Chapter 4
Chapter 4
BURIE CAMPUS
DEPARTMENT OF COMPUTER SCIENCE
Computer Security
By:
Amare W.
1
2
3/2/2018
8 06/20/2023
♥Typically, an e-mail message gets forwarded from its UA, goes through
the mesh of MTAs and finally reaches the UA on the recipient’s machine.
3/2/2018
11 06/20/2023
♥All this sounds good, but in absence of network security, Bob could be in for a few
surprises.
If transactions did not use confidentiality (encryption), an attacker could obtain his
payment card information. The attacker can then make purchases at Bob's expense.
If no data integrity measure is used, an attacker could modify Bob's order in terms of
type or quantity of goods.
Lastly, if no server authentication is used, a server could display Alice's famous logo
but the site could be a malicious site maintained by an attacker, who is
masquerading as Alice. After receiving Bob's order, he could take Bob's money and
flee. Or he could carry out an identity theft by collecting Bob's name and credit card
details. 3/2/2018
14 06/20/2023
3/2/2018
15 06/20/2023
3/2/2018
16 06/20/2023
in an operating system.
17 06/20/2023
3/2/2018
18 06/20/2023
Features of SSL
♥The salient features of SSL protocol are as follows −SSL provides network
connection security through −
♥Confidentiality − Information is exchanged in an encrypted form.
♥Authentication − Communication entities identify each other through the use of
digital certificates. Web-server authentication is mandatory whereas client
authentication is kept optional.
♥Reliability − Maintains message integrity checks.
SSL is available for all TCP applications
Supported by almost all web browsers
Provides ease in doing business with new online entities
3/2/2018
Developed primarily for web e-commerce
19 06/20/2023
Features of IPsec
3/2/2018
23 06/20/2023
♥We have seen that rapid growth of Internet has raised a major
concern for network security.
♥Several methods have been developed to provide security in the
application, transport, or network layer of a network.
♥Many organizations incorporate security measures at higher OSI
layers, from application layer all the way down to IP layer.
♥ However, one area generally left unattended is hardening of Data
Link layer. This can open the network to a variety of attacks and
3/2/2018
compromises.
24 06/20/2023
ARP Spoofing
♥Address Resolution Protocol (ARP) is a protocol used to map an IP
address to a physical machine address recognizable in the local Ethernet.
♥When a host machine needs to find a physical Media Access Control
(MAC) address for an IP address, it broadcasts an ARP request.
♥The other host that owns the IP address sends an ARP reply message with
its physical address.
3/2/2018
25 06/20/2023
3/2/2018
27 06/20/2023
MAC Flooding
Port Stealing
♥ Now all data frames intended for the targeted host are sent to the
attacker’s switch port and not to the target host.
♥ Thus, the attacker now receives all the frames which were
actually destined only for the target host.
DHCP Attacks
♥ Dynamic Host Configuration Protocol (DHCP) is not a datalink
protocol but solutions to DHCP attacks are also useful to thwart
Layer 2 attacks.
3/2/2018
♥ DHCP is used to dynamically allocate IP addresses to computers
for a specific time period.
30 06/20/2023
♥It is possible to attack DHCP servers by causing denial of service in the network
or by impersonating the DHCP server.
♥In a DHCP starvation attack, the attacker requests all of the available DHCP
addresses. This results in a denial of service to the legitimate host on the
network.
♥In DHCP spoofing attack, the attacker can deploy a rogue DHCP server to
provide addresses to the clients.
♥ Here, the attacker can provide the host machines with a rouge default gateway
with the DHCP responses.
♥Data frames from the host are now guided to rouge gateway where the attacker
3/2/2018
can intercept all package and reply to actual gateway or drop them.
31 06/20/2023
3/2/2018
33 06/20/2023
DHCP Snooping
♥We have seen that DHCP spoofing is an attack where the attacker listens for
DHCP requests from host on the network and answers them with fake DHCP
response before the authorized DHCP response comes to the host.
♥DHCP snooping can prevent such attacks. DHCP snooping is a switch feature.
Switch can be configured to determine which switch ports can respond to DHCP
requests. Switch ports are identified as trusted or untrusted ports.
♥Only ports that connect to an authorized DHCP server are configured as
“trusted”, and allowed to send all types of DHCP messages.
♥All other ports on the switch are untrusted and can send only DHCP requests. If
a DHCP response is seen on an untrusted port, the port is shut down.
3/2/2018
34 06/20/2023
♥ The method of port security can prevent MAC flooding and cloning
attacks. However, it does not prevent ARP spoofing.
♥ Port security validates the MAC source address in the frame header,
but ARP frames contain an additional MAC source field in the data
payload, and the host uses this field to populate their ARP cache.
♥ Some methods to prevent ARP spoofing are listed as follows.
Static ARP
Intrusion Detection System
Dynamic ARP inspection 3/2/2018
35 06/20/2023
Thank you