Network Security 2
Network Security 2
UNIT 1
Introduction to Network Security
Network Security is a branch of cybersecurity focused on protecting computer
networks and the data that travels through them from unauthorized access, misuse,
alteration, or destruction. It involves a combination of hardware, software, policies,
and procedures to secure data and systems.
Network security is essential for all organizations and individuals using digital
platforms. As the world becomes increasingly connected, threats like malware,
phishing, ransomware, and hacking become more sophisticated and widespread,
making strong network protection more critical than ever.
Security Approaches
There are several methodologies and strategies for achieving network security. They can
be broadly categorized as follows:
1. Preventive Security
These are mechanisms put in place to stop attacks before they occur.
• Access Control: Ensures only authorized individuals can access certain systems.
2. Detective Security
• Log analysis
3. Corrective Security
- Integrity: Ensures that only authorized parties are able to modify computer system
assets and transmitted information. Modification includes writing, changing status,
deleting, creating and delaying or replaying of transmitted messages.
- Non repudiation: Requires that neither the sender nor the receiver of a message be
able to deny the transmission.
1. Encryption:
Converts plaintext into ciphertext to ensure confidentiality of data during
transmission (e.g., SSL/TLS, AES).
2. Authentication:
Verifies the identity of users or systems before granting access (e.g., passwords,
biometrics, digital certificates).
3. Access Control:
Determines who is allowed to access or use network resources (e.g., role-based
access control - RBAC).
4. Integrity Checking:
Ensures data is not altered during transmission using techniques like hashing
(e.g., SHA-256, HMAC).
5. Firewalls:
Hardware or software tools that filter incoming and outgoing traffic based on
security rules, protecting against unauthorized access.
SECURITY ATTACKS
Security attacks are deliberate attempts to compromise the confidentiality, integrity, or
availability of network data or services. They can be classified into two main types:
Passive and Active attacks.
1. Passive Attacks:
• Eavesdropping (Sniffing):
Attacker secretly listens to data being transmitted over a network.
• Traffic Analysis:
Attacker observes patterns in the traffic (like size, frequency) to gather sensitive
information.
2. Active Attacks:
• Masquerade Attack:
An attacker pretends to be an authorized user to gain access.
• Replay Attack:
A valid data transmission is captured and resent to trick the recipient.
• Modification Attack:
Data is altered during transmission to change its meaning.
Components:
This model shows that network security is not just about securing endpoints, but also
about protecting the entire path and process.
Data is transmitted over network between two communicating parties, who must
cooperate for the exchange to take place. A logical information channel is established
by defining a route through the internet from source to destination by use of
communication protocols by the two parties. Whenever an opponent presents a threat
to confidentiality, authenticity of information, security aspects come into play. Two
components are present in almost all the security providing techniques.
Some secret information shared by the two principals and, it is hoped, unknown to the
opponent. An example is an encryption key used in conjunction with the transformation
to scramble the message before transmission and unscramble it on reception
A trusted third party may be needed to achieve secure transmission. It is responsible for
distributing the secret information to the two parties, while keeping it away from any
opponent. It also may be needed to settle disputes between the two parties regarding
authenticity of a message transmission. The general model shows that there are four
basic tasks in designing a particular security service:
Substitution Techniques
In cryptography, substitution techniques are methods used to replace elements of
the plaintext (original readable message) with other elements to create the ciphertext
(encrypted message).
"Replace each character or bit of the original message with something else to
disguise it."
This disguises the original message and protects it from being easily understood if
intercepted.
Substitution works by taking each unit of the plaintext (this could be a letter, number,
or binary bit) and replacing it with a different unit according to a specific rule or key.
For example:
• Replace B with N
• And so on...
So the word “HELLO” could become “URYYB” under a certain substitution rule (like
the ROT13 cipher).
Purpose of Substitution
Here are the main types of substitution methods, explained in more detail:
Caesar Cipher
This cryptosystem is generally referred to as the Shift Cipher. The concept is to replace
each alphabet by another alphabet which is ‘shifted’ by some fixed number between 0
and 25.
For this type of scheme, both sender and receiver agree on a ‘secret shift number’ for
shifting the alphabet. This number which is between 0 and 25 becomes the key of
encryption.
The name ‘Caesar Cipher’ is occasionally used to describe the Shift Cipher when the
‘shift of three’ is used.
Monoalphabetic cipher is a substitution cipher in which for a given key, the cipher
alphabet for each plain alphabet is fixed throughout the encryption process. For
example, if ‘A’ is encrypted as ‘D’, for any number of occurrence in that plaintext, ‘A’ will
always get encrypted to ‘D’.
Polyalphabetic Cipher is a substitution cipher in which the cipher alphabet for the plain
alphabet may be different at different places during the encryption process. The next
two examples, playfair and Vigenere Cipher are polyalphabetic ciphers.
Playfair Cipher
In this scheme, pairs of letters are encrypted, instead of single letters as in the case of
simple substitution cipher.
In playfair cipher, initially a key table is created. The key table is a 5×5 grid of alphabets
that acts as the key for encrypting the plaintext. Each of the 25 alphabets must be
unique and one letter of the alphabet (usually J) is omitted from the table as we need
only 25 alphabets instead of 26. If the plaintext contains J, then it is replaced by I.
The sender and the receiver deicide on a particular key, say ‘tutorials’. In a key table, the
first characters (going left to right) in the table is the phrase, excluding the duplicate
letters. The rest of the table will be filled with the remaining letters of the alphabet, in
natural order.
One-Time Pad
Transposition Techniques
In the realm of cryptography and network security, transposition techniques are used to
protect information by rearranging the characters or bits of the plaintext. Unlike
substitution techniques—which replace characters with others—transposition
maintains the original characters but alters their positions based on a specific algorithm
or key.
• The result is ciphertext that appears jumbled but retains all original characters.
Method:
• Write the text in a zigzag pattern across multiple "rails" (lines).
Steganography
Steganography is the art and science of hiding information in a way that prevents
detection. Unlike cryptography, which hides the content of a message, steganography
hides the existence of the message itself.
In network security, steganography is used to embed secret data within digital media
(e.g., images, audio, video, or even network protocols), allowing covert communication.
A plaintext message may be hidden in any one of the two ways. The methods of
steganography conceal the existence of the message, whereas the methods of
cryptography render the message unintelligible to outsiders by various transformations
of the text. A simple form of steganography, but one that is time consuming to construct
is one in which an arrangement of words or letters within an apparently innocuous text
spells out the real message. e.g.,
(i) the sequence of first letters of each word of the overall message spells out the
real (hidden) message.
(ii) (Subset of the words of the overall message is used to convey the hidden
message.
Various other techniques have been used historically, some of them are:
Invisible ink – a number of substances can be used for writing but leave no visible
trace until heat or some chemical is applied to the paper.
Pin punctures – small pin punctures on selected letters are ordinarily not visible
unless the paper is held in front of the light.
Typewritten correction ribbon – used between the lines typed with a black ribbon, the
results of typing with the correction tape are visible only under a strong light.
1. Image Steganography
Example:
• The least significant bit of each color channel is changed to match the secret
data
2. Audio Steganography
o LSB encoding
o Echo hiding
o Phase coding
3. Video Steganography
4. Text Steganography
o Extra spaces
o Capitalization
o Font manipulation
o DNS queries
• A 56-bit key means the key is 56 bits long (used in DES encryption, which is now
considered insecure).
• A 128-bit key means there are 128 binary digits (0s and 1s) in the key.
• A 256-bit key is even longer and more secure.
The key size directly affects how secure an encryption algorithm is. The longer the key,
the harder it is for an attacker to guess or crack it using brute-force methods (which
means trying every possible combination until the correct one is found).
Formula:
This is because each bit can have two possible values (0 or 1). So with n bits, there are 2
to the power of n possible combinations.
So, if a system uses a 128-bit key, an attacker would theoretically have to try 3.4 x 10³⁸
combinations to break it, which is practically impossible with current technology.
Main Objectives:
2. Ciphertext-Only Attack:
The attacker only has access to encrypted data (ciphertext) and tries to deduce
the plaintext or key.
3. Known-Plaintext Attack:
The attacker has access to some plaintext and its matching ciphertext and uses
this to find the key.
4. Chosen-Plaintext Attack:
The attacker can encrypt plaintexts of their choice to observe the resulting
ciphertexts, helping them uncover the key.
UNIT 2
Symmetric Cipher Model
Symmetric Encryption is the most basic and old method of encryption. It uses only one
key for the process of both the encryption and decryption of data. Thus, it is also known
as Single-Key Encryption.
Cipher Text: encoded format of the original message that cannot be understood by
humans
Decryption (or Deciphering): the conversion of cipher text to plain text, i.e., reverse of
encryption
Symmetric Cipher: General Idea of Symmetric Key Cryptography
Symmetric key cryptography is a method of encryption in which the same secret key is
used for both encryption (converting plaintext into ciphertext) and decryption (reverting
ciphertext back into plaintext). It is also known as private key cryptography because
both the sender and the receiver must privately share the same key and keep it
confidential.
Key Concepts:
1. Shared Secret Key: Both communicating parties use a single, identical key. The
key must be exchanged securely before communication begins.
2. Encryption & Decryption: The sender encrypts the message using the key, and
the receiver decrypts it using the same key. Without the key, the ciphertext is
meaningless.
3. High Speed: Symmetric algorithms are computationally faster and more efficient
than asymmetric cryptography, especially when encrypting large volumes of
data.
• AES (Advanced Encryption Standard): A secure and widely used block cipher
with 128, 192, or 256-bit keys.
• Block Ciphers: Encrypt data in fixed-size blocks (e.g., AES: 128-bit blocks).
• Stream Ciphers: Encrypt data one bit or byte at a time (e.g., RC4).
Advantages:
Limitations:
• Not scalable for large numbers of users (as each pair needs a unique key).
I. Algorithm Types
The encryption process begins with the stream cipher's algorithm generating a
pseudo-random keystream made up of the encryption key and the unique randomly
generated number known as the nonce. The result is a random stream of bits
corresponding to the length of the ordinary plaintext. Then, the ordinary plaintext is
also deciphered into single bits.
These bits are then joined one by one to the keystream bits, gradually converting the
ordinary plaintext into the ciphertext using the XOR bitwise operations. When the
recipient wants to decrypt the encrypted plaintext, they must generate a new
keystream made during the encryption. The encrypted plaintext is then deciphered
one by one to derive the encrypted plaintext at the recipient's end.
• Strengths: The initial appeal of RC4 came from its efficient design and capability
to handle variable-length data streams.
Salsa20
• Strengths: It's fast and efficient, with a simple and elegant design. Most
importantly, the security it offers against known attacks is robust. Apart from
that, Salsa20 serves as a building block for other cryptographic protocols,
exhibiting its versatility.
• Current Status: Salsa20 is a very widely used and well-respected stream cipher.
It's used for many applications where performance and security balance.
Grain-128
• Strengths of Grain-128 include efficiency, lightweight implementation, and the
ability to perform well with limited processing power and memory, making it ideal
for radio frequency identification (RFID) tags and sensor networks. Importantly,
Grain-128 still provides strong security with such simplicity.
Block Cipher
The result of a block cipher is a sequence of blocks that are then encrypted with the
key. The output is a sequence of blocks of encrypted data in a specific order. When
the ciphertext travels to its endpoint, the receiver uses the same cryptographic
key to decrypt the ciphertext blockchain to the plaintext message.
• It has support for three-length keys: 128 bits, 192 bits, or 256 bits, the most
commonly used one is a 128-bit key.
• In DES, the 64-bit blocks of plaintext are encrypted using a 56-bit key.
• This weakness caused by the small key size led to the development of a more
secure algorithm, called AES.
• The development of the Triple DES, also called Triple-DES or TDEA, was triggered
by the weak security resulting from the small key size in the DES.
• Triple DES denotes a method of three times applying the DES algorithm
sequentially (encrypt-decrypt-encrypt) on every plaintext block.
Operation Modes in Symmetric Cryptography
• A major limitation of ECB is that the same plaintext block produces identical
ciphertext blocks that can be used for subsequent attacks, and patterns in the
plaintext are visible in the ciphertext.
• CBC mode links each plaintext block with the previous ciphertext block before
encryption.
• Each plaintext block is XORed with the previous ciphertext block before
encryption, adding randomness and preventing patterns in the plaintext from
being apparent in the ciphertext.
• CFB mode operates like a stream cipher, generating a keystream to XOR with the
plaintext block before encryption.
• It produces a separate keystream, which will be the XOR with the plaintext to
derive the ciphertext.
• CTR mode transforms a block cipher into a stream cipher by using a counter
value as the input to the block cipher.
• CTR mode is highly parallelizable and efficient, making it suitable for scenarios
where performance is critical, such as disk and network encryption.
Types of attack
Attacks are typically categorised based on the action performed by the attacker. An
attack thus can be active or passive.
Active attack: An active attack involves changing the information in some way by
conducting some process on the information. For example,
Passive attack:
-The primary goal of passive attack is to obtain unauthorised access to the information.
For example, actions such as intercepting and eavesdropping on the communication
channel can be regarded as a passive attack.
-These actions are passive in nature, as they neither affect information nor disrupt the
communication channel. A passive attack is often seen as stealing physical goods and
stealing information is that theft of data still leaves the owner in possession of that data.
Based on the discussion so far, when the sender of a message encrypts a plain-text
message into its corresponding cipher text, there are five possibilities for an attack on
this message
Chosen-ciphertext Attack: Attacker can decrypt chosen ciphertexts to learn about the
encryption.
Chosen text attack: Essentially a combination of both chosen plain text attack and
chosen cipher text attack.
Attacks on Symmetric Key Cryptography
There are two general approaches to attacking a Symmetric Key Cryptography scheme:
Cryptanalysis
Brute-Force Attack
The attacker attempts all the possible keys on the piece of encrypted data until they get
a readable translation into plain text. It takes on average 50% of all the possible keys to
get this far. If either of these attacks gets the key right, then all of the future and previous
messages encrypted with this key are lost. This is why a large key size offers protection
from brute force attacks by making them infeasible to compute.
• Requires a secure method to share the key between sender and receiver.
Asymmetric key encryption is one of the most common cryptographic methods that
involve using a single key and its pendent, where one key is used to encrypt data and the
second one is used to decrypt an encrypted text. The second key is kept highly secret,
while the first one which is called a public key can be freely distributed among the
service’s users.
• It uses two keys a public key for encryption and a private key for decryption.
-Round function
-Key schedule
The initial and final permutations are straight Permutation boxes (P-boxes) that are
inverses of each other. They have no cryptography significance in DES. The initial and
final permutations are shown as follows-
Round Function
The heart of this cipher is the DES function, f. The DES function applies a 48-bit key to
the rightmost 32 bits to produce a 32-bit output.
-Expansion Permutation Box- Since right input is 32-bit and the round key is a 48-bit, we
first need to expand right input to 48 bits. The graphically depicted permutation logic is
generally described as a table in DES specification.
-XOR (Whitener). - After the expansion permutation, DES does XOR operation on the
expanded right section and the round key. The round key is used only in this operation.
-Substitution Boxes. - The S-boxes carry out the real mixing (confusion). DES uses 8 S-
boxes, each with a 6 bit- input and a 4 bit output.
-There are a total of eight S-box tables. The output of all eight s-boxes is then combined
into32-bit section.
-Straight Permutation, The 32-bit output of S-boxes, is then subjected to the straight
permutation.
Key Generation
The round-key generator creates sixteen 48-bit keys out of a 56-bit cipher key.
That means it takes 128 bits as input and outputs 128 bits of encrypted cipher text. AES
relies on the substitution-permutation network principle, which is performed using a
series of linked operations that involve replacing and shuffling the input data.
Working of The Cipher
AES performs operations on bytes of data rather than in bits. Since the block size is 128
bits, the cipher processes 128 bits (or 16 bytes) of the input data at a time.
10 128
12 192
14 256
In the AES algorithm, the initial cipher key is not used directly in every round. Instead, it
is expanded into multiple round keys using a key expansion or key schedule algorithm.
This process ensures confusion and diffusion in the encryption process and protects
against attacks like brute force and linear cryptanalysis.
For use in AES encryption, a single initial key can be expanded into a series of round
keys using the AES (Advanced Encryption Standard) key expansion technique. These
round keys are needed for each round of AES encryption and decryption.
The AES key expansion method receives a four-word (16-byte) key and returns a linear
array of 44 words (176 bytes). This is sufficient to provide both the initial Add Round Key
step and a four-word round key for each of the cipher's ten rounds.
Applications of AES
• SSL/TLS (HTTPS)
Used in: Secure emails, digital signatures, web security (SSL/TLS), cryptocurrency
wallets, and more.
RSA Algorithm
RSA Algorithm is based on factorization of large number and modular arithmetic for
encrypting and decrypting data. It consists of three main stages:
2. Encryption: Sender encrypts the data using Public Key to get cipher text.
3. Decryption: Decrypting the cipher text using Private Key to get the original data.
To use RSA, both public and private keys must be generated securely:
2. Compute modulus n:
n=p×q
This n is used in both keys and determines the key size (e.g., 1024, 2048 bits).
Final Keys:
RSA uses the public key to encrypt and the private key to decrypt:
🔹 Encryption:
C = M^e mod n
🔹 Decryption:
M = C^d mod n
The values of M, e, d, and n must be in integer form. Large messages are often divided
and padded.
Definition:
The RSA private key is a number d (along with n) that allows the receiver to decrypt
messages that were encrypted using their public key.
Key Functions:
Format:
• Symmetric Key Cryptography: Uses the same secret key for encryption and
decryption.
• Asymmetric Key Cryptography: Uses a public-private key pair where the public
key encrypts and the private key decrypts.
Both have strengths and weaknesses, so modern secure systems combine them to
leverage the advantages of each.
Digital Envelopes
Digital signatures, digital certificates, and Public Key Infrastructure (PKI) are crucial
components of network security, ensuring the authenticity, integrity, and confidentiality
of data and communication. Digital signatures verify the origin and integrity of data,
while digital certificates authenticate the identity of entities and enable encryption. PKI
provides the framework for managing these digital certificates, ensuring secure
communication and transactions.
Digital Signatures:
Digital Certificates:
2. The entity submits their public key and other identity information to a CA for
verification.
3. The CA issues a digital certificate, binding the public key to the entity's identity.
4. The digital certificate is used to authenticate the entity's identity and enable
secure communication.
5. When an entity wants to send a signed message, they use their private key to
create a digital signature.
6. The recipient uses the sender's public key (from their digital certificate) to verify
the signature and the message's integrity.
UNIT 4
Information Security Protocols
Information Security Protocols are a set of standardized procedures and rules
designed to secure data communication, storage, and access in digital environments.
They ensure confidentiality, integrity, authentication, and non-repudiation during
transmission and storage of data.
Confidentiality Ensures that only authorized parties can read the data.
-SSL is included as part of both the Microsoft and Netscape browsers and most Web
server products. Developed by Netscape, SSL also gained the support of Microsoft and
other Internet client/server developers as well and became the de facto standard until
evolving into Transport Layer Security.
-The "sockets" part of the term refers to the sockets method of passing data back and
forth between a client and a server program in a network or between program layers in
the same computer.
-SSL uses the public-and-private key encryption system from RSA, which also includes
the use of a digital certificate.
-TLS and SSL are an integral part of most Web browsers (clients) and Web servers. If a
Web site is on a server that supports SSL, SSL can be enabled, and specific Web pages
can be identified as requiring SSL access.
-Any Web server can be enabled by using Netscape's SSL Ref program library which can
be downloaded for non-commercial use or licensed for commercial use. TLS and SSL
are not interoperable. However, a message sent with TLS can be handled by a client that
handles SSL but not TLS.
HTTPS stands for Hyper Text Transfer Protocol Secure. It is the most common protocol
for sending data between a web browser and a website. HTTPS is the secure variant of
HTTP and is used to communicate between the user's browser and the website,
ensuring that data transfer is encrypted for added security.
Any website, especially those requiring login details, should use HTTPS. You can see a
padlock icon in the URL bar, which means the page is secure. Browsers, like Google
Chrome, treat HTTPS seriously and mark non-HTTPS websites as "Not Secure."
HTTPS establishes the communication between the browser and the web server. It uses
the Secure Socket Layer (SSL) and Transport Layer Security (TLS) protocol for
establishing communication. The new version of SSL is TLS(Transport Layer Security).
HTTPS uses the conventional HTTP protocol and adds a layer of SSL/TLS over it.
The workflow of HTTP and HTTPS remains the same, the browsers and servers still
communicate with each other using the HTTP protocol. However, this is done over a
secure SSL connection. The SSL connection is responsible for the encryption and
decryption of the data that is being exchanged to ensure data safety.
In the digital world, verifying the exact time at which a document, message, or
transaction was created is essential for authenticity, integrity, and legal validity. The
Time Stamping Protocol (TSP) is a standardized method used to prove that data
existed at a certain point in time, even if the data itself is not publicly disclosed.
Objective of TSP
Client sends this hash to the TSA in a Time Stamp Request (TSR).
Step 3: Time Stamp Token Generation
The TSA:
Step 4: Response
The TSA sends back the TST to the client, which can now prove that the original data
existed at the timestamped moment.
Applications of TSP
• Digital Signatures
• Legal & Compliance Records
• Financial Transactions
• Blockchain
• Software Integrity
Email Security
Kerberos
Core Objective
Working Steps
UNIT 5
Diffie-Hellman Key Exchange
The Diffie-Hellman Key Exchange (DHKE) is a cryptographic protocol that allows two
parties to securely share a secret key over an insecure communication channel without
prior key exchange. It was invented in 1976 by Whitfield Diffie and Martin Hellman, and it
laid the foundation for modern public-key cryptography.
DHKE is based on the difficulty of solving the Discrete Logarithm Problem (DLP) in a
finite field.
For the sake of simplicity and practical implementation of the algorithm, we will
consider only 4 variables, one prime P and G (a primitive root of P) and two private
values a and b.
P and G are both publicly available numbers. Users (say Alice and Bob) pick private
values a and b and they generate a key and exchange it publicly. The opposite person
receives the key and that generates a secret key, after which they have the same
secret key to encrypt .
Firewall
Network Firewalls are the devices that are used to prevent private networks from
unauthorized access. A Firewall is a security solution for the computers or devices that
are connected to a network, they can be either in the form of hardware as well as in
form of software. It monitors and controls the incoming and outgoing traffic (the amount
of data moving across a computer network at any given time ).
The major purpose of the network firewall is to protect an inner network by separating it
from the outer network. An inner Network can be simply called a network created inside
an organization and a network that is not in the range of an inner network can be
considered an Outer Network.
It is also a type of packet filtering that is used to control how data packets move through
a firewall. It is also called dynamic packet filtering. These firewalls can inspect that if
the packet belongs to a particular session or not. It only permits communication if and
only if, the session is perfectly established between two endpoints else it will block the
communication.
Application Layer Firewalls
These firewalls can examine application layer (of OSI model) information like
an HTTP request. If finds some suspicious application that can be responsible for
harming our network or that is not safe for our network then it gets blocked right away.
IP Security
Importance of IPSec
IPSec (Internet Protocol Security) is important because it helps keep your data safe and
secure when you send it over the Internet or any network. Here are some of the
important aspects why IPSec is Important:
• IPSec is often used in Virtual Private Networks (VPNs) to create secure, private
connections.
For Encryption, IPSec uses cryptographic keys. It can be created and shared using a
process called IKE (Internet Key Exchange), that ensures that both devices have the
correct keys to establish a secure connection.
When two devices communicate using IPSec, the devices first initiate the connection
by sending a request to each other. After that, they mutually decide on protection of
data using passwords or digital certificates. Now, they establish the secure tunnel for
communication. Once the tunnel is set up, data can be transmitted safely, as IPSec is
encrypting the data and also checking the integrity of the data to ensure that data has
not been altered. After the communication is finished, the devices can close the secure
connection. In this way, the IPSec works.
1. Privacy Protection: A VPN hides your IP address, ensuring that your browsing
habits and activities remain private.
2. Security on Public Networks: Public Wi-Fi networks are often insecure, but a VPN
encrypts your connection, making it safer to browse the internet on networks like
those in cafes or airports.
4. Prevent Data Throttling: Some ISPs throttle your connection speed when you
stream or play games. A VPN can bypass this, allowing for faster internet speeds.
A VPN works by creating an encrypted tunnel between your device and a remote server.
Here's the process simplified:
2. Encryption: The VPN encrypts your data (information, files, web traffic) so that
it’s unreadable to anyone trying to intercept it, whether it's a hacker on the same
Wi-Fi network or an entity trying to monitor your browsing.
3. Traffic Redirection: Your device’s internet traffic is routed through the VPN server,
which can be located in any country. This makes it appear as though you’re
browsing from the server’s location, masking your actual IP address.
4. Decryption: Once your data reaches the VPN server, it is decrypted and sent to
the destination (such as a website, app, or service). Any response from the
server is then sent back to you through the encrypted tunnel.
This end-to-end encryption ensures that your sensitive data stays private and your
location remains anonymous.
• It analyzes the data flowing through the network to look for patterns and signs of
abnormal behavior.
• The IDS compares the network activity to a set of predefined rules and patterns
to identify any activity that might indicate an attack or intrusion.
• If the IDS detects something that matches one of these rules or patterns, it
sends an alert to the system administrator.
• The system administrator can then investigate the alert and take action to
prevent any damage or further intrusion.
IP Spoofing
In IP spoofing, the attacker modifies the source IP address to mask their identity or
impersonate another device.
This can bypass IP-based authentication systems or cause the victim to respond to
the wrong host.
Types of IP Spoofing
DNS spoofing
In above image -
1. Request to Real Website: User hits a request for a particular website it goes to
the DNS server to resolve the IP address of that website.
2. Inject Fake DNS entry: Hackers already take control over the DNS server by
detecting the flaws and now they add false entries to the DNS server.
3. Resolve to Fake Website: Since the fake entry in the DNS server redirect the user
to the wrong website.
Implementing DNSSEC, using secure DNS servers, and maintaining cache hygiene
are critical to defending against such attacks.
• A list of transactions/data.
• A timestamp.
• A reference (hash) to the previous block.
• A unique hash for integrity verification.
Feature Description
No central authority; every node in the network holds a
Decentralization copy of the ledger.
Immutability Data, once recorded, cannot be altered or deleted.
Transparency All participants can view the transaction history.
Transactions are verified through mechanisms like Proof of
Consensus
Work or Proof of Stake.
Auditability Easy to track and audit past transactions.
What Is Cryptocurrency?
Cryptocurrency is a digital or virtual currency that uses cryptography for security
and operates independently of a central authority (such as a bank). Most
cryptocurrencies run on blockchain technology, which acts as their public
transaction ledger.
Popular Cryptocurrencies
Cryptocurrency Symbol Purpose