Comparison of Network Attacks
Download
Report
Transcript Comparison of Network Attacks
Comparison of Network
Attacks
COSC 356
Kyler Rhoades
Two classes of Network Attacks
◦ Passive
◦ Active
Passive
◦ Non-evasive monitoring of transmissions
◦ Traffic Analysis
◦ Tricky to detect because data is unaffected
Active
◦ Attacker tries to bypass or break into a secured
system
◦ Results in the disclosure or dissemination of
data
Sniffing (Passive)
◦ AKA
Eavesdropping
Mapping
Sniffing
◦ Goals
Intercept information traveling throughout a
network
To gather information about a network
Sniffing
◦ How It Works
Attacker gains access to a network path
“Listen” to the data being transmitted back and
forth
◦ Plaintext format
◦ E-mail messages, User names, Passwords, Documents
Sniffing
Sniffing
◦ How To Combat Sniffing
Strong encryption methods
◦ Key-agreement protocol
Don’t use passive HUBS
Spoofing (Active)
◦ Impersonates another host
◦ IP Spoofing
Trusted Source
Spoofing
◦ Goals
Impersonate
◦ Malicious actions, if caught, will look as if another
legitimate user was behind the attack
Spoofing
◦ How It Works
Find an IP address of a host connected to a
secure network
Fakes his IP address to that the known host
Any data transmitted will appear to becoming
from the known host
Spoofing
Spoofing
◦ Attacks can also set up a spoofed access point
Legitimate users will think they are connected to
their network
Attacker can easily monitor traffic and attack the
connected hosts
Man-In-The-Middle Attack (Active)
◦ Weakness in the TCP/IP protocol
Headers
◦ Relies on spoofing
Man-In-The-Middle Attack
◦ How It Works
An attacker makes connections between two
victims and controls the relay between them
◦ Victims appear that they are on a private connection
◦ Attacker must be able to impersonate both victims
The attacker intercepts all the data transferred
between the victims
The attacker then can take the data and
manipulate it and send it to the recipient
Man-In-The-Middle Attack
Man-In-The-Middle Attack
◦ Defense
Strong mutual authentication protocols
◦ Key-agreement protocol
Denial of Service Attacks (DoS) (Active)
◦ Aims to prevent the normal use of a network or
device by legitimate users
Consume computational resources
◦ Bandwidth
◦ Disk Space
◦ CPU Time
Denial of Service Attacks (DoS)
◦ How It Works
Buffer overflow attack
◦ Sends more traffic to a network address then the
expected size of a given buffer.
◦ This can range from sending oversized internet control
message protocol packets to as simple as sending
emails that contain attachments with over 256
character file names.
Denial of Service Attacks (DoS)
◦ Smurfing attack
Sends an IP ping request to a site that tells it to
send the number of hosts in a site’s local network
The request appears to be sent from the target
host
The result is that a large number of ping replies
flooding back to the target host with the intention
that the host will not be able to tell between real
and fake traffic.
Smurfing Attack
Denial of Service Attacks (DoS)
◦ SYN Floods
When a computer wants to make a TCP/IP connection
to another computer, there is an exchange of TCP/SYN
and TCP/ACK packets.
The computer that is trying to connect will send a
TCP/SYN packet to the client requesting to connect.
The client will return a TCP/ACK packet telling the
computer it is allowed to connect.
The client then reserves a space for the incoming
connection and waits for the computer to respond with
another TCP/ACK packet.
The address of the computer requesting a connection is
spoofed and when the client sends the TCP/ACK packet
it is never received by a device or is simply ignored. If
you do this multiple times to a given client, you will
take up all the reserved connections for unresolved
hosts and other legitimate hosts will not be able to
connection to the client.
SYN Floods
Distributed Denial of Service Attacks
(DDoS) (Active)
◦ Multiple attackers flood the resources and
bandwidth of a target host.
◦ This is done by gaining control over many
other hosts first and then installing a slave
program.
◦ The master program, controlled by the
attacker, will contact the slave programs on all
the different hosts to coordinate a denial of
service attack on a target host.
Distributed Denial of Service Attacks
(DDoS)