SlideShare a Scribd company logo
INFORMATION AND NETWORK SECURITY
(2170703)
TYPES OF ATTACKS
SUBMITTED TO :
Prof. BRIJESH PATEL
SUBMITTED BY :
ASHKA SONI
(140110107004)
DHRUVIN R SHAH
(140110107013)
VIVEK GANDHI
(140110107017)
Definitions • Computer Security
– Generic name for the collection of tools designed to
protect data and to thwart hackers
• Network Security
– Measures to protect data during their transmission
• Internet Security (our focus!)
– Measures to protect data during their transmission
over a collection of interconnected networks
Security
Trends
3 Aspects of
Information
Security
• Security Attack
– Any action that compromises the security of information.
• Security Mechanism
– A mechanism that is designed to detect, prevent, or
recover from a security attack.
• Security Service
– A service that enhances the security of data processing
systems and information transfers.
• Makes use of one or more security mechanisms.
Computer
Security
Concept
• Computer Security
– The protection afforded to an automated information
system in order to attain the applicable objectives of
preserving the integrity, availability and confidentiality
of information system resources (includes hardware,
software, information/data, and telecommunications).
Computer
Security
Concept
1. Confidentiality
preserving authorized restrictions on
information access and disclosure, including
means for protecting personal privacy and
proprietary information.
2. Integrity
Guarding against improper information
modification or destruction, and includes
ensuring information non-repudiation and
authenticity
3. Availability
Ensuring timely and reliable access to and
use of information.
Security
Goals
Integrity
Confidentiality
Avalaibility
Types of
Attacks
• PassiveAttacks
• Active Attacks
PASSIVE ATTACKS
Passive
Attacks
• A passive attack is a network attack in which a system
is monitored and sometimes scanned for open ports
and vulnerabilities. The purpose is solely to gain
information about the target and no data is changed
on the target.
• In passive reconnaissance, an intruder monitors
systems for vulnerabilities without interaction, through
methods like session capture. In active reconnaissance,
the intruder engages with the target system through
methods like port scans.
Types of
Passive
Attacks
• Interception Attack
• TrafficAnalysisAttack
Interception • The phenomenon of confidentiality plays an important
role in this type of attack. The data or message which is
sent by the sender is intercepted by an unauthorized
individual where the message will be changed to the
different form or it will be used by the individual for his
malicious process. So the confidentiality of the
message is lost in this type of attack.
• It is also known as “Release of message contents”.
Interception
Traffic
Analysis
• Traffic analysis is the process of intercepting and
examining messages in order to deduce information
from patterns in communication. It can be performed
even when the messages are encrypted and cannot be
decrypted. In general, the greater the number of
messages observed, or even intercepted and stored,
the more can be inferred from the traffic. Traffic
analysis can be performed in the context of military
intelligence or counter-intelligence, and is a concern in
computer security.
Traffic
Analysis
Observe traffic pattern
ACTIVE ATTACKS
Active
Attacks
• An active attack is a network exploit in which a hacker
attempts to make changes to data on the target or
data en-route to the target.
• The purpose is to gain information about the target
and no data is changed. However, passive attacks are
often preparatory activities for active attacks.
Types of
Active
Attacks
• Masquerade Attack
• Interruption Attack
• FabricationAttack
• Session ReplayAttack
• ModificationAttack
• Denial of Service (DOS)Attack
Masquerade • In a masquerade attack, the intruder pretends to be a
particular user of a system to gain access or to gain
greater privileges than they are authorized for. A
masquerade may be attempted through the use of
stolen login IDs and passwords, through finding
security gaps in programs or through bypassing the
authentication mechanism.
Interruptio
n
• This type of attack is due to the obstruction of any kind
during the communication process between one or
more systems. So the systems which are used become
unusable after this attack by the unauthorized users
which results in the wastage of systems.
Fabrication • In this type of attack a fake message is inserted into
the network by an unauthorized user as if it is a valid
user. This results in the loss of confidentiality,
authenticity and integrity of the message.
Fabricate message
Session
Replay
• In a session replay attack, a hacker steals an authorized
user’s log in information by stealing the session ID.The
intruder gains access and the ability to do anything the
authorized user can do on the website.
Modification • In a message modification attack, an intruder alters
packet header addresses to direct a message to a
different destination or modify the data on a target
machine.
Modify
message
Denial of
Service
(DOS)
• In a denial of service (DoS) attack, users are deprived of
access to a network or web resource. This is generally
accomplished by overwhelming the target with more
traffic than it can handle.
THANK YOU

More Related Content

What's hot

What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
lavakumar Thatisetti
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
patelripal99
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
Anil Neupane
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
CAS
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
Fabiha Shahzad
 
Cryptography
CryptographyCryptography
Cryptography
Shivanand Arur
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
Dr.Florence Dayana
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Network Security
Network SecurityNetwork Security
Network Security
Manoj Singh
 
Intruders
IntrudersIntruders
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Dos attack
Dos attackDos attack
Dos attack
Manjushree Mashal
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
lalithambiga kamaraj
 
Email security
Email securityEmail security
Email security
Indrajit Sreemany
 
Active and Passive Network Attacks
Active and Passive Network AttacksActive and Passive Network Attacks
Active and Passive Network Attacks
Pradipta Poudel
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
Nikhil Raj
 
Distributed computing
Distributed computingDistributed computing
Distributed computingshivli0769
 
Network security ppt
Network security pptNetwork security ppt
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 

What's hot (20)

What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Cryptography
CryptographyCryptography
Cryptography
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Network Security
Network SecurityNetwork Security
Network Security
 
Intruders
IntrudersIntruders
Intruders
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Dos attack
Dos attackDos attack
Dos attack
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Email security
Email securityEmail security
Email security
 
Active and Passive Network Attacks
Active and Passive Network AttacksActive and Passive Network Attacks
Active and Passive Network Attacks
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 

Similar to Types of attacks

Lec 01.pdf
Lec 01.pdfLec 01.pdf
Lec 01.pdf
MohammedElkayesh
 
Module-1.ppt cryptography and network security
Module-1.ppt cryptography and network securityModule-1.ppt cryptography and network security
Module-1.ppt cryptography and network security
AparnaSunil24
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
Zara Nawaz
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
Zara Nawaz
 
CH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptx
CH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptxCH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptx
CH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptx
sangeeta borde
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
Shafaan Khaliq Bhatti
 
cryptography introduction.pptx
cryptography introduction.pptxcryptography introduction.pptx
cryptography introduction.pptx
BisharSuleiman
 
Enhancement in network security with security
Enhancement in network security with securityEnhancement in network security with security
Enhancement in network security with security
eSAT Publishing House
 
Enhancement in network security with security protocols
Enhancement in network security with security protocolsEnhancement in network security with security protocols
Enhancement in network security with security protocols
eSAT Journals
 
Unit 1
Unit 1Unit 1
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1limsh
 
ch01.pdf
ch01.pdfch01.pdf
ch01.pdf
Samtech6
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
Dr. Kapil Gupta
 
Lec 2- Hardening and whitelisting of devices
Lec 2- Hardening and whitelisting of devicesLec 2- Hardening and whitelisting of devices
Lec 2- Hardening and whitelisting of devices
BilalMehmood44
 
2.Types of Attacks.pptx
2.Types of Attacks.pptx2.Types of Attacks.pptx
2.Types of Attacks.pptx
NISARSHAIKH57
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security Management
Bhadra Gowdra
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptx
VinzoCenzo
 
cryptographic security
cryptographic securitycryptographic security
cryptographic security
Priyamvada Singh
 
Introduction to Network security
Introduction to Network securityIntroduction to Network security
Introduction to Network security
mohanad alobaidey
 
CNS Unit-I_final.ppt
CNS Unit-I_final.pptCNS Unit-I_final.ppt
CNS Unit-I_final.ppt
SwapnaPavan2
 

Similar to Types of attacks (20)

Lec 01.pdf
Lec 01.pdfLec 01.pdf
Lec 01.pdf
 
Module-1.ppt cryptography and network security
Module-1.ppt cryptography and network securityModule-1.ppt cryptography and network security
Module-1.ppt cryptography and network security
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
CH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptx
CH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptxCH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptx
CH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptx
 
Chapter 1: Overview of Network Security
Chapter 1: Overview of Network SecurityChapter 1: Overview of Network Security
Chapter 1: Overview of Network Security
 
cryptography introduction.pptx
cryptography introduction.pptxcryptography introduction.pptx
cryptography introduction.pptx
 
Enhancement in network security with security
Enhancement in network security with securityEnhancement in network security with security
Enhancement in network security with security
 
Enhancement in network security with security protocols
Enhancement in network security with security protocolsEnhancement in network security with security protocols
Enhancement in network security with security protocols
 
Unit 1
Unit 1Unit 1
Unit 1
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1
 
ch01.pdf
ch01.pdfch01.pdf
ch01.pdf
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
 
Lec 2- Hardening and whitelisting of devices
Lec 2- Hardening and whitelisting of devicesLec 2- Hardening and whitelisting of devices
Lec 2- Hardening and whitelisting of devices
 
2.Types of Attacks.pptx
2.Types of Attacks.pptx2.Types of Attacks.pptx
2.Types of Attacks.pptx
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security Management
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptx
 
cryptographic security
cryptographic securitycryptographic security
cryptographic security
 
Introduction to Network security
Introduction to Network securityIntroduction to Network security
Introduction to Network security
 
CNS Unit-I_final.ppt
CNS Unit-I_final.pptCNS Unit-I_final.ppt
CNS Unit-I_final.ppt
 

Recently uploaded

H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 

Recently uploaded (20)

H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 

Types of attacks

  • 1. INFORMATION AND NETWORK SECURITY (2170703) TYPES OF ATTACKS SUBMITTED TO : Prof. BRIJESH PATEL SUBMITTED BY : ASHKA SONI (140110107004) DHRUVIN R SHAH (140110107013) VIVEK GANDHI (140110107017)
  • 2. Definitions • Computer Security – Generic name for the collection of tools designed to protect data and to thwart hackers • Network Security – Measures to protect data during their transmission • Internet Security (our focus!) – Measures to protect data during their transmission over a collection of interconnected networks
  • 4. 3 Aspects of Information Security • Security Attack – Any action that compromises the security of information. • Security Mechanism – A mechanism that is designed to detect, prevent, or recover from a security attack. • Security Service – A service that enhances the security of data processing systems and information transfers. • Makes use of one or more security mechanisms.
  • 5. Computer Security Concept • Computer Security – The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources (includes hardware, software, information/data, and telecommunications).
  • 6. Computer Security Concept 1. Confidentiality preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. 2. Integrity Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity 3. Availability Ensuring timely and reliable access to and use of information.
  • 10. Passive Attacks • A passive attack is a network attack in which a system is monitored and sometimes scanned for open ports and vulnerabilities. The purpose is solely to gain information about the target and no data is changed on the target. • In passive reconnaissance, an intruder monitors systems for vulnerabilities without interaction, through methods like session capture. In active reconnaissance, the intruder engages with the target system through methods like port scans.
  • 11. Types of Passive Attacks • Interception Attack • TrafficAnalysisAttack
  • 12. Interception • The phenomenon of confidentiality plays an important role in this type of attack. The data or message which is sent by the sender is intercepted by an unauthorized individual where the message will be changed to the different form or it will be used by the individual for his malicious process. So the confidentiality of the message is lost in this type of attack. • It is also known as “Release of message contents”.
  • 14. Traffic Analysis • Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted and cannot be decrypted. In general, the greater the number of messages observed, or even intercepted and stored, the more can be inferred from the traffic. Traffic analysis can be performed in the context of military intelligence or counter-intelligence, and is a concern in computer security.
  • 17. Active Attacks • An active attack is a network exploit in which a hacker attempts to make changes to data on the target or data en-route to the target. • The purpose is to gain information about the target and no data is changed. However, passive attacks are often preparatory activities for active attacks.
  • 18. Types of Active Attacks • Masquerade Attack • Interruption Attack • FabricationAttack • Session ReplayAttack • ModificationAttack • Denial of Service (DOS)Attack
  • 19. Masquerade • In a masquerade attack, the intruder pretends to be a particular user of a system to gain access or to gain greater privileges than they are authorized for. A masquerade may be attempted through the use of stolen login IDs and passwords, through finding security gaps in programs or through bypassing the authentication mechanism.
  • 20. Interruptio n • This type of attack is due to the obstruction of any kind during the communication process between one or more systems. So the systems which are used become unusable after this attack by the unauthorized users which results in the wastage of systems.
  • 21. Fabrication • In this type of attack a fake message is inserted into the network by an unauthorized user as if it is a valid user. This results in the loss of confidentiality, authenticity and integrity of the message. Fabricate message
  • 22. Session Replay • In a session replay attack, a hacker steals an authorized user’s log in information by stealing the session ID.The intruder gains access and the ability to do anything the authorized user can do on the website.
  • 23. Modification • In a message modification attack, an intruder alters packet header addresses to direct a message to a different destination or modify the data on a target machine. Modify message
  • 24. Denial of Service (DOS) • In a denial of service (DoS) attack, users are deprived of access to a network or web resource. This is generally accomplished by overwhelming the target with more traffic than it can handle.