Network Security
Network Security
Network Security refers to the measures taken by any enterprise or organization to secure its
computer network and data using both hardware and software systems. Network security
refers to all hardware and software functions, characteristics, features, operational
procedures, accountability measures, access controls, administrative and management policy
required to provide an acceptable level of protection for hardware, software, and information
in a network. This aims at securing the confidentiality, integrity and accessibility of the data
and network. There are three reasons as the main forces driving this continued increase in the
need for security:
There are three primary vulnerabilities or weaknesses:
Technology weaknesses
Configuration weaknesses
Security policy weaknesses
Technological Weaknesses: Computer and network technologies have intrinsic
security weaknesses. These include TCP/IP protocol weaknesses, operating system
weaknesses, and network equipment weaknesses.
Configuration Weaknesses: Network administrators or network engineers need to learn what
the configuration weaknesses are and correctly configure their computing and network
devices to compensate.
Security policy weaknesses can create unforeseen security threats. The network may pose
security risks to the network if users do not follow the security policy.
Threats are the people eager, willing, and qualified to take advantage of each security
weakness, and they continually search for new exploits and weaknesses. Finally, the threats
use a variety of tools, scripts, and programs to launch attacks against networks and network
devices. In this paper we will discuss the two primary classes of threats to network security,
there are internal threats and external threats. Internal threats to a network are a major source
of strain on the level of security attained by that network. These threats generally stem from
either disgruntled or unethical employees.
External threats to network security, generally referred to as hackers, can be equally and
sometimes more dangerous than internal threats. To obtain entry into a network or view
sensitive information, hackers must use some tools such as: 1- password sniffers, 2- IP
snooping, 3- E-Mail attacks. Password sniffers actually work with the execution of a packet
sniffer that monitors traffic on a network passing through the machine on which the sniffer
resides. The sniffer acquires the password and log-on name used when the source machine
attempts to connect to other machines and saves this information in a separate file later
obtained by the hacker. IP spoofing involves the capturing of the information in an
Information Packet (IP) to obtain the necessary address name of a workstation that has a
trusted relationship with yet another workstation. In doing so, a hacker can then act as one of
the workstation and use the trusted relationship to gain entry into the other workstation where
any number of actions can be performed. Finally, E-Mail is extremely vulnerable and quite
susceptible to a number of different attacks
OSI model is a reference model to understand how computer networks operate and
communicate. Using this ISO standard, organizations can understand where network
vulnerabilities may exist within their infrastructure and apply controls appropriately. OSI is
hierarchical model which supports in understanding of how packets move throughout a
network and how attacks and can disrupt can occur at any level.
Layer 1 : Physical Layer Security
Layer 1 refers to the physical aspect of networking disrupting this service, primarily resulting
in Denial of Service (DoS) attacks. Network vulnerabilities/threats which occur at this level
are the following:
1) Access Control
Permitting only authorized personnel to access.
Physical security keeps safe from unauthorized access.
Restricting access to critical servers and using strong passwords can prevent many
attacks.
2) Damage data bits
3) Environmental issues
Environmental issues at the Physical layer include fire, smoke, water.
Less control over environmental factors such as temperature, humidity, dust, and
ventilation can cause frequent failures.
4) Disconnection of Physical Links.
5) Backup
Layer 2 : Data Link security (Switch Security)
acts as a medium for communication between two directly connected hosts. At the sending
front, it transforms the data stream into signals bit by bit and transfers it to the hardware. On
the contrary, as a receiver, it receives data in the shape of electrical signals and transforms
them into an identifiable frame. Normally, this consists of switches utilizing protocols such as
the Spanning Tree Protocol (STP) and the Dynamic Host Configuration Protocol (DHCP).
Switches provide LAN connectivity and majority of threats come from internal LAN
MAC can be classified as a sublayer of the data link layer that is accountable for physical
addressing. MAC address is a unique address for a network adapter allocated by the
manufactures for transmitting data to the destination host. If a device has several network
adapters i.e., Ethernet, Wi-Fi, Bluetooth, etc., there would be different MAC addresses for
each standard.
1) ARPs/ARP spoofing
Address Resolution Protocol (ARP) is a protocol or procedure that connects an ever-changing
Internet Protocol (IP) address to a fixed physical machine address, also known as a media
access control (MAC) address, in a local-area network (LAN).
This mapping procedure is important because the lengths of the IP and MAC addresses differ,
and a translation is needed so that the systems can recognize one another. The most used IP
today is IP version 4 (IPv4). An IP address is 32 bits long. However, MAC addresses are 48
bits long. ARP translates the 32-bit address to 48 and vice versa. ARP caches are kept on all
operating systems in an IPv4 Ethernet network. Every time a device requests a MAC address
to send data to another device connected to the LAN, the device verifies its ARP cache to see
if the IP-to-MAC-address connection has already been completed.
ARP spoofing is a type of malicious attack in which a cyber criminal sends fake ARP
messages to a target LAN with the intention of linking their MAC address with the IP address
of a legitimate device or server within the network. The link allows for data from the victim's
computer to be sent to the attacker's computer instead of the original destination.
To prevent these attack, configuration is performed to ignore gratuitous ARPs. Edge VLAN
(Private VLANs) segregation and ARP inspection to mitigate this threat.
2) MAC Flooding
MAC (Media Access Control) Flooding is a cyber-attack in which an attacker floods network
switches with fake MAC addresses to compromise their security. A switch does not broadcast
network packets to the whole network and maintains network integrity by segregating data
and making use of VLANs (Virtual Local Area Network). To rapidly saturate the table, the
attacker floods the switch with a huge number of requests, each with a fake MAC address.
When the MAC table reaches the allocated storage limit, it begins removing old addresses
with the new ones. After removing all the legitimate MAC addresses, the switch starts
broadcasting all the packets to every switch port and takes on the role of network hub. Now,
when two valid users attempt to communicate, their data is forwarded to all available ports,
resulting in a MAC table flooding attack.
All the legitimate users will now be able to make an entry until this is completed. In these
situations, malicious entities make them a part of a network and send malicious data packets
to the user’s computer. As a result, the attacker will be able to capture all the ingoing and
outgoing traffic passing through the user’s system and can sniff the confidential data it
contains. The following snapshot of the sniffing tool, Wireshark, displays how the MAC
address table is flooded with bogus MAC addresses. An access control list (ACL) contains
rules that grant or deny access to certain digital environments.
The session layer allows users on different machines to establish sessions between them.
Sessions offer various services, including dialog control (keeping track of whose turn it is to
transmit), token management (preventing two parties from attempting the same critical
operation simultaneously), and synchronisation (checkpointing long transmissions to allow
them to pick up from where they left off in the event of a crash and subsequent recovery).
1) Session Hijacking
Security attack on a user session. A session hijacking attack works when it
compromises the token by guessing what an authentic token session will be, thus
acquiring unauthorized access to the Web server.
Layer 6 : Presentation Layer Security
The presentation layer is responsible for how data is presented to the user. Presentation of
various forms of information like graphics, text, audio, video etc in various forms to the user
is the major duty of this layer. Data encryption is also one of the functions of the presentation
layer to ensure data security. The presentation layer is working as the intermediate between
the Application layer and Session layer in OSI
SSL Hijacking
Superfish uses a process called SSL hijacking to get user’s encrypted data. When Internet
browser connects to the HTTP (insecure) site, HTTP server redirects to the HTTPS (secure)
version. HTTPS server provides a certificate, this certificate provides an identification to user
to get in and access to server. The connection is completed now.
Layer 7 : Application Layer Security
This layer is responsible for the actual physical connection between the devices by
identifying the equipment involved in the data transfer. Layer 1 defines the hardware
equipment, cabling, wiring, frequencies and pulses. The information is contained in the form
of bits and transmitted from one node to another.
The problem is that hardware security goes neglected; existing security software solutions do
not cover the Physical Layer of the OSI model (Layer 1). Without Layer 1 visibility, the
physical specifications of the network are not captured. Hence, network implants – Rogue
Devices which operate on the Physical Layer – are not detected. Similarly, spoofed
peripherals – Rogue Device manipulated on the Physical Layer – are identified as legitimate
HIDs. Without Layer 1 visibility, enterprises are at risk of Rogue Devices infiltrating their
network and conducting harmful attacks. As Layer 1 is the first of the OSI layers, it is crucial
to have adequate physical level security protection at this level to stop the attacks originating
from Rogue Devices at the very first instant; before being carried out. Safeguarding this layer
needs bio-metric security, camera-based surveillance, key cards, and other physical
monitoring.
Individual assignment
1. Examine other network security techniques like firewall, VPN, IDS and data backups
2. Suppose that you are responsible for designing a secure Internet banking application
a. What is network security protocol, and what is its purpose
b. Explain the security services that can be provided by security protocols.
c. Explain the commonly used security protocols in internet banking ie SET