The Tech Behind Cyber Security October 31 | Part 1: From Packets to IP and the “Ping of Death”: An Introduction to Cyber November ? |Part 2: Case Study:

Slides:



Advertisements
Similar presentations
INTRODUCTION TO COMPUTER NETWORKS Zeeshan Abbas. Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
Advertisements

Introduction to Networking Andrew Hamilton TJ IT Technician.
Chapter 3 Internet. Physical Components of the Internet Servers Networks Routers.
INTRODUCTION TO COMPUTER NETWORKS CS-107 INTRODUCTION TO COMPUTING Aug-Dec,2010 Alak Roy Assistant Professor Dept. of CSE Royal Group of Institution .
Security (Continued) V.T. Raja, Ph.D., Oregon State University.
Computer Networks An Overview. A Computer Network!
IS 247 Introduction to Web Application Development Tim Wu.
The Internet Useful Definitions and Concepts About the Internet.
Networking Theory (part 2). Internet Architecture The Internet is a worldwide collection of smaller networks that share a common suite of communication.
Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
Prepared By E.Musa Alyaman1 Networking Theory Chapter 1.
Web and Internet Part I ST: Introduction to Web Interface Design Prof. Angela Guercio Spring 2007.
Inside of a computer… What happens when you turn your computer on? What loads? Where are applications stored? How are do they run? In what form is information.
Chapter Overview TCP/IP Protocols IP Addressing.
CS 356 Systems Security Spring Dr. Indrajit Ray
Wireshark and TCP/IP Basics ACM SIG-Security Lance Pendergrass.
Networks. ProtocolMeaningApplication DNSDomain Name System (Server)Translates domain names such as ocr.org.uk into IP Addresses TLS/SSLTransport Layer.
Chapter Eleven An Introduction to TCP/IP. Objectives To compare TCP/IP’s layered structure to OSI To review the structure of an IP address To look at.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e
CS134 Web Design & Development Introduction to the Internet Mehmud Abliz.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Networking & the Internet. 2 What is a Network? □ A computer network allows computers to communicate with many other computers and to share resources.
Web Technology. History of the Internet Internet was developed by ARPANet in ARPANet (American Research Project Agency Network)
Chapter 1: Introduction to Web Applications. This chapter gives an overview of the Internet, and where the World Wide Web fits in. It then outlines the.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
Examining TCP/IP.
Chapter 12 Computer Networks. Basic Concepts in Computer Networking – Communication Links – Figure 12.1a –Two Forms of Information Representation (a)
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Networks QUME 185 Introduction to Computer Applications.
Okay, here’s a scenario… You’re sitting at a computer…. Type in www. yourcompany.com As soon as you click on search your browser will ask your Operation.
Computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources Usually, the connections.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications ◦The client requested data.
Networking & the Internet. 2 What is a Network? □ A computer network allows computers to communicate with many other computers and to share resources.
The Inter-network is a big network of networks.. The five-layer networking model for the internet.
Network – internet – part2  Address at diff. layers  Headers at diff. layers  Equipment at diff. layers.
Information Flow Across the Internet. What is the Internet? A large group of computers that link together to form the Worldwide Area Network (WAN)
Chapter 1 Communication Networks and Services Network Architecture and Services.
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Network Programming All networked computers have an IP Address – Unique – In the form of xxx.xxx.xxx.xxx ( ) – 32 bits = ~4 billion possibilities.
Protocols COM211 Communications and Networks CDA College Olga Pelekanou
ISDS 4120 Project 1 DWAYNE CARRAL JR 3/27/15. There are seven layers which make up the OSI (Open Systems Interconnection Model) which is the model for.
Transmission Control Protocol (TCP) Internet Protocol (IP)
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
CPMT 1449 Computer Networking Technology – Lesson 3
Application of the Internet 1998/12/09 KEIO University, JAPAN Mikiyo
COMPUTER NETWORKS Hwajung Lee. Image Source:
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Network Overview. Protocol Protocol (network protocols) - a special set of rules that define communication between two or more devices on a network.
Computer Networking 网络课件 双语教学 模拟实验 计算机网络教研室 Department of Computer Networking Application CHAPTER 14 INTERNETWORKING 1 The first section 2 Exercises.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Internet and World Wide Web Introduction to the Internet.
Data communication and Networks
Computer Networks.
NETWORK Unit 1 Module: 2 Objective: 7.
Chapter 1 Communication Networks and Services
Network Wiring and Reference
Data Networking Fundamentals
Web Development & Design Chapter 1, Sections 4, 5 & 6
Lecture 1 Overview of Communication Networks and Services
Networking Theory (part 2)
NETWORK Unit 1 Module: 2 Objective: 7.
NETWORK Unit 1 Module: 2 Objective: 7.
Networking Theory (part 2)
Objectives: 1.Identify different internet protocol (IP) 2.Configure sample of IP address 3.Appreciate and relate protocol in our life.
Presentation transcript:

The Tech Behind Cyber Security October 31 | Part 1: From Packets to IP and the “Ping of Death”: An Introduction to Cyber November ? |Part 2: Case Study: Distributed Denial, the Tech of Cyber Attack in the Russo- Georgian War of 2008

0 1

bits and bytes bit: ( b inary dig it ) bit The basic unit of information in computing, the amount of information stored by a digital device in one of two possible distinct states, not 1 and 2, off/on digital value of 1 = positive voltage, up to 5 volts digital value of 0 = 0 volts 8 bits = 1 byte, usually, but depends on hardware byte : the number of bits needed to encode a single character of text in a computer

binary to letter

= p = i = z = a

data and packets data : binary files, … etc. packet : a unit of data from binary to text or image packet: control information and payload control information: data the network needs to deliver the payload, ex. address, error control payload: the content of your “digital letter”

hosts on networks who has the data? who doesn’t … hosts going global and mobile networks: start local, LANs, wireless LANs, AirBears client-server model addresses, what’s your unique network address? Type: ipconfig, find IPv4 numerical address ping ping ist.berkeley.eduist.berkeley.edu ping ping ping, an echo request from host to host

ping, an echo request

ping, the payload

OSI model

Network Ports 21: File Transfer Protocol (FTP)File Transfer Protocol 22: Secure Shell (SSH)Secure Shell 23: Telnet remote login serviceTelnet 25: Simple Mail Transfer Protocol (SMTP)Simple Mail Transfer Protocol 53: Domain Name System (DNS) serviceDomain Name System 80: Hypertext Transfer Protocol (HTTP) used in the World Wide WebHypertext Transfer ProtocolWorld Wide Web 110: Post Office Protocol (POP)Post Office Protocol 119: Network News Transfer Protocol (NNTP)Network News Transfer Protocol 143: Internet Message Access Protocol (IMAP)Internet Message Access Protocol 161: Simple Network Management Protocol (SNMP)Simple Network Management Protocol 443: HTTP Secure (HTTPS)HTTP Secure

OSI model

internet and the web internet : network of networks, millions of networks web : system of interlinked hypertext documents ports: http 80 Try it: Try it:

ping, nslookup traceroute how does the traffic flow? network devices: hubs, routers, switches using nslookup, names and numbers nslookup nslookup using traceroute tracert tracert tracert

attack! Professor Nacht has left instructions for you to build and launch a cyber attack on the nation state of Vulgaria. You have everything you need to build it. How would you do it?

attack! Step 0 : Recall that an echo request is an ICMP (ping) message whose data is expected to be received back in an echo reply. The host must respond to all echo requests with an echo reply containing the exact data received in the request message Step 1 : Create a list of Vulgarian military and civil servers that should be targeted Step 2 : Write a simple script (program) that repeats your ping request many times a second Step 3 : Plant this script on computers across the globe Step 4 : “Flood” the Vulgarian servers with ping requests from multiple hosts…to which it cannot keep up…the result...

attack! server failure 

attack! You have just conceptualized the opening cyber salvo used in the Russo-Georgia War of July 19, 2008: The First Salvo of Cyber Attack o flood http o flood tcp o flood icmp

next time: Part 2: The Cyber of the Russo-Georgian War of 2008 Case Study: Distributed Denial: the Tech of Cyber Attack in the Russo-Georgian Conflict of August 2008

voltage Ethernet cable: 2.0 volts Composite video: 2.5 volts Wall socket in US, Canada: 120 volts, sometimes 240