Wednesday, 25 April 2012

E-Tutorial 1 ( Common Network Attacks )

There are many types of network attacks such as:
-Hijacking
-Spoofing
-DoS

1) Hijacking (Man in the middle attack)
 Man-in-middle attacks is a stranger assuming your identity in order to read your conversation with your friend. The person on the other end or your friend will most likely continue to think that they are still talking to you, because the stranger that assumed your indenity is continuing to reply to the conversations acting like you and thus will try to keep the conversation going for as long as possible to gain more information.
Solution:
The integrity of public keys must generally be assured in some manner, but need not be secret, passwords and shared secret keys have the additional secrecy requirement. Public keys can be verified by a certificate authority, whose public key is distributed through a secure channel

2) Spoofing
Any internet connected device that sends data through the internet will carry the sender's IP address as well as other important data. If the attacker obtains control over the software running on a network device, they can then easily modify the device's protocols to place an IP address into the data packet's source address field. which makes any packets source IP look like what the attacker wants it to be.

Solution:
The countermeasure for spoofing is ingress filtering which routers usually perform. Routers that perform filtering checks the IP address of incoming packets and determine whether the source addresses that are known to be reachable via that interface. If it can't be reached, the packet is discarded.

3) DoS
A denial of service attack is a special kind of Internet attack targeted at large websites. It is a type of attack on a network that is meant to bring the network down by flooding it with useless traffic.

Solution:
Only ingress filtering only can control DoS attack that are on a smaller scale.

Reference: http://ayurveda.hubpages.com/hub/Types-of-Network-Attacks

7 comments:

  1. This comment has been removed by the author.

    ReplyDelete
  2. For the spoofing attack, there's another filter called the egress filter which is part of a router or firewall function. When the computer in the internal network intended to send out a packet, the router or firewall will examine the source destination of the packet, if it detects that the source destination isn't one of the interface inside the network it will drop the packet. This helps to prevent the attacker within the network to launch an IP spoofing attack outside the network. It is also recommended to design network protocols and services that they do not rely on the IP source address for authentication.

    ReplyDelete
  3. This comment has been removed by the author.

    ReplyDelete
  4. HEY! Nice article on Common Network Attacks you've written there! Your article is well written and concise and readable at all times, you have excellent organisation in your article, the information reflected in your article is well thought out and tightly and relevantly linked as a whole. You have done a very good job on your article, hope to see more great works from you! And also your article is of a great quality! Maybe you could add more information to let us know more details about the network attacks! Maybe, you could write up on the other types of network attacks as well, your blog is very informative and I have been supporting your blog for a very long time! Thank you for all the hard work you've put in!

    ReplyDelete
  5. That's a very great post you have posted there! The information given for each type of networking attacks are clear and sufficient . The reference website which you referenced from also made understanding of each threats easier. Oh and for man in the middle attacks, the attacker can also intercept the communication between two people other than assuming one of the person's identity!

    ReplyDelete
  6. A great post, I've understand more about network attack, and what types of network attack there are in the reality world. The link u provided is very useful as it has other attacks that is not stated here. Just hope that u can further illustrate on DoS as it information is quite limited and viewers may not fully understand it. Overall a very nice post!

    -Adler

    ReplyDelete
  7. Hi, that is a good post on network attacks, it is very clearly stated and well organized, as all the information are stated under each specific heading. Pictures are also provided to let readers understand more about what the blogger is trying to show. Solutions are also given for every threat mentioned. Overall it is a nicely organized post.

    ReplyDelete