0% found this document useful (0 votes)
11 views

EnggRoom Code 26 Network Security

Uploaded by

Tejukumar R
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

EnggRoom Code 26 Network Security

Uploaded by

Tejukumar R
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 19

A

SEMINAR ON
NETWORK SECURITY
PREPARED BY :-
SANKET U PATADIA
(6TH I.T).
ROLL NO 26.
GUIDED BY: THANKS TO:
MS.JAGRUTI GOSWAMI MS.SAROJ G. BODAR
(HOD OF I.T)
NETWORK
THE PURE DEFINITION OF
COMPUTER NETWORK REFERS TO
THE INTERCONNECTION OF THE
SYSTEMS IN ORDER TO EXCHANGE
INFORMATION.
Internet
●What is the Internet?
The Internet is the world's largest
network of networks . When you want
to access the resources offered by the
Internet, you don't really connect to
the Internet; you connect to a network
that is eventually connected to the
Internet backbone , a network of
extremely fast network components.
IP ADDRESS CLASSES
CLASS RANGE
A 1.0.0.0 -127.255.255.255

B 128.0.0.0-139.255.255.255

C 140.0.0.0-191.255.255.255

D 192.0.0.0-239.255.255.255

E 240.0.0.0-247.255.255.255
ATTACKS ON IP ADDRESS
• ATTACK THROUGH IRC.

• ATTACKING THROUGH E-MAIL.


• ATTACKING THROUGH SCRIPTS.
• IP SPOOFING.
• IP SESSION HIJACKING.
COUNTERMEASURES
AGAINST IP ATTACKS

1.SURF USING ANNONYMOUS WEB SEVICES


2.USE ANNONYMOUS E-MAIL SEVICES.
3.USE PROXY THAT HIDE YOUR IP.
4.USE MULTIPLE PROXIES IN ORDER TO HAVE
GOOD SECURITY.
5.USE FIREWALL.
UNWRAPPING THE
TCP LAYER
IT’S A TRANSCONTROL PROTOCOL.
A THREE WAY HANDSHAKE TAKES PLACE
WHILE TRANFERING DATA.
HOST-----SYN----SOURCE
SOURCE----ACK-----HOST
If connection is established
HOST-------FIN-----SOURCE.
If connection is not established
HOST-------RST-----SOURCE.
ATTACKS ON TCP.

1.SYN FLOOD ATTACK.


2.FIN ATTACK
3 NULL ATTACK
ATTACKS ON UDP.

1 IN THIS ATTACK THE HACKER TRIES TO


CREATE INFINITE LOOP BETWEEN TWO
UDP CONNECTION USER.
COUNTERMEASURES
AGAINST TCP UDP.
1. REDUCE TIME DURATION FOR TIMED
OUT OF A CONNECTION.
2.INCREASE QUEUE OF REQUEST.
3 INSTALL VENDOR SPECIFIC UPDATES.
RISK
MANAGEMENT
IT’S A GAME OF SECURITY WHERE
THE ORGANIZATION DECIDES HOW
MUCH RISK IS ACCOMNIED AND
HOW MUCH SECURITY THEY CAN
PROVIDE.
DDOS ATTACKS
1.PING OF DEATH
2.TEAR DROP
3.SYN FLOODING
4.LAND ATTACK.
5.DISTRIBUTED DOS ATTACK.
COUNTERMEASURES
AGAINST DDOS ATTACKS
1.ALMOST ALL NEW SYSTEM ARE BOUND TO BE
NOT VULNERABLE TO THE PING ATTACK.
2.REDUCE TIME OUT SESSION OF ACONNECTION
TO TAKE PLACE.
3.DISABLE ALL ECHO SERVICES THAT YOU
DON’T NEED.
4.USE PACKET FILTERING.
5.DISTRIBUTED DOS ATTACK.
TROJAN’S ATTACKS
TROJAN IS A ONE KIND OF SOFTWARE THAT IS
INSTALLED ON EITHER ON THE SYSTEM OF
VICTIM OR ON THE ATTACKER’S SYSTEM THAT
CAN BE USED FOR MALLICIOUS PURPOSE.
COUNTERMEASURES
AGAINS TROJAN’S ATTACKS
1.TROJANS ENTER INTO THE SYSTEM BY
SPECIFIC PORTS SO COMPARE THOSE PORTS
WITH TROJAN PORT , IF ANY SERVICE IS
RUNNING CLOSE THAT PORT.

2.DON’T ACCEPT ANY UNKNOWN FILE.

3.DOWN LOAD EXE FILES FROM TRUSTED SITES.


FIREWALLS
IT’S A SOFTWARE OR HARDWARE OR
COMBINATION OF SOFTWARE & HARDWARE
THAT FILTERS THE ALL INCOMING MESSAGE.
CONCLUSIONS:-
SECURITY IS REALLY A DIFFICULT
TOPIC.EVERYONE HAS DIFFERENT IDEA WHAT
“SECURITY” IS AND WHAT LEVELS OF RISK ARE
ACCEPTABLE.THE KEY TO BUILD SECURE
NETWORK FOR AN ORGANISATION IS TO DEFINE
WHAT SECURITY MEAN TO YOUR
ORGANISATION.ONCE IT HAS BEEN DEFINED
EVERYTHING THAT GOES ON TO THE NETWORK
CAN BE EVALUATED.
SECURITY IS EVERYONE’S BUSINESS AND ONLY
WITH EVERYBODY’S COOPERATION AN
INTELLIGENT POLICY WILL BE AVAILABLE
References:-
1 The New Lexicon Webster's Encyclopedic Dictionary of the English
Language. New York: Lexicon.
2 R.T. Morris, 1985. A Weakness in the 4.2BSD Unix TCP/IP Software.
Computing Science Technical Report No. 117, AT&T Bell Laboratories,
Murray Hill, New Jersey.
3 S.M. Bellovin. Security Problems in the TCP/IP Protocol Suite.
Computer Communication Review, Vol. 19, No. 2, pp. 32-48, April 1989.
4 Y. Rekhter, R. Moskowitz, D. Karrenberg, G. de Groot, E. Lear,
``Address Allocation for Private Internets.'' RFC 1918.
5 J.P. Holbrook, J.K. Reynolds. ``Site Security Handbook.'' RFC 1244.
6 M. Curtin, ``Snake Oil Warning Signs: Encryption Software to Avoid.''
USENET <sci.crypt> Frequently Asked Questions File.
7 Shield your computer from internet crime. By Richard Mansfield
8 Internet security by Chris Prossie..
9 Incident Response by KevinMandia.
10 802.7 security by Bruce Potter
ANY
QUERY ?

You might also like