module v
module v
Protection
• Ping scans: A ping is used to check whether a network data packet can reach an IP
address without any issues. Ping scans involve automated transmissions of several ICMP
requests to various servers.
• 2Half-open or SYNC scans: Attackers can check the state of a port without creating a full
connection by using a half-open scan, often known as a SYN scan. This kind of scan just
transmits a SYN message and does not complete a connection with the recipient.
• XMAS scans: XMAS scans send a number of packets to a port to check if it is open. If the
port is closed, the scanner gets a response. If it does not get a response, that means the
port is open and can be used to access the network.
Protection
DoS attacks can be classified into several types based on the techniques used. Here are four
of the most common ones:
• Volume-Based Attacks: The aim here is to saturate the bandwidth of the targeted site.
Examples include ICMP floods and UDP floods.
• Protocol Attacks: These attacks focus on exploiting vulnerabilities in the target's
resources, like servers or load balancers. Examples include SYN floods and Ping of Death.
• Application Layer Attacks: These attacks target specific aspects of an application or
service. HTTP floods are a common example.
• Advanced Persistent DoS (APDoS): This is a more advanced form of DoS, where the
attacker uses multiple attacking systems and different attack vectors.
Types of DOS Attacks: ICMP flood
A ping(Packet Internet or Inter-Network Groper) which is also known as (ICMP)flood is
a denial-of-service attack in which the attacker attempts to overwhelm a targeted device with
ICMP echo-request packets, causing the target to become inaccessible to normal traffic.
When the attack traffic comes from multiple devices, the attack becomes a DDoS or distributed
denial-of-service attack.
Types of DOS Attacks: SYN flood
A SYN flood is a form of denial-of-service attack on data communications in which an
attacker rapidly initiates a connection to a server without finalizing the connection.
By repeatedly sending initial connection request (SYN) packets, the attacker is able to
overwhelm all available ports on a targeted server machine, causing the targeted device to
respond to legitimate traffic sluggishly or not at all.
Types of DOS Attacks
A UDP flood is a type of denial-of-service attack in which a large number of User Datagram
Protocol (UDP) packets are sent to a targeted server with the aim of overwhelming that device’s
ability to process and respond.
The firewall protecting the targeted server can also become exhausted as a result of UDP flooding,
resulting in a denial-of-service to legitimate traffic.
DDOS
• Distributed Denial of Service (DDoS) is a type of
DOS attack where multiple systems, which are
trojan infected, target a particular system which
causes a DoS attack.
• A DDoS attack uses multiple servers and Internet
connections to flood the targeted resource.
• A DDoS attack is one of the most powerful
weapons on the cyber platform.
• When a website being brought down, it generally
means it has become a victim of a DDoS attack
• This means that the hackers have attacked
website or PC by imposing heavy traffic. Thus,
crashing the website or computer due to
overloading.
• In 2016, Dyn was hit with a massive DDoS attack
that took down major websites and services such
as Netflix, PayPal, Amazon, and GitHub.
DDOS
• A botnet refers to group of computers which have been
infected by an attacker and is under his complete
control.
• The hacker starts to build the botnet by exploiting a
vulnerability in a computer, called the DDoS master, to
infect it with malware.
• The DDoS master then starts to spread the malware,
infecting other vulnerable devices to make them join the
botnet. The devices in the botnet are often called
zombies or bots.
• Each infected device spreads the malware further,
gathering more and more devices to the botnet.
• The number of devices in a botnet can be extremely
high with no known upper limit. Once the attacker is
ready to launch the attack, the amount of attack traffic
from the botnet has been known to exceed 1 Tbps.
Types
• HTTP flood
An HTTP flood attack is a type of volumetric distributed denial-of-service (DDoS) attack designed
to overwhelm a targeted server with HTTP requests .Once the target has been saturated with
requests and is unable to respond to normal traffic, denial-of-service will occur for additional
requests from actual users..
• PING(ICMP) flood
The target machine is sent so many ping requests that it is overwhelmed and fails to respond
• ping of death attack
A Ping of death (PoD) attack is a denial-of-service (DoS) attack, in which the attacker aims to disrupt
a targeted machine by sending a packet larger than the maximum allowable size, causing the
target machine to freeze or crash. The original ping of death attack is less common today. A related
attack known as an ICMP flood attack is more prevalent.
Types
Smurf Attack:
A Smurf attack is a distributed denial-of-service (DDoS) attack in which an attacker attempts
to flood a targeted server with Internet Control Message Protocol (ICMP)packets. By
making requests with the spoofed IP address of the targeted device to one or more
computer networks, the computer networks then respond to the targeted server,
amplifying the initial attack traffic and potentially overwhelming the target, rendering it
inaccessible. This attack vector is generally considered a solved vulnerability and is no
longer prevalent.
• DNS Amplification:
DNS server resolves domain name to IP address, the attacker crafts a DNS request( with the
target’s IP address) such that DNS server responds with a large amount of data and crashes
the target
• SYN Flood :
The attacker sends multiple SYN packets until the resources on target are totally consumed
and the target can no more receive any SYN packets further.
Preventing DDOS Attacks
• In order to provide a high degree of privacy SSL encrypts data that is transmitted across
the web.
• SSL initiates an authentication process called a handshake between two communicating
devices to ensure that both devices are really who they claim to be.
• SSL also digitally signs data in order to provide data integrity, verifying that the data is
not tampered with before reaching its intended recipient.
• There have been several iterations of SSL, each more secure than the last.
• In 1999 SSL was updated to become TLS.
SSL Protocol Stack:
SSL Record Protocol:
• This protocol uses the SSL record protocol. Unless Handshake Protocol is completed, the
SSL record Output will be in a pending state.
• After the handshake protocol, the Pending state is converted into the current state.
• Change-cipher protocol consists of a single message which is 1 byte in length and can
have only one value.
• This protocol’s purpose is to cause the pending state to be copied into the current state.
Alert Protocol
This protocol sends error ,problems or warnings about the connection between the two
parties.
This layer is formed with two fields: Severity level and Alert Description.
Severity Level:
• The severity level sends message with a ‘1’ or ‘2’ value, depending on the level of concern.
• A message with a value of ‘1’ is a cautionary or warning message, suggesting that the
parties discontinue their session and reconnect using a new handshake.
• A message with a value of ‘2’ is a fatal alert message, and requires that the parties
discontinue their session.
Alert Description:
• The Alert Description field indicates that the specific error that caused the Alert message
to be sent from a party.
• This field is one byte ,mapped to one of twelve specific numbers, and can take on one of
the following meaning.
• Those descriptions that always follows a fatal alert message are(level=‘2’) : Handshake
failure, Decompression failure, Illegal parameters, Bad record MAC, Unexpected
message.
• Warning Messages(level=‘1’) :Bad certificate, No certificate, Certificate expired,
Certificate unknown, Close notify, Certificate revoked, Unsupported certificate
IPsec (Internet Protocol Security)
• Internet Protocol Security is a suite of protocols and algorithms for securing data transmitted
over the internet or any public network.
• The Internet Engineering Task Force, or IETF, developed the IPsec protocols in the mid-1990s to
provide security at the IP layer through authentication and encryption of IP network packets
• IP-level security encompasses three functional areas: authentication, confidentiality, and key
management.
• The IP security capabilities were designed to be used for both with the current IPv4 and the
future IPv6 protocols
• .IPsec helps keep data sent over public networks secure. It is often used to set up VPNs and it
works by encrypting IP packets, along with authenticating the source where the packets come
from.
• Within the term "IPsec," "IP" stands for "Internet Protocol" and "sec" for "secure." The Internet
Protocol is the main routing protocol used on the Internet; it designates where data will go
using IP addresses.
• IPsec is secure because it adds encryption and authentication to this process.
• Networking protocol suites like TCP/IP are only concerned with connection and
delivery, and messages sent are not concealed.
• Anyone in the middle can read them. IPsec, and other protocols that encrypt data,
essentially put an envelope around data as it traverses networks, keeping it secure.
• The IPSec networking device will typically encrypt and compress all traffic going into
the WAN, and decrypt and decompress traffic coming from the WAN; these
operations are transparent to workstations and servers on the LAN.
Components of IP Security
Encapsulating Security Payload (ESP):
• It provides data integrity, encryption, authentication, and anti-replay. It also provides
authentication for payload.
.
Components of IP Security
• The SPI – a unique and random 32-bit value that, together with the destination IP address and
security protocol, uniquely identifies the SA for the packet.
• The sequence number – a monotonically increasing 32-bit counter used to protect
against replay attacks. When an SA is established the sequence number is reset to 0.
Encapsulated Security Payload(ESP)
• Payload data – a variable length field that typically contains the data payload, whose type
is denoted by the next header field. It may also contain cryptographic synchronization data,
such as an IV.
• Padding – used to fill the payload data to a specific block size multiple required by a
particular encryption algorithm, or to randomize the length of the payload in order to
protect against traffic flow analysis.
• Pad length – an 8-bit field whose value indicates in bytes the length of the padding field.
• Next header – an 8-bit field that identifies the type of data contained in the payload Data
Field
IPsec tunnel mode and IPsec transport mode?
• IPsec tunnel mode is used between two dedicated routers, with each router acting as
one end of a virtual "tunnel" through a public network.
• In IPsec tunnel mode, the original IP header containing the final destination of the
packet is encrypted, in addition to the packet payload.
• To tell intermediary routers where to forward the packets, IPsec adds a new IP header.
• At each end of the tunnel, the routers decrypt the IP headers to deliver the packets to
their destinations.
• In transport mode, the payload of each packet is encrypted, but the original IP header is
not.
• Intermediary routers are thus able to view the final destination of each packet.
Advantages of IPSec:
• Strong security: IPSec provides strong cryptographic security services that help protect
sensitive data and ensure network privacy and integrity.
• Wide compatibility: IPSec is an open standard protocol that is widely supported by
vendors and can be used in heterogeneous environments.
• Flexibility: IPSec can be configured to provide security for a wide range of network
topologies, including point-to-point, site-to-site, and remote access connections.
• Scalability: IPSec can be used to secure large-scale networks and can be scaled up or
down as needed.
• Improved network performance: IPSec can help improve network performance by
reducing network congestion and improving network efficiency.
IDS(Intrusion Detection System)
Hybrid Detection:
This IDS uses both signature-based as well as anomaly-based
detection system and enable it to detect potential threats with a
minimum error rate
Advantages
• It keeps a check on the routers, firewalls, key servers, and files and uses its database to
raise the alarm and send notifications.
• Offer centralized management for the correlation of the attack.
• Act as an additional layer of protection for the company.
• It analyzes different attacks, identifies their patterns, and helps the administrator to
organize and implement effective control.
• Provide system administrators the ability to quantify the attack.
• An intrusion detection system in cyber security help detects cyber security problems.
Firewall
• A Firewall is a network security device that monitors and filters incoming and outgoing
network traffic based on an organization’s previously established security policies.
• At its most basic, a firewall is essentially the barrier that sits between a private internal
network and the public Internet.
• A firewall’s main purpose is to allow non-threatening traffic in and to keep dangerous
traffic out.
• Firewalls are designed with modern security techniques that are used in a wide range of
applications.
• A firewall can be hardware, software or both.
Working
• A firewall system analyzes network traffic based on pre-defined rules. It then filters the
traffic and prevents any such traffic coming from unreliable or suspicious sources.
• It only allows incoming traffic that is configured to accept.
• Typically, firewalls intercept network traffic at a computer's entry point, known as a port.
• Incoming traffic is allowed only through trusted IP addresses, or sources.
Firewall Characteristics
• Physical Barrier: A firewall does not allow any external traffic to enter a system or a
network without its allowance.
• Multi-Purpose: A firewall has many functions other than security purposes. It configures
domain names and Internet Protocol(IP) addresses. It also acts as a network address
translator.
• Flexible Security Policies: Different local systems or networks need different security
policies. A firewall can be modified according to the requirement of the user by changing
its security policies.
• Security Platform: All the queries related to security can be kept under check from one
place in a system or network.
• Access Handler: Determines which traffic needs to flow first according to priority or can
change for a particular network or system. specific action requests may be initiated and
allowed to flow through the firewall.
Firewall
Host-based Firewalls
• A host-based firewall is installed on each network node, which controls each incoming and
outgoing packet.
• is a software application or suite of applications that come as a part of the operating system. Host
firewall protects each host from attacks and unauthorized access.
Network-based Firewalls
Network firewall function on network level. These firewalls filter all incoming and outgoing traffic
across the network. It protects the internal network by filtering the traffic using rules defined on the
firewall. A Network firewall might have two or more network interface cards (NICs). A network-based
firewall is usually a dedicated system with proprietary software installed.
The network scanning process is also known as host discovery, which is often the first step
hackers take in staging an attack. They use two primary protocols: Address Resolution
Protocol (ARP) scans and various ICMP scans. An ARP scan maps IP addresses to media access
control (MAC) addresses and can be used to determine hosts that are active. It only works
within a local-area network (LAN), so the attacker must be connected to the internal network.
Various ICMP packets can be used to conduct a network scan outside the LAN, such as
address mark, echo, and timestamp requests. Discovering hosts depends on receiving a reply
from targeted hosts. Not receiving a response means there is no host at the target address or
the request was blocked by a firewall or packet filter.
Once the network scan has been scanned and a list of available hosts compiled, port checker
or port scanner attack can identify the usage of specific ports. It will typically classify ports as
open, closed, or filtered.