Network Attacks 
and 
Countermeasures
What is Attack? 
 Attack on Network to cause collateral 
damage to the network. 
 The main types of Attacks are 
Mapping Packet 
Sniffing 
Spoofing Hijacking DoS and DDoS
1. Mapping 
 To study the victim before attacking. 
 Continuously monitor the 
communication and get the key value. 
 IP Address is the best source for this 
mapping. 
 Mapping is more found in Nmap an 
open source default.
2. Packet Sniffing 
 A host that receives all the information 
between client and server. 
 Can water be prevented using 
promiscuous mode. 
Sending 
Password to bob 
and rules have 
arrived from bob. 
Trudy reading 
the messages. 
Sending 
Password to bob 
and rules have 
arrived from bob.
3. Spoofing 
 IP address is the main source. 
 Takes a target IP address and 
replaces it with Trudy's any IP 
address. 
 Spoofed IP address leaves the 
Network open. 
 Using Spoofed IP address Trudy can 
undergo various attack and remain 
safe. 
 Ingress Filter can stop IP Spoofing.
4. DoS and DDoS 
 Stop a service by overloading it. 
 SYN Flooding Attack- opening up the 
systems of network and stopping the 
handshake. 
 Smurf Attack- Innocent hosts 
responding to spoofed IP address. 
 DDoS is highly planned method, which 
works like virus spreading in body.
DDoS Attack
5. Hijacking 
 Combinational off all to disrupt the 
network. 
 Hacking can be carried over a 
individual system or the server of an 
organization. 
 Havoc.. Havoc.. Havoc…

Network Attacks and Countermeasures

  • 1.
    Network Attacks and Countermeasures
  • 2.
    What is Attack?  Attack on Network to cause collateral damage to the network.  The main types of Attacks are Mapping Packet Sniffing Spoofing Hijacking DoS and DDoS
  • 3.
    1. Mapping To study the victim before attacking.  Continuously monitor the communication and get the key value.  IP Address is the best source for this mapping.  Mapping is more found in Nmap an open source default.
  • 4.
    2. Packet Sniffing  A host that receives all the information between client and server.  Can water be prevented using promiscuous mode. Sending Password to bob and rules have arrived from bob. Trudy reading the messages. Sending Password to bob and rules have arrived from bob.
  • 5.
    3. Spoofing IP address is the main source.  Takes a target IP address and replaces it with Trudy's any IP address.  Spoofed IP address leaves the Network open.  Using Spoofed IP address Trudy can undergo various attack and remain safe.  Ingress Filter can stop IP Spoofing.
  • 6.
    4. DoS andDDoS  Stop a service by overloading it.  SYN Flooding Attack- opening up the systems of network and stopping the handshake.  Smurf Attack- Innocent hosts responding to spoofed IP address.  DDoS is highly planned method, which works like virus spreading in body.
  • 7.
  • 8.
    5. Hijacking Combinational off all to disrupt the network.  Hacking can be carried over a individual system or the server of an organization.  Havoc.. Havoc.. Havoc…