SlideShare a Scribd company logo
1 of 24
Download to read offline
Computer Security Management
(ISYS20261)
Lecture 6 - Network-based Attacks (1)




 Module Leader: Dr Xiaoqi Ma
 School of Science and Technology
Last week …

• Host-based attacks:
  – Malicious Code
  – Malicious Software

• Malicious Code
  – Backdoors
  – Computer Viruses

• Malicious Software (Malware)
  – Computer Worms
  – Trojan Horses (Trojans)
  – Rootkits
  – Spyware




Computer Security Management
Page 2
Today ...

• Computer networking
• Network-based attacks




Computer Security Management
Page 3
Computer networking

• Need for communication between computer systems or devices
• Systems are connected via physical networks and talk to each other
  using standard protocols
• Networking, routers, routing protocols, etc., are specified by the
  Internet Engineering Task Force (IETF)
• Published in Requests for Comments (RFCs)
• ISO standard for worldwide communication: Open Systems
  Interconnect (OSI) reference model




Computer Security Management
Page 4
The OSI Reference Model (1)

• abstract description for layered communications and computer
  network protocol design
• it divides network architecture into seven layers
  – Application
  – Presentation
  – Session
  – Transport
  – Network
  – Data-Link
  – Physical Layer

• Layer: collection of conceptually similar functions that provide
  services to the layer above it and receives service from the layer
  below it

Computer Security Management
Page 5
The OSI Reference Model (2)

• Application Layer
  – interacts with software applications that implement a communicating component
  – Examples: File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP),
    etc.

• Presentation Layer
  – establishes a context between Application Layer entities

• Session Layer
  – controls the dialogues/connections (sessions) between computers
  – establishes, manages and terminates the connections between the local and
    remote application

• Transport Layer
  – provides transparent transfer of data between end users
  – provides reliable data transfer services to the upper layers


Computer Security Management
Page 6
The OSI Reference Model (3)

• Network Layer
  – provides the functional and procedural means of transferring variable length
    data sequences from a source to a destination via one or more networks
  – Maintains the quality of service requested by the Transport Layer

• Data Link Layer
  – provides the functional and procedural means to transfer data between network
    entities
  – detects and possibly corrects errors that may occur in the Physical layer

• Physical Layer
  – defines the electrical and physical specifications for devices
  – includes the layout of pins, voltages, cable specifications, Hubs, repeaters,
    network adapters, Host Bus Adapters, etc




Computer Security Management
Page 7
The OSI Reference Model (4)

         Layer                 Data Unit                 Function

    Application 7                          Network process to application

   Presentation 6                Data      Data representation and encryption

      Session 5                            Inter-host communication
                                           End-to-end connections and
    Transport 4                Segment
                                           reliability
                                           Path determination and logical
     Network 3                  Packet
                                           addressing
     Data link 2                Frame      Physical addressing (MAC & LLC)

      Physical 1                  Bit      Media, signal and binary transmission



Computer Security Management
Page 8
OSI Reference Model vs. TCP/IP

                   Layer       OSI Reference Model       TCP/IP

                      7            Application

                      6           Presentation         Application

                      5              Session

                      4             Transport          Transport

                      3             Network             Internet

                      2             Data link        Network access

                      1             Physical




Computer Security Management
Page 9
Network devices (1)

• Network Interface Card (NIC)
  – computer hardware
  – designed to allow computers to communicate over a computer network
  – provides physical access to a networking media and often provides a low-level
    addressing system through the use of Media Access Control (MAC) addresses

• Repeater
  – electronic device that receives a signal and retransmits it at a higher power level
    so that the signal can cover longer distances without degradation
  – Example: in most twisted pair Ethernet configurations, repeaters are required
    for cable runs longer than 100 meters away from the computer




Computer Security Management
Page 10
Network devices (2)

• Hub
  – contains multiple ports
  – when a packet arrives at one port, it is copied to all the ports of the hub for
    transmission

• Example:

                                                          Workstation


                               Network
                                             Hub
                                                          Workstation




                                                          Workstation


Computer Security Management
Page 11
Network devices (3)

• Router
  – networking device that forwards data packets between networks using headers
    and forwarding tables to determine the best path to forward the packets
  – work at the network layer of the TCP/IP model or layer 3 of the OSI model
  – Embedded computer system running dedicated OS, e.g. IOS (Cisco) or JUNOS
    (Juniper Networks)

• Example:

                                                          LAN
                               LAN




                                       Internet
                          Router                         Router




Computer Security Management
Page 12
Network devices (4)

• Switch
  – Hardware that allow traffic to be sent only where it is needed
  – Ethernet switch: operates at the data-link layer to create a different collision
    domains (segments) per switch port

• Example:



                                         Workstation A   Workstation B


                               Network
                                            Switch




                                         Workstation D   Workstation C

Computer Security Management
Page 13
Network-based attacks

• Primary attempt to
  – forge or steal data
  – gain unauthorised access to a system

• Means
  – Sniffing data
  – Redirecting data

• Take advantage of vulnerabilities of OS and by exploiting inherent
  weaknesses of the Internet, Transport, and/or Application layer of
  TCP/IP
• Usually involves a sequence of preceding steps to identify a
  potential vulnerability that can be exploited
  – Reconnaissance
  – Scanning

Computer Security Management
Page 14
Reconnaissance phase

• Information gathering step
• intruder ties to gather as much information about the network and
  the target computer(s) as possible
• avoids to raise alarms about his/her activities
• collects data regarding network settings, subnet ids, router
  configurations, host names, DNS server information, security level
  settings, etc.
• Application servers are often targets of attacks
  – web servers
  – DNS servers
  – SMTP mail servers
  – Etc.


Computer Security Management
Page 15
Scanning phase

• Network scanning
  – Sending probing packets to the identified network-specific devices to gain
    information about their configuration settings
  – Example: get IP address from DNS server etc.

• Host scanning
  – Connect to target host
  – probe target machine to check if any known vulnerabilities specific to the OS are
    present
  – Example: using port scanning to identify services running on the host system




Computer Security Management
Page 16
Attacks (1)

• Sniffing
• IP address spoofing
• Man-in-the-middle attack
• Denial-of-service attack (DoS)
  – SYN flooding
  – Smurf attack
  – Distributed Denial of Service attack (DDoS)




Computer Security Management
Page 17
Attacks (2)

• OS-based attacks
  – Stack smashing
  – Buffer overflows
  – Password attacks

• Web application attacks
  – Phishing
  – Pharming
  – Session Hijacking
  – Cross-site scripting (XSS)




Computer Security Management
Page 18
Sniffing (1)

• computer software or computer hardware (sniffer) intercepts and
  logs traffic passing over a digital network (eavesdropping)
• Works on data link layer of TCP/IP
• as data streams flow across the network, the sniffer captures each
  packet and eventually decodes and analyses its content according to
  the appropriate specifications, e.g. RFC
• Not only done by criminals: legally used by network administrator,
  e.g. for fault detection
• In the UK: it is legal to monitor network traffic only if you get
  official permission from the dedicated network administrator




Computer Security Management
Page 19
Sniffing (2)

• sniffer needs to be placed inside the network
• When nodes are connected to a hub: easy to monitor traffic
• When nodes are connected to a switch port rather than a hub the
  sniffer will be unable to read the data due to the intrinsic nature of
  switched networks
• Exception: when a network switch with a so-called monitoring port
  is in use it is easy to monitor all data packets in a LAN




Computer Security Management
Page 20
Sniffing (3)

• Legally used for:
  – Analyse network problems
  – Detect network intrusion attempts
  – Gain information for affecting a network intrusion
  – Monitor network usage
  – Gather and report network statistics
  – Filter suspect content from network traffic
  – Debug client/server communications
  – Debug network protocol implementations

• Criminal use:
  – Spy on other network users and collect sensitive information, e.g. passwords
  – Reverse engineer protocols used over the network




Computer Security Management
Page 21
Sniffing (4)

• Sniffers usually software based
• tcpdump
  – common packet sniffer used on UNIX machines
  – runs under the command line
  – allows the user to intercept and display TCP/IP and other packets being
    transmitted or received over a network to which the computer is attached

• Wireshark:
  – Free tool
  – Available for a wide range of OSs, including Linux, Mac OS, MS Windows, etc.
  – similar to tcpdump but offers a graphical user interface
  – More information: www.wireshark.org

• Commercial tools
  – E.g. Microsoft Network Monitor, NetScout, etc.

Computer Security Management
Page 22
Sniffing (5)

• Hardware network sniffers: Network Taps
• Network Tap
  – hardware device for monitoring the network traffic between two points in the
    network
  – has at least three ports: A port, a B port, and a monitor port
  – To place the Tap between points A and B, the network cable between point A
    and point B is replaced with a pair of cables, one going to the Tap's A port, one
    going to the Tap's B port
  – The Tap passes through all traffic between A and B, so A and B still think they
    are connected to each other, but the Tap also copies the traffic between A and B
    to its monitor port, enabling a third party to listen

• Problem: expensive to monitor all data in a 10Gbit network
• Solution: use of filterable Tap, parse off the data, applications,
  VLAN...etc to a 1 Gig port for deep analysis and monitoring

Computer Security Management
Page 23
Next week …

… we will continue looking at network-based attacks




Computer Security Management
Page 24

More Related Content

What's hot

Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnologyGulrez Khan
 
Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks Nicola Cerami
 
computer networks
computer networks computer networks
computer networks MiXvideos
 
networking hypherlink Group 2 presentation
networking hypherlink Group 2 presentationnetworking hypherlink Group 2 presentation
networking hypherlink Group 2 presentationHerson Franz Ugale
 
Sample elements of computer networking
Sample elements of computer networkingSample elements of computer networking
Sample elements of computer networkingRameesh Paul
 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Conceptszaisahil
 
Chapter 11
Chapter 11Chapter 11
Chapter 11cclay3
 
C10 support for-mobility
C10 support for-mobilityC10 support for-mobility
C10 support for-mobilityRio Nguyen
 
Network protocols and vulnerabilities
Network protocols and vulnerabilitiesNetwork protocols and vulnerabilities
Network protocols and vulnerabilitiesG Prachi
 
Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301Editor IJARCET
 
Sonali Bank Network Design Project Report
Sonali Bank Network Design Project ReportSonali Bank Network Design Project Report
Sonali Bank Network Design Project ReportHasibul Islam Nirob
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networkingicanhasfay
 
C11 support for-mobility
C11 support for-mobilityC11 support for-mobility
C11 support for-mobilityRio Nguyen
 
Understanding computer networks
Understanding computer networksUnderstanding computer networks
Understanding computer networksUC San Diego
 
Basics concept of network and internet mansi
Basics concept of network and internet   mansiBasics concept of network and internet   mansi
Basics concept of network and internet mansiMansiGupta298
 
Network types & its topology
Network types & its topologyNetwork types & its topology
Network types & its topologyDEVI NATARAJAN
 

What's hot (19)

Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnology
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks
 
computer networks
computer networks computer networks
computer networks
 
networking hypherlink Group 2 presentation
networking hypherlink Group 2 presentationnetworking hypherlink Group 2 presentation
networking hypherlink Group 2 presentation
 
Sample elements of computer networking
Sample elements of computer networkingSample elements of computer networking
Sample elements of computer networking
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basic
 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Concepts
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
C10 support for-mobility
C10 support for-mobilityC10 support for-mobility
C10 support for-mobility
 
Network protocols and vulnerabilities
Network protocols and vulnerabilitiesNetwork protocols and vulnerabilities
Network protocols and vulnerabilities
 
Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301Ijarcet vol-2-issue-7-2297-2301
Ijarcet vol-2-issue-7-2297-2301
 
Sonali Bank Network Design Project Report
Sonali Bank Network Design Project ReportSonali Bank Network Design Project Report
Sonali Bank Network Design Project Report
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 
C11 support for-mobility
C11 support for-mobilityC11 support for-mobility
C11 support for-mobility
 
Understanding computer networks
Understanding computer networksUnderstanding computer networks
Understanding computer networks
 
Basics concept of network and internet mansi
Basics concept of network and internet   mansiBasics concept of network and internet   mansi
Basics concept of network and internet mansi
 
Network types & its topology
Network types & its topologyNetwork types & its topology
Network types & its topology
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 

Similar to Isys20261 lecture 06

Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentalsThe Avi Sharma
 
communication-protocols
 communication-protocols communication-protocols
communication-protocolsAli Kamil
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.pptssuserf7cd2b
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.pptssuserf7cd2b
 
Chapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network DesignChapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network Designnakomuri
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA Aiman Hud
 
unit-1fon (1).pptx
unit-1fon (1).pptxunit-1fon (1).pptx
unit-1fon (1).pptxDeepVala5
 
homenet-ews.ppt
homenet-ews.ppthomenet-ews.ppt
homenet-ews.pptTariq Emad
 
DCN-chapter1.pdf
DCN-chapter1.pdfDCN-chapter1.pdf
DCN-chapter1.pdfMakuBandar
 
Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)Ammar Shafiq
 
Fundamental Of Computer Network.
Fundamental Of Computer Network. Fundamental Of Computer Network.
Fundamental Of Computer Network. PushpendraSingh483
 
Computer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerComputer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerDeepak John
 
CCNA ppt Day 2
CCNA ppt Day 2CCNA ppt Day 2
CCNA ppt Day 2VISHNU N
 
Basic networking 07-2012
Basic networking 07-2012Basic networking 07-2012
Basic networking 07-2012Samuel Dratwa
 

Similar to Isys20261 lecture 06 (20)

Networking fundamentals
Networking  fundamentalsNetworking  fundamentals
Networking fundamentals
 
communication-protocols
 communication-protocols communication-protocols
communication-protocols
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
06 - OSI Model.ppt
06 - OSI Model.ppt06 - OSI Model.ppt
06 - OSI Model.ppt
 
Chapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network DesignChapter 1 overview-stij3053 - Network Design
Chapter 1 overview-stij3053 - Network Design
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
Networking Fundamentals.ppt
Networking Fundamentals.pptNetworking Fundamentals.ppt
Networking Fundamentals.ppt
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
unit-1fon (1).pptx
unit-1fon (1).pptxunit-1fon (1).pptx
unit-1fon (1).pptx
 
homenet-ews.ppt
homenet-ews.ppthomenet-ews.ppt
homenet-ews.ppt
 
DCN-chapter1.pdf
DCN-chapter1.pdfDCN-chapter1.pdf
DCN-chapter1.pdf
 
Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)Skr+3200+chapter+2+(kweh)
Skr+3200+chapter+2+(kweh)
 
Fundamental Of Computer Network.
Fundamental Of Computer Network. Fundamental Of Computer Network.
Fundamental Of Computer Network.
 
Network Protocol and TCP/IP
Network Protocol and TCP/IPNetwork Protocol and TCP/IP
Network Protocol and TCP/IP
 
Computer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerComputer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link Layer
 
CCNA ppt Day 2
CCNA ppt Day 2CCNA ppt Day 2
CCNA ppt Day 2
 
OSI layer (Network)
OSI layer (Network)OSI layer (Network)
OSI layer (Network)
 
Networking lec1 4
Networking lec1 4Networking lec1 4
Networking lec1 4
 
VOICE
VOICEVOICE
VOICE
 
Basic networking 07-2012
Basic networking 07-2012Basic networking 07-2012
Basic networking 07-2012
 

More from Wiliam Ferraciolli

Lecture 12 monitoring the network
Lecture 12   monitoring the networkLecture 12   monitoring the network
Lecture 12 monitoring the networkWiliam Ferraciolli
 
Lecture 11 managing the network
Lecture 11   managing the networkLecture 11   managing the network
Lecture 11 managing the networkWiliam Ferraciolli
 
Lecture 10 the user experience
Lecture 10   the user experienceLecture 10   the user experience
Lecture 10 the user experienceWiliam Ferraciolli
 
Lecture 10 the user experience (1)
Lecture 10   the user experience (1)Lecture 10   the user experience (1)
Lecture 10 the user experience (1)Wiliam Ferraciolli
 
Lecture 7 naming and structuring objects
Lecture 7   naming and structuring objectsLecture 7   naming and structuring objects
Lecture 7 naming and structuring objectsWiliam Ferraciolli
 
Lecture 5&6 corporate architecture
Lecture 5&6   corporate architectureLecture 5&6   corporate architecture
Lecture 5&6 corporate architectureWiliam Ferraciolli
 
Lecture 3 more on servers and services
Lecture 3   more on servers and servicesLecture 3   more on servers and services
Lecture 3 more on servers and servicesWiliam Ferraciolli
 
Lecture 2 servers and services
Lecture 2   servers and servicesLecture 2   servers and services
Lecture 2 servers and servicesWiliam Ferraciolli
 
Lecture 13, 14 & 15 c# cmd let programming and scripting
Lecture 13, 14 & 15   c# cmd let programming and scriptingLecture 13, 14 & 15   c# cmd let programming and scripting
Lecture 13, 14 & 15 c# cmd let programming and scriptingWiliam Ferraciolli
 

More from Wiliam Ferraciolli (20)

Lecture 12 monitoring the network
Lecture 12   monitoring the networkLecture 12   monitoring the network
Lecture 12 monitoring the network
 
Lecture 11 managing the network
Lecture 11   managing the networkLecture 11   managing the network
Lecture 11 managing the network
 
Lecture 10 the user experience
Lecture 10   the user experienceLecture 10   the user experience
Lecture 10 the user experience
 
Lecture 10 the user experience (1)
Lecture 10   the user experience (1)Lecture 10   the user experience (1)
Lecture 10 the user experience (1)
 
Lecture 9 further permissions
Lecture 9   further permissionsLecture 9   further permissions
Lecture 9 further permissions
 
Lecture 8 permissions
Lecture 8   permissionsLecture 8   permissions
Lecture 8 permissions
 
Lecture 7 naming and structuring objects
Lecture 7   naming and structuring objectsLecture 7   naming and structuring objects
Lecture 7 naming and structuring objects
 
Lecture 5&6 corporate architecture
Lecture 5&6   corporate architectureLecture 5&6   corporate architecture
Lecture 5&6 corporate architecture
 
Lecture 4 client workstations
Lecture 4   client workstationsLecture 4   client workstations
Lecture 4 client workstations
 
Lecture 3 more on servers and services
Lecture 3   more on servers and servicesLecture 3   more on servers and services
Lecture 3 more on servers and services
 
Lecture 2 servers and services
Lecture 2   servers and servicesLecture 2   servers and services
Lecture 2 servers and services
 
Lecture 1 introduction
Lecture 1   introductionLecture 1   introduction
Lecture 1 introduction
 
Lecture 13, 14 & 15 c# cmd let programming and scripting
Lecture 13, 14 & 15   c# cmd let programming and scriptingLecture 13, 14 & 15   c# cmd let programming and scripting
Lecture 13, 14 & 15 c# cmd let programming and scripting
 
Isys20261 lecture 14
Isys20261 lecture 14Isys20261 lecture 14
Isys20261 lecture 14
 
Isys20261 lecture 12
Isys20261 lecture 12Isys20261 lecture 12
Isys20261 lecture 12
 
Isys20261 lecture 11
Isys20261 lecture 11Isys20261 lecture 11
Isys20261 lecture 11
 
Isys20261 lecture 10
Isys20261 lecture 10Isys20261 lecture 10
Isys20261 lecture 10
 
Isys20261 lecture 09
Isys20261 lecture 09Isys20261 lecture 09
Isys20261 lecture 09
 
Isys20261 lecture 08
Isys20261 lecture 08Isys20261 lecture 08
Isys20261 lecture 08
 
Isys20261 lecture 07
Isys20261 lecture 07Isys20261 lecture 07
Isys20261 lecture 07
 

Isys20261 lecture 06

  • 1. Computer Security Management (ISYS20261) Lecture 6 - Network-based Attacks (1) Module Leader: Dr Xiaoqi Ma School of Science and Technology
  • 2. Last week … • Host-based attacks: – Malicious Code – Malicious Software • Malicious Code – Backdoors – Computer Viruses • Malicious Software (Malware) – Computer Worms – Trojan Horses (Trojans) – Rootkits – Spyware Computer Security Management Page 2
  • 3. Today ... • Computer networking • Network-based attacks Computer Security Management Page 3
  • 4. Computer networking • Need for communication between computer systems or devices • Systems are connected via physical networks and talk to each other using standard protocols • Networking, routers, routing protocols, etc., are specified by the Internet Engineering Task Force (IETF) • Published in Requests for Comments (RFCs) • ISO standard for worldwide communication: Open Systems Interconnect (OSI) reference model Computer Security Management Page 4
  • 5. The OSI Reference Model (1) • abstract description for layered communications and computer network protocol design • it divides network architecture into seven layers – Application – Presentation – Session – Transport – Network – Data-Link – Physical Layer • Layer: collection of conceptually similar functions that provide services to the layer above it and receives service from the layer below it Computer Security Management Page 5
  • 6. The OSI Reference Model (2) • Application Layer – interacts with software applications that implement a communicating component – Examples: File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), etc. • Presentation Layer – establishes a context between Application Layer entities • Session Layer – controls the dialogues/connections (sessions) between computers – establishes, manages and terminates the connections between the local and remote application • Transport Layer – provides transparent transfer of data between end users – provides reliable data transfer services to the upper layers Computer Security Management Page 6
  • 7. The OSI Reference Model (3) • Network Layer – provides the functional and procedural means of transferring variable length data sequences from a source to a destination via one or more networks – Maintains the quality of service requested by the Transport Layer • Data Link Layer – provides the functional and procedural means to transfer data between network entities – detects and possibly corrects errors that may occur in the Physical layer • Physical Layer – defines the electrical and physical specifications for devices – includes the layout of pins, voltages, cable specifications, Hubs, repeaters, network adapters, Host Bus Adapters, etc Computer Security Management Page 7
  • 8. The OSI Reference Model (4) Layer Data Unit Function Application 7 Network process to application Presentation 6 Data Data representation and encryption Session 5 Inter-host communication End-to-end connections and Transport 4 Segment reliability Path determination and logical Network 3 Packet addressing Data link 2 Frame Physical addressing (MAC & LLC) Physical 1 Bit Media, signal and binary transmission Computer Security Management Page 8
  • 9. OSI Reference Model vs. TCP/IP Layer OSI Reference Model TCP/IP 7 Application 6 Presentation Application 5 Session 4 Transport Transport 3 Network Internet 2 Data link Network access 1 Physical Computer Security Management Page 9
  • 10. Network devices (1) • Network Interface Card (NIC) – computer hardware – designed to allow computers to communicate over a computer network – provides physical access to a networking media and often provides a low-level addressing system through the use of Media Access Control (MAC) addresses • Repeater – electronic device that receives a signal and retransmits it at a higher power level so that the signal can cover longer distances without degradation – Example: in most twisted pair Ethernet configurations, repeaters are required for cable runs longer than 100 meters away from the computer Computer Security Management Page 10
  • 11. Network devices (2) • Hub – contains multiple ports – when a packet arrives at one port, it is copied to all the ports of the hub for transmission • Example: Workstation Network Hub Workstation Workstation Computer Security Management Page 11
  • 12. Network devices (3) • Router – networking device that forwards data packets between networks using headers and forwarding tables to determine the best path to forward the packets – work at the network layer of the TCP/IP model or layer 3 of the OSI model – Embedded computer system running dedicated OS, e.g. IOS (Cisco) or JUNOS (Juniper Networks) • Example: LAN LAN Internet Router Router Computer Security Management Page 12
  • 13. Network devices (4) • Switch – Hardware that allow traffic to be sent only where it is needed – Ethernet switch: operates at the data-link layer to create a different collision domains (segments) per switch port • Example: Workstation A Workstation B Network Switch Workstation D Workstation C Computer Security Management Page 13
  • 14. Network-based attacks • Primary attempt to – forge or steal data – gain unauthorised access to a system • Means – Sniffing data – Redirecting data • Take advantage of vulnerabilities of OS and by exploiting inherent weaknesses of the Internet, Transport, and/or Application layer of TCP/IP • Usually involves a sequence of preceding steps to identify a potential vulnerability that can be exploited – Reconnaissance – Scanning Computer Security Management Page 14
  • 15. Reconnaissance phase • Information gathering step • intruder ties to gather as much information about the network and the target computer(s) as possible • avoids to raise alarms about his/her activities • collects data regarding network settings, subnet ids, router configurations, host names, DNS server information, security level settings, etc. • Application servers are often targets of attacks – web servers – DNS servers – SMTP mail servers – Etc. Computer Security Management Page 15
  • 16. Scanning phase • Network scanning – Sending probing packets to the identified network-specific devices to gain information about their configuration settings – Example: get IP address from DNS server etc. • Host scanning – Connect to target host – probe target machine to check if any known vulnerabilities specific to the OS are present – Example: using port scanning to identify services running on the host system Computer Security Management Page 16
  • 17. Attacks (1) • Sniffing • IP address spoofing • Man-in-the-middle attack • Denial-of-service attack (DoS) – SYN flooding – Smurf attack – Distributed Denial of Service attack (DDoS) Computer Security Management Page 17
  • 18. Attacks (2) • OS-based attacks – Stack smashing – Buffer overflows – Password attacks • Web application attacks – Phishing – Pharming – Session Hijacking – Cross-site scripting (XSS) Computer Security Management Page 18
  • 19. Sniffing (1) • computer software or computer hardware (sniffer) intercepts and logs traffic passing over a digital network (eavesdropping) • Works on data link layer of TCP/IP • as data streams flow across the network, the sniffer captures each packet and eventually decodes and analyses its content according to the appropriate specifications, e.g. RFC • Not only done by criminals: legally used by network administrator, e.g. for fault detection • In the UK: it is legal to monitor network traffic only if you get official permission from the dedicated network administrator Computer Security Management Page 19
  • 20. Sniffing (2) • sniffer needs to be placed inside the network • When nodes are connected to a hub: easy to monitor traffic • When nodes are connected to a switch port rather than a hub the sniffer will be unable to read the data due to the intrinsic nature of switched networks • Exception: when a network switch with a so-called monitoring port is in use it is easy to monitor all data packets in a LAN Computer Security Management Page 20
  • 21. Sniffing (3) • Legally used for: – Analyse network problems – Detect network intrusion attempts – Gain information for affecting a network intrusion – Monitor network usage – Gather and report network statistics – Filter suspect content from network traffic – Debug client/server communications – Debug network protocol implementations • Criminal use: – Spy on other network users and collect sensitive information, e.g. passwords – Reverse engineer protocols used over the network Computer Security Management Page 21
  • 22. Sniffing (4) • Sniffers usually software based • tcpdump – common packet sniffer used on UNIX machines – runs under the command line – allows the user to intercept and display TCP/IP and other packets being transmitted or received over a network to which the computer is attached • Wireshark: – Free tool – Available for a wide range of OSs, including Linux, Mac OS, MS Windows, etc. – similar to tcpdump but offers a graphical user interface – More information: www.wireshark.org • Commercial tools – E.g. Microsoft Network Monitor, NetScout, etc. Computer Security Management Page 22
  • 23. Sniffing (5) • Hardware network sniffers: Network Taps • Network Tap – hardware device for monitoring the network traffic between two points in the network – has at least three ports: A port, a B port, and a monitor port – To place the Tap between points A and B, the network cable between point A and point B is replaced with a pair of cables, one going to the Tap's A port, one going to the Tap's B port – The Tap passes through all traffic between A and B, so A and B still think they are connected to each other, but the Tap also copies the traffic between A and B to its monitor port, enabling a third party to listen • Problem: expensive to monitor all data in a 10Gbit network • Solution: use of filterable Tap, parse off the data, applications, VLAN...etc to a 1 Gig port for deep analysis and monitoring Computer Security Management Page 23
  • 24. Next week … … we will continue looking at network-based attacks Computer Security Management Page 24