Nework Security-3
Nework Security-3
Nework Security-3
Repudiation
Type: Active Attacks
Type: Passive Attacks
Threats to Integrity
Passive Versus Active Attacks
B
A
2
Passive Vs. Active Attacks
Main Differences
Passive Attack Active Attack
Attacker acts secretly and just Attacker altered the message with
observe the message or fake modifications
communication
Difficult to detect It can be detected easily
Can be prevented using Can be prevented using encryption,
encryption Msg. digest and digital signature.
Destroy confidentiality Destroy message integrity
Passive Attacks
• In nature these attacks are alike eavesdropping or
monitoring of transmission
Types:
1. Snooping and releasing message contents
(Looking, listening/observing)
A B
Eavesdropper
Active Attacks
• In nature these attacks are alike message tempering and
replaying with false modifications.
Types:
Modification
Masquerading
Replaying
Repudiation
Modification (Message
Tampering)
• It means, stops the flow of the message, modify it fake
modifications (addition or deletion) and then release it
again.
• Normally hidden communication delay occurs in it.
• It can easily be detected using message digest.
A B
Attacker
Masquerade (Identity
Fabrication
• It means to steel the identity of someone else and then
generate and distribute objects under this identity
• For example, Someone may deny that he/she did not make
any transaction from the credit card
Denial of Service Attack
(Destroying Connection) Inhibits the use of
• Destroy or denying the connection with network normal
resources with different tricks or commands Communication
• Modify software with (alias commands) facilities with:
• Corrupt packets in transit
delay, server down
not responding
Link down or
A B failure etc.
Common Strategies:
• Automated Intrusion Prevention System (IPS) are used for
this purpose. IPS automatically remove the fake access
control and facilitate backup option.
• Turn Off or disconnect the system
• Reset the system using system restore
Hacker Categories
• White Hat Hackers - Good guys. Very knowledgeable
(programming & OS skills). Hired to find a vulnerability
in a network to improve security. Write own software.
• Black Hat Hackers (Cracker) - Bad guys. Desire to
cause harm to a specific system. Write own software to
destroy security.
• Script Kiddies - Starting hacker. May not target a
specific system. Rely on tools written by others.
• Cyber terrorists - Motivated by political, religious, or
philosophical agenda. They initiate unlawful attacks made against
computer, networks and the stored information to force the government or any
other religious group or nations to fulfill their demands
Why Networks are Vulnerable?
Anonymity: E.g. Who and where is the attacker?
Unknown perimeter: Where is my networks boundary?
Unknown Path: unknown route & shared medium
System complexity: great mesh of network interconnected
resources.
Sharing: Who needs access to what and why?
Points of failure: Any weakest link(s)?
What is X.800
• Security architecture or service that provides various
services to secure network transmission