes in the form of an antivirus. An antivirus is the
best last defense.
Typically, antivirus software is used to protect clients. This is good to protect the managed
desktop computers. But users using their own devices cannot be forced to install an
antivirus. To protect the network against the propagation of malware through infected
devices, network devices and servers can be fitted with specialized antivirus software.
3.3.1.
FIREWALL PROTECTION
Next to good firewall rules and blocking malicious websites, a firewall can be equipped
with some extra tools to protect against malware and attacks. The downside of running
extra services on the firewall is that traffic might start to pass through slowly which
creates extra latency. So it’s important to make sure the system can handle the extra load.
In our case, pfSense is installed on a virtual machine, extra resources can be appointed
when the firewall starts to run slowly.
Intrusion prevention system or intrusion detection system
An intrusion prevention system analyzes packets and blocks them when it identifies the
packet as a threat. It detects threats by analyzing the data of the packet and through
behavioral characteristics or data signatures it decides whether the content is malicious or
not. A firewall will only analyze the packet header and it enforces the defined policies,
namely the firewall rules. So the IPS is an extra layer of protection on top of the firewall.
An intrusion detection system does the same as an IPS but it only notifies about threats
instead of blocking packages. With the reports the IDS delivers, the administrator can
implement extra security features. The benefit of an IDS over an IPS is that an IPS might
block legitimate content, while an IDS doesn’t block anything.
An IPS or IDS can be implemented on pfSense for free with the Snort package.
Page | 23
Figure 14. The Snort package allows you to choose different IPS security levels. These settings are a tradeoff
between security and the amount of false positives.
Gateway antivirus
A gateway antivirus is similar to an IPS. A gateway antivirus focuses on blocking malicious
software from being downloaded while an IPS generally protects against threats like
malware attacks, targeted attacks, DDOS attacks, and others. But the line between the
two terms is blurry and it usually just comes down to marketing.
There is a free solution for pfSense which identifies itself as a gateway antivirus, called
ClamAV. This service is included with the Squid3 package and it can be easily enabled by
checking a checkbox when Squid3 is installed.
Figure 15. Enabling ClamAV in the Squid package
3.3.2.
SERVER PROTECTION
Antivirus Software
It’s common to install antivirus software on client computers. But servers, and certainly file
servers, can get infected by malware too. These servers can also be used to propagate
malware through the network. In our case, at MMU, a worm had spread on the Domain
controller’s file server storage. Every client that connected to the Domain controller got
infected by this worm.
Next to all the security implementations discussed earlier, can an antivirus on the servers
be beneficial too. But the problem with server antivirus software is that it might influence
the stability of the server. So the necessity of a real-time antivirus scanner depends from
Page | 24
system to system. The software solutions covered in chapter 2 are used to detect and to
remove malware. This can be sufficient to protect systems, if they are scanned daily, which
should be done during downtimes.
If these scans show that infections on the servers are common, it might be beneficial to
install real-time anti-virus scanners. But in the case that infections are not common it might
not be worth jeopardizing the stability of the systems and to spend resources on this.
If it is the case that these systems can benefit from a real-time antivirus scanner, it is a
good idea to first test the antivirus on less critical systems or copies of critical systems,
when working in a virtual environment. This to ensure the antivirus software does not
cause instability.
The Supply
An important element of this paper is to provide security with limited resources. Most of
the solutions in this paper have been free. For this part however, it’s not that easy. A lot of
the antivirus software for clients is for free, but this is not the case for server antivirus
software. As with most software, the business versions are not for free. However, most
antivirus companies offer discounts for educational facilities. And most of them have trial
versions, so the software can be tested on the infrastructure first.
Comparing the different products that are available is not very easy. There is a lack of tests
about enterprise antivirus software on Windows Servers. So to compare the available
software you either have to rely on the manufacturer’s claims or on tests performed on
client computers. These tests might not show how stable the software runs on Windows
Servers, but it does show the quality of the product. The following table gives an overview
of the popular software currently available. The scores are based on a recent real-world
test conducted by av-test.org.
Page | 25
Usability12
Price
Protection12
Performance12
Score out of 6
Score out of 6
Antivirus for
Endpoint
Antivirus server
5.5
6.0
6.0
AVG Antivirus Business
5.5
5.0
6.0
Bitdefender
Endpoint Security
6.0
6.0
6.0
G Data
AntiVirus Business
5.5
5.0
6.0
~95.67
McAfee Endpoint
Security
For file
Kaspersky
Servers
Endpoint
For virtual
Security
Servers
Sophos Endpoint
Security and Control
3.5
4.5
6.0
150.41
Name
Avira
Symantec
Endpoint Protection
Score out of 6
Discount
Per 3 in €
for schools?
109.00
Yes, up to
80%
453.69
96.65
(1 Year)
68.65
(1 Year)
(1 Year)
(1 Year)
Yes
Comments
Endpoint
version is for
file servers
The file server
only version is:
€ 43.21
No
Yes, special
offer for big
volume
No
330.00
(For 10 pc.)
6.0
4.5
6.0
6.0
4.0
6.0
167.38
5.5
143.95
6.0
6.0
252.00
(1 Year)
(1 Year)
No
No
No
Symantec does
offer a flexible
service for
schools.
Table 2. Comparison of enterprise antivirus software.
The table shows that this software can be costly. Most of the software in the table is only
intended for workstations or file servers. These are not made for critical servers like the
domain controller. Avira and Kaspersky do offer antivirus software targeted at critical
servers. But there are no test results for these specific products. The manufacturers claim
that this software has a minimal performance impact, which should justify the higher price.
Again, whether it is justified to buy this software or not, depends on the situation. If
infections are common on the servers, a real-time antivirus scanner can be beneficial. If
infections aren’t common, regular scanning with malware detection and removal software
can be enough.
Backups
When something does go wrong, it’s important to have a backup strategy. Without
backups servers and files are in constant danger. No security implementation is a 100%
fool proof. When working in a vSphere environment, vSphere Replication is a good
solution. As it is included in the vSphere license, there are no additional costs to it.
Replication allows you to backup any virtual machine. An interval can be configured of
when to take a backup copy. And it supports point-in-time retention. This means it can
keep up to 24 snapshots over a configurable timespan. This is an essential feature to make
it viable backup solution. Multiple point-in-time instances can help with minimizing data
loss and the ability to recover to a clean state. For example, if system got infected 3 days
ago and the backup solution only keeps the latest state from a day ago, it cannot be
recovered to a clean state.
12
av-test. (2016, April The best antivirus software for Windows Client Business User). Retrieved
from av-test.org: https://www.av-test.org/en/antivirus/business-windows-client/windows-10/
Page | 26
Figure 16. vSphere Replication setting window
3.3.3.
CLIENT PROTECTION
As discussed in chapter 1, the client computers used at MMU are already equipped with
Deep Freeze. Which will recover the computers to working state at every restart. But these
computers also have shared storage space for students to store their files. If there is
malicious software on this storage space, it could infect the computer every time the
system is recovered.
Giving each student their own storage space through domain user accounts and a Windows
fileserver is a good solution to combat this problem. At MMU this will be implemented in
the future. But chapter 1 also covered how Deep Freeze alone is not sufficient to combat
all malware. An infected client computer could spread malware to other devices on the
network or on USB devices. That’s why antivirus software is still needed next to all the
preventive measures.
Most real-time antivirus software is commercial software. Unlike the malware detection
software covered in chapter 2, there are no open source real-time antivirus scanners for
client computer. A lot of companies offer their antivirus products for free, but only for
personal use. Legally these free versions cannot be used on school computers. Personal
computers of staff and students can use these free versions, but the computers in the
library or the computer lab cannot.
Some companies provide discounts for educational facilities, like an 80% discount on all
Avira products. But luckily a few even offer free software for schools.
Avast has a free for education program. Avast provides free enterprise grade antivirus
software for educational facilities. Avast has good scores on av-test.org’s recent tests13.
There is no other free antivirus software for educational institutions available with the
same quality. So Avast is the best choice to secure school computers.
13
av-test. (2016, April). The best antivirus software for Windows Home User. Retrieved from avtest.org: https://www.av-test.org/en/antivirus/home-windows/windows-7
Page | 27
3.4. TODO
There are still some things to be done on Saaka’s network. A lot of the research has been
done in Uganda, but all the implementations of this research haven’t been done yet.
The biggest problems at Saaka today are the pfSense firewall and the client computers.
The firewall currently lacks a good configuration. Another problem are the computers in
the library and the computerlab, as they lack antivirus software. The biggest problems with
the configuration of the network devices has been fixed already, like the configuration of
the layer 3 switch and the wireless controller. A backup solution for the servers has also
been implemented.
The firewall still needs some better configuration. The configuration of the DMZ has been
done already, but the rules for the LAN network are still the default rules. These should be
changed as described in point 3.2.4. Next to this should SquidGuard be installed to block
some unsafe sites. The pfSense also currently lacks an IPS, so Snort should be installed.
However, the impact of Snort has to be monitored whether the systems can handle it or
not.
The client computers can really use an antivirus. So Avast should be contacted to arrange
free antivirus software for the devices in the library and the computerlab. Lastly, the IT
staff should make a habit out of scanning the servers for malware at least once a week at
the end of a day.
Page | 28
4. CONCLUSION
The objective of this paper was to find a solution to secure a school network and to make it
malware-free with limited resources. The network infrastructure of the Saaka campus at
Mountains of the Moon University was used as a reference. This infrastructure lacked
proper security which made it vulnerable for targeted attacks, malware and phishing
attacks. This was due to the lack of a secure configuration of network devices like the
managed switch, the firewall and the wireless controller. But also because of the lack of
vulnerability mitigation methods like a proper patch management and a correct leastprivilege principle implementation. And lastly, almost no measures were taken to protect
against threats. The lack of security became apparent as the systems showed signs of
malware infections which impeded the systems to function well.
The importance of good network security and the protection against malware is clear.
Without it, important data is at risk to be compromised or to be damaged. A lot of
malicious software is at large. Each kind of malware propagates in a different way and
poses a different risk to certain systems. Some malware is easier to detect and to remove
than others. But as malware gets smarter and starts to incorporate social manipulation to
spread and infect, it’s clear an antivirus alone is not sufficient to protect devices against
malware.
In order to properly secure a network, its servers and its users, it’s important to have a
solid security strategy all over the network. Every part of the network should be assessed
for potential vulnerabilities and these vulnerabilities should be minimized. This is
accomplished by educating the students and the staff about proper usage of the network.
Next to this should users only get those privileges that correspond with their role within
the network. This through using Active Directory services, Group Policies and through the
correct configuration of the devices that use these services. But most important, should all
of the software be kept up to date through a good patch management.
As there will always be vulnerabilities left, there will be threats that can exploit these
vulnerabilities. Systems should therefore be protected against these threats. This
protection should be implemented on different levels within the network. A good firewall
configuration is key to protect the network from external threats. A good principle to use
is to deny all the traffic by default and only to allow the traffic that’s really needed. A
firewall like pfSense can be equipped with free features to provide extra protection: Snort
can provide a free IPS that blocks malicious traffic by deep inspection, ClamAV provides a
gateway antivirus solution that prevents users from downloading malicious files and
SquidGuard prevents users from visiting malicious sites.
Servers should be scanned regularly by malware detection and removal software to
protect them against malware and to remove malicious files from their storage. Software
like Malwarebytes should be used to detect general threats while specialized software like
HitmanPro should be used as a second opinion. Real-time antivirus software should only be
used when malware infections on the servers are common, as this software can impede the
performance of the servers. A backup solution like vSpere Replication should be used to
recover systems when they are damaged beyond repair. Client computers do need to be
protected with real-time antivirus software like Avast.
Page | 29
While businesses, big schools and universities have the resources to spend on high-end and
expensive software solutions to protect them against malware and security breaches, a lot
of educational institutions don’t have these resources. But for almost every expensive
software solution, there is a free counterpart available. Either through open-source
initiatives like pfSense or by companies offering their software for free to schools like
Avast does. This free software in combination with a good security strategy makes it very
possible to secure a school network with limited resources.
Page | 30