On Investigating the Effectiveness of Biometric Readers in Thwarting Network Attacks: A Secure Architecture Design Proposal

Size: px
Start display at page:

Download "On Investigating the Effectiveness of Biometric Readers in Thwarting Network Attacks: A Secure Architecture Design Proposal"

Transcription

1 On Investigating the Effectiveness of Biometric Readers in Thwarting Network Attacks: A Secure Architecture Design Proposal Abstract Biometrics readers are deployed in many public sites and are used for user identification and verification. Nowadays, most biometrics readers can be connected to local area networks (LANs), and consequently they are potential targets for network attacks. This paper investigates the robustness of several fingerprint and iris readers against common denial of service (DoS) attacks. This investigation has been conducted using a set of laboratory experiments and DoS attack generator tools. The experiments show clearly that the tested biometric readers are very vulnerable to common DoS attacks, and their recognition performances deteriorate significantly once they are under DoS attacks. Finally, the paper lists some security consideration that should be taken into consideration when designing secure biometrics readers. Keywords-component; Fingerprint reader; Iris reader; Biometrics readers; Denial of Service attack (DoS); WCCAIS'2014. I. INTRODUCTION It is unquestionable that the use of biometric technologies is becoming increasingly common. Nowadays, biometrics readers, such as fingerprint, face and iris, are deployed in many public sites and are used for user identification and verification. They play an important role in implementing the security policies within institutions. Biometric reader manufacturers have been focusing on offering easy to use and practical devices with effective costs, low enrollment and recognition time, and low rate of false match and non-match. Currently, most biometrics readers are able to connect to wired and wireless networks, and communicate with remote biometric servers to exchange biometric data. However, since these devices are as any network host with IP and MAC addresses, they may be the targets of malicious network users. In fact, it is unquestionable that biometric readers should be robust enough against network attacks in order to rely on them while building secure networks and applications. That is, biometric readers should be able to thwart common network attacks; otherwise they can be easy targets for malicious users. Also, in case of network attacks, the biometric readers logs and the biometric data should be available to assist in investigating the nature and sources of the attacks. However, unsecure and vulnerable biometric readers may not contribute in finding exactly what happened on the target systems. Therefore, it is important to acquire sufficient knowledge about the security robustness of both biometric readers and the exchanged biometric data prior to designing and implementing networks and applications that use biometric technologies. In this paper, we investigated the effect of common network attacks on the performance of several fingerprint and iris readers. Practically, experiments are conducted using DoS attacks and ARP cache poisoning attack. The experiments consist mainly into launching several types of network attacks targeting biometric readers, and then studying the robustness of the tested readers against the attacks by analyzing their response time and their ability to continue communicating properly with other network devices while they are under attacks. The remainder of this paper is organized as follows. Section 2 introduces the network attacks that have been used during the experiments. Section 3 presents an overview of the biometrics readers that have been tested. Then, in Section 4, we present and analyze the experiments results related to the resilience of the tested biometrics readers against the network attacks. Section 5 lists some security consideration that should be taken into consideration when designing secure biometric readers. Finally, Section 6 concludes the paper. II. BACKGROUND: DOS AND ARP CACHE POISONING ATTACKS The investigation conducted in this paper uses common DoS attacks to evaluate the resilience of several fingerprint and iris readers against these attacks. Also, we investigated the ability of ARP cache poisoning attack to corrupt the ARP cache entries of the biometrics readers. Hosts with corrupted ARP caches are usually unable to communicate properly with the other network hosts [18]. Consequently, a DoS situation may emerge from corrupting the ARP caches of target network hosts.

2 A. DoS Attacks Commonly, a DoS attack attempts to render a system unusable or significantly slows down the system for legitimate users by overloading the resources so no one else can access it. A DoS attack may target a user, to prevent him from making outgoing connections on the network. A DoS attack may also target an entire organization, to either prevent outgoing traffic or to prevent incoming traffic to certain network services, such as the organization web page. DoS attacks are much easier to accomplish than remotely gaining administrative access to a target system. Because of this, DoS attacks have become very common on the Internet. A DoS attack can either be deliberate or accidental. It is caused deliberately when an unauthorized user actively overloads a resource. It is caused accidentally when an authorized user unintentionally does something that causes resources to become unavailable. Most DoS attacks rely upon weaknesses in the TCP/IP protocols. The next sub-sections introduce the selected common DoS attacks, used in this paper's experiments, namely the SYN flood, Land, Teardrop and UDP flood attacks. Land Attack: Land attack occurs when an attacker sends spoofed TCP SYN packets (connection initiation) with the target host's IP address and an open port as both source and destination. The target host responds by sending the SYN-ACK packet to itself, creating an empty connection that lasts until the idle timeout value is reached. Flooding a system with such empty connections can overwhelm the system, causing a DoS (Figure 1) situation. Figure 1. The Land attack SYN Flood Attack: A SYN flood occurs when a host becomes so overwhelmed by SYN packets initiating incomplete connection requests that it can no longer process legitimate connection requests. When a client system attempts to establish a TCP connection to a system providing a service (the server), the client and server exchange a sequence set of messages known as a three-way handshake. In fact, the client system begins by sending a SYN (synchronization) message to the server. The server then acknowledges the SYN message by sending a SYN-ACK (acknowledgment) message to the client. The client then finishes establishing the connection by responding with an ACK message. The connection between the client and the server is then opened, and the service-specific data can be exchanged between the client and the server. The potential for abuse arises at the point where the server system has sent an acknowledgment (SYN-ACK) back to the client, but it has not yet received the final ACK message. This is what meant by a half-opened connection. The server has in its system memory a built-in data structure describing all pending connections. This data structure is of finite size, and it can be made to overflow by intentionally creating too many partially-opened connections (Figure 2). Creating half opened connection is easily accomplished with IP spoofing. The attacker s system sends SYN messages to the victim s server that appear to be legitimate, but in fact, the source address is spoofed to a system that is not currently connected to the network. This means that the final ACK message is never sent to the victim server. Because the source address is spoofed, there is no way to determine the identity of the true attacker when the packet arrives at the victim s system.

3 Figure 2. The SYN Flood attack Teardrop Attack: Teardrop attack target vulnerability in the way fragmented IP packets are reassembled. Fragmentation is necessary when IP datagrams are larger than the maximum transmission unit (MUT) of a network segment across which the datagrams must traverse. In order to successfully reassemble packets at the receiving end, the IP header for each fragmented packet includes an offset to identify the fragment s position in the original unfragmented packet. In a Teardrop attack, packet fragments are deliberately fabricated with overlapping offset fields causing the host to hang or crash when it tries to reassemble them. Figure 3 shows that the second fragment packet purports to begin 20 bytes earlier (at 800) than the first fragment packet ends (at 820). The offset of fragment Packet #2 is not in accord with the packet length of fragment Packet #1. This discrepancy can cause some systems to crash during the reassembly attempt. Figure 3. The Teardrop attack UDP Flood Attack: UDP is a connectionless protocol and it does not require any connection setup procedure to transfer data. A UDP Flood attack is possible when an attacker sends a UDP packet to a random port on the victim system. When the victim system receives a UDP packet, it will determine what application is waiting on the destination UDP port. Two cases are possible. If there is no application that is waiting on the port (closed UDP port), the victim host will generate an ICMP packet of destination unreachable to the forged source address. However, if there is an application running on the destination UDP port, then the application will handle the UDP packet. In both cases, if enough UDP packets are delivered to destination UDP ports, the victim host or application may slow down or go down (Figure 4).

4 Figure 4. UDP Flood attack B. ARP Cache Poisoning Attack Sniffing attack consists of re-routing (redirecting) the network traffic between two target hosts to a malicious host. Then, the malicious host will forward the received packets to the original destination; so that the communication between the two target hosts is not interrupted and the two communicating hosts will not notice that their traffic is being sniffed by a malicious one. Man-in-the-Middle attack (MiM) is the most common attack used to sniff switched LAN networks. MiM attack is based on corrupting the ARP caches of target hosts using ARP cache poisoning attack [18]. ARP cache poisoning attack is the malicious act, by a host in a LAN, of introducing a spurious IP address to MAC address mapping in another host s ARP cache. This can be done by manipulating directly the ARP cache of a target host, independently of the ARP messages sent by the target host. To do that, the malicious host can either add a new fake entry in the target host s ARP cache, or update an already existing entry by fake IP and MAC addresses. In MiM attack, the malicious user first enables the host s IP packet routing, in order to become a router and be able to forward the redirected packets. Then, using the ARP cache poisoning attack, the malicious host corrupts the ARP caches of the two target hosts, in order to force the two hosts to forward all their packets to the malicious host. It is important to notice that if the malicious host corrupts the ARP caches of the two target hosts without enabling its IP packet routing, then the two hosts will not be able to exchange packets and it will be a DoS attack. In this case, the malicious host does not forward the received packets to their legitimate destination as shown in Figure 5. Figure 5. Biometric data sniffing based on the MiM attack

5 III. BIOMETRICS READERS In 2001 MIT Technology Review [3] named biometrics as one of the top ten emerging technologies that will change the world. The term Biometric comes from the Greek words bio (life) and metric (to measure). Biometrics refer to technologies used for measuring and analyzing a person's unique characteristics. There are two types of biometrics: behavioral and physical. Behavioral biometrics are generally used for verification while physical biometrics can be used for either identification or verification. Identification is determining who a person is. It involves trying to find a match for a person's biometric data in a database containing records of biometric information about people. This method requires time and a large amount of processing power, especially if the database is very large. Verification is determining if a person is who he/she say he/she really is. It involves comparing a user's biometric data to the previously recorded data for that person to ensure that this is the same person. This method requires less processing power and time, and is usually used for authentications and access control. The main physical biometrics technologies include fingerprint, iris, retina, hand geometry, and face features [11,12]. There are also a number of behavioral biometric technologies such as voice recognition (analyzing a speaker's vocal behavior), keystroke patterns (measuring the time spacing of typed words), gait recognition (manner of walking), or signature (analyzing the way you sign). Other biometric techniques still in exploratory stages include DNA biometrics, ear shape, fingernails, and odor [12]. The most common types of biometric technologies are fingerprint, iris, voice, hand geometry, and face recognition [8,10,11, 12]. Yet, there is not one single biometric technology that would be ideal for all applications. Each technology has its own benefits and weaknesses. Nowadays, fingerprint and iris technologies are widely used [1] because they are fast, reliable, stable, cost effective, and provide excellent identification accuracy rates. Iris recognition is the most precise of all biometric identification systems. The false acceptance ratio is so low that the probability of falsely identifying one individual as another is virtually zero [9]. For these reasons, this paper is focusing on investigating the effect of common network DoS attacks on solely fingerprint and iris readers. IV. ROBUSTNESS OF BIOMETRIC REDAERS AGAINST DOS ATTACKS: EXPERIMENTS To investigate the robustness of fingerprint and iris readers against DoS attacks, two laboratory experiments are conducted using DoS attack generation tools. Practically, we investigated the effect of four common DoS attacks on the performance of several fingerprint and iris readers. In addition, we investigated the effect of ARP cache poisoning attack on the entries of the ARP caches of the readers. The proposed experimental method consists mainly into launching first several types of network DoS attacks targeting fingerprint and iris readers, and then studying the robustness of the readers by analyzing their response time and their ability to continue communicating properly with other network devices while they are under attacks A. Network Architecture Figure 6 shows the network architecture used in the experiments. A DoS attack generator host, a biometric server, a fingerprint reader and an iris reader are connected to a switch. B. DoS Attack Tools The tools used to generate the DoS attacks are: Figure 6. Network architecture

6 FrameIP packet generator [5] and CommView Visual Packet Builder [2] are packet generators that allow generating IP and ARP packets. The tools can be used by the attack host to generate the Land, Teardrop, and UDP flood attacks; as well as to perform ARP cache poisoning attack. SYNFlood tool [17] is a ready-to-use attack tool used to generate the SYN flood attack. 1) Building Land attack packets The user can use a packet generator tool to build packets that produce the Land attack. For example, the user can use an online command tool, such as FrameIP Packet Generator, or a more friendly and easy to use GUI tool, such as CommView Visual Packet builder. In this paper, CommView Visual Packet Builder is used to generate Land attack. Figure 7 shows a screenshot of how a spoofed TCP SYN packet is used to build a Land attack packet. The packet has the source IP address set to the destination IP address, and the source port number set to the destination port number. Figure 7. A Land attack packet built using CommView Visual Packet Builder 2) Building Teardrop attack packets To generate a Teardrop attack, two fragmented packets have to be built. The packets belong to the same original packet and have the same IP s Identification (ID). The field ID includes an identifying value assigned by the sender host to aid in assembling the fragments of a datagram. However, the two fragmented packets have overlapping offset values. Using CommView Visual Packet Builder, figures 8 and 9 show the two example fragmented packets with overlapped offset values leading to the Teardrop attack.

7 Figure 8. The first fragment packet of a Teardrop attack Figure 9. The second fragment packet of a Teardrop attack 3) Building UDP flood attack packets In an UDP flood attack packet, the source IP address should be set to a spoofed or random IP address. The destination port should be set to a number of an open UDP port in the victim host.

8 There are many available ready-to-use UDP flood attack tools. First, the attacker can use any port scanner tool to identify the list of open UDP ports at the victim host. Then, one open UDP port number is selected and is used as the destination port number in the UDP flood attack packets. For example, Figure 10 shows a screenshot of the result of a UDP port scanning of a target host, using Fast Port Scanner tool [4]. Figure 10. UDP port scanning using Fast Port Scanner tool To build UDP flood attack packets, the user has to use a packet builder tool that allows including spoofed or random IP addresses in the source IP field of the IP header. Random or spoofed source IP addresses allow hiding the real source IP address of the attacker host. FrameIP Packet Generator has the ability to generate UDP packets with random or spoofed source IP addresses. Figure 11 is a screenshot of the online command of FrameIP that allows generating UDP flood traffic to the destination UDP port 53 of the target host with IP address Figure 11. Frameip s online command for generating UDP flood traffic 4) Building SYN flood attack packets There are many available ready-to-use SYN flood attack tools. As an example, Figure 12 shows the online command used to generate the SYN flood attack, using the tool SYNflood. After executing the online command, a flood of fake TCP SYN packets is sent to the target biometric reader whose IP address is

9 Figure 12. The SYN flood attack online command During the experiment, all above four DoS attacks (Land, Teardrop, UDP flood, and SYN flood attacks) are lunched simultaneously, to increase their effect. The following section presents the result of the experiments. C. DoS Attacks Results for Fingerprint Readers In this experiment, we tested three fingerprint readers, namely: NitGen Fingerprint reader NAC 3000 [15], F7 Standalone Biometric Access Control Terminal [6], MX600 Fingerprint Access Control [14]. Table 1 summarizes the experiments results for each fingerprint reader. The DoS attacks had a negative effect on the readers performance. That is, few seconds after launching the DoS attacks, the recognition performances of all tested fingerprint readers deteriorated significantly. Practically, the recognition status of the readers became unstable under the DoS attacks. In fact, the readers recognition response was very slow or there was no response to Ping requests. In addition, the biometrics readers often disconnected from the network, especially when the attack traffic rate increase significantly. Table 1. DoS attacks results for fingerprint readers Fingerprint readers Effect of DoS attacks on the recognition performance of the fingerprint readers NitGen Fingerprint reader NAC 3000 Recognition status is unstable: F7 Standalone Biometric Access Control Terminal - The reader recognition response is very slow MX600 Fingerprint Access Control or there is no response to Ping requests. - The readers often disconnect from the network. For example, Figure 13 shows that before launching the DoS attacks, the response times were less than 0.4 ms when pinging the NitGen Fingerprint reader NAC However, the response times increased considerably and reached more than 20 ms just after launching the attacks. This is due to the fact that after launching the DoS attacks, the fingerprint reader became overloaded with treating the flood of packets and consequently became unable to process the Ping requests instantly. In fact, DoS attacks have usually a major negative effect on victim system s performance by making their processors heavily loaded with processing malicious requests, resulting into delaying the processing of legitimate requests that do not intend to harm the system s performance.

10 Figure 13. Response time of Nitgen Fingerprint reader NAC 3000 before and during the DoS attacks D. DoS Attacks Results for Iris Readers In this experiment, we tested three iris readers, namely: Panasonic Iris reader BM-ET330 [16], LG s IrisAccess 4000 [13], IG-AD100 Iris Camera System [7]. Table 2 summarizes the experiments results for each iris reader. As for the case of fingerprint readers, the DoS attacks had a negative effect on the readers performance. Few seconds after launching the DoS attacks, the recognition performances of all tested iris readers deteriorated significantly. Practically, the recognition status of the readers became unstable under the DoS attacks. In fact, the reader recognition response was very slow or there was no response. The readers disconnected from the network. But, when the DoS attacks stopped, the iris readers reconnected again to the network. Table 2. DoS attacks results for iris readers Effect of DoS attacks on the recognition performance of the iris readers Panasonic Iris reader BM-ET330 Recognition status is unstable: LG s IrisAccess The reader recognition response is very slow or there is IG-AD100 Iris Camera System no response to Ping requests. - The readers disconnected from the network. But, when the DoS attack stopped, the readers reconnected to the network. Iris readers For example, Figure 14 shows that before launching the DoS attacks, the response times were less than 0.1 ms when pinging the Panasonic Iris reader BM-ET330 [16]. However, just after launching the attacks, the reader crashed and consequently there were no ping responses. The reader became unable to recognize users and completely disconnected from the network. When the DoS attack stopped, the reader reconnected to the network.

11 Figure 14. Response time of Panasonic Iris reader BM-ET330 of before and after the DoS attacks E. ARP Cache Poisoning Attack Results This attack consists into attempting to corrupt the ARP caches of the fingerprint and iris readers. Network hosts with corrupted ARP caches may not be able to communicate properly with other network hosts. For example, the following shows the contents of an ARP request packet that intends to corrupt an ARP entry of a target biometric reader with a fake IP/MAC entry: Operation Source IP address Source MAC address Destination IP address ARP header 1 (ARP request) IP of a network host Fake MAC address Any address Destination MAC address 00:00:00:00:00:00 Source MAC address Destination MAC address Type Ethernet header Any address MAC address of the target biometric reader ARP (0x0806) As an example, CommView Visual Packet Builder tool is used to build such a fake ARP request packet, as shown in Figure 15. In fact, the Sender Address IP ( ) is assigned a fake MAC address ( ). Hence, if the target reader is vulnerable to ARP cache poisoning attack, this fake ARP request will allow creating fake IP/MAC entry in the target reader s ARP cache. Consequently, the target reader will not be able to communicate properly with the host whose IP address is specified in the fake IP/MAC entry.

12 Figure 15. ARP cache poisoning packet generation using CommView Visual Packet Builder tool The experiments result indicates that the ARP cache poisoning attack has no effect on the tested readers. Consequently, the readers are protected from this type of attack. We believe that this is because of the simple implementation of the ARP protocol in these readers. In fact, the readers do not allow updating their ARP caches. They use static ARP cache entries, so that the entries cannot be updated by fake ARP request and replies. The ARP cache entries are created when the readers connect to the network. Once they get the MAC addresses of the biometric servers, they create static entries (IP/MAC addresses) in their ARP caches. V. SECURE BIOMETRICS READERS DESIGN CONSIDERATION The experiments results demonstrate clearly that the tested biometric readers are very vulnerable to common DoS attacks, and their recognition performances significantly deteriorate just after launching the attacks. In fact, the security analysis conducted in this paper proves that the tested biometric readers have been designed without any security consideration. Biometric readers usually are focusing on enhancing the recognition performance (Identification accuracy rates, false acceptance ratios) of the biometric algorithms and technologies. Hence, they are easy targets for malicious network traffic and users. Usually, biometric devices are designed to offer ease to use and practical user interfaces with effective costs, low enrollment and recognition time, and low false non-match and match rates. However, our work in this paper shows that they are not designed to include basic security functions, mainly network packet filtering capabilities to filter the network traffic, and to integrate Intrusion Detection/Prevention capabilities to detect and prevent network attacks and malicious network activities. Hence, biometric devices can be easily crashed or disconnected from the network by common DoS attacks. Consequently, their availability and efficiency may become questionable within any institution, and it will be difficult to rely on such devices to implement secure networks and biometric systems. The following lists some basic security considerations that should be taken into consideration when designing secure biometric readers to limit the effect of DoS attacks: The biometric reader s user interface should allow the filtering of network packets, such as blocking all incoming ping requests. The ARP cache of the biometric reader should be static, so that malicious ARP packets cannot update its contents with fake IP/MAC entries. This would allow protecting the reader from DoS attacks based on ARP cache poisoning attack. Network traffic with high speed rate targeting the biometric reader should be denied from reaching the kernel of the reader. This would allow protecting the reader from many common DoS flood attacks, such as SYN flood attack. Figure 16 shows typical secure biometric reader architecture. That is, commonly, to offer secure biometric readers, it is important to design readers that are able to offer at least the following basic security modules: 1. Firewall module: Allow implementing at least the basic common filtering rules to filter the network traffic exchanged by biometric readers.

13 2. Intrusion detection module: Allow protecting and preventing at least common network attacks, mainly DoS attacks. This intrusion detection module should be able to use basic common attack signatures and be able to download new attach signatures. 3. Encryption module: Allow encrypting the traffic between the biometric readers and servers. The encryption security capability will prevent malicious users from being able to spy and analyze the exchanged network traffic between the biometric readers and servers since the traffic is encrypted. Usually, malicious users use MiM attack techniques to collect the exchanged network traffic between the biometric readers and servers. Figure 16. Typical secure biometric reader architecture VI. CONCLUSION This paper investigated the effect of common DoS attacks on the performance of several fingerprint and iris readers. Experiments are conducted using common DoS and ARP cache poisoning attacks. The experiments results demonstrate clearly that the tested biometric readers lack robust security solutions, such as firewall packet filtering or Intrusion Detection/Prevention capabilities, and consequently are easy targets for malicious network traffic and users. However, the tested biometric devices are protected from ARP cache poisoning attack since they use simple implementation of the ARP protocol. In fact, they use static ARP caches entries; instead of using dynamic entries as it is the case in ordinary computers. In order to enhance the availability and efficiency of biometric readers and implement secure biometric based systems, the paper listed several security functions that should be incorporated into biometric readers, mainly network packet filtering, intrusion detection and encryption capabilities. REFERENCES [1] A. Al-Raisi, and A. Al-Khouri, Iris recognition and the challenge of homeland and border control security in UAE, Journal of Telematics and Informatics. Vol. 25 (2008), pp [2] CommView Visual Packet Builder, [3] Emerging Technologies That Will Change the World, Ten emerging technologies that will change the world, MIT Technology Review, January/February [4] Fast Port Scanner tool, [5] FrameIP Packet Generator, [6] F7 Standalone Biometric Access Control Terminal, [7] IG-AD100 Iris Camera System, [8] J. Chirillo, and S. Blaul, Implementing biometric security, Wiley Publisher, [9] J. Duagman, How iris recognition works, IEEE Transactions on Circuits and Systems for Video Technology, Vol. 14 (2004), pp [10] J. Duagman, Recognizing persons by their iris patterns, The 5th Chinese Conference on Biometric Recognition, SINOBIOMETRICS, China (2004), pp [11] J. L. Wayman, A. K. Jain, D. Maltoni, and D. Maio, Biometric systems: Technology design and performance evaluation, Springer Publisher, 2005.

14 [12] J. R. Vacca, Biometric technologies and verification systems, Butterworth-Heinemann Publisher, [13] LG s IrisAccess 4000, [14] MX600 Fingerprint Access Control, [15] Nitgen Fingerprint reader NAC 3000, Specification Sheet, [16] Panasonic Iris reader BM-ET330, Specification Sheet, ftp://ftp.panasonic.com/pub/panasonic/cctv/specsheets/bm-et330.pdf. [17] SYN flood [18] Z. Trabelsi, and K. Shuaib, A novel Man-in-the-Middle intrusion detection scheme for switched LANs, The International Journal of Computers and Applications. Vol. 3, No. 3 (2008), pp

Abstract. Introduction. Section I. What is Denial of Service Attack?

Abstract. Introduction. Section I. What is Denial of Service Attack? Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss

More information

Security Technology White Paper

Security Technology White Paper Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without

More information

20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7

20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7 20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic

More information

CS5008: Internet Computing

CS5008: Internet Computing CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is

More information

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

CYBER ATTACKS EXPLAINED: PACKET CRAFTING CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure

More information

Chapter 8 Security Pt 2

Chapter 8 Security Pt 2 Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,

More information

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Signature based IDS systems use these fingerprints to verify that an attack is taking place. The problem with this method

More information

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped

More information

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India

More information

A Very Incomplete Diagram of Network Attacks

A Very Incomplete Diagram of Network Attacks A Very Incomplete Diagram of Network Attacks TCP/IP Stack Reconnaissance Spoofing Tamper DoS Internet Transport Application HTTP SMTP DNS TCP UDP IP ICMP Network/Link 1) HTML/JS files 2)Banner Grabbing

More information

Linux Network Security

Linux Network Security Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols

More information

1. Firewall Configuration

1. Firewall Configuration 1. Firewall Configuration A firewall is a method of implementing common as well as user defined security policies in an effort to keep intruders out. Firewalls work by analyzing and filtering out IP packets

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona collberg@gmail.com Copyright

More information

Denial Of Service. Types of attacks

Denial Of Service. Types of attacks Denial Of Service The goal of a denial of service attack is to deny legitimate users access to a particular resource. An incident is considered an attack if a malicious user intentionally disrupts service

More information

ACHILLES CERTIFICATION. SIS Module SLS 1508

ACHILLES CERTIFICATION. SIS Module SLS 1508 ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security

More information

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

Attack Lab: Attacks on TCP/IP Protocols

Attack Lab: Attacks on TCP/IP Protocols Laboratory for Computer Security Education 1 Attack Lab: Attacks on TCP/IP Protocols Copyright c 2006-2010 Wenliang Du, Syracuse University. The development of this document is funded by the National Science

More information

SECURING APACHE : DOS & DDOS ATTACKS - I

SECURING APACHE : DOS & DDOS ATTACKS - I SECURING APACHE : DOS & DDOS ATTACKS - I In this part of the series, we focus on DoS/DDoS attacks, which have been among the major threats to Web servers since the beginning of the Web 2.0 era. Denial

More information

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for

More information

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Session Hijacking Exploiting TCP, UDP and HTTP Sessions Session Hijacking Exploiting TCP, UDP and HTTP Sessions Shray Kapoor shray.kapoor@gmail.com Preface With the emerging fields in e-commerce, financial and identity information are at a higher risk of being

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall

More information

Project 4: (E)DoS Attacks

Project 4: (E)DoS Attacks Project4 EDoS Instructions 1 Project 4: (E)DoS Attacks Secure Systems and Applications 2009 Ben Smeets (C) Dept. of Electrical and Information Technology, Lund University, Sweden Introduction A particular

More information

CSCE 465 Computer & Network Security

CSCE 465 Computer & Network Security CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Vulnerability Analysis 1 Roadmap Why vulnerability analysis? Example: TCP/IP related vulnerabilities

More information

Frequent Denial of Service Attacks

Frequent Denial of Service Attacks Frequent Denial of Service Attacks Aditya Vutukuri Science Department University of Auckland E-mail:avut001@ec.auckland.ac.nz Abstract Denial of Service is a well known term in network security world as

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

Intrusion Detection System: Security Monitoring System

Intrusion Detection System: Security Monitoring System RESEARCH ARTICLE OPEN ACCESS Intrusion Detection System: Security Monitoring System ShabnamNoorani, Sharmila Gaikwad Rathod Abstract An intrusion detection system (IDS) is an ad hoc security solution to

More information

co Characterizing and Tracing Packet Floods Using Cisco R

co Characterizing and Tracing Packet Floods Using Cisco R co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1

More information

Development of a Network Intrusion Detection System

Development of a Network Intrusion Detection System Development of a Network Intrusion Detection System (I): Agent-based Design (FLC1) (ii): Detection Algorithm (FLC2) Supervisor: Dr. Korris Chung Please visit my personal homepage www.comp.polyu.edu.hk/~cskchung/fyp04-05/

More information

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Final exam review, Fall 2005 FSU (CIS-5357) Network Security Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection

More information

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015 Network Security Dr. Ihsan Ullah Department of Computer Science & IT University of Balochistan, Quetta Pakistan April 23, 2015 1 / 24 Secure networks Before the advent of modern telecommunication network,

More information

Brocade NetIron Denial of Service Prevention

Brocade NetIron Denial of Service Prevention White Paper Brocade NetIron Denial of Service Prevention This white paper documents the best practices for Denial of Service Attack Prevention on Brocade NetIron platforms. Table of Contents Brocade NetIron

More information

Networks: IP and TCP. Internet Protocol

Networks: IP and TCP. Internet Protocol Networks: IP and TCP 11/1/2010 Networks: IP and TCP 1 Internet Protocol Connectionless Each packet is transported independently from other packets Unreliable Delivery on a best effort basis No acknowledgments

More information

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN flooding: attacker

More information

CS 356 Lecture 16 Denial of Service. Spring 2013

CS 356 Lecture 16 Denial of Service. Spring 2013 CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter

More information

How To Prevent DoS and DDoS Attacks using Cyberoam

How To Prevent DoS and DDoS Attacks using Cyberoam How To Prevent DoS and DDoS Attacks using Cyberoam How To Prevent DoS and DDoS Attacks using Cyberoam Applicable Version: 10.00 onwards Overview Denial of Service (DoS) A Denial of Service (DoS) attack

More information

Internet Firewall CSIS 3230. Internet Firewall. Spring 2012 CSIS 4222. net13 1. Firewalls. Stateless Packet Filtering

Internet Firewall CSIS 3230. Internet Firewall. Spring 2012 CSIS 4222. net13 1. Firewalls. Stateless Packet Filtering Internet Firewall CSIS 3230 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 8.8: Packet filtering, firewalls, intrusion detection Ch

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

Denial of Service. Tom Chen SMU tchen@engr.smu.edu

Denial of Service. Tom Chen SMU tchen@engr.smu.edu Denial of Service Tom Chen SMU tchen@engr.smu.edu Outline Introduction Basics of DoS Distributed DoS (DDoS) Defenses Tracing Attacks TC/BUPT/8704 SMU Engineering p. 2 Introduction What is DoS? 4 types

More information

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.

More information

Chapter 28 Denial of Service (DoS) Attack Prevention

Chapter 28 Denial of Service (DoS) Attack Prevention Chapter 28 Denial of Service (DoS) Attack Prevention Introduction... 28-2 Overview of Denial of Service Attacks... 28-2 IP Options... 28-2 LAND Attack... 28-3 Ping of Death Attack... 28-4 Smurf Attack...

More information

Content Distribution Networks (CDN)

Content Distribution Networks (CDN) 229 Content Distribution Networks (CDNs) A content distribution network can be viewed as a global web replication. main idea: each replica is located in a different geographic area, rather then in the

More information

Denial of Service Attacks. Notes derived from Michael R. Grimaila s originals

Denial of Service Attacks. Notes derived from Michael R. Grimaila s originals Denial of Service Attacks Notes derived from Michael R. Grimaila s originals Denial Of Service The goal of a denial of service attack is to deny legitimate users access to a particular resource. An incident

More information

Using SYN Flood Protection in SonicOS Enhanced

Using SYN Flood Protection in SonicOS Enhanced SonicOS Using SYN Flood Protection in SonicOS Enhanced Introduction This TechNote will describe SYN Flood protection can be activated on SonicWALL security appliance to protect internal networks. It will

More information

Firewall Firewall August, 2003

Firewall Firewall August, 2003 Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls

More information

Implementing Secure Converged Wide Area Networks (ISCW)

Implementing Secure Converged Wide Area Networks (ISCW) Implementing Secure Converged Wide Area Networks (ISCW) 1 Mitigating Threats and Attacks with Access Lists Lesson 7 Module 5 Cisco Device Hardening 2 Module Introduction The open nature of the Internet

More information

PROFESSIONAL SECURITY SYSTEMS

PROFESSIONAL SECURITY SYSTEMS PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security

More information

A1.1.1.11.1.1.2 1.1.1.3S B

A1.1.1.11.1.1.2 1.1.1.3S B CS Computer 640: Network AdityaAkella Lecture Introduction Networks Security 25 to Security DoS Firewalls and The D-DoS Vulnerabilities Road Ahead Security Attacks Protocol IP ICMP Routing TCP Security

More information

Denial of Service Attacks

Denial of Service Attacks 2 Denial of Service Attacks : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 13 August 2013 its335y13s2l06, Steve/Courses/2013/s2/its335/lectures/malicious.tex,

More information

How To Protect A Dns Authority Server From A Flood Attack

How To Protect A Dns Authority Server From A Flood Attack the Availability Digest @availabilitydig Surviving DNS DDoS Attacks November 2013 DDoS attacks are on the rise. A DDoS attack launches a massive amount of traffic to a website to overwhelm it to the point

More information

E-BUSINESS THREATS AND SOLUTIONS

E-BUSINESS THREATS AND SOLUTIONS E-BUSINESS THREATS AND SOLUTIONS E-BUSINESS THREATS AND SOLUTIONS E-business has forever revolutionized the way business is done. Retail has now a long way from the days of physical transactions that were

More information

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall. Firewalls 1 Firewalls Idea: separate local network from the Internet Trusted hosts and networks Firewall Intranet Router DMZ Demilitarized Zone: publicly accessible servers and networks 2 1 Castle and

More information

UNDERSTANDING FIREWALLS TECHNICAL NOTE 10/04

UNDERSTANDING FIREWALLS TECHNICAL NOTE 10/04 UNDERSTANDING FIREWALLS TECHNICAL NOTE 10/04 REVISED 23 FEBRUARY 2005 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation

More information

Introduction of Intrusion Detection Systems

Introduction of Intrusion Detection Systems Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:

More information

Firewalls. Chapter 3

Firewalls. Chapter 3 Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border

More information

DDoS Protection Technology White Paper

DDoS Protection Technology White Paper DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of

More information

TCP SYN Flood - Denial of Service Seung Jae Won University of Windsor wons@uwindsor.ca

TCP SYN Flood - Denial of Service Seung Jae Won University of Windsor wons@uwindsor.ca TCP SYN Flood - Denial of Service Seung Jae Won University of Windsor wons@uwindsor.ca Abstract TCP SYN flooding attack is a kind of denial-of-service attack. This SYN flooding attack is using the weakness

More information

Security vulnerabilities in the Internet and possible solutions

Security vulnerabilities in the Internet and possible solutions Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in

More information

Stateful Firewalls. Hank and Foo

Stateful Firewalls. Hank and Foo Stateful Firewalls Hank and Foo 1 Types of firewalls Packet filter (stateless) Proxy firewalls Stateful inspection Deep packet inspection 2 Packet filter (Access Control Lists) Treats each packet in isolation

More information

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall Firewall Introduction Several Types of Firewall. Cisco PIX Firewall What is a Firewall? Non-computer industries: a wall that controls the spreading of a fire. Networks: a designed device that controls

More information

Firewalls, IDS and IPS

Firewalls, IDS and IPS Session 9 Firewalls, IDS and IPS Prepared By: Dr. Mohamed Abd-Eldayem Ref.: Corporate Computer and Network Security By: Raymond Panko Basic Firewall Operation 2. Internet Border Firewall 1. Internet (Not

More information

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security

More information

10 Configuring Packet Filtering and Routing Rules

10 Configuring Packet Filtering and Routing Rules Blind Folio 10:1 10 Configuring Packet Filtering and Routing Rules CERTIFICATION OBJECTIVES 10.01 Understanding Packet Filtering and Routing 10.02 Creating and Managing Packet Filtering 10.03 Configuring

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS

TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS 2002 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor

More information

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding? Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against

More information

Villains and Voice Over IP

Villains and Voice Over IP Villains and Voice Over IP Heather Bonin ECE 578 March 7, 2004 Table of Contents Introduction... 3 How VOIP Works... 3 Ma Bell and her Babies... 3 VoIP: The New Baby on the Block... 3 Security Issues...

More information

Chapter 8 Network Security

Chapter 8 Network Security [Computer networking, 5 th ed., Kurose] Chapter 8 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 84Securing 8.4 e-mail 8.5 Securing TCP connections: SSL 8.6 Network

More information

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Network Security Chapter 3 Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: October 21, 2015 IN2101, WS 15/16, Network Security 1 Security Policies and

More information

TCP/IP Security Problems. History that still teaches

TCP/IP Security Problems. History that still teaches TCP/IP Security Problems History that still teaches 1 remote login without a password rsh and rcp were programs that allowed you to login from a remote site without a password The.rhosts file in your home

More information

Safeguards Against Denial of Service Attacks for IP Phones

Safeguards Against Denial of Service Attacks for IP Phones W H I T E P A P E R Denial of Service (DoS) attacks on computers and infrastructure communications systems have been reported for a number of years, but the accelerated deployment of Voice over IP (VoIP)

More information

A Research Study on Packet Sniffing Tool TCPDUMP

A Research Study on Packet Sniffing Tool TCPDUMP A Research Study on Packet Sniffing Tool TCPDUMP ANSHUL GUPTA SURESH GYAN VIHAR UNIVERSITY, INDIA ABSTRACT Packet sniffer is a technique of monitoring every packet that crosses the network. By using this

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

BASIC ANALYSIS OF TCP/IP NETWORKS

BASIC ANALYSIS OF TCP/IP NETWORKS BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks

More information

Packet Sniffing on Layer 2 Switched Local Area Networks

Packet Sniffing on Layer 2 Switched Local Area Networks Packet Sniffing on Layer 2 Switched Local Area Networks Ryan Spangler ryan@packetwatch.net Packetwatch Research http://www.packetwatch.net December 2003 Abstract Packet sniffing is a technique of monitoring

More information

Network Layer: Network Layer and IP Protocol

Network Layer: Network Layer and IP Protocol 1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols

More information

Firewalls and Intrusion Detection

Firewalls and Intrusion Detection Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall

More information

Gaurav Gupta CMSC 681

Gaurav Gupta CMSC 681 Gaurav Gupta CMSC 681 Abstract A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing Denial of Service for users of the

More information

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe

More information

INTRODUCTION TO FIREWALL SECURITY

INTRODUCTION TO FIREWALL SECURITY INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

Post-Class Quiz: Telecommunication & Network Security Domain

Post-Class Quiz: Telecommunication & Network Security Domain 1. What type of network is more likely to include Frame Relay, Switched Multi-megabit Data Services (SMDS), and X.25? A. Local area network (LAN) B. Wide area network (WAN) C. Intranet D. Internet 2. Which

More information

Chapter 7 Protecting Against Denial of Service Attacks

Chapter 7 Protecting Against Denial of Service Attacks Chapter 7 Protecting Against Denial of Service Attacks In a Denial of Service (DoS) attack, a Routing Switch is flooded with useless packets, hindering normal operation. HP devices include measures for

More information

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial Rocky K. C. Chang The Hong Kong Polytechnic University Presented by Scott McLaren 1 Overview DDoS overview Types of attacks

More information

CIT 380: Securing Computer Systems

CIT 380: Securing Computer Systems CIT 380: Securing Computer Systems Scanning CIT 380: Securing Computer Systems Slide #1 Topics 1. Port Scanning 2. Stealth Scanning 3. Version Identification 4. OS Fingerprinting 5. Vulnerability Scanning

More information

IP Filter/Firewall Setup

IP Filter/Firewall Setup CHAPTER 9 IP Filter/Firewall Setup 9.1 Introduction The IP Filter/Firewall function helps protect your local network against attack from outside. It also provides a way of restricting users on the local

More information

Attack and Defense Techniques

Attack and Defense Techniques Network Security Attack and Defense Techniques Anna Sperotto, Ramin Sadre Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Attack Taxonomy Many different kind of

More information

APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)

APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10) APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist nurul@apnic.net Specialties: Routing &

More information

Lecture 6: Network Attacks II. Course Admin

Lecture 6: Network Attacks II. Course Admin Lecture 6: Network Attacks II CS 336/536: Computer Network Security Fall 2014 Nitesh Saxena Adopted from previous lectures by Keith Ross, and Gene Tsudik Course Admin HW/Lab 1 We are grading (should return

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment

Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment Keyur Chauhan 1,Vivek Prasad 2 1 Student, Institute of Technology, Nirma University (India) 2 Assistant Professor,

More information

How do I get to www.randomsite.com?

How do I get to www.randomsite.com? Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local

More information

Client Server Registration Protocol

Client Server Registration Protocol Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are

More information

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski

Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski Denial of Service attacks: analysis and countermeasures Marek Ostaszewski DoS - Introduction Denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended

More information

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks Threat Paper Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks Federal Computer Incident Response Center 7 th and D Streets S.W. Room 5060 Washington,

More information

Wireless Security: Secure and Public Networks Kory Kirk

Wireless Security: Secure and Public Networks Kory Kirk Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science kory.kirk@villanova.edu www.korykirk.com/ Abstract Due to the increasing amount of wireless access points that

More information

CMS Operational Policy for Firewall Administration

CMS Operational Policy for Firewall Administration Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS Operational Policy for Firewall Administration July 16, 2008 Document Number: CMS-CIO-POL-INF11-01

More information

Security: Attack and Defense

Security: Attack and Defense Security: Attack and Defense Aaron Hertz Carnegie Mellon University Outline! Breaking into hosts! DOS Attacks! Firewalls and other tools 15-441 Computer Networks Spring 2003 Breaking Into Hosts! Guessing

More information