/
Introduction Introduction

Introduction - PowerPoint Presentation

debby-jeon
debby-jeon . @debby-jeon
Follow
364 views
Uploaded On 2016-05-28

Introduction - PPT Presentation

to Security Computer Networks Term A15 Intro to Security Outline Network Security Malware Spyware viruses worms and trojan horses botnets Denial of Service and Distributed DOS Attacks ID: 338847

networks security introduction computer security networks computer introduction attack network attacks malware internet service trojan hosts bad target application

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Introduction" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

IntroductiontoSecurity

Computer Networks

Term

A15Slide2

Intro to Security OutlineNetwork SecurityMalwareSpyware, viruses, worms and trojan horses, botnetsDenial of Service and Distributed DOS AttacksPacket SniffingMasquerading AttacksMan-in-the-Middle Attacks Computer Networks Introduction to Security2Slide3

Networks under AttackThe “original” Internet (i,e., ARPANET) was not designed with security in mind.The early vision was “a group of mutually trusting users attached to a transparent network”.ARPANET started out as academics and DoD users!!Protocol and application designers are playing “catch-up”.The Internet changed:Added industrial management partners  ISP’sWWW made the Internet accessible to the masses.Bad guys can attack networks and attempt to wreak havoc on our daily lives. Computer Networks Introduction to Security3Slide4

Network SecurityNetwork security is about:How bad guys can attack computer networks.How we can defend networks against attacks.How to design architectures that are immune to attacks.Network security is becoming more important as more individuals become dependent on the Internet and as the destructive nature of new attacks increases.Security issues exist at all layers! Computer Networks Introduction to Security4Slide5

MalwareMalware:: malicious “stuff” that enters our hosts from the Internet and infects our devices.Spyware collects private information (e.g., keystrokes and web sites visited) and uploads info to bad guy collection sites.An infected host can be enrolled in a botnet, used for spam and distributed denial-of-service (DDoS) attacks.Malware is often self-replicating (i.e., from an infected host, it seeks entry into other hosts). Computer Networks Introduction to Security5Slide6

Malware from the InternetMalware can get into a host and spread in the form of a virus, worm, or trojan horse.Virus::Requires some form of user active execution.Classic example: an email attachment containing malicious executable code that is triggered when the attachment is opened.Self-replicating (e.g., via address book) Computer Networks Introduction to Security6Slide7

Worms and Trojan Horses Computer Networks Introduction to Security7

Worm

Infects by passively receiving object via a

vulnerable

network application that runs the malware to create worm.

S

elf-replicates by searching for hosts running the same application.

Trojan horse

Hidden in some otherwise useful software.

O

ften found today on a Web page (Active-X, plugin).

Sapphire Worm: aggregate scans/sec

in first 5 minutes of outbreak (CAIDA,

UWisc

data)Slide8

Denial-of-Service AttackDenial-of-service (DoS) renders resources (server, link) unusable by legitimate users by overwhelming the resource with bogus traffic. Computer Networks Introduction to Security8

target

select target

break into hosts around the network (see botnet)

send packets toward target from compromised hosts

Distributed

DoS

(

DDoS

)Slide9

Three categories:Vulnerability attack:: attack application with well-crafted messages (result – service stops or host crashes).Bandwidth flooding:: deluge victim with so many messages such that target’s access link gets clogged.Connection flooding:: initiate so many half-open or open TCP connections that target stops accepting legitimate connections. Computer Networks Introduction to Security9Denial-of-Service AttackSlide10

Bad Guy Packet Sniffing Computer Networks Introduction to Security10Packet sniffing:: passive receiver that records a copy of every packet that goes by (e.g., Wireshark) broadcast media (shared Ethernet, wireless)promiscuous network interface reads/records all packets (e.g., including passwords!) passing by

A

B

C

src:B dest:A payloadSlide11

Masquerade AttackIP spoofing:: send a packet with false source address Computer Networks Introduction to Security11

A

B

C

src:B

dest:A payloadSlide12

Man-in-the-Middle Attackrecord-and-playback:: sniff sensitive info (e.g., password), and use laterBad guy password holder is that user from system point of view Computer Networks Introduction to Security12

A

B

C

src:B dest:A user: B; password: fooSlide13

Intro to Security SummaryNetwork SecurityMalwareSpyware, viruses, worms and trojan horses, botnetsDoS and DDOS AttacksPacket Sniffing (promiscuous mode)Masquerading Attacks (IP spoofing)Man-in-the-Middle AttacksRecord and playback Computer Networks Introduction to Security13