Network Security: MSC Course by
Network Security: MSC Course by
MSC Course
By:
Dr. Qutaiba Ibrahem Ali
Computer Eng. Dept. / Mosul University
:LECTURE 1
Network Threats & Attacks
Threats
There are four primary classes of threats to network security
1.Unstructured threats
Unstructured threats consist of mostly inexperienced individuals using easily available
hacking tools such as shell scripts and password crackers . Even unstructured threats that are
only executed with the intent of testing and challenging a hacker’s skills can still do serious
damage to a company. For example, if an external company Web site is hacked, the integrity
of the company is damaged. Even if the external Web site is separate from the internal
information that sits behind a protective firewall, the public does not know that. All the
public knows is that the site is not a safe environment to conduct business.
2.Structured threats
Structured threats come from hackers that are more highly motivated and technically
competent. These people know system vulnerabilities, and can understand and develop
exploit-code and scripts. They understand, develop, and use sophisticated hacking
techniques to penetrate unsuspecting businesses. These groups are often involved with the
major fraud and theft cases reported to law enforcement agencies.
3.External threats
External threats can arise from individuals or organizations working outside of a company.
They do not have authorized access to the computer systems or network. They work their
way into a network mainly from the Internet or dialup access servers.
4.Internal threats
Internal threats occur when someone has authorized access to the network with either an
account on a server or physical access to the network. According to the FBI, internal access
and misuse account for 60 to 80 percent of reported incidents.
Attacks
There are 4 primary classes of attacks
• Reconnaissance
Reconnaissance is the unauthorized discovery and mapping of systems, services, or vulnerabilities.
It is also known as information gathering and, in most cases, it precedes an actual access or Denial
of Service (DoS) attack. Reconnaissance is somewhat analogous to a thief casing a neighborhood
for vulnerable homes to break into, such as an unoccupied residence, easy-to-open doors, or open
windows.
• Access
System access is the ability for an unauthorized intruder to gain access to a device for which the
intruder does not have an account or a password. Entering or accessing systems to which one does
not have access usually involves running a hack, script, or tool that exploits a known vulnerability
of the system or application being attacked.
• Denial of Service (DoS) :Denial of service (DoS) implies that an attacker disables or corrupts
networks, systems, or services with the intent to deny services to intended users. DoS attacks
involve either crashing the system or slowing it down to the point that it is unusable. But DoS can
also be as simple as deleting or corrupting information. In most cases, performing the attack simply
involves running a hack or script. The attacker does not need prior access to the target because a
way to access it is all that is usually required. For these reasons, DoS attacks are the most feared.
• Worms, Viruses, and Trojan Horses
Malicious software is inserted onto a host in order to damage a system, corrupt a system, replicate
itself, or deny services or access to networks, systems, or services.
Reconnaissance attacks : Reconnaissance attacks can consist of the following
•Packet sniffers
•Port scans
•Ping sweeps
•Internet information queries
A malicious intruder typically ping sweeps the target network to determine which IP
addresses are alive . After this, the intruder uses a port scanner to determine what network
services or ports are active on the live IP addresses
The ping command tells the attacker what IP addresses are alive.
Network snooping and packet sniffing are common terms for eavesdropping. Eavesdropping
is listening in to a conversation, spying, prying, or snooping. The information gathered by
eavesdropping can be used to pose other attacks to the network.
An example of data susceptible to eavesdropping is SNMP version 1 community strings,
which are sent in clear text. An intruder could eavesdrop on SNMP queries and gather
valuable data on network equipment configuration. Another example is the capture of
usernames and passwords as they cross a network.
Password Attacks
Password attacks can be implemented using several methods, including brute-force attacks, Trojan
horse programs, IP spoofing, and packet sniffers
Although packet sniffers and IP spoofing can yield user accounts and passwords, password attacks
usually refer to repeated attempts to identify a user account, password, or both. These repeated
attempts are called brute force attacks.
Often a brute-force attack is performed using a program that runs across the network and attempts to
log in to a shared resource, such as a server. When an attacker gains access to a resource, he or she
has the same access rights as the user whose account has been compromised. If this account has
sufficient privileges, the attacker can create a back door for future access, without concern for any
status and password changes to the compromised user account
Masquerade/IP Spoofing
With a masquerade attack, the network intruder can manipulate TCP/IP packets by IP spoofing, falsifying
the source IP address, thereby appearing to be another user. The intruder assumes the identity of a valid
user and gains that user’s access privileges by IP spoofing. IP spoofing occurs when intruders create IP
data packets with falsified source addresses.
Normally, an IP spoofing attack is limited to the injection of data or commands into an existing stream of
data passed between a client and server application or a peer-to-peer network connection. The attacker
simply does not worry about receiving any response from the applications.
If an attacker manages to change the routing tables they can receive all of the network packets that are
addressed to the spoofed address, and reply just as any trusted user can. Like packet sniffers, IP spoofing
is not restricted to people who are external to the network.
After obtaining information through scanning tools, the intruder looks for vulnerabilities associated with
those entities.
Course Projects (2007-2008)