CNS Unit-1
CNS Unit-1
CNS Unit-1
Security attack:
Security attack means any action that compromises the security of information owned by an
organization.
Different security attacks: Security attacks are two types Passive attacks and Active attacks.
Passive attacks
Passive attacks are two types - 1.Release of Message contents and 2. Traffic analysis
Passive attacks are in the nature of eavesdropping on, or monitoring of, transmissions.
The goal of the opponent is to obtain information that is being transmitted.
There are two types of passive attacks
1. Release of message contents
2. Traffic analysis
Release of message contents:
A telephone conversation, an electronic mail message, and a transferred file may contain
sensitive or confidential information. One should prevent an opponent from learning the contents
of these transmissions.
Traffic Analysis:
Suppose that we had a way of masking the contents of messages or other information
traffic so that opponents, even if they captured the message, could not extract the information
from the message. The common technique for masking contents is encryption. If we had
encryption protection in place, an opponent might still be able to observe the pattern of these
messages.
The opponent could determine the location and identity of communicating hosts and could
observe the frequency and length of messages being exchanged. This information might be
useful in guessing the nature of the communication that was taking place.
Passive attacks are very difficult to detect, because they do not involve any alteration of
the data. However, it is feasible to prevent the success of these attacks, usually by means of
encryption. Thus, the emphasis in dealing with passive attacks is on prevention rather than
detection.
Active Attacks:
Active attacks involve some modification of the data stream or the creation of a false stream.
Active attacks are of 4 types - masquerade, replay, modification of messages, and denial of
service.
A masquerade takes place when one entity pretends to be a different entity. For
example, authentication sequences can be captured and replayed after a valid authentication
sequence has taken place, thus enabling an authorized entity with few privileges to obtain extra
privileges by impersonating an entity that has those privileges.
Replay involves the passive capture of a data unit and its subsequent retransmission to produce
an unauthorized effect.
Modification:
•
An unauthorized party not only accessing the information and also modifies (tampers) the
information and sends to destination is called modification.
Example:
A customer sends a message to a bank to do some transaction. The attacker intercepts the
message and changes the transaction to benefit her.
Attack: An assault on system security that derives from an intelligent threat; that is, an intelligent
act that is a deliberate attempt (especially in the sense of a method or technique) to evade
security services and violate the security policy of a system.
• Integrity uses the encipherment, digital signature, data integrity security mechanisms
Non-repudiation:
• Non-repudiation service is protection against denial by one of the parties(sender,
receiver) in a communication
• In this case the sender and receiver can keep proofs to avoid repudiation.
Security mechanism:
A process (or a device incorporating such a process) that is designed to detect, prevent, or
recover from a security attack.Security is divided into those that are implemented in a specific
protocol layer, such as TCP or an application-layer protocol, and those that are not specific to
any particular protocol layer or security service.
ITU-T (X.800) defined several security mechanisms are:
Encipherment
Digital signature
Data integrity
Authentication exchange
Traffic padding
Routing control
Notarization
Access Control
Encipherment: Encipherment is a security mechanism (or cryptography algorithms) to
transform intelligible data into an unintelligible form. The transformation and subsequent
recovery of the data depends on an algorithm and zero or more encryption keys.
Digital signature: A digital signature is a means by which the sender can electronically sign the
data and the receiver can electronically verify the signature.
Data integrity: The data integrity mechanism appends to the data a short check value that has
been created by a sender specific process from the data itself. The receiver receives the data and
the check value. He creates a new check value from the received data and compares the newly
created check value with the received one. If the two are the same, the integrity of data has been
preserved.
Authentication exchange: Check values In Authentication exchange, the two entities some
message to prove their identity to each other. The authentication can be one-way authentication
or two-way authentication.
Traffic padding: Traffic padding means inserting some bogus data into the original data to
prevent the traffic analysis attempts
Routing control: Routing control means selection and continuously changing different available
routes between the sender and receiver prevent the opponent from eavesdropping (secretly listen)
on the particular root
Notarization: Notarization means selecting third trusted party to control the communication
between two entities. This can be done, for example, to prevent repudiation. The receiver can
involve a trusted party to store the sender request in order to prevent the sender from later
denying that she has made such request.
Access control: Access control uses methods to prove that a user has access right to the data or
resource owned by a system.
2. What is meant by security service? Explain various security services listed in X.800. [8M]
[Set-3, Mar-2015] [Set-2, Dec-2014]
3. Discuss different types of authentications.