Network Attacks Dylan Small.

Slides:



Advertisements
Similar presentations
SECURING WIRELESS LANS PRESENTED BY VICTOR C. NWALA CS555 Department of Computer Science Old Dominion University.
Advertisements

Denial of Service Attack History What is a Denial of Service Attack? Modes of Attack Performing a Denial of Service Attack Distributed Denial of Service.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Web Server Administration TEC 236 Securing the Web Environment.
Network Attacks Mark Shtern.
Web server security Dr Jim Briggs WEBP security1.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
Quiz Review.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Guide to Network Defense and Countermeasures Chapter 2.
VPN AND SECURITY FLAWS Rajesh Perumal Clemson University.
BUSINESS B1 Information Security.
Staying Safe Online Keep your Information Secure.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
IT security By Tilly Gerlack.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Michael McDonnell GIAC Certified Intrusion Analyst Creative Commons License: You are free to share and remix but you must provide.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Network Security David Lazăr.
CHAPTER 9 Sniffing.
Network Security & Accounting
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Computer Security By Duncan Hall.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Forms of Network Attacks Gabriel Owens COSC 352 February 24, 2011.
Difference between External and Internal Server Monitoring.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Network System Security - Task 2. Russell Johnston.
START. A room full of computers Two or more computers connected together in order to communicate A computer that can communicate with every living thing.
Hardware and software that can provide a good level of security In this presentation I am going to provide advices on hardware and software that needs.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Unit 3 Section 6.4: Internet Security
Chapter 40 Internet Security.
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Instructor Materials Chapter 7 Network Security
Network Security Marshall Leitem 11/30/04
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
How And The Internet Work
CONTRA Camouflage of Network Traffic to Resist Attack (Intrusion Tolerance Using Masking, Redundancy and Dispersion) DARPA OASIS PI Meeting – Hilton Head.
Big Picture How many ways can a system be attacked? What can we do about it?
Spoofing Basics Presentation developed by A.F.M Bakabillah Cyber Security and Networking Consultant MCSA: Messaging, MCSE RHCE ITIL CEH.
Little work is accurate
– Communication Technology in a Changing World
ISNE101 Dr. Ken Cosh Week 13.
Firewalls Routers, Switches, Hubs VPNs
Distributed Denial of Service Attacks
Fire-wall.
Faculty of Science IT Department By Raz Dara MA.
Security.
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Security week 1 Introductions Class website Syllabus review
FIREWALL.
Cyber security and Computer Misuse
Computer Security By: Muhammed Anwar.
Operating System Concepts
Wireless Spoofing Attacks on Mobile Devices
6. Application Software Security
Presentation transcript:

Network Attacks Dylan Small

Roadmap History of Network Attacks Current Network Attacks Software Used Blocking Network Attacks Future of Network attacks

History of Network Attacks Previously DDoS attacks were the only method of network attacking DDoS or Distributed Denial of Service attack is when the hacker floods a server with millions of packets and make the server unusable This is a brute force type attack

DDoS Attacks What DDoS attacks aim to do is overload the remote servers’ usage of computational resources, such as bandwidth, memory, disk space, or processor time What this does is make the website or whatever the server is hosting unusable and unable to be accessed by its users The ultimate goal of DDoS attacks is to crash the remote server

https://www.youtube.com/watch?v=OhA9PAfkJ10

Software Used Low Orbit Ion Cannon (LOIC) - An easy to use GUI that makes DDoS attacking easy for anyone All you have to do is type in the target URL, add a message in there if you want and then click “IMMA CHARGIN MAH LAZER”

Protecting against DDoS Attacks https://www.youtube.com/watch?v=AXzZZa1sITw

Protecting against DDoS Attacks Properly configured internet routers and switches can greatly reduce the effectiveness of DDoS attacks Many internet routers have built in Automatic DDoS attack detection, so if DDoS packets are detected they will be discarded and not interfere with regular packets Having complex rules in place in routers and switches greatly decreases effectiveness of DDoS attacks but nothing is completely safe

Passive Attacks Passive Attacks monitor unencrypted traffic and looks for clear-text passwords and sensitive information that can be used in other types of attacks This can include traffic analysis, monitoring of unprotected communications, decrypting weakly encrypted traffic, and capturing authentication information such as passwords

Insider Attacks Just like the title says, an insider attack is when someone from the “inside” of the organization attacks the network With the information that is gathered the attacker can eavesdrop, steal, or damage information within the organization

Phishing Attacks Phishing is when attackers create a website that looks like a real website but login information is sent to attackers instead of the real organization

Phishing Attacks How to prevent being “phished” Check the URL in the address bar and make sure it is the real one ie Facebook.com instead of face-book.com Follow Amanda Marshalls emails

Sources http://en.wikipedia.org/wiki/DDoS_mitigation http://www.cisco.com/c/en/us/products/collateral/security/traffic-anomaly-detector-xt-5600a/prod_white_paper0900aecd8011e927.html https://www.google.com/search?q=ddos&rlz=1CAACAJ_enUS634US634&oq=ddos&aqs=chrome.0.69i59j0l5.506j0j4&sourceid=chrome&es_sm=0&ie=UTF-8 http://en.wikipedia.org/wiki/Denial-of-service_attack http://www.digitalattackmap.com/understanding-ddos/ https://www.youtube.com/watch?v=AXzZZa1sITw https://www.youtube.com/watch?v=OhA9PAfkJ10