Feleke Comp Network Security Part 3
Feleke Comp Network Security Part 3
&
Attack Mitigation
• Types of attacks
• ARP attack
Authentication
Integrity
Non Repudiation
Access Control
Availability
Source: Feleke Merin (Dr.-Engr.) 4
Computer Network Security
• Introduction
• In today’s highly networked world, we can’t talk of
computer security without talking of network security.
• Focus is on:
SMTP SNMP
transport
TCP UDP
network
ICMP IP IGMP
link
hardware
ARP RARP
interface
Source:
MediaFeleke Merin (Dr.-Engr.) 7
Levente Buttyán
Computer Network Security
• The next slides show some attacks at each layer of the TCP/IP stack
• Spoofing attack:
a situation in which one person or program
successfully imitate another by falsifying data and
thereby gaining an illegitimate advantage.
IP spoofing
Putting a wrong IP address in the source IP address of an IP packet
DNS spoofing
Changing the DNS information so that it directs to a wrong machine
140.252.13
Reply
08:00:20:03:F6:42 00:34:CD:C2:9F:A0 00:00:C0:C2:9B:26
.1 .2 .3 .4 .5
140.252.13
TCP Attacks
TCP Attacks…
TCP Attacks…
• Mr. Big Ears lies on the path between Alice and Bob
on the network
He can intercept all of their packets
Packets
The Void
TCP Attacks…
• Then, Mr. Big Ears sends his malicious packet with
the next ISN (sniffed from the network)
ISN, SRC=Alice
Malicious user
Source: Feleke Merin (Dr.-Engr.) 30
Computer Network Security Attacks
TCP Attacks…
• How do we prevent this?
• IPSec
Provides source authentication, so Mr. Big Ears cannot
pretend to be Alice
• Mobile code
Java applets and ActiveX controls
normally run within a controlled environment (sandbox) and access
to local resources is strictly controlled by a security manager
however, an applet may escape from the sandbox due to some bugs
in the implementation of the Java Virtual Machine for example
• Cookies
cookies are set by web servers and stored by web browsers
A cookie set by a server is sent back to the server when the
browser visits the server again
Cookies can be used to track what sites the user visits (can lead
to serious privacy violation!)
Source: Feleke Merin (Dr.-Engr.) 35
Computer Network Security Attacks
Application layer: Web browsers as threats…
• HTTPS
• S/MIME
• DNSSEC
• SSL Handshake