Common security attacks and countermeasures
Security
Why do we need security?
Who is vulnerable?
What is the countermeasures with;
Firewall
What is the countermeasures with;
Intrusion Detection System
What is the countermeasures with;
Denial of Service
Ingress filtering, IDS
What is the countermeasures with;
IPSec
What is the countermeasures with;
Encryption (SSH, SSL, HTTPS)
What is the countermeasures with;
Education
Basic problem – many network applications and protocols have security problems that are fixed over time
Firewalls
A ____ is like a castle with a drawbrigde
- Only one point of access into the network
- This can be good or bad
Firewall
T or F
Firewall can be hardware or software
True
Used to filter packets based on a combination of features
Firewall (Packet filtering firewalls)
Used to monitor for “suspicious activity” on a network.
- Can protect against known software exploits, like buffer overflows
Open Source IDS: Snort, www.snort.org
Intrusion Detection
We can run a _____ on the passwords
- the passwords in /etc/passwd are encrypted with the crypt(3) function (one-way hash)
- Can take a dictionary of words, crypt() them all, and compare with the hashed passwords
Dictionary attack
T or F
is “sdfo84f9f” a good password
True
Make the network service unusable, usually by overloading the server or network.
Many different kind of ____ attack
- SYN flooding
- SMURF
- Distributed attacks
- Mini Case Study: Code-red
Denial of Service
SMURF
Distributed Denial of Service
Mini Case Study -CodeRed
Ingress filtering
If an attacker learns the associated ____ state for the connection, then the connection can be hijacked
TCP
Attacker can insert malicious data into the ____, and the recipient will believe it came from the original source
TCP stream