Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.

Slides:



Advertisements
Similar presentations
NETWORK SECURITY ADD ON NOTES MMD © Oct2012. IMPLEMENTATION Enable Passwords On Cisco Routers Via Enable Password And Enable Secret Access Control Lists.
Advertisements

Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Review For Exam 2 March 9, 2010 MIS 4600 – MBA © Abdou Illia.
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
Security (Continued) V.T. Raja, Ph.D., Oregon State University.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Raw Sockets CS-480b Dick Steflik Raw Sockets Raw Sockets let you program at just above the network (IP) layer You could program at the IP level using.
Firewalls and Intrusion Detection Systems
Computer Security and Penetration Testing
Security (Part 2) School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 13, Thursday 4/5/2007)
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Network & Computer Attacks (Part 2) February 11, 2010 MIS 4600 – MBA © Abdou Illia.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
Analysis of Attack By Matt Kennedy. Different Type of Attacks o Access Attacks o Modification and Repudiation Attacks o DoS Attacks o DDoS Attacks o Attacks.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
1 Figure 5-4: Drivers of Performance Requirements: Traffic Volume and Complexity of Filtering Performance Requirements Traffic Volume (Packets per Second)
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
FIREWALL Mạng máy tính nâng cao-V1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Guide to Network Defense and Countermeasures Chapter 2.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
Chapter 6: Packet Filtering
Review for Exam 3 School of Business Eastern Illinois University © Abdou Illia, Fall 2005.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Targeted Break-in, DoS, & Malware attacks (II) (February ) © Abdou Illia – Spring 2015.
--Harish Reddy Vemula Distributed Denial of Service.
EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Security News Source Courtesy:
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Security (Part 1) School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 13, Tuesday 4/3/2007)
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2004.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
DoS Suite and Raw Socket Programming Group 16 Thomas Losier Paul Obame Group 16 Thomas Losier Paul Obame.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Security School of Business Eastern Illinois University © Abdou Illia, Fall 2002 (Week 12, Wednesday 11/13/2002)
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 25 November 16, 2004.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
1 Figure 3-13: Internet Protocol (IP) IP Addresses and Security  IP address spoofing: Sending a message with a false IP address (Figure 3-17)  Gives.
DoS/DDoS attack and defense
1 Figure 4-11: Denial-of-Service (DoS) Attacks Introduction  Attack on availability  Act of vandalism Single-Message DoS Attacks  Crash a host with.
DOS Attacks Lyle YapDiangco COEN 150 5/21/04. Background DOS attacks have been around for decades Usually intentional and malicious Can cost a target.
I NTRODUCTION TO F IREWALLS. O VERVIEW OF F IREWALLS As the name implies, a firewall acts to provide secured access between two networks A firewall may.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Denail of Service(Dos) Attacks & Distributed Denial of Service(DDos) Attacks Chun-Chung Chen.
Information Systems Design and Development Security Precautions Computing Science.
1 Managing Security Additional notes. 2 Intercepting confidential messages Attacker Taps into the Conversation: Tries to Read Messages Client PC Server.
Review Exam 2 Spring 2016.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Review Exam 2 Spring 2013.
Domain 4 – Communication and Network Security
Introduction to Networking
Intro to Denial of Serice Attacks
SECURING INFORMATION SYSTEMS
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006

Security School of Business Eastern Illinois University

3 Identifying security attacks’ targets n Scanning (Probing) – Ping messages (To know if a potential victim exist) – Supervisory messages (To know if victim available) – Tracert, Traceroute (To know how to get to target)

4 Identifying security attacks’ targets n Examining scanning results reveal n IP addresses of potential victims n What services victims are running; different services have different weaknesses n Host’s operating system, version number, etc.

5 Denial of Service (DoS) attacks n Types of DoS attacks: Flooding DoS Smurf Flooding DoS Ping of Death attacks LAND attacks Distributed Denial of Service attacks

6 Flooding DoS n Send a stream of request messages to the target n Makes the target run very slowly or crash n Objective is to have the target deny service to legitimate users DoS requests Server Attacker Legitimate user Legitimate request

7 Smurf Flooding DoS n Attacker uses IP spoofing ( false source IP address in outgoing messages ) n Attacker sends ping / echo messages to third party computers on behalf of the target n All third party computers respond to target

8 Ping of Death attacks n Take advantage of – Fact that TCP/IP allows large packets to be fragmented – Some operating systems inability to handle packets larger than bytes n Attacker sends a request message that are larger than 65,536 bytes n Ping of Death are usually single-message DoS attacks n Ping of death attacks are rare today as most operating systems have been fixed to prevent this type of attack from occurring

9 LAND attacks n First, appeared in 1997 n Attacker uses IP spoofing (false source IP address in outgoing messages) n Attacker sends IP packets where the source and destination address refer to target itself. n LAND attacks are usually single-message DoS attacks n Back in time, OS and routers were not designed to deal with loopback n Problem resurface recently with Windows XP and Windows 2003 Server

10 Distributed DoS (DDoS) Attack Server DoS Messages Computer with Zombie Computer with Zombie Attacker Attack Command Attack Command n Attacker hacks into multiple clients and plants Zombie programs on them n Attacker sends commands to Zombie programs which execute the attacks n First appeared in 2000 with Mafiaboy attack against cnn.com, ebay.com, etrade.com, dell.com, etc.

11 Review Questions What is the difference between DoS and DDoS? What kinds of tools/techniques could be used during the scanning process by a hacker? Are ping of death attacks and LAND attacks all example of single-message DoS attacks What kind of techniques or defense systems could be used to protect a system against (a) intercepting messages, (b) malware or content attack What is the difference between a worm, a Trojan horse, and a logic bomb What kind of malware could harm a host computer by consuming processor time and random access memory

12 Security Goals n CIA is the key word in implementing security – C onfidentiality of communications – I ntegrity of data – A vailability of network services and resources

13 Packet Filter Firewall Packet Filter Firewall IP-H TCP-H UDP-HApplication Message IP-HICMP Message Arriving Packets Permit Deny Corporate NetworkThe Internet Examines content of IP header, TCP header, UDP header, and content of ICMP supervisory messages

14 Application (Proxy) Firewall n Application firewalls, also known as Proxy firewalls – Examine Application layer messages to check for illicit content n Application firewalls and Packet filter firewalls are complementary – In terms of what part of a message they examine. IP-H TCP-H UDP-HApplication Message

15 Intrusion Detection Systems n Software or hardware device that – Capture network activity data in log files – Generate alarms in case of suspicious activities

16 Review Questions What are the three main security goals? What parts of incoming messages do packet filter firewalls examine? What parts of incoming messages do application firewalls examine? b) What do they look for? Answer: (a) Application layer messages, (b) illicit content What kind of techniques or defense systems could be used to protect a system against (a) intercepting messages, (b) malware or content attack What could an IDS be used for?

17 Summary Questions n Jason sends a message to Kristin using public key encryption. (a) What key will Jason use to encrypt the message? (b) What key will Kristin use to decrypt the message? (c) What key will Kristin use to encrypt the reply? (d) What key will Jason use to decrypt the reply? (e) Can the message and reply be long messages? Explain. Answer: a) Jason will encrypt the message with Kristin’s public key. b) Kristin will use her own private key to decrypt the message. c) Kristin will use Jason’s public key to encrypt the reply. d) Jason will use his own private key to decrypt the reply. e) No, public key encryption can only encrypt short messages. n Does public key encryption have a problem with secure key exchange for the public key? Explain. Answer: There is no problem distributing the public key, because it does not have to be distributed securely. You can even find companies’ public keys on their website.

Network Management

19 Summary Questions (Part 1) 1) List the main elements in centralized network management 2) Does the Manager communicate directly with the managed devices? Explain. 3) Explain the difference between a managed device and objects. 4) Where is the MIB (database) stored?

20 Summary Questions (Part 2) 1) In Manager-Agent communications, what device creates commands? Responses? Traps? 2) Explain the two types of commands. 3) What is a trap?