This paper is presenting types of attacks in security of TCP/IP protocol and also defense to security problems. Flaws in such system are due to attackers’ access over machine and due to insecurity of machine. Paper proposed solutions to the problems and discuss problems without considering their implementation.
Attack like “TCP sequence number prediction” where spoofing is allowed on host on a local network. A variant in TCP sequence number attack exploits the netstat service where the intruder impersonates a host that is down. If netstat is on the target host it supplies the necessary sequence number information on another port. Defense to this is by randomizing the increment, good logging and alerting mechanisms.
“The joy of routing” This is the simple attack that basically depend on routing protocols that has been used. It is further categorized in different attacks that can be “Source Routing” In which target host reverses source route in a TCP for traffic that is returning. So facilities can be exchanged between host and attacker. The idea to protect from attacks is to put gateways into the local net for rejection of external packets that acting as part of the local net or to do rejection of pre-authorized connections. Another attack is “The Routing Information Protocol (RIP)” attack is mostly used on local networks like broadcast media. As information here sent is not checked so intruder can change or send modified information due to which protocols that depends on
TCP SYN Flood : A SYN flood attack works by not responding to the server with the expected ACK code.
To reduce the risk of these types of attacks, routers should be hardened, packet filtering controls should be used and routing information should be controlled.
Generic Attacks against Routing: Routing is very important function in MANETs. It can also be easily misused, leading to several types of attack. Routing protocols in general are prone to attacks from malicious nodes. These protocols
Remember the internet works with ACL or access control list, allowing for the possible for a person to reach Google without being a part of the same subnet. There is a common method UDP host punching. UDP hole punching is a commonly used technique employed in network address translator (NAT) applications for maintaining User Datagram Protocol (UDP) packet streams that traverse the NAT. NAT traversal techniques are typically required for client-to-client networking applications on the Internet involving hosts connected in private networks, especially in peer-to-peer, Direct Client-to-Client (DCC) and Voice over Internet Protocol (VoIP) deployments. UDP hole punching establishes connectivity between two hosts communicating across one or more network address translators. Typically, an application, when it sets up direct communications between two or more communicating hosts choosing to use a third-party host on the public transit network by using a UDP port. Usually normal communications traffic or when there is no significant traffic keep-alive packet traffic usually consisting of empty UDP packets ore packets with minimal non-intrusive content enable once port state keep the port states open. A common example of programs which use UDP hole punching consist of Team
In this report I will be describing the ways in which networks can be attacked, also be giving real life example of each of the below.
(b) Redirection with modified hop count: This type of attack is targeted against the AODV protocol in which a malicious node can increase the chances that they are included on a newly created route by resetting the hop count field of a RREQ packet to zero. [17]
These attacks can be extremely damaging to one’s intellectual properties (information, money, etc) as well as a concern for personal safety. The key to stopping or minimizing these attacks is to learn what these attacks are and how they are executed to really create an effective plan to stop unnecessary losses.
Denial-of-Service (DDoS) attack is the one in which the host’s network elements are flooded with high volume of fabricated attacking packets that originate from a large number of machines [12]. A successful attack allows the attacker to gain access to the host’s machine, allowing stealing of sensitive internal data and possibly cause disruption and denial of service (DoS) in some cases.
In order for traffic to get back to the attacker during session hijacking, a process called __________ is used that allows the sender to specify a particular route for the IP packet to take to the destination.
2. (15 pts) Using general mass-media (such as news sites) identify a recent computer security incident. Discuss the incident in few sentences. Next, find at least three articles on computer security sites that discuss the technology behind the attack / prevention / reaction etc. for the incident. Remember to provide the links also. This part should not be longer than 1-1.5 pages.
Explain the two different types of attacks that can be performed in Cain and Able to crack user account passwords. Which do you think is the most effective and why?
tackers. For example, an attacker might want to get control of an IRC channel via
Today, security devices such as Firewall, IDS are used on the many organization's networks for preventing security attacks. But, these devices can only diagnose illegitimate traffic and prevent it. They cannot prevent attacks which are as a result of the network devices vulnerabilities in the switches, routers, and etc. A malicious user who is within the network can implement many attacks by using these vulnerabilities. This paper explains the kind of existing vulnerabilities in Cisco switches and methods of preventing these attacks from
From research on our network the external threats come from the internet majorly. Internet is a universal network that enables sharing of resources internationally. However, resource sharing can be greatly prone to attacks because the internet encompasses a lot of users with different motives. In addition, such attacks come from eavesdropping during transit but WebTechMsn has been able to address this issues by using fiber optic cables which are resistant to tapping of information a long communication channel.