Lec 8 Network Attack Architecture and Isolation
Lec 8 Network Attack Architecture and Isolation
Network Attacks
• Types of Attacks and Mitigation
Conclusion
References
More and more people getting connected to
networks, increasing the number of network
security threats.
Threats and
Cracker – the term regarded as the
Initiate more accurate word that describes an
Network individual who attempts to gain
unauthorized network access to
Attacks network resources with malicious
intent
Spammer – an individual who sends large
Individuals number of unsolicited emails. Spammers
use viruses to take control of computer
who pose systems then use them to send out bulk
Network messages
Threats and
Phisher – a phisher uses email or other
Initiate means to trick others into providing
sensitive information, such as credit card
Network numbers or passwords. The phisher
Attacks masquerades as a trusted party that would
have a legitimate need for sensitive
information
White Hat – a term used to describe
Individuals individuals who use their abilities to
find vulnerabilities in the systems or
who pose networks and then report these
vulnerabilities to the owners of these
Network systems
Threats and
Initiate Black Hat – a term used to describe
individuals who use their knowledge
Network of computer systems to break into
systems that they are not authorized to
Attacks use
The biggest threats to network security are
listed below;
• Viruses and worms
• Trojan Horses
Types of • SPAM
• Phishing
Network • Packet Sniffers
Threats and • Maliciously coded websites
Prevention • Password Attacks
• Hardware Loss and Residual Data
Fragments
• Shared Computers
• Zombie Computers and Botnets
A virus is a program or piece of code that is
loaded onto your computer without your
knowledge and runs against your wishes
Packet
Sniffers When strong encryption is used, all
packets are unreadable to any but the
destination address, making packet
sniffers useless. So one solution is to
obtain strong encryption
Some websites across the
Internet contain malicious code
Prevention:
• Do not check the "Remember my ID on this
Shared computer" box
• Never leave a computer unattended while
Computers signed in
• Always sign out completely
• Clear browser cache
• Be wary of spyware
• Never save passwords
• Change your passwords often
• A zombie computer is a computer that has
been secretly compromised by hacking tools
which allow a third party to control the
computer and its resources remotely
• A hacker could hack into a computer and
Zombie obtain data
• A botnet is a network of online computers
Computers that, although their owners are unaware of it,
have been setup to forward transmissions
and Botnets (including spam or viruses) to other computers
on the Internet
• This is a major security threat on a network
because the network, unknown to anyone,
could be acting as a hub that forwards
malicious files to ther computers.
Zombie Prevention:
Computers • Antivirus software suites can help
prevent zombie computers
and Botnets
Network Attacks
• Four primary classes of attacks
exist:
1. Reconnaisance
2. Access
3. Denial of service
4. Malicious code (worms, viruses
and Trojan horses)
• Active vs Passive: An 'active attack' attempts
to alter system resources or affect their
operation. A 'passive attack' attempts to learn
or make use of information from the system
but does not affect system resources (e.g.,
wiretapping)
Common • Insider vs Outsider: An 'insider attack' is and
attacj initiated by an entity inside the security
Terms perimeter i.e., an entity that is authorized to
access system resources but uses them in a
way not approved by those who granted the
authorization.
• An 'outside attack' is initiated from outside the
perimeter, by an unauthorized or illegitimate
user of the system.
• On the Internet, potential outside
attackers range from armateur
pranksters to organized criminals and
hostile governments
• Malware is any software used to
Common disrupt computer operation, gather
sensitive information, or gain access to
Terms private computer systems. Malware is
defined by its malicious intent, acting
against the requirements of the
computer user, and does not include
software that causes unintentional harm
due to some deficiency.
Reconnaisance is the unauthorized discovery and mapping of
systems, services, or vulnerabilities
• Packet sniffers
• Port scans
• Ping sweeps
• Internet information queries
System access is the ability for an unautorized
intruder to gain access to a device for which the
intruder does not have an account or password
Denial-of- dropped
• DDoS used attack methods similar to standard DoS attacks but operates
on a much larger scale
Service • Typically, hundreds or thousands of attack points attempt to overwhelm a
target
(DDoS) • Examples of DDoS attacks include:
• Smurf attacks
Attacks •
•
Tribe Flood Network (TFN) - CERT Incident Note 99-04
Stacheldraht
• With a masquerade attack, the network intruder
can manipulate TCP/IP packets by IP spoofing,
falsifying the source IP address, thereby appearing
to be another user
• The intruder assumes the identity of a valid user
and gains that user's access privileges by IP
Masquerade/IP spoofing
• IP spoofing occurs when intruders create IP
Spoofing packets with falsified source addresses
Attacks • During an IP spoofing attack, an attacker outside
the network pretends to be a trusted computer
• The attacker may either use an IP address that is
within the range of IP addresses for the network or
use an authorized external IP address that is
trusted and provides access to specified resources
on the network
• An IP spoofing attack is limited to the
injection of data or commands into an
existing stream of data passed between
a client and server application or peer-
to-peer network connection
Masquerade/IP • Some tools used to perform IP spoofing
Spoofing attacks are as follows:
Attacks 1. Protocol analyzers, also called password
sniffers
2. Sequence number modification
3. Scanning tools that probe TCP ports for
specific services, network or system
architecture, and the operating system
• The primary vulnerabilities for end-user workstations are worm, virus and Trojan horse
attacks
• The anatomy of a worm attack is as follows:
1. The enabling vulnerability: A worm installs itself using an exploit vector on a
vulnerable system
2. Propagation mechanism: After gaining access to devices, a worm replicates
Malicious 3.
and selects new targets
Payload: After the device is infected with a worm, the attacker has access to the
host often as a privileged user. Attackers could use a local exploit to escalate
Code Prevention:
their privilege level to administrator
• The following are the recommended steps for worm attack mititgation:
1. Step 1: Containment
2. Step 2: Inoculation
3. Step 3: Quarantine
4. Step 4: Treatment
• A virus is a malicious software that is attached
to another program to execute a particular
unwanted funtion on a user's workstation
• An example of a virus is a program that is
attached to command.com (the primary
interpreter for Windows systems) that deletes
Malicious certain files and infects any other versions of
command.com that it can find
Code • A Trojan horse differs only in that the entire
application was written to look like soemthing
else, whn in fact it is an attack tool
• An example of a Trojan horse is a software
application that runs a simple game on the
user's workstation
• While the user is occupied with the
game, the Trojan horse mails a copy of
itself to every contact in the user's
address book. The other users receive
the game and then play it, thus
spreading the Trojan horse
Malicious Prevention:
Code • These kinds of applications can be
contained through the effective use of
antivirus software at the user level
• Keeping up-to-date with the latest
antivirus software, application versions
and software patches
Every device in your network could be exploited so
make sure to harden them all (especially change
default usernames and passwords)