Download presentation
Presentation is loading. Please wait.
Published byOphelia Palmer Modified over 8 years ago
1
Methods for Detecting & Handling unsolicited Data Transfers By: Brandon Wright
2
Overview Background Fundamental network types Purpose of OSI model Common TCP Protocols used in data transfers Types of data transfer software and uses Types of unsolicited transfers Prevention methods for unwanted transfers Conclusion
3
Background Before networks, sneakernet was main method for data transfer First remote data sharing done using Xmodem (1977) Early 1980s, ISO began development on standardizing specifications for massive computer communication File Transfer Protocol (FTP) standardized (1985)
4
Fundamental Network Types Peer-to-Peer: Every computer communicates directly with other computers on network Simple configuration/cheap Not flexible, or very secure Client/server: Sever acts as central computer facilitating communication to client computers. Much more expensive but scalable Provides much more surveillance/security
5
Purpose of OSI Model Seven Layers enable you to send and receive data Efficiency increased proportionally to security decreasing
6
Common TCP Protocols used in Data Transfers TCP/IP contains several security flaws TCP is a connection oriented protocol; SYN-ACK File Transfer Protocol (FTP) port 20 & 21 Hypertext Transfer Protocol (HTTP) port 80 Simple Mail transfer Protocol (SMTP) port 25
7
Examples of Data Transfer Software Napster KaZaA BitTorrent protocal
8
Napster Shawn Fanning Released June 1999 Legal Issues Shutdown then reopened
9
KaZaA Introduced in 2001 Used FastTrack protocol Known for bundling malware
10
BitTorrent Protocol Most common P2P file sharing protocol Bram Cohen released in April 2001 Approx. 27-55% of all internet traffic (Feb 2009) Seeds & Peers
11
Unsolicited File Transfer Examples Accidental copyright infringement Pop-ups Malware Denial-of-Service attacks Packet-sniffers Koobface, the MySpace and Facebook Worms
12
Prevention Methods IP-blocker/blocklist Packet-filtering firewall Statefull/stateless firewall Content-filters Intrusion detection & prevention systems Trap and Trace Systems
13
IP-Blocker Examples: PeerGuardian, PeerProtector, MoBlock Use customizable IP block lists Compiled lists as Iblocklist.com Can block ports Is as safe as you make it
14
Packet-Filtering Firewall Hardware or software Operates at data link & transport layers Examines packet headers Block logical ports
15
Stateful/Stateless Firewall Differences Cost Performance Security
16
Content-Filters Also called “reverse firewalls” Blocks designated traffic Parental controls
17
Golden Shield Project China protesters lead to Internet censorship 30,000 Internet police Great Firewall of China DNS cache poisoning
18
Golden Shield Project http://www.youtube.com/watch?v=iyXtT5oWwIY&feature=relatedhttp://www.youtube.com/watch?v=iyXtT5oWwIY&feature=relate
19
Intrusion Detection & Prevention Systems Alert Evasion False negative/False positive Confidence value
20
Trap and Trace Systems Detect and Trace Use of honey pots with an alarm Back Hacking
21
Conclusion Ethical boundaries in file transfers Censorship Child abuse Copyright infringement
22
References Dean, Tamara. Network+ Guide to Networks. 5th. Boston, MA: Course Technology Ptr, 2009. Print. Whitman, Michael, and Herbert Mattord. Principles of Information Security. #rd. Boston, MA: Course Technology Ptr, 2009. Print.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.