7.2 Threats in Networks: Network Security / G. Steffen 1
7.2 Threats in Networks: Network Security / G. Steffen 1
2 Threats in Networks
In This Section
What makes a network Vulnerable Reasons for network attacks
Who Attacks Networks? Who are the attackers? Why people attack? Threats in Transit: Eavesdropping and Wiretapping Different ways attackers attack a victim
Attacker can mount an attack from thousands of miles away; passes through many hosts Both targets and origins An attack can come from any host to any host More users have the potential to access networked systems than on single computers
Sharing
Reliable security is difficult to obtain Complex as many users do not know what their computers are doing at any moment One host may be a node on two different networks Causing uncontrolled groups of possibly malicious users Can have multiple paths from one host to another.
Network Security / G. Steffen 4
Unknown Perimeter
Unknown Path
technique? Can I defeat this network? Fame Money and Espionage Organized Crime Ideaology
Hacktivism breaking into a computer system with the
intent of disrupting normal operations but not causing serious damage Cyberterroism- more dangerous than hacktivism can cause grave harm such as loss of life or severe economic damage
Network Security / G. Steffen 5
Reconnaissance 1
How attackers perpetrate attacks? Port Scan
For a particular IP address, the program will gather network information. It tells an attacker which standard ports are being used, which OS is installed on the target system, & what applications and which versions are present.
Social Engineering
Intelligence
Reconnaissance 2
How attackers perpetrate attacks? Operating System & Application Fingerprinting
Determining what commercial application server application is running, what version Exchanging information and techniques online Vendors provide information on website about their product in order to develop compatible, complementary applications. For instance Microsoft
Availability of Documentation
Threats in Transit
Eavesdropping Overhearing without expending any extra effort Causing harm that can occur between a sender and a receiver Wiretapping Passive wiretapping
Active wiretapping
10
Wiretap Vulnerabilities
11
Other Threats
Protocol Flaws
Authentication Foiled by Guessing Authentication Thwarted by Eavesdropping or
Wiretapping Authentication Foiled by Avoidance Nonexistent Authentication Well-Known Authentication Trusted Authentication
12
Other Threats
Impersonation Easier than wiretapping for obtaining information on a network More significant threat in WAN than in LAN Spoofing An attacker obtains network credentials illegally and carries false conversations Masquerade One hosts pretends to be another Phishing is a variation of this kind of an attack. Session hijacking Intercepting & carrying a session begun by another entity Man-in-the-Middle Attack One entity intrudes between two others.
Network Security / G. Steffen 13
14
16
17
DOS Attacks 1
Echo-Chargen Attack works between two hosts Ping of Death Flood network with ping packets Attack limited by the smallest bandwidth to victim Smurf It is a variation of ping attack Syn Flood Attack uses the TCP protocol suite
Network Security / G. Steffen 18
19
Summary
Threats are raised against the key aspects of security :
Authentication Failures
Summary
Target
Programming Flaws
Vulnerability
Buffer Overflow Addressing Errors Parameter Modifications Cookie Malicious Typed Code Protocol Flaw Eavesdropping Passive Wiretap Misdelivery Cookie
Confidentiality
21
Summary
Target
Integrity
Vulnerability
Protocol Flaw Active Wiretap Noise Impersonation Falsification of Message Protocol Flaw Connection flooding, e.g., smurf DNS Attack Traffic Redirection DDoS
Availability
22