Network Security Attacks and Countermeasures On Layer 2 and Layer 3 Network Devices
Network Security Attacks and Countermeasures On Layer 2 and Layer 3 Network Devices
https://doi.org/10.22214/ijraset.2021.33462
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.429
Volume 9 Issue III Mar 2021- Available at www.ijraset.com
Abstract: In today's world, network security is becoming increasingly necessary, as a result of which various techniques are
being used to hack it. To deter consumer data from being misused, network engineers must keep up with recent developments in
both hardware and software sectors. People's focus is gradually drawn to network security. This paper briefly addresses the
concept of network protection, as well as the need for it, as well as the various methods of attack and Defence against it.
Keywords: Network Security, DOS Attacks, MITM, Spoofing, Encryption, Port Security, AAA, TACACS+.
I. INTRODUCTION
For growing businesses, having quick access to knowledge on the Internet has become increasingly necessary. When corporations
continue to outsource different business operations to the public internet, care must be taken to ensure that their network is not
tampered with or falling into the wrong hands. If a hacker or irritated employee has access to a network, it may cause havoc with the
organization's confidential records, reduce competitiveness, and hinder the company's ability to compete with other companies.
Unauthorized network access will also harm a company's reputation with clients and business associates, who can doubt the
company's ability to protect their sensitive data.
Furthermore, any aspect of a network may be targeted by hackers or have unauthorized access. Both routers, switches, and hosts
may be hacked by company rivals or even internal workers. In order to identify the best ways to defend a company's assets from
attackers, the company's Information Technology Manager must first consider the types of attacks that can be launched and the
damage they can wreak on business infrastructures. Growing and strengthening computer and network security is now becoming
increasingly necessary and relevant.
Because of the increased use of computer networks, many networks have been exposed to different types of internet attacks, and as
a result of this exposure, increased network protection is critical and essential in any organization.To protect the integrity, availabilit
y, accountability, and authenticity of computer hardware or network infrastructure, protection can include identification, authenticati
on, and authorization, as well as surveillance cameras.
There is no set process for creating a stable network. Network security must be adapted to the needs of a particular organization's
network, not those of others.
For example, a small construction company may allow designated users on the outside of the network access to case information
while still ensuring that workers on the inside of the network have complete internet access at all times, in case they need to access a
case file from the workplace or on the road.
Applicability When searching for a network provider for an organization, particularly one as big as a construction company, care
must be made to ensure that the network is secured in a way that is compatible with its intent. Fig 1.1 shows the topology of the
network. Today's network model necessitates protection against attackers and hackers. Two forms of authentication are used in
network security.
B. Packet Sniffers
A packet sniffer (Wireshark, Ettercap), as its name suggests, is a useful tool for network administrators to use to track or analyze
and detect some sort of problems.
It is also a good tool for attackers to capture packets transmitted through networks.
C. Access Attack
Attackers may be outsider hackers or internal users who obtain unauthorized access to a network in order to extract vital and
confidential data from the networks. They could even kill infrastructure in order to conceal any knowledge that could lead to them.
Different types of attacks have different causes. Intruders use network or server access attacks for the following reasons: retrieving
data, gaining entry, and escalating their access rights. The following are examples of access attacks:
D. Password Attacks
L0phtCrack and pwdump8 could take password hashes, but not clear-text passwords.
A brute-force password assault can be used to gain access to Accounts that can be used to change sensitive network resources and
files. If an attacker modifies the network's routing tables, this is a common example of an attack that violates network integrity. As a
result, the attacker guarantees that all network packets are diverted to him before being sent to their intended destination [9].
An attacker can control all network traffic in such situations. L0phtCrack has two techniques for calculating passwords:
1) Dictionary cracking: All of the password hashes in a dictionary file are matched and computed to all of the users' password
hashes. This is a lightning-fast tool for locating very basic passwords.
2) Brute-force computation: This technique uses a specific character set, such as A to Z plus 0 to 9, to calculate the hash for any
possible password made up of those characters. If the passwords are made up of the character set that someone has chosen to
try, brute-force compilation normally computes them. The time taken to complete this method of attack is a challenge for the
attacker.
The Following Development Tools has been used in the development of this work.
Core 5 Duo or higher
Computer
RAM 8 GB
Platform Windows 10
Keyboard, mouse
Other hardware
4) GNS3 is a modern software design language environment. It has sophisticated data structures, covers built-in editing and
debugging tackles, and supports all Network Devices. By drag in drop the device in work space, we can Configure the device
by double-clicking on the Device shortcut, by default open with command line tool putty.
Fig.7. shows the switch is protected from DHCP starvation attacks thanks to port security features. On ports attached to end stations,
the switches are designed to restrict the number of MAC addresses that can be learned. With the traditional MAC address table, a
small table of ‘secure' MAC addresses is also stored. The MAC address table is also a subset of this table. Cisco switches come with
a built-in port protection system [3].
Fig.10. shows Mitigation of Man-in-the-Middle Threats. DAI stands for Dynamic ARP Inspection which is used to prevent MITM
attacks on Cisco switches. Interface e0/0 is attached to the DHCP Server and contains the Mac Address Table of all hosts with
dynamically allocated IP addresses.
Switch tests the actual host IP address and MAC address using the Table, and if the bot address is right, the packet is allowed.
}
cmd = exit {
permit .*
}
cmd = logout {
permit .*
}
cmd = ssh {
permit 192\.168\.1\.[0-9]+
deny .*
}}
In the first section of the code above we place the user “bjones” in the netadmins group, to grant privilege level 15 on all devices on
the network. “bjones” also exists in the local Unix /etc/passwd file, and it’s the same case for all users whom company wish to grant
access through TACACS+. The next section of code is unprivileged user “sjones”, in which level privilege granted. The group
members on the TACACS+ server has a default deny statement, by so doing, no commands are allowed default. Users are allowed
to run nearly every “show” command for debugging purposes, but not given the privilege to see any IP or TACACS+ information.
And also SSH is allowed to machines on 192.168.1.0/24 subnet, with use of a regular expression in the Secure Shell (SSH) section.
Finally, exit is allowed from the router, using any of the three commands that allow logoff. This section could be modified to fit
company needs. Once the configuration file is adjusted to fit company needs, the TACACS+ command can follow:
# /usr/local/sbin/tac_plus -C /etc/tac_plus.cfg -d 248
The “-C” options shows the daemon the location of the configuration file while the “-d 248” is the debugging level, which is set to
248, giving plenty of information in the logs (see the tacplus man page for more details). User account should be created on the
system and added to the tacplus.cfg file. Thus, it is recommended to have minimum of two TACACS+ servers and use of "rsync"
for user accounts synchronization and TACACS+ configuration. IOS Configuration The section below configuration can be added
to all of the IOS (Internetwork Operating System) based network devices (primarily routers and switches). Proper orderliness should
be ascertained when putting the commands; otherwise, someone could be easily locked out of the device. Firstly, setup the
TACACS+ servers:
tacacs-server host 192.168.1.5 tacacs-server host 192.168.1.6
tacacs-server key this should belong random string The device uses the first server on the list if available, and then uses the second,
and so on. The key should be set to the same value as set on the TACACS+ server. The next line of configuration codes creates a
local user; called “admin”, with privilege level of 15, and a good password:
Username Admin privilege 15-password ACDI@123
This is the username/password pair that is needed to be use if the TACACS+ server is unavailable. Local account IS needed in order
to provide remote access via SSH only, and providing this local account will allow telnet access turned off to the device while still
allowing access if the TACACS+ server is unavailable.
The AAA configuration code:
aaa new-model
aaa authentication login default group tacacs+ local enable
aaa authorization exec default group tacacs+ local none
aaa authorization commands 0 default group tacacs+ local none
aaa authorization commands 1 default group tacacs+ local none
aaa authorization commands 15 default group tacacs+ local none
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 0 default start-stop group tacacs+
aaa accounting commands 1 default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacac+
The configuration above directs the device to handle all interactive user logins and what users will be able to do once logged in. The
first line creates a new AAA schema, which allows user to enter all commands that follows.
The second line which is the authentication tells the device that once a user logs in it will confirm the username and password
against the TACACS+ server, then check through a local username and password database, and finally, it defaults to the enable
password. The only period it defaults to the enable password is when local username is not setup. The exec and command
authorization work the same way. [cisco 2020]
REFERENCES
[1] Patel, A., Patel, N. and Patel, R(2015), “Defending against Wormhole Attack in MANET”, IEEE Fifth International Conference on Communication Systems
and Network Technologies, 674–678.
[2] Uday, Kumar., et.al “Analysis of Network Security Issue and Its Attack and Defence” Uday Kumar et al, / (IJCSIT) International Journal of Computer Science
and Information Technologies, Vol. 7 (3), (2016)
[3] S.E. Smaha, Haystack: an intrusion detection system[A]. Aerospace Computer Security Applications Conference[C] (IEEE, 2002), pp. 37–44
[4] J.P. Anderson, Computer security threat monitoring and surveillance[A] (James P Anderson Co Fort [C], Washington, 1980), pp. 26–32
[5] C. Phillips, L.P. Swiler, A graph-based system for network-vulnerability analysis[A] (The Workshop on New Security Paradigms[C]. IEEE, 1998), pp. 71–79
[6] R.W. Ritchey, P. Ammann, Using model checking to analyze network vulnerabilities[A] (Proceedings of IEEE Symposium on Security and Privacy[C]. IEEE,
2000), pp. 156–165
[7] T. Bass, Multisensor data fusion for next generation distributed intrusion detection systems[A] (Proceedings of the Iris National Symposium on Sensor & Data
Fusion[C]. Hopkins University Applied Physics Laboratory, 1999), pp. 24–27
[8] T. Bass, Intrusion systems and multisensor data fusion: creating cyberspace situation awareness. Commun. ACM 43(4), 99–105 (2000). https://doi.org/1
0.1145/332051.332079]
[9] J. Mcdermott, Attack-potential-based survivability modeling for highconsequence systems[A] (IEEE International Workshop on Information Assurance[C].
IEEE Comp. Soc, 2005), pp. 119–130
[10] W. Yuanzhuo, L. Chuang, C. Xueqi, et.al., Analysis for network attack-defense based on stochastic game model[J]. Chin. J. Comput. Phys. 33(33), 1748–1762
(2010)
[11] N. Poolsappasit, R. Dewri, I. Ray, Dynamic security risk management using Bayesian attack graphs[J]. Dependable Secure Comput. 9(1), 61–74 (2012)
[12] J. Theureau, Nuclear reactor control room simulators: human factors research and development[J]. Cogn. Tech. Work 2(2), 97–105 (2000)
[13] M.R. Endsley, Design and evaluation for situation awareness enhancement[J]. Proceed. Hum. Factors Ergon. Soc. Ann. Meet. 32(1), 97– 101 (1988)
[14] M.R. Endsley, Toward a theory of situation awareness in dynamic systems[J]. Hum. Factors 37(1), 32–64 (1995)
[15] Boyd J R. A Discourse on Winning and Losing[C]// Strategic game of 1987. 16. G.P. Tadda, J.S. Salerno, Overview of cyber situation awareness. Cyber
Situational Awareness[M] (Springer US, 2010), pp. 15–35
[16] X.W. Liu, H.Q. Wang, H.W. Lü, J.G. Yu, S.W. Zhang, Fusion-based cognitive awareness-control model for network security situation[J]. J. Soft. 27(8), 2099–
2114 (2016)
[17] U. Franke, J. Brynielsson, Cyber situational awareness a systematic review ofthe literature. Comput. Secur. 46, 18–31 (2014).
https://doi.org/10.1016/j.cose.2014.06.008
[18] J. Gong, X.D. Zang, Q. Su, X.Y. Hu, J. Xu, Survey of network security situation awareness[J]. J. Softw 28(4), 1010–1026 (2017)
[19] D.E. Denning, An intrusion-detection model. IEEE Trans. Softw. Eng 13(2), 222–232 (1987) 21. H. Debar, M. Dacicr, Andreas wespi towards taxonomy of
intrusiondetection systems. Comput. Netw 31(8), 805–822 (1999)
[20] G. Vigna, R.A. Kemmerer, NetSTAT: a network-based intrusion detection system. Journal of Computer Security 7(1), 37–71 (1999)
[21] B. Mukherjee, L.T. Heberlein, Network Intrusion Detection[M]. IEEE Netw., 26– 41 (1994) 26. J. Shi, S.Q. Guo, Y. Lu, L. Xie, An intrusion response method
based on attack graph. J. Softw. 19(10), 2746–2753 (2008)
[22] Z.H. Tian, X.Z. Yu, H.L. Zhang, B.X. Fang, A real time network intrusion forensics method based on evidence reasoning network. Chin. J. Comput. Phys.
5(37), 1184–1193 (2014)
[23] X.H. Bao, Y.X. Dai, P.H. Feng, P.F. Zhu, J. Wei, A detection and forecast algorithm for multi-step attack based on intrusion intention. J. Softw. 16(12), 2132–
2138 (2005)
[24] K. Ilgun, R.A. Kemmerer, P.A. Porras., State transition analysis: a rule-based intrusion detection approach. IEEE Trans. Softw. Eng. 21(3), 181–199 (1995)
[25] T. Bass, R. Robichaux, in Proc., of the Communications for Network-CentricOperations: Creating the Information Force (MILCOM). Defense-in-depth
revisited: qualitative risk analysis methodology for complex network-centric operations (IEEE, 2001), pp. 64–70