Introduction to Security Computer Networks Computer Networks Term B10.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

KULIAH III THREAT AND ATTACK (2) Aswin Suharsono KOM Keamanan Jaringan 2012/2013 KOM Keamanan Jaringan 2012/2013.
Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 5 Omar Meqdadi Department of Computer Science and Software Engineering University of.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
Threats To A Computer Network
BOTNETS/Cyber Criminals  How do we stop Cyber Criminals.
Introduction 1-1 Chapter 1 Introduction These additional slides are adapted from the slides of the textbook. Computer Networking: A Top Down Approach,5th.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
8-1 Internet security threats Mapping: m before attacking: gather information – find out what services are implemented on network  Use ping to determine.
Lecture 3 Introduction 1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit.
Analysis of Attack By Matt Kennedy. Different Type of Attacks o Access Attacks o Modification and Repudiation Attacks o DoS Attacks o DDoS Attacks o Attacks.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
1-1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet.
Introduction 1-1 Chapter 1 Introduction slides are modified from J. Kurose & K. Ross CPE 400 / 600 Computer Communication Networks.
University of Calgary – CPSC 441.  The field of network security is about:  how bad guys can attack computer networks  how we can defend networks against.
CPSC 441 TUTORIAL TA: FANG WANG NETWORK SECURITY.
Introduction 1 Lecture 4 Networking Concepts (cont) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
Quiz Review.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Attacks and Malicious Code Chapter 3. Learning Objectives Explain denial-of-service (DoS) attacks Explain and discuss ping-of-death attacks Identify major.
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Graciela Perera Department of Computer Science and Information Systems Slide 1 of 5 OVERVIEW FOR NETWORKING CONCEPTS AND ADMINISTRATION CSIS 3723 Graciela.
Introduction 1-1 Chapter 1 Introduction Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
Viruses & Destructive Programs
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Final Introduction ---- Web Security, DDoS, others
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
--Harish Reddy Vemula Distributed Denial of Service.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
CS 3830 Day 5 Introduction 1-1. Announcements  Program 1 due today at 3pm  Program 2 posted by tonight (due next Friday at 3pm)  Quiz 1 at the end.
Types of Electronic Infection
1 Introduction to Information Security Spring 2012.
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
CS 3830 Day 6 Introduction 1-1. Announcements  Program 2 posted this afternoon (due date will be week of 9/24) Introduction 1-2.
Denial of Service Datakom Ht08 Jesper Christensen, Patrick Johansson, Robert Kajic A short introduction to DoS.
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
Network Programming and Network Security Lane Thames Graduate Research Assistant.
Session 2.
COMP 562: “Advanced Topics in Networking” Qian Zhang Spring 2009 HKUST Introduction 1-1.
Introduction 1-1 Chapter 1 Introduction Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on.
DELAYS, LAYERED NETWORK MODEL AND NETWORK SECURITY.
Malicious Software.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Polytechnic University Introduction1 CS 393/682: Network Security Professor Keith W. Ross.
CPSC441 Computer Communications Aniket Mahanti Introduction 1-1.
CPSC 441 TUTORIAL – APRIL 4, 2012 TA: MARYAM ELAHI NETWORK SECURITY.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Introduction1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
What they are and how to protect against them
3.6 Fundamentals of cyber security
IT Security  .
The Internet of Unsecure Things
Computer Security.
Presentation transcript:

Introduction to Security Computer Networks Computer Networks Term B10

Intro to Security Outline  Network Security  Malware –Spyware, viruses, worms and trojan horses, botnets  Denial of Service and Distributed DOS Attacks  Packet Sniffing  Masquerading Attacks  Man-in-the-Middle Attacks Computer Networks Introduction to Security 2

Networks under Attack  The “original” Internet (i,e., ARPANET) was not designed with security in mind. –The early vision was “a group of mutually trusting users attached to a transparent network”. ARPANET started out as academics and DoD users!! –Protocol and application designers are playing “catch-up”.  The Internet changed: –Added industrial management partners  ISP’s –WWW made the Internet accessible to the masses.  Bad guys can attack networks and attempt to wreak havoc on our daily lives. Computer Networks Introduction to Security 3

Network Security  Network security is about: –How bad guys can attack computer networks. –How we can defend networks against attacks. –How to design architectures that are immune to attacks.  Network security is becoming more important as more individuals become dependent on the Internet and as the destructive nature of new attacks increases.  Security issues exist at all layers! Computer Networks Introduction to Security 4

MalwareMalware  Malware:: malicious “stuff” that enters our hosts from the Internet and infects our devices.  Spyware collects private information (e.g., keystrokes and web sites visited) and uploads info to bad guy collection sites.  An infected host can be enrolled in a botnet, used for spam and distributed denial-of-service (DDoS) attacks.  Malware is often self-replicating: from an infected host, it seeks entry into other hosts. Computer Networks Introduction to Security 5

Malware from the Internet  Malware can get into a host and spread in the form of a virus, worm, or trojan horse.  Virus –Requires some form of user active execution. –Classic example: an attachment containing malicious executable code that is triggered when the attachment is opened. –Self-replicating (e.g., via address book) Computer Networks Introduction to Security 6

Worms and Trojan Horses Computer Networks Introduction to Security 7  Worm –Infects by passively receiving object via a vulnerable network application that runs the malware to create worm. –Self-replicates by searching for hosts running the same application.  Trojan horse –Hidden in some otherwise useful software. –Often found today on a Web page (Active-X, plugin). Sapphire Worm: aggregate scans/sec in first 5 minutes of outbreak (CAIDA, UWisc data)

Denial-of-Service Attack  Denial-of-service (DoS) renders resources (server, link) unusable by legitimate users by overwhelming the resource with bogus traffic. Computer Networks Introduction to Security 8 target 1. select target 2. break into hosts around the network (see botnet) 3. send packets toward target from compromised hosts Distributed DoS (DDoS)

 Three categories: –Vulnerability attack:: attack application with well-crafted messages (result – service stops or host crashes). –Bandwidth flooding:: deluge victim with so many messages such that target’s access link gets clogged. –Connection flooding:: initiate so many half-open or open TCP connections that target stops accepting legitimate connections. Computer Networks Introduction to Security 9 Denial-of-Service Attack

Bad Guy Packet Sniffing Computer Networks Introduction to Security 10 Packet sniffing:: passive receiver that records a copy of every packet that goes by (e.g., Wireshark) –broadcast media (shared Ethernet, wireless) –promiscuous network interface reads/records all packets (e.g., including passwords!) passing by A B C src:B dest:A payload

Masquerade Attack  IP spoofing:: send a packet with false source address Computer Networks Introduction to Security 11 A B C src:B dest:A payload

Man-in-the-Middle Attack  record-and-playback :: sniff sensitive info (e.g., password), and use later –Bad guy password holder is that user from system point of view Computer Networks Introduction to Security 12 A B C src:B dest:A user: B; password: foo

Intro to Security Summary  Network Security  Malware –Spyware, viruses, worms and trojan horses, botnets  DoS and DDOS Attacks  Packet Sniffing (promiscuous mode)  Masquerading Attacks (IP spoofing)  Man-in-the-Middle Attacks –Record and playback Computer Networks Introduction to Security 13