Network Security Bangla Book
Network Security Bangla Book
Unit: One
Basic Concept of Network Security and
Troubleshooting
NETWORK SECURITY:
ই ।
-
। Network এ Computer এ Resource
, Network Security । আ Network
Security
data / / । Network security
আ এ এ Security System- , Un-wanted User
এ Login , Computer resource Secure
এ Source to Destination এ Data আ -
ই ।
এ এ Network Administrator –
challenges Faced ,
।
Account Management:
Network Resource User/User Group ,
User- level এ Permission এ ISP এ
ই Account Management এ আ ।
Configuration Management:
Hardware/Software installation, repair, modification,
expansion or upgrading Vendor -
।
Fault Management:
Fault detect ই Fault management ।
Hardware/software tools Fault
।
Performance Management:
ই Fault এ Backup System এ
Network এ Down time । এই
ই Network ferformance
monitoring এ Network up time
।
Security Management:
Network User- Access level control, Firewall configuration,
Filtering, Antivirus Software installation এ data encryption ই
Security Management এ আ ।
Security
, Step by Stem আ ।
Firewall: Firewall
। Firewall এ Program
আ Packet reject ।
Software-based Personal firewall program
।
DSL Cable MODEM internet
Hardware Firewall এ ।
Message Encryption: data আ - ই
Encryption System , Data
access ।
Wirless network এ - Disable
এ wirless security WEP WPA Enable ।
SSID Broadcast- Shutdown এ ই Access
point ।
এ Adminestator-
Hardware & Software । Network
Problem -
Network Congestion: ,
এ
Network capacity ।
Broadcast Storms( ): ,
।
Power Problem: এ Network service time ,
ই UPS ।
Server Problem: client-server network এ server ।
ই server computer ই high configuration hardware-software
ই service ।
Hardware conflict ( ): ই
IRQ (Interrupt Request Line) number । এ
ই এ ই IRQ number Hardware conflict
।
# ipconfig/all
# Ping
IP Address এ Active আ ,
ই ping command ।
# tracert
router path এই ।
Feni Computer Institute |Shariful islam lincon 5
Network Security & Troubleshooting
# netstst –a
, port virus/Trojan
determine এই tool ।
# nslookup
# hostname
এই tool ।
# finger
Unit: Two
Understand Cryptography
2.1 Introduction to Cryptography
CRYPTOGRAPHY:
Cryptography । Plain Text
data/message Un-readable
Key এ Encryption এ
Encrypted data Readable plain text এ convert
Decryption । আ plain text– Encryption
& decryption overall process cryptography ।
CRYPTOGRAPHY PRINCIPLE ( ):
‚All algorithm must be public, only the key’s are Secret‛
cryptography Encryption & decryption process ই
Key Cryptography ।
SUBSTITUTING CIPHERS:
Plain Text Encryption Text Cipher
Text । A substitution cipher replaces one symbol with another
Substitution cipher Plain text এ Symbol
Symbol/Group of symbol Replace Encrypt
।
Example:
TRANSPOSITION CIPHERS:
Transposition cipher plain text এ Symbol
Column এ Row by row এ এ
Column Secret key এ এ ,
Column symbol Cipher text এ Convert
।
2.4
Message
Break into
blocks
M1 M2 M3 M4 M5 M6 M7
Encrypt
E E E E E E E with secret
key
C1 C2 C3 C4 C5 C6 C7
Fig.2.4(a): ECB Encryption
P0 P1 P2 P3 C0 C1 C2 C3
Key D D D D
IV
Decreption
Encryption
IV
Key E E E E
P0 P1 P2 P3
C0 C1 C2 C3
COUNTER MODE:
Unit: Three
Key Management Concept
3.1 Basic Concept of key management
KEY MANAGEMENT:
Cryptosystem এ cryptographic key Key generation,
exchange, storage, use and replacement ই Key
management । Key management system এ Cryptographic protocol
designe, key server, user procedures এ Protocol
।
Symmetric-Key Encryption
Asymmetric Public-key Encyption
SYMMETRIC-KEY ENCRYPTION:
ASYMMETRIC-KEY ENCRYPTION:
Public & Private ’ key Assymetric-key
encryption । এ Public & Private ই Key,
mathematicaly co-related এ message- Encrypted এ
Decrept । এ Puiblic-key & private-key Encryption
Public-key Encryption ।
Alice Bob
Transmitted
PlainText ciphertext PlainText
Input Output
(b)Encryption
Alice Bob
Transmitted
PlainText ciphertext PlainText
Input Output
(c)Authentication
Bob
BB
B – Bob’s identity
Bob’s Alice’s
P
Alice’s
Private
Bob’s
Private Public
P
Public Key,
Key, DA EB Key DB Key, EA
i. CONFIDENTIALITY:
এ Unauthorized user’s এ data/information ।
ii. INTEGRITY:
Sender data , receiver ঐ data receive
integrity ।
iii. AUTHENTICATION:
sender receiver এ data আ - ।
iv. NON-REPUDIATION AND AUTHENTICATION:
It deals with digital signature client/receiver
receive signature এ sender এ
deal signature এ এ ।
Unit: Four
Communication & Application Layer Security
4.1 Fundamental of Communication and Application layer security
Dos Attack:
এ ই
এ Range আ । এ ই এই Range ,
,
। এ
।
এই এ । DoS/DDoS এ
এ আ এ /এ
service request , Overloded Traffic । ই
এই আ , Real IP Address Hide
Proxy server IP
Address service request ।
Stealth attack:
E-mail security:
Threats:
ই Threats । Threats । -
Denial of service:
Attacks make computer resources (e.g., bandwidth, disk space,
or CPU time) unavailable to its intended users.
Unauthorised access:
Access without permission issues by a rightful owner of devices
or networks.
Impersonation
Worms:
Viruses
:
ই এ user এ ই
ই
আ ।
Unit: Five
Authentication Protocol Concepts
5.1 Authentication Based on Share Secret Key.
1 A
2 RB
4 RA
5
KAB (RA)
এ ,
Here,
Let,
n = 47
g=3
Alice Picks x = 8
Bob Picks y = 10
So that,
= 17 mod 47 = 4
Feni Computer Institute |Shariful islam lincon 27
Network Security & Troubleshooting
=4
KA Encrypted with Alice-KDC secret key Session key between Alice and Bob
Public_Key infrastructure
(PKI) derectory
EB (A, RA)
Alice 6 Bob
EA (RA, RB, KS)
7
KS (RB)
Unit: Six
Understand the Concept of Filtering
6. undamentals of iltering and it’s components.
(Filtering): এ Filtering এ এ
Security System, data packet, service ই
Pass or reject ।
PACKET FILTERING:
Header information
Pass or reject Packet Filtering ।
Packet Filtering
Router Configuration । -
protocol type
IP address
TCP/UDP port
Fragment number
Protocol Filtering:
Protocol Filtering এ IP Protocol - UDP, TCP,
ICMG IGMP ই filtering table Pass or reject
।
IP Address Filtering:
IP Address Block IP Address
Filtering । আ source IP Address
Source Router IP Address IP Address Filtering এ
data packet- Pass/reject ।
Port Filtering:
Port number Appplication service এ Virtual address। -
http Service এ port 80, এ IP Address এ
‚ 92. 68.2. :80‛ এই ।
23 Telnet
Encrypted Authentication:
System এ bug/ এ
আ ।
Unit: Seven
Understand the Sockets and Services
7.1 Understand the Sockets & Services.
(SOCKET):
inter-process communication এ endpoint
(Socket) । Computer communication
internet protocol , Network socket internet
Socket ।
IP , Port ঐ
Application এ ।
:- , ই
TCP/IP এ 20-21 । File
Transfer Protocol এ 20-21 Port number ।
SERVICES:
। - File transfer, E-mail, Voice & video Call,
chat, Data backup, Web hosting আ । এই
port
protocol oriented।
Socket Service ;
1. Datagram Sockets:
Datagram Socket Connectionless socket , User
Datagram Protocol (UDP) ।
2. Stream Sockets:
এ এ Connection-Oriented Socket Transmission Control
Protocol (TCP) Stream Control Transmission Protocol
(SCTP) ।
3. Raw Sockets:
এ Raw IP Socket । এ Routers এ
Network Equipment এ । Raw socket OSI-Layer
এ Transmission layer এ bypassed এ Application এ
Packet Header Accessible ।
আ এ Non-Internet Sockets
Transport Protocol - Systems Network Architecture (SNA), Unix
Domain Sockets (UDS) internal inter-process communication এ
implement ।
DAYTIME PROTOCOL:
Daytime Service- Internet Protocol Suite এ এ Protocol
1983 RFC 867 । এ RFC 867
ARPA Internet community এ standard।
*** স্াভভ ার বা লনটওয়ার্কভ ক্লক টাইম Provide করার জনয Daytime Protocol বযবহার
করা ।***
Daytime Syntax:
Daytime Service এ ;
Complexity – Simple
Abuse potential – Minimal
Information sensivity – None
Dialog - Minimal
Programmability and configurability – None
Address
Domain name system । DNS এ
’ -
Host Name
Domain Name
Ex- bdnews24.com
DNS এ ;
Complexity – Complex
Abuse potential – High
Echo Protocol:
Echo Internet Protocol Suite এ এ Protocol RFC 867
। এ RFC 862 ARPA Internet community
এ standard। এ IP Network এ testing and
measurement tools ।
Echo এ ;
Complexity – Simple
Abuse potential – Minimal
Information sensivity – None
Dialog - Minimal
Programmability and configurability – None
FTP:
File transfer protocol (FTP) এ এ Service
ই FTP Server এ
User name এ Password Login , এ
File/folder/software/data download Upload । FTP
linux to linux linux to
unix, windows, MAC ই ।
FTP এ ;
Complexity – Complex
Abuse potential – High
Information sensivity – Medium
Dialog - High
Programmability and configurability – High
GOPHER:
এ এ এ Tool, menu interface এ user-
data group data
। Text Gopher
।
Gopher এ ;
Complexity – Simple
Abuse potential – Minimal
Information sensivity – Low
Dialog - Minimal
Programmability and configurability – Low
HTTP:
WWW-World wide web এ http-Hyper Text
Protocol , port number 80।
http এ ;
Complexity – Complex
Abuse potential – High
Information sensivity – Medium
Dialog - High
Programmability and configurability – High
NFS:
NFS-Network File System Unix Linux Environment এ
Network User – diretyory file access
। এ NFS distribution file system schema
।
NFS এ ;
Complexity – Complex
Abuse potential – High
Information sensivity – High
Dialog - High
Programmability and configurability – Medium.
POP 3:
POP 3 – Post Office Protocol version-3 mail clien
software & Mail server এ interface client এ mail download
। POP-3 service access No.110 port ।
POP এ ;
Complexity – Simple
Abuse potential – Medium
Information sensivity – Medium
Dialog - Minimal
Programmability and configurability – Low
SMTP:
SMTP – Simple Mail Transfer Protocol Mail Server এ mail
। SMTP service access No.25 port
।
SMTP এ ;
Complexity – Copmlex
Abuse potential – Medium
Information sensivity – Medium
Dialog - Minimal
Programmability and configurability – High
SNMP:
SNMP-Simple Network Management Protocol এ network
Troubleshooting tool network status এ
report, Admin । এ UDP port 161
।
SNMP এ ;
Complexity – Medium
Abuse potential – High
Information sensivity – High
Dialog - Minimal
Programmability and configurability – Medium
TELNET:
LAN/MAN/WAN Remote login
Access Telnet protocol । এ
port number 23।
Telnet এ ;
Complexity – Simple
Abuse potential – High
Information sensivity – High
Dialog - Minimal
Programmability and configurability – None
Unit: Eight
Virtual Private Networks Concept
8.1 Introduction to VPN
VPN এ :
, Facebook , এ আ
FaceBook ই আ VPN ।
Facebook আ এ আ VPN Server
Access , ঐ VPN Server এ login এ
Virtually Facebook ।
, Facebook ,
১ 1-2-3 Facebook
আ VPN Server , 1-4-2-3
। Facebook Data VPN Server
আ data packet এ VPN Server ১ আ
। এ Gateway server , এ
Facebook এ data packet।
VPN – ’ । - Remore
access VPN এ Site-to-site VPN।
Puplic network/
Internet
Site-to-Site VPN:
VPN এ আ । -
Unit: Nine
Understand the concept of Firewall
9.1 Define & classify Firewall.
FIREWALL:
এ firewall । -
NT as a Firewall:
Packet filtering
Encrypted tunneling
Encrypted authentication
Enterprise Firewall:
এ এ Firewall এ Firewall
এ single, centralized firewall policy
firewalls ঐ firewall Enterprise
Firewall ।
Unit: Ten
Understand the basic concept of
Hacking
10.1 Define Hacking
HACKING:
Computer networking System এ Hacker এ এ
/ এ
Computer/Network system এ
এই ।
Hacking Hacker এ ,
।
TYPES OF HACKER:
Hacking এ Hacker ই ।
Hacking এ -
আ
Hacking - ।
: এ Computer ই
। এ । এ ই
।
: ই
। এ ।
ই এ ই ।
: এ এ এ
। এ ই
আ ।
Feni Computer Institute |Shariful islam lincon 58
Network Security & Troubleshooting
: এ । এ
এ Hide । এ
এ । Programming এ এ
।
: এ Tools Script । Tools
Script এ Hacking ।
: এ এ Beginner.
এ Access
। -
1. ।
2. Internet Network এ ।
3. RAS- Remote Access Service Remote Control
Server এ ।
Hacking attacks এ :
Target Selection: এ
Attack ।
Target Identification: এই target
information এ information
bug ।
====================================================
Password Hacking:
Password website এ computer এ main security system।
Computer etwork hacker’s এ
। Password (cracking)
-
sign in Link এ
।
:
আ । এ ই , , ।
MAC Linux OS আ
।
# ই : ই এ user এ
ই
ই আ ।
# : এ ই Execute আ
। এ ই , ই , ই ।
# : এ ই ই আ
আ আ ।
Web Hacking:
#Cross site scripting (XSS): XSS ই ,
website এ । XSS এ web
application এ । Script
language XSS ।
, ই এই ই hacking
।
এ ।
আ । Network
hacking, warless hacking, Windows hacking আ
আ ই ।
ATTACKS:
import java.io.*;
String Name;
Name = BR.readLine();
int L = Name.length();
char A[]=Name.toCharArray();
switch (A[i])
case 'a':
A[i] = 'S';
break;
case 'b':
A[i] = 'T';
break;
case 'c':
A[i] = 'U';
break;
case 'd':
A[i] = 'V';
break;
case 'e':
A[i] = 'W';
break;
case 'f':
A[i] = 'X';
break;
case 'g':
A[i] = 'Y';
break;
case 'h':
A[i] = 'Z';
break;
case 'i':
A[i] = 'A';
break;
case 'j':
A[i] = 'B';
break;
case 'k':
A[i] = 'C';
break;
case 'l':
A[i] = 'D';
break;
case 'm':
A[i] = 'E';
break;
case 'n':
A[i] = 'F';
break;
case 'o':
A[i] = 'G';
break;
case 'p':
A[i] = 'H';
break;
case 'q':
A[i] = 'I';
break;
case 'r':
A[i] = 'J';
break;
case 's':
A[i] = 'K';
break;
case 't':
A[i] = 'L';
break;
case 'u':
A[i] = 'M';
break;
case 'v':
A[i] = 'N';
break;
case 'w':
A[i] = 'O';
break;
case 'x':
A[i] = 'P';
break;
case 'y':
A[i] = 'Q';
break;
case 'z':
A[i] = 'R';
break;
Output: