Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Proceedings of the 12th INDIACom; INDIACom-2018; IEEE Conference ID: 42835

2018 5 International Conference on “Computing for Sustainable Global Development”, 14 th - 16th March, 2018
th

Bharati Vidyapeeth's Institute of Computer Applications and Management (BVICAM), New Delhi (INDIA)

Salami Attacks and their Mitigation - An Overview


Nazifi Sani Alhassan Mukhtar Opeyemi Yusuf
Computer Science Department Computer Science Department
Noida International University Noida International University
Greater Noida, India Greater Noida, India
Email: nalhassansani@gmail.com Email: mukhtaropeyemi@gmail.com

Aliyu Rabiu Karmanje Mahtab Alam


Computer Science Department Computer Science Department
Noida International University Noida International University
Greater Noida, India Greater Noida, India
Email: aliyukarmanje@gmail.com Email: alam12mahtab@gmail.com

Abstract—One of the essential elements of every organization By means of the organization grows, the activity or some
is information. In the field of Computer Science information is mechanisms of the structure may be supplementary or
relevant in every aspect, be it in developing a software, superfluous, which origin the alteration in planning. Any errors
organization of data warehouse, sorting, searching etc. Given the through alteration lead to offer attack boundary, which
important of information, securing is particularly relevant and emphases to new security desires or go through the prevailing
should be given a high priority. Most of this company, school, one prudently [2]. The hazard calculation is achieved by the
banks to mention but few contain sensible information which subsequent phases.
when tempered can cause a serious damage to the organization.
This paper aims to describe a type of information attack or theft  The proprietor of the association regulates the aims or
called Salami fraud or simply a Salami attack. In a nutshell, task to be attained by recognizing precarious items
Salami attack occurs when a small piece of information is (Assets) which requisite security requirements.
acquired from various sources in such a way that the victims
whose information ware acquired from didn’t notice. So many  Invent the shabbiest apparent of the structure
researches were carried out till date to solve the issue of Salami (Vulnerabilities) over which threats can deed and clues
attack nevertheless all of them seem to be very unrealistic. Salami to risk.
attack is correspondingly called Penny Splinter, Not Observed
Stealing (NOS) or Very Precarious When Originate Stealing  Categorize the Threats and classify them using STRIDE
(VPWOS). The remedy for this kind of attack is achieved by model (Spoofing, Tampering, Repudiation, Information
striking the thought of ethical hacking on to Salami stealing to disclosure, Denial of Service, and Elevation of
perceive and also precise the stealing of Profound Evidence at Privilege) which delivers risk.
prior phases.
 Exuberant the threats using the DREAD classifications
Keywords—Salami theft, Sensitive information (SInfo), (Damage potential, Reproducibility, Exploitability,
information risk, Ethical hacking. Affected Users, and discoverability) which can be
diminished with security panels (Countermeasures and
I. INTRODUCTION safeguards). The panels can be Practical, Operative or
In the present competitive world of hackers where every Administrative.
computer expert is looking forward to make money or to be The risk is vibrant once threat and vulnerability are
famous, one of the major attack used is the Salami attack, for demarcated. An improved description of risk, from NIST SP
this reason Salami attack is one of the most discussed attack in 800-30, is “The disposable job influence seeing the likelihood
computer classes or between security experts. Salami attack is that a specific [threat] will work out (inadvertently triggers or
a process by which an individual steal small amount of deliberately deed) a certain [vulnerability] and the subsequent
information from numerous sources. There are two influence if this should happen. All the above mentioned four
etymologies, which the computer experts believe are the origin activities are shown in Fig. 1.
of the word ‘Salami’. The first is from institute of security
specialist, which privilege that ‘Salami denotes carving or
shaping the tinny numbers - like Salami”. Others refer to it as
“building up a significant or important object from tiny scraps
– like Salami” [1].

Copy Right © INDIACom-2018; ISSN 0973-7529; ISBN 978-93-80544-28-1 4639


Proceedings of the 12th INDIACom; INDIACom-2018; IEEE Conference ID: 42835
2018 5 International Conference on “Computing for Sustainable Global Development”, 14th - 16th March, 2018
th

III. TYPES OF SALAMI ATTACKS


Various small attacks that combine to form large attack that
may affect the organization’s day-to-day activities are known
as Salami attacks. There are two major types of Salami attacks
[5]:
A. Internal attacks
This is the most common type of Salami attack which
occurs when an individual working in the organization who
knows about the security system within the organization try to
steal from the organization and causes serious damage. For
example, when an accountant of a particular bank who
Fig. 1. Risk Assessment engaged with the bank customers on a daily basis, try to insert
a program in to the bank server that will divert one rupee (1₹)
The real story behind the Salami attack comes from the old from each customer that makes a transaction from his work
“collect-the-round off” trick. Collect-the-round off scam is a station to his account, at the end of the day after transacting
situation where by a computer scientist adjusts the with five thousand (5,000) customers he will get a sum of
mathematics procedures such as interest calculations. 5,000 rupees (₹5000.00) into his account.
Characteristically, the calculations are accepted out to
numerous fraction places outside the habitual 2 or 3 reserved B. External attack
for monetary registers. For instance, when money is in rupee, As the name implies, external attack is a kind of Salami
the round figure drives up to the adjacent paisa around half the attack that occurs outside the organization. A situation where
time and down the rest of the time. These fractions of paises the attacker leaves outside the organization but try to steal
when gathered by the computer scientist in to a distinct information from the organization causing serious damage to
account will lead to substantial fund without any warning to the organization is known as external attack. Salami attack is
the financial institution. Salami attacks are unfortunately very occasionally named fragmentary approach used by the Nazi
hard to detect or noticed. The only solution towards detecting party.
this attack is by having random audits, especially of financial
data, when pattern of discrepancies is detected this will lead to IV. FORMS OF SALAMI ATTACKS
discovery [1]. In 1940s Salami attack was used to lunch different kind of
This paper is organized into seven (7) sections. First section internet attack such as, stealing one’s internet banking
contains the introduction of the Salami attack, the second information or revealing opponent’s sensitive information
section describes the Salami attack, the third section talks during political race for this reasons Salami attack was also
about the major types of Salami attacks, the fourth section called divide and conquer.
discuss the form of Salami attacks, the fifth section compares In these present days of modern technology, there are
Salami attacks and Salami tactics, the sixth section talks about several and different kind of operational wallets where one can
the detection and mitigation of the attacks, then the seventh enhance currency to the wallet and used the added money to
section is the Conclusion, Recommendation and References. make online transactions (that is to buy goods or transfer the
money to another wallet) it can also be used to make payments
II. WHAT IS SALAMI ATTACK
in an eatery, supermarket, to a taxi driver etc. this
A small attack that transform into a large attack is known improvement is a good technology advancement. However,
Salami attack. It is sometimes called Salami slicing, because this wallet can be hacked by inserting a program in to the
the attack occurs almost unnoticed by the victims due to the wallet server to deduct a small amount of money from each
nature of the attack. In general, Salami slicing is defined as wallet, for example if one rupee ( 1) is deducted from each
anything that is reduced interested in minor activities or wallet, would someone aware in communicating them to
segments. For instance, during an automated bank transfers, crisscross about the facts? If someone acquaintances them, for
the process of acquiring minuscule segments from each deal sure the telephone charges will be more than one rupee ( 1) if
that figures into a big amount of illegitimately gained fund is there is not a toll free facility. Maximum of us won’t
known as Salami slicing. When a money slices of a paises on a cognizance loosing that one rupee ( 1). Now, if the hacker
deal it might drive unobserved and if it were to steal this minor deduct one rupee ( 1) from 5 million wallets, then he will
make a sum of 5million rupees ( 5,000,000.00). Salami
quantity from many transactions it can rapidly add up to a
large amount of money [2].
attack is classified in to two forms [4]:
The requirement used for this kind of cyber-attack is a
computer which is castoff as together the goal and likewise an A. Intentional form
instrument to achieve the pony-trekking of information i.e.,
This form of Salami attack refers to stealing of one’s
theft of subtle information. This means in Salami attack the
information knowingly, mostly for fun, fame, fund, political
computer is said to be the subject as well as object of an attack
uses etc. for example When we go to a mall to purchase some
[6].

Copy Right © INDIACom-2018; ISSN 0973-7529; ISBN 978-93-80544-28-1 4640


Salami Attacks and their Mitigation - An Overview

clothes etc. on the price tag we will see price like 1999/-  The banking system should initiate both SMS
(one thousand nine hundred and nighty nine rupees) but when
we give the cashier 2000\- (two thousand rupees) he will not and email message to alert their customers
give back the one rupee ( 1) change. Imagine if this were on any transaction that occurs and also
done on 5000 customers, the cashier would accumulate a
sizable sum at the close of the day. These things are not advise the customers to immediately report
somewhat novel, but maximum of the individuals already any unaware money reduction no matter how
small it is, so the bank can update their
familiar about it.
B. Unintentional form security system [7].
Unintentional form of Salami attack occurs accidentally,
mostly as a result of complexity of information that an  Individuals should avoid using their date of
individual is working on, singularity of information source etc.
birth, surname, mothers name or cell phone
V. SALAMI ATTACK AND SALAMI TACTICS number as their password of their phone,
Penny shaving, Salami slicing or Salami Attack or is ATMs or e-banking as it can be easily
mostly based on financial crimes. The idea behind this attack is
to make the alteration so irrelevant that it would go completely determined by the attackers.
unnoticed. The idea of Salami attack is widely used not just on
financial crimes alone but also as a strategy in politics called  The most important one is bank should advise
“Salami tactics” [10]. their customer to avoid saving their bank
Salami-slice strategy or Salami tactics comprises of two details inside their cell phone or on any of
terms, threats and alliances, which is used to overcome
opposition party. This strategy occurs when several groups are their social media [9].
created with in the opposition party and gradually disorganize
the party piece by piece from the inside without causing any VII. CONCLUSION AND RECOMMENDATION
conflict. The success of this Salami tactics depends on the In a nutshell Salami attack is the stealing of information
committers keeping their accurate enduring intentions from numerous sources where the victims remain unaware, this
concealed and maintaining an attitude of cooperativeness and may occur internally within an organization or externally
usefulness though betrothed in the envisioned regular outside the organization and may be intentional or accidental.
dismantling [10][11]. The most efficient way to avoid Salami attack is to define
efficient and robust user and security policy, which may
VI. DETECTION AND MITIGATION OF SALAMI ATTACK involve keeping every sensitive information within an
A. Detection organization confidential or use of multi-step security
authentication. In the impending, more augmentations can be
There may be different software to verify the authentication completed in creating warnings called as “Salami Alerts” or
of information in an organization but the most efficient and “NNT alerts” as and when the stealing materialized to display
effective way to detect Salami attack according to researchers and tracks the information (asset).
is to check each and every line of code and each and every
process and transaction (also known as white box testing) Acknowledgement
[7][9].
The authors are very grateful to the entire reviewers for
B. Mitigations procedures [8] their suggestions on all the revisions of the paper. Nazifi
 The organization should establish a security Alhassan Sani acknowledges the full support of all staffs in the
Computer Science department, Noida International University,
policy; this policy should contain different India.
privileges of who can access certain
information at certain level and who to deny
References
[1] M. E. Kabay, “Salami Fraud” Northfield VT: Norwich University.
such access. This will reduce the internal [2] Handbook of Information Security Management: Law, Investigation, and
attack on organizational assets. Ethics, www.cccure.org/Documents/HISM/522-525.html
[3] S. Bosworth and M. E. Kabay, “Computer Security Handbook”, 4th
 The organization should also frequently update Edition, New York: Wiley
[4] http://www.mekabay.com/index.htm
their security systems in order to avoid any [5] A. Scott., “Salami Attacks”, www.all.net/cid/attack/papers/Salami.html
ongoing attack to the organization. [6] www.nwfusion.com/newsletters/sec/2002/01467137.html
[7] The Security Database: Attack #93 Salami Attacks, www.all.net

Copy Right © INDIACom-2018; ISSN 0973-7529; ISBN 978-93-80544-28-1 4641


Proceedings of the 12th INDIACom; INDIACom-2018; IEEE Conference ID: 42835
2018 5 International Conference on “Computing for Sustainable Global Development”, 14th - 16th March, 2018
th

[8] D. B. Parker, “Fighting Computer Crime: A New Framework for


Protecting Information,” New York: John Wiley & Sons, Inc., 1998.
[9] M. Alnatheer and K. Nelson, “A Proposed Framework for Understanding
Information Security Culture and Practices in the Saudi Context,” in
Proc. 7th Australian Information Security Management Conference, 2009,
pp. 1-3.
[10] Time Magazine - Hungary: Salami Tactics (April 14, 1952).
[11] J. Horvath, “Salami Tactics, Telepolis” Heise.de
.

Copy Right © INDIACom-2018; ISSN 0973-7529; ISBN 978-93-80544-28-1 4642

You might also like