Chapter 7 7.2 Threats in Networks Network Security / G. Steffen.

Slides:



Advertisements
Similar presentations
NS-H /11041 Attacks. NS-H /11042 The Definition Security is a state of well-being of information and infrastructures in which the possibility.
Advertisements

1 Reading Log Files. 2 Segment Format
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Lecture 1: Overview modified from slides of Lawrie Brown.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Network Attacks Mark Shtern.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
7.3 Network Security Controls 1Network Security / G.Steffen.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Analysis of Attack By Matt Kennedy. Different Type of Attacks o Access Attacks o Modification and Repudiation Attacks o DoS Attacks o DDoS Attacks o Attacks.
Security in Networks— Their design, development, usage… Barbara Endicott-Popovsky CSSE592/491 In collaboration with: Deborah Frincke, Ph.D. Director, Center.
Threats and Attacks Principles of Information Security, 2nd Edition
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Week 10 - Wednesday.  What did we talk about last time?  Network basics.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
Computer & Network Security
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Security in Computer System 491 CS-G(172) By Manesh T
--Harish Reddy Vemula Distributed Denial of Service.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Lecture 20 Hacking. Over the Internet Over LAN Locally Offline Theft Deception Modes of Hacker Attack.
Welcome to Introduction to Computer Security. Why Computer Security The past decade has seen an explosion in the concern for the security of information.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-01 S. Hartman M. Wasserman D. Zhang 1.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
DoS Suite and Raw Socket Programming Group 16 Thomas Losier Paul Obame Group 16 Thomas Losier Paul Obame.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Security in Computing Security in Networks. I.Threats in networks A. Vulnerabilities 1.Anonymity 2.Shared resources 3.Size (many points of attack) 4.Complexity.
Topic 5: Basic Security.
BY SYDNEY FERNANDES T.E COMP ROLL NO: INTRODUCTION Networks are used as a medium inorder to exchange data packets between the server and clients.
1 Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise your system.
Security in Networks Single point of failure Resillence or fault tolerance CS model.
CSCE Farkas1 CSCE 522 Network Security. Reading Pfleeger and Pfleeger: Chapter 6 CSCE Farkas2.
DoS/DDoS attack and defense
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
Security in network Outline Threats in network Network security controls Firewalls Intrusion detection system Secure Networks and Cryptography Example.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Week 9 - Wednesday.  What did we talk about last time?  Network basics.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Carrie Estes Collin Donaldson.  Zero day attacks  “zero day”  Web application attacks  Signing up for a class  Hardening the web server  Enhancing.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Network security Vlasov Illia
Some Important Network Characteristics for Security
Outline Basics of network security Definitions Sample attacks
What Makes a Network Vulnerable?
Outline Basics of network security Definitions Sample attacks
Threats in Networks Jagdish S. Gangolly School of Business
Outline Basics of network security Definitions Sample attacks
Presentation transcript:

Chapter 7 7.2 Threats in Networks Network Security / G. Steffen

In This Section What makes a network Vulnerable Who Attacks Networks? Reasons for network attacks Who Attacks Networks? Who are the attackers? Why people attack? Threats in Transit: Eavesdropping and Wiretapping Different ways attackers attack a victim Network Security / G. Steffen

What Makes a Network Vulnerable 1 How network differ from a stand-alone environment: Anonymity Attacker can mount an attack from thousands of miles away; passes through many hosts Many points of attack Both targets and origins An attack can come from any host to any host Sharing More users have the potential to access networked systems than on single computers Network Security / G. Steffen

What Makes a Network Vulnerable 2 How network differ from a stand-alone environment: Complexity of System Reliable security is difficult to obtain Complex as many users do not know what their computers are doing at any moment Unknown Perimeter One host may be a node on two different networks Causing uncontrolled groups of possibly malicious users Unknown Path Can have multiple paths from one host to another. Network Security / G. Steffen

Who Attacks Networks Challenge – what would happen if I tried this approach or technique? Can I defeat this network? Fame Money and Espionage Organized Crime Ideaology Hacktivism – breaking into a computer system with the intent of disrupting normal operations but not causing serious damage Cyberterroism- more dangerous than hacktivism can cause grave harm such as loss of life or severe economic damage Network Security / G. Steffen

Reconnaissance 1 How attackers perpetrate attacks? Port Scan For a particular IP address, the program will gather network information. It tells an attacker which standard ports are being used, which OS is installed on the target system, & what applications and which versions are present. Social Engineering It gives an external picture of the network to the attacker. Intelligence Gathering all the information and making a plan. Network Security / G. Steffen

Reconnaissance 2 How attackers perpetrate attacks? Operating System & Application Fingerprinting Determining what commercial application server application is running, what version… Bulletin Boards & Charts Exchanging information and techniques online Availability of Documentation Vendors provide information on website about their product in order to develop compatible, complementary applications. For instance Microsoft Network Security / G. Steffen

Threats in Transit Eavesdropping Wiretapping Overhearing without expending any extra effort Causing harm that can occur between a sender and a receiver Wiretapping Passive wiretapping Similar to eavesdropping Active wiretapping Injecting something into the communication Network Security / G. Steffen

Wiretapping Communication Mediums 1 Cable Packet sniffer – A device that can retrieve all packets of LAN Inductance – a process where an intruder can tap a wire and read radiated signals without making physical contact with the cable Microwave Signals are broadcasted through air, making more accessible to hackers Signals are not usually shielded or isolated to prevent interception Satellite Communication Dispersed over a great area than the indented point of reception Communications are multiplexed, the risk is small that any one communication will be interrupted Greater potential than microwave signals Network Security / G. Steffen

Wiretapping Communication Mediums 2 Optical Fiber Not possible to tap an optical signal without detection Inductive tap is not possible as optical fiber carries light energy Hackers can obtain data from repeaters, splices , and taps along a cable Wireless Major threat is interception Network Security / G. Steffen

Wiretap Vulnerabilities Network Security / G. Steffen

Other Threats Protocol Flaws Authentication Foiled by Guessing Authentication Thwarted by Eavesdropping or Wiretapping Authentication Foiled by Avoidance Nonexistent Authentication Well-Known Authentication Trusted Authentication Network Security / G. Steffen

Other Threats Impersonation Spoofing Masquerade Session hijacking Easier than wiretapping for obtaining information on a network More significant threat in WAN than in LAN Spoofing An attacker obtains network credentials illegally and carries false conversations Masquerade One hosts pretends to be another Phishing is a variation of this kind of an attack. Session hijacking Intercepting & carrying a session begun by another entity Man-in-the-Middle Attack One entity intrudes between two others. Network Security / G. Steffen

Key Interception by a Man-in-the Middle Attack Network Security / G. Steffen

Message Confidentiality Threats Misdelivery Message can be delivered to someone other than the intended recipient Exposure Passive wiretapping is a source of message exposure Traffic Flow Analysis Protecting both the content of the message & the header information that identifies the sender and receiver Network Security / G. Steffen

Message Integrity Threats Falsification of Messages An attacker may change content of the message on the way to the receiver An attacker may destroy or delete a message These attacks can be perpetrated by active wiretapping, Trojan horse, preempted hosts etc Noise These are unintentional interferences Network Security / G. Steffen

Denial of Service (DOS)/ Availability Attacks Transmission Failure Line cut Network noise making a packet unrecognizable or undeliverable Connection Flooding Sending too much data Protocol attacks: TCP, UDP, ICMP (Internet Control Message Protocol) Network Security / G. Steffen

DOS Attacks 1 Echo-Chargen Ping of Death Smurf Syn Flood Attack works between two hosts Ping of Death Flood network with ping packets Attack limited by the smallest bandwidth to victim Smurf It is a variation of ping attack Syn Flood Attack uses the TCP protocol suite Network Security / G. Steffen

Distributed Denial of Service (DDoS) To perpetrate a DDoS attack, an attacker first plants a Trojan horse on a target machine. This process is repeated with many targets. Each of these targets systems then become what is known as zombie. Then the attacker chooses a victim and sends a signal to all the zombies to launch the attack. It means the victim counters n attacks from the n zombies all acting at once. Network Security / G. Steffen

Summary Threats are raised against the key aspects of security : confidentiality, integrity, and availability. Target Vulnerability Precursors to attack Port Scan Social Engineering Reconnaissance OS & Application Fingerprinting Authentication Failures Impersonation Guessing Eavesdropping Spoofing Man-in-the Middle Attack Network Security / G. Steffen

Summary Target Vulnerability Programming Flaws Buffer Overflow Addressing Errors Parameter Modifications Cookie Malicious Typed Code Confidentiality Protocol Flaw Eavesdropping Passive Wiretap Misdelivery Network Security / G. Steffen

Summary Target Vulnerability Integrity Protocol Flaw Active Wiretap Noise Impersonation Falsification of Message Availability Connection flooding, e.g., smurf DNS Attack Traffic Redirection DDoS Network Security / G. Steffen