Download presentation
Presentation is loading. Please wait.
Published byJane Blake Modified over 8 years ago
1
Forms of Network Attacks Gabriel Owens COSC 352 February 24, 2011
2
Roadmap Definition Different Forms of Attacks Prevention Conclusion Questions??
3
Definition What is a network attack? Passive Active
4
Different Types of Attack Eavesdropping Data Modification Identity Spoofing (IP Address Spoofing) Password Based Attacks Denial of Service Attack Man-In-The-Middle-Attack Compromised-Key Attack Sniffer Attack Application-Layer Attack
5
Eavesdropping Majority of network communications occur in an unsecured or “cleartext” format. Allows attacker to “listen in” or read the network traffic. Known as Sniffing or Snooping Biggest security issue faced by network administrators in an enterprise.
6
Eavesdropping (cont.) Prevention In order to prevent the eavesdropping of data traversed on your network, you must have strong encryption services based on cryptography.
7
Identity Spoofing Computers are identified in an operating system or network by a valid IP Address. Possible for IP Address to be falsely assumed (identity spoofing). Special Programs to construct IP packets that appear to originate from valid addresses inside the corporate intranet. After gaining access with a valid IP, attacker can modify, delete or reroute your data, As well as perform a number of other attacks.
8
Data Modification Step One – Read Data Step Two – Alter Data Modify data in the packet without the knowledge of the sender or receiver. Example: Purchase Requisitions, exchange of items, amounts and billing information
9
Password Based Attacks Access Rights to a computer or network resources are determined by who you are (username and password) If an attacker gains access to a valid user account he is able to do whatever that user can do Obtain lists of valid user and computer names and network information. Modify server and network configurations, including access controls and routing tables. Modify, reroute, or delete your data.
10
Denial of Service Attack Prevents normal use of computer or network by valid users (Unlike Password Based Attack) After gaining access to the network Randomize the attention of your internal Information Systems staff so that they do not see the intrusion immediately, which allows the attacker to make more attacks during the diversion. Send invalid data to applications or network services, which causes abnormal termination or behavior of the applications or services. Flood a computer or the entire network with traffic until a shutdown occurs because of the overload. Block traffic, which results in a loss of access to network resources by authorized users.
11
Man-In-The-Middle Attack Attacker is monitoring, capturing and controlling data sent between you and the person whom you are communicating with transparently At low levels of communication on the network layer, computers might not be able to determine with whom they are exchanging data. Attacker assumes your identity and attempts to gather as much information as possible, while the person you’re communicating with thinks it is you.
12
Compromised-Key Attack Definition: Key – A secret code or number that is needed to interpret secured information. Obtaining a Key: Difficult and Resource- Intensive, but possible. Attacker can use key to gain access on a secured communication without the knowledge of either party. Can also use key to attempt computation of additional keys, which would lead to access to other secure communications.
13
Sniffer Attack Definition: Sniffer – An application or device that can read, monitor, and capture network data exchanges and read network packets. If packets aren’t encrypted, the Sniffer provides a full view of the data inside the packets. Using a Sniffer, an attacker is capable of: Analyzing your network and gain information to eventually cause your network to crash or to become corrupted. Read your communications.
14
Application-Layer Attack Targets application servers by deliberately causing a fault in the server’s operating system or applications. Results in the attacker gaining the ability to bypass normal access controls. Capable of the same damages as a man-in-the-middle attack
15
Application-Layer (cont.) Once the attacker has gained access, he can do any of the following: Read, add, delete, or modify your data or operating system. Introduce a virus program that uses your computers and software applications to copy viruses throughout your network. Introduce a Sniffer program to analyze your network and gain information that can eventually be used to crash or to corrupt your systems and network. Abnormally terminate your data applications or operating systems. Disable other security controls to enable future attacks.
16
Prevention Always have some type of security plan in place. Have some sort of encryption service based on cryptography. Make sure all applications are up-to- date in order to have as little vulnerabilities as possible.
17
Video Denial of Service Attack - Example
18
Resources "Common Types of Network Attacks." Microsoft TechNet: Resources for IT Professionals. Web. 24 Feb. 2011.. "Strengthen Application Defenses to Prevent Network Attacks | TechRepublic." TechRepublic - A Resource for IT Professionals. Web. 24 Feb. 2011.. "Network Security Types of Attack Passive Attack Active." Complete Computer Networking Notes Guides Tutorials. Web. 24 Feb. 2011..
19
Questions Questions??
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.