Classification of various Attacks.

Slides:



Advertisements
Similar presentations
Chris Karlof and David Wagner
Advertisements

Computer Security and Penetration Testing
NS-H /11041 Attacks. NS-H /11042 The Definition Security is a state of well-being of information and infrastructures in which the possibility.
Introduction to Sensor Networks Rabie A. Ramadan, PhD Cairo University 4.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Routing Security in Ad Hoc Networks
CS541 Advanced Networking 1 Mobile Ad Hoc Networks (MANETs) Neil Tang 02/02/2009.
Security Risks for Ad Hoc Networks and how they can be alleviated By: Jones Olaiya Ogunduyilemi Supervisor: Jens Christian Godskesen © Dec
Analysis of Attack By Matt Kennedy. Different Type of Attacks o Access Attacks o Modification and Repudiation Attacks o DoS Attacks o DDoS Attacks o Attacks.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
PART THREE E-commerce in Action Norton University E-commerce in Action.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Viruses & Destructive Programs
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures Chris Karlof and David Wagner (modified by Sarjana Singh)
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
DSR: Introduction Reference: D. B. Johnson, D. A. Maltz, Y.-C. Hu, and J. G. Jetcheva, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks,”
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Network Security Introduction
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Computer threats, Attacks and Assets upasana pandit T.E comp.
CWSA Workshop SWAN: Survivable Wireless Ad Hoc Networks Cristina Nita-Rotaru Purdue University J oint work with: Baruch Awerbuch, Reza Curtmola, Dave Holmer.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
Network security Vlasov Illia
An Introduction To ARP Spoofing & Other Attacks
KAMAN Kerberos Assisted Authentication in Mobile Ad-hoc Networks
Author:Zarei.M.;Faez.K. ;Nya.J.M.
IPSecurity.
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Introduction Wireless devices offering IP connectivity
Instructor Materials Chapter 7 Network Security
Ad-hoc Networks.
Network Security.
Packet Leashes: Defense Against Wormhole Attacks
Outline Basics of network security Definitions Sample attacks
Introduction to Information Security
Introduction to Networking
Internet Networking recitation #4
Firewalls.
Information and Network Security
Mobile Ad hoc Network: Secure Issues In Multi-Hop Routing Protocols
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
* Essential Network Security Book Slides.
Mobile ad hoc networking: imperatives and challenges
Mumtaz Ali Rajput +92 – INFORMATION SECURITY – WEEK 2 Mumtaz Ali Rajput +92 – 301-
Outline Basics of network security Definitions Sample attacks
PRESENTATION COMPUTER NETWORKS
Lecture 3: Secure Network Architecture
Computer Networks ARP and RARP
An Overview of Security Issues in Sensor Network
Outline Basics of network security Definitions Sample attacks
Routing in Mobile Wireless Networks Neil Tang 11/14/2008
Security Attacks Network Security.
Lecture 36.
Lecture 36.
Presentation transcript:

Classification of various Attacks.

Objectives 1. Introduction 2. Classification of Attacks Behavior based attacks (Active or Passive) Location based attacks (Internal or External) Layer based attacks

1. Introduction Mobile Ad-hoc network is a temporary network of mobile nodes; Mobile nodes communicate with each other through wireless links with no fixed infrastructure & no central control. Each mobile node acts as both a router & host. Nodes within each other's radio range communicate directly, while those that are far apart use other nodes as relays. Minimal configuration & quick deployment make them suitable for emergency situations like war, emergency medical situations etc. Fig 1: MANET and its applications

1. Introduction(cont.) Internet MANETs Operation : After one of the nodes is configured as a gateway, the entire network is connected to an external network like Internet. C B D E A Internet E F Gateway Fig 2: MANETs Operation

2. Classification of Attacks Lack of any central administration & due to security vulnerabilities of the routing protocols makes MANET more vulnerable to attacks. Such attacks can be categorized as given below Behavior based attacks i.e. Passive or Active attack Location/Source based attacks i.e. Internal or External Layer based attacks Fig 3: Classification of attacks

2. Classification of Attacks (Cont.) a) Behavior based attacks (Active or Passive) Active attack: Those attacks that attempt to alter, inject, delete or destroy the data being exchanged in the network. Intention to damage network or disrupt the network operations Modifies the contents of the packets Easier to handle as detecting modifications is not difficult. Types of active attacks are: Fabrication or masquerading attacks, message modifications, message replays and DOS attacks. Fig 4: Active Attack Fig 5: Types of Active attacks

2. Classification of Attacks (Cont.) Fig 6: Active Attacks : Masquerade, Replay, Modification of Message or DOS

2. Classification of Attacks (Cont.) Passive attack : Those attacks which attempt to learn or make use of information from the system but does not affect system resources. No intention to damage the network & network operations. Does not modifies the contents of the packets Difficult to handle as modifications cannot be detected easily. Types of Passive Attacks: Release of message contents and Traffic analysis. Fig 7: Passive Attack Fig 8: Types of Passive attacks

2. Classification of Attacks (Cont.) Fig 9: Passive attacks : Traffic Analysis & Release of Message Contents.

2. Classification of Attacks (Cont.) b) Location based attacks (External or Internal) External attack: Those attacks which are carried out by nodes or group of nodes that do not belong to the network. Such attacks send fake packets in order to interrupt the performance of the network. Can be avoided by implementing firewall and encryption techniques. Internal attack : Those attacks which are carried out by nodes or group of nodes that are actually part of the network. Either by acting as a impersonated node or compromising an existing node. More severe and difficult to detect than external attacks. Fig 10: External & Internal Attacks

2. Classification of Attacks (Cont.) c) Layer based attacks Attacks at Physical Layer Attacks at Link/MAC Layer Attack at Network Layer Attack at Transport Layer Attack at Application Layer

2. Classification of Attacks (Cont.) i) Attacks at the Physical Layer The attacks on physical layer are hardware oriented. They need help from hardware sources to come into effect. Types : eavesdropping, interference and jamming. Eavesdropping reading of messages or conversations. The main aim of such attacks is to obtain the confidential information such as private key, public key or passwords. Example : Sniffers (a piece of software that grabs all of the traffic flowing into and out of a computer attached to a network) Fig 11: Eavesdropping

2. Classification of Attacks (Cont.) Jamming and Interference Special type of DOS attack. a radio signal can be jammed or interfered, which causes the message to be corrupted or lost. A malicious node keeps monitoring the wireless medium in order to find out the frequency at which the receiver node is receiving signals from the sender. The attacker then transmits signals using the same frequency to send data to the receiver thereby disrupting communications. Frequency hopping is used to overcome jamming attacks. Fig 12: Jamming & Active Interference

2. Classification of Attacks (Cont.) ii) Attacks at Link/MAC Layer Selfish Misbehavior of Nodes: Directly affects the self-performance of nodes. Does not interfere with the operation of the network. Selfish nodes may refuse to take part in the forwarding process. Dropping packets intentionally in order to conserve the resources. Malicious behavior of Nodes: Purpose of malicious node is to disrupt the network operation. Types: DOS & Misdirecting traffic DOS: an attacker attempts to prevent legitimate users from accessing information or services. Example: Flooding, disrupt connections Misdirecting traffic: A malicious node advertises wrong routing info like fake route request or fake error messages. Traffic Analysis : Confidential information about network topology can be derived by analyzing traffic patterns. Reveal information like: Location of nodes, Network topology and roles played by source nodes and destination nodes.

2. Classification of Attacks (Cont.) iii) Attacks at Network Layer The basic idea behind network layer attacks is to inject itself in the active path from source to destination or to absorb network traffic. Examples: Routing attack, Black hole attack, Rushing attack, Worm hole attack, Sink hole attack, Link Spoofing attack, Sybil attack and Byzantine attack. Routing attack: Attack against the Routing and Path Selection to disrupt the operation of the network. As shown in the figure below: The malicious node X can absorb important data by placing itself between source A and destination D. X can also divert the data packets exchanged between A and D, which results in significant end to end delay between A and D. Fig 13: Routing attack

2. Classification of Attacks (Cont.) Black hole Attack: In this type of attacks, malicious node claims having an optimum route to the destination node. Route Requests (RREQs), Route Replay (RREPs), Route Errors (RERRs) are control messages used for establishing a path to the destination. In fig. below when source node S wants to send data to destination node D, it initiates the route discovery process by sending RREQ Packets. The malicious node 4 when receives the route request, it immediately sends response by RREP to the source. Malicious node 4 advertises itself in such a way that it has a shortest route to the destination. If reply from node 4 reaches first to the source S, then the source node S ignores all other reply messages & begin to send packet via route node 4. Fig 14: Black hole attack

2. Classification of Attacks (Cont.) Rushing attack: When a compromised node receives a route request packet from the source node, it floods the packet quickly throughout the network before other nodes. In fig. below, the node 4 represents the rushing attack node. The rushing attack of compromised node 4 quickly broadcasts the route request messages to ensure that the RREQ message from itself arrive earlier than from other nodes(in this case i.e. from S. When neighboring node of D i.e. 7 and 8 when receive the actual (late) route request from source, they simply discard the request. So in the presence of such attacks S fails to discover any useable route or safe route without the involvement of attacker. Fig 15: Rushing Attack

2. Classification of Attacks (Cont.) Worm hole Attack: In wormhole attack, malicious node receive data packet at one point in the network and tunnels them to another malicious node. The tunnel exist between two malicious nodes is referred to as a wormhole. In fig. below, the nodes X & Y are malicious node that forms the tunnel. The source node S when initiate the RREQ message to find the route to node D destination node. The immediate neighbor node of source node S, namely 2 and 1 forwards the RREQ message to their respective neighbors 5 and X. The node X when receive the RREQ it immediately share with it Y and later it initiate RREQ to its neighbor node 8. Due to high speed link, it forces the source node to select route <S-1-8-D> for destination. Fig 16: Wormhole attack

2. Classification of Attacks (Cont.) Sink hole Attack: In sinkhole Attack, a compromised node or malicious node advertises wrong routing information to produce itself as a attractive specific node and receives whole network traffic. Link Spoofing Attack: In Link spoofing attacks, a malicious node broadcasts fake route information to disrupt the routing operation. Sybil Attack: In this attack, a malicious node produces itself as a large number of nodes instead of single node. Sybil attacker may generate fake identities to represent multiple identities for a malicious node. In Fig 19, A is connected with B, C and the malicious node, M1. If M1 represents other nodes M2, M3 and M4 (e.g. by using their secret keys) this makes A believe it has 6 neighbors instead of 3. Fig 17: Sink Hole Attack Fig 18: Link Spoofing Attack Fig 19: Sybil Attack

2. Classification of Attacks (Cont.) iii) Attacks at Transport Layer Session Hijacking The attacker in a session hijacking scenario exploits the unprotected session following its initial setup and it tries to collect secure data. E.g. of session hijacking attack is TCP–ACK storm Problem. In fig. below, nodes N1 and N2 have established a TCP connection. An attacker M spoofs the IP address of N2 and injects data into the session of node N1. N1 acknowledges the receipt by sending an ACK packet to node N2. As N2 notices a different sequence number in the received ACK packet from N1, it reissues its last ACK packet to N1 in order to resynchronize. This process repeats over and over, leading to an ACK storm. Fig 20: Session Hijacking : TCP-ACK storm

2. Classification of Attacks (Cont.) iii) Attacks at Transport Layer SYN Flooding Attack: Those attacks in which attacker creates a large number of half opened TCP connection with victim node. TCP connection between two communicating parties is established through completing three way handshakes, described in the fig. below Step1: Node S sends a SYN packet with a seq. number P to Node D. Step2: Node D transmits to S, a SYN/ACK message, including its own sequence number Q & acknowledgment number P+1. Step3: S issues an ACK message (with ack. number Q+1) to D. Fig 21: SYN Flooding Attack

2. Classification of Attacks (Cont.) iii) Attacks at Transport Layer A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic. Fig 22: SYN Flooding Attack

2. Classification of Attacks (Cont.) iii) Attacks at Application Layer Repudiation Attacks: refers to a denial of participation in the communication. Example of repudiation attack on a commercial system: a selfish person could deny conducting an operation on a credit card purchase or deny any on-line transaction, which is a repudiation attack on a commercial system. Malicious code attacks: Malicious code attacks include, Viruses, Worms, Spywares, and Trojan horses, can attack both operating system and user application. These malicious programs usually can spread themselves through the network and cause the computer system and networks to slow down.

Thanks