Module1 NS
Module1 NS
21EC742
MODULE 1
1. CONFIDENTIALITY
2. AUTHENTICATION
3. INTEGRITY
4. NON REPUDIATION
AVAILABILITY
Types of Attacks
4 categories
Interception
Fabrication
Modification
Interruption
Passive attack
Attacker monitors the data transmission
The term passive indicates – attacker will not modify the contents of
the original message.
Release of message contents
When the confidential email is sent from person A to B, We desire that only B can see
the message.
Due to the attack the contents of the message are released to some one else .
Traffic analysis attack
The passive attacker, from the many messages could try to figure out the similarities
between them.
Comes up with some sort of pattern that provides clues regarding the communication that
is taking place.
application
means.
network.
● The attacker decides to create his/her own Web site, which looks very
identical to a real Web site. For example, the attacker can clone
Citibank’s Web site. The cloning is so clever that the human eye will
not be able to distinguish between the real (Citibank’s) and fake
(attacker’s) site.
The attacker can use many techniques to attack the bank’s customers.
3. Pharming (DNS Spoofing)
Domain Name System (DNS), people can identify Web sites with human-readable names (such as
www.yahoo.com), and computers can continue to treat them as IP addresses (such as 120.10.81.67).
For this, a special server computer called a DNS server maintains the mappings between domain
names and the corresponding IP addresses.
A protocol called DNS Sec (Secure DNS) is being used to thwart such attacks.
transfers
Network Security 34
Security Services
Authentication
Access Control
Data Confidentiality
Connection Confidentiality
Connectionless Confidentiality
Connectionless integrity
Non Repudiation
Network Security 40
Model for Network Access
Security
Network Security 41
NETWORK ACCESS CONTROL (NAC)
IEEE 802.1X
Firewall
DHCP Management
Extensible Authentication
Protocol
Components are
1. EAP Peer
2. EAP Authenticator
3. Authentication
server
EAP Fields:
1. Code
2. Identifier
3. Length
4. Data
Fig: EAP Protocol Exchanges
Example of EAP exchange: