Tuesday, April 24, 2012

E-Tutorial 1 ( Common Network Attacks)

Oh yea, so INKS has a E-Tutorial. Hence why there's this post (DUH).

Blogpage is crappy. Pardon me while I continue to customize it!



Common Network attack Threats and Solution


ThreatsExplainationSolution
1) SpoofingSpoofing becomes a threat to network as information and data can be tweaked to change specifications in the packet that will result in misinformation(I.E, IP and MAC spoofing).Active checking the IP addresses of the packets will determine whether the IP address is reachable through the interface whereby it is received. If IP is unreachable via interface spoofing has occured.
Notes: This is usually done on the router.
2) SniffingPacket sniffing is the act of intercepting data packets that are being transmitted in the network.In order to prevent packet sniffing, one should end-to-end or user-to-user encryption
3) MappingMapping allows an attack to gather information of the victim or target, such as, the Operating System used, IP Address, port status, and Services that are being used or activated. Hence, to prevent such an attack, it is always recommended that users have strong encryption services enabled.
4) HijackingHijacking or Man in the Middle attack utilizes the appearance of a weaker or compromised trusted link in the network to intrude on the remaining secure links that the compromised link has access to.To be updated
5)TrojansThere are no limits to how a trojan can attack a computer. The only way to prevent a trojan is the early use of a cryptographic checksum or binary digital Signature Procedure.
6)Dos and DDoSDoS and DDoS are attacks based on the target of bringing down and crippling a large website or server by flooding and congesting the connection of the target, causing it to fail respond to real request.

However, DDoS is a more extensive case of a DoS as it utilizes "Zombie networks" which consist of compromised systems that are used to bring down websites and servers without the knowledge of the user.
To date, only weak DoS attempts has been preventable thorough ingress filtering
7)Social EngineeringSocial engineering is the usage of persuasion and deception to gain access into systems, which the medium to doing so is usually through telephones or emails.Solutions to Social Engineering is non-existent as it operates the human element of networking, which has been refered to as the weakest link of all networking

5 comments:

  1. Prevention of Hijacking or man in the middle attack is the integrity of public keys that must generally be assured in some manner, but need not be secret, passwords and shared secret keys have the additional secrecy requirement. Public keys can be verified by a certificate authority, whose public key is distributed through a secure channel

    Packet sniffing can also be detected in two ways which is host based, there are commands that can be run on the host machine to tell if the NIC is running in promiscuous mode or not and network based which tend to check for the presence of running process or log files.

    Solution to Trojans is the early use of a cryptographic checksum or binary digital signature procedure.

    ReplyDelete
  2. for the IP spoofing attack solution, the mechanism that does the job for detecting the source of the IP address in the packet when it is sending out to an external network is called the egress filter. It is generally part of a firewall or router function, if it detects that the source destination isn't one of the interface inside the network it will drop the packet. There's another filter called the ingress filter which blocks the packets outside the network with a source address inside the network. Both filters will help to prevent an attack of spoofing either inside or outside the network.

    ReplyDelete
  3. Nice table you have there! It shows the 7 common types of network attacks and their solutions in a fashion that is very readable and information could be easily digested from such a table! Very creative approach to the e-tutorial! Hope you could update the solutions to the blanks in your tables as soon as possible! Maybe you could also be more concise by adding in additional information and data around!
    Also, your table on trojans is lacking in terms of information and data, hope you could fill in more data to let us know exactly what is trojans, how do they work and other stuffs like that. Great work!
    Signing off,
    Li Weichao

    ReplyDelete
  4. I like the table thing you got going on. Haha. My suggestion for solutions to social engineering, is for the companies to educate its employees through the various social engineering methods. Security policies should also be put in place by the companies that would prevent a successful social engineering attempt.

    ReplyDelete
  5. A very good table made, it is very neat and all threats and solution are neatly placed and summarised. Most of the common network threats can be found here and the discription and solution are well written. Very good post! And lastly, a very nice opening you have there

    -Adler

    ReplyDelete