Assignment 3 of CN
Assignment 3 of CN
Assignment 3 of CN
TCP
UDP
VLAN
A VLAN is a group of devices on one or more LANs that are configured to
communicate as if they were attached to the same wire, when in fact they
are located on a number of different LAN segments. Because VLANs are
based on logical instead of physical connections, they are extremely
flexible.
Inter-VLAN
Inter-VLAN routing can be defined as a way to forward traffic between
different VLAN by implementing a router in the network. As we learnt
previously, VLANs logically segment the switch into different subnets, when
a router is connected to the switch, an administrator can configure the
router to forward the traffic between the various VLANs configured on the
switch. The user nodes in the VLANs forwards traffic to the router which
then forwards the traffic to the destination network regardless of the VLAN
configured on the switch.
NAT
1. NAT stands for Network Address Translation.
2. In NAT, Private IP addresses are translated into the public IP address.
3. NAT can be considered PAT’s superset.
4. NAT uses IPv4 address.
5. It have 3 types: Static, Dynamic NAT and PAT/ NAT Overloading/IP
masquerading.
PAT
1. PAT stands for Port Address Translation.
2. In PAT, Private IP addresses are translated into the public IP address via
Port numbers.
Static routing is easy to implement in a small network. Static routes stay the
same, which makes them fairly easy to troubleshoot. Static routes do not
send update messages and, therefore, require very little overhead.
Advantages
1. Easy to implement in a small network.
2. Very secure. No advertisements are sent, unlike with
dynamic routing protocols.
3. It is very predictable, as the route to the destination is always
the same.
4. No routing algorithm or update mechanisms are required.
Therefore, extra resources (CPU and memory) are not
required.
Disadvantages
1. Suitable for simple topologies or for special purposes such
as a default static route.
2. Configuration complexity increases dramatically as the
network grows. Managing the static configurations in large
networks can become time consuming.
3. If a link fails, a static route cannot reroute traffic. Therefore,
manual intervention is required to re-route traffic.
Dynamic routing protocols help the network administrator manage the time-
consuming and exacting process of configuring and maintaining static
routes.
What if the company grew and now has four regions and 28 routers to
manage, as shown in Figure 3-4? What happens when a link goes down?
How do you ensure that redundant paths are available?
Advantages
Disadvantages
ICMP
What is ICMP?
ICMP is stacked on the Internet Layer and supports the core Internet protocol.
It is considered as one of the most essential systems that allow the internet to
work flawlessly.
IP does not have a built-in mechanism that sends control messages and error
messages. That is why a protocol like ICMP is needed. Practically, ICMP
offers error control and often it is employed to report errors,
send management queries and operations information.
Network devices like routers need to use the ICMP in order to send the error
messages. That is why ICMP is considered as a supporting protocol.
It is a known fact that the lower Internet Layer does not need to be concerned
with assuring the connection, yet ICMP is very much needed for important
feedback when things go out of order.
ICMP offers feedback and information regarding errors, control messages and
management queries. The first code field in the ICMP block singlehandedly
manages to convey a great deal of information. Below you can find some of
the most relevant values the first code field can have and their meaning:
3: Destination is unreachable.
10: Router solicitation.
IGMP
IGMP is acronym for Internet Group Management Protocol. IGMP is a
communication protocol used by hosts and adjacent routers for
multicasting communication with IP networks and uses the resources
efficiently to transmit the message/data packets. Multicast communication
can have single or multiple senders and receivers and thus, IGMP can be
used in streaming videos, gaming or web conferencing tools. This protocol
is used on IPv4 networks and for using this on IPv6, multicasting is
managed by Multicast Listener Discovery (MLD). Like other network
protocols, IGMP is used on network layer. MLDv1 is almost same in
functioning as IGMPv2 and MLDv2 is almost similar to IGMPv3.
The communication protocol, IGMPv1 was developed in 1989 at Stanford
University. IGMPv1 was updated to IGMPv2 in year 1997 and again
updated to IGMPv3 in year 2002.
Applications:
Streaming –
Multicast routing protocol are used for audio and video streaming over
the network i.e., either one-to-many or many-to-many.
Gaming –
Internet group management protocol is often used in simulation games
which has multiple users over the network such as online games.
Web Conferencing tools –
Video conferencing is a new method to meet people from your own
convenience and IGMP connects to the users for conferencing and
transfers the message/data packets efficiently.
Types:
There are 3 versions of IGMP. These versions are backward compatible.
Following are the versions of IGMP:
1. IGMPv1 :
The version of IGMP communication protocol allows all the
supporting hosts to join the multicast groups using
membership request and include some basic features. But,
host cannot leave the group on their own and have to wait for
a timeout to leave the group.
The message packet format in IGMPv1:
Version –
Set to 1.
Type –
1 for Host Membership Query and Host Membership Report.
Unused –
8-bits of zero which are of no use.
Checksum –
It is the one’s complement of the one’s complement of the sum of IGMP
message.
Group Address –
The group address field is zero when sent and ignored when received in
membership query message. In a membership report message, the group
address field takes the IP host group address of the group being reported.
2. IGMPv2 :
IGMPv2 is the revised version of IGMPv1 communication protocol. It has
added functionality of leaving the multicast group using group
membership.
The message packet format in IGMPv2:
Max Response Time –
This field is ignored for message types other than membership query. For
membership query type, it is the maximum time allowed before sending a
response report. The value is in units of 0.1 seconds.
Checksum –
It is the one’s complement of the one’s complement of the sum of IGMP
message.
Group Address –
It is set as 0 when sending a general query. Otherwise, multicast address
for group-specific or source-specific queries.
3. IGMPv3 :
IGMPv2 was revised to IGMPv3 and added source-specific multicast and
membership report aggregation. These reports are sent to 224.0.0.22.
The message packet format in IGMPv3:
Max Response Time –
This field is ignored for message types other than membership query. For
membership query type, it is the maximum time allowed before sending a
response report. The value is in units of 0.1 seconds.
Checksum –
It is the one’s complement of the one’s complement of the sum of IGMP
message.
Group Address –
It is set as 0 when sending a general query. Otherwise, multicast address for
group-specific or source-specific queries.
Resv –
It is set zero of sent and ignored when received.
S flag –
It represents Suppress Router-side Processing flag. When the flag is set, it
indicates to suppress the timer updates that multicast routers perform upon
receiving any query.
QRV –
It represents Querier’s Robustness Variable. Routers keeps on retrieving the
QRV value from the most recently received query as their own value until the
most recently received QRV is zero.
QQIC –
It represents Querier’s Query Interval Code.
Number of sources –
It represents the number of source addresses present in the query. For
general query or group-specific query, this field is zero and for group-and-
source-specific query, this field is non-zero.
Source Address[i] –
It represents the IP unicast address for N fields.
Working:
IGMP works on devices that are capable of handling multicast groups and
dynamic multicasting. These devices allows the host to join or leave the
membership in the multicast group. These devices also allows to add and
remove clients from the group. This communication protocol is operated
between host and local multicast router. When a multicast group is created, the
multicast group address is in range of class D (224-239) IP addresses and is
forwarded as destination IP address in the packet.
L2 or Level-2 devices such as switches are used in between host and multicast
router for IGMP snooping. IGMP snooping is a process to listen to the IGMP
network traffic in controlled manner. Switch receives the message from host
and forwards the membership report to the local multicast router. The multicast
traffic is further forwarded to remote routers from local multicast routers using
PIM (Protocol Independent Multicast) so that clients can receive the
message/data packets. Clients wishing to join the network sends join message
in the query and switch intercepts the message and adds the ports of clients to
its multicast routing table.
Advantages:
IGMP communication protocol efficiently transmits the multicast data to
the receivers and so, no junk packets are transmitted to the host which
shows optimized performance.
Bandwidth is consumed totally as all the shared links are connected.
Hosts can leave a multicast group and join another.
Disadvantages:
It does not provide good efficiency in filtering and security.
Due to lack of TCP, network congestion can occur.
IGMP is vulnerable to some attacks such as DOS attack (Denial-Of-
Service).
ARP
Address Resolution Protocol (ARP) is a protocol or procedure that connects an ever-
changing Internet Protocol (IP) address to a fixed physical machine address, also
known as a media access control (MAC) address, in a local-area network (LAN).
This mapping procedure is important because the lengths of the IP and MAC addresses
differ, and a translation is needed so that the systems can recognize one another. The
most used IP today is IP version 4 (IPv4). An IP address is 32 bits long. However, MAC
addresses are 48 bits long. ARP translates the 32-bit address to 48 and vice versa.
The MAC address is also known as the data link layer, which establishes and
terminates a connection between two physically connected devices so that data transfer
can take place. The IP address is also referred to as the network layer or the layer
responsible for forwarding packets of data through different routers. ARP works
between these layers.
HOW DOES ARP WORK?
When a new computer joins a LAN, it is assigned a unique IP address to use for
identification and communication.
ARP caches are kept on all operating systems in an IPv4 Ethernet network. Every time
a device requests a MAC address to send data to another device connected to the LAN,
the device verifies its ARP cache to see if the IP-to-MAC-address connection has
already been completed. If it exists, then a new request is unnecessary. However, if the
translation has not yet been carried out, then the request for network addresses is sent,
and ARP is performed.
An ARP cache size is limited by design, and addresses tend to stay in the cache for
only a few minutes. It is purged regularly to free up space. This design is also intended
for privacy and security to prevent IP addresses from being stolen or spoofed by
cyberattackers. While MAC addresses are fixed, IP addresses are constantly changing.
In the purging process, unutilized addresses are deleted; so is any data related to
unsuccessful tries to communicate with computers not connected to the network or that
are not even powered on.
WHAT ARE THE TYPES OF ARP?
There are different versions and use cases of ARP. Let us take a look at a few.
PROXY ARP
Gratuitous ARP is almost like an administrative procedure, carried out as a way for a
host on a network to simply announce or update its IP-to-MAC address. Gratuitous ARP
is not prompted by an ARP request to translate an IP address to a MAC address.
REVERSE ARP (RARP)
Host machines that do not know their own IP address can use the Reverse Address
Resolution Protocol (RARP) for discovery.
INVERSE ARP (IARP)
Whereas ARP uses an IP address to find a MAC address, IARP uses a MAC address to
find an IP address.
WHY IS ARP NECESSARY?
ARP is necessary because the software address (IP address) of the host or computer
connected to the network needs to be translated to a hardware address (MAC address).
Without ARP, a host would not be able to figure out the hardware address of another
host. The LAN keeps a table or directory that maps IP addresses to MAC addresses of
the different devices, including both endpoints and routers on that network.
The four basic requirements for a reliable network include fault tolerance, scalability, quality
of service, and security. These requirements are explained below
FAULT TOLERANCE
The first requirement for a reliable network is that it needs to be fault-tolerant. The fault
tolerance of a network means that it requires having the capability to continue data
deliverance in case of any hardware failure. For fault-tolerance network, there need to be
backups for the network hardware. The users trust more fault-tolerant networks, which has
backups instead of the one with a single hardware and no backup.
SCALABILITY
Scalability is an important requirement for reliable networks, as, with the increasing amount
of smart devices, every network needs to be scalable, to quickly adopt new devices in the
network. There are also various algorithms or structure designs which are used to increase
the scalability of a network, such as a tree structure. Scalability is more important in the
case of large networks.
QOS
QoS (Quality of Service) is also important for providing a reliable network to users. QoS is
responsible for the reliable delivery of communications in the network. It also has the
responsibility of avoiding congestions in the network. The QoS of a network can be
maintained through different algorithms, that can also be used for traffic congestions.
SECURITY
It is a significant factor for a reliable network. Security of a network consists of the main
elements, such as confidentiality, integrity, and availability. These three aspects of security
define the security policies for the network, and the network is considered secure if the
security policies cover all loopholes in the network.
It is very simple; just keep sending more and more requests to the system than that it
can handle all along. With the invention of the toolkit, it has become way easy to disturb
any website’s availability. In DOS an attacker’s program will establish a connection on a
service port, obviously counterfeiting the packet’s header details and then leaves the
connection. Now if the host can handle 20 requests per second and the attacker is
sending 50 requests per second, then it may cause the host server down due to mass
fake requests. In this case, the server cannot accept the legitimate requests as well due
to fake requests and it shows the unavailability of the server to a legitimate user.
S ECURITY S OLUTIONS
Monitoring the packets to save your server from the entrance of the counterfeit packets.
Timely upgrading of the security patches on your host’s operating system.
Beware of the running your server very close to the last level of the capacity.
S ECURITY S OLUTIONS
THREAT #3 EAVESDROPPING
Another greatest security threat in the network. During eavesdropping, an intruder
intercepts the packages of data transferred over HTTP (through monitoring software),
modifies the data and misuses them in order to harm the network. It is really a
dangerous threat as there are many tools named as Sniffers available and developed
frequently to intercept the data packages.
S ECURITY S OLUTIONS
Entertaining encryption strategy will secure you a way out from eavesdropping. Using encryption
measures like digital certificates (SSL certificates) will definitely lessen the risk of eavesdropping attacks.
Apply network segmentation which will prevent eavesdropping as well as other network attacks.
Employing Network Access Control enhances the security of your network by checking the
authenticity of every device before establishing any connection.
PRODUCTS
o Single Domain SSL
o Domain Validation SSL
o Organization Validation SSL
o EV SSL Certificates
o Wildcard SSL Certificates
o Multi-Domain / SAN SSL
o Exchange Server SSL
o Code Signing Certificates
SSL BRANDS
o Comodo
o RapidSSL
o GeoTrust
o Thawte
o DigiCert
o Symantec
DEALS
PARTNERS
FREE TOOLS
12 NETWORK SECURITY THREATS AND THEIR
SOLUTIONS
Posted on February 8, 2021 by ClickSSL
Security plays a very critical factor in almost every field either it is an organization, a
governmental entity, a country, or even your house. Computers, mobile devices, and
Internet are also facing a surplus amount of security challenges day by day.
Computers/mobiles are now included in the list of the basic necessities of a human
being. From simple mathematical calculation to storing data, building applications,
communicating with the world and so on we all depend completely on these devices.
WHAT IS A NETWORK?
The computers connected through intranet together in an order to serve a number of
users in a particular area like in an office can be termed as a Network.
WHAT IS NETWORK SECURITY?
Network security deals with aspects like prevention of unauthorized access, termination
of misuse and denial of the service problems. Security may be referred to as
complementing factors like: confidentiality, integrity and availability (CIA). If you are
thinking that this is it, you are absolutely wrong.
It is very simple; just keep sending more and more requests to the system than that it
can handle all along. With the invention of the toolkit, it has become way easy to disturb
any website’s availability. In DOS an attacker’s program will establish a connection on a
service port, obviously counterfeiting the packet’s header details and then leaves the
connection. Now if the host can handle 20 requests per second and the attacker is
sending 50 requests per second, then it may cause the host server down due to mass
fake requests. In this case, the server cannot accept the legitimate requests as well due
to fake requests and it shows the unavailability of the server to a legitimate user.
S ECURITY S OLUTIONS
Monitoring the packets to save your server from the entrance of the counterfeit packets.
Timely upgrading of the security patches on your host’s operating system.
Beware of the running your server very close to the last level of the capacity.
S ECURITY S OLUTIONS
Enforce strong authentication strategies.
Keeping usernames and passwords secret from the unreliable sources.
Not providing unnecessary access to any user or even to any employee.
THREAT #3 EAVESDROPPING
Another greatest security threat in the network. During eavesdropping, an intruder
intercepts the packages of data transferred over HTTP (through monitoring software),
modifies the data and misuses them in order to harm the network. It is really a
dangerous threat as there are many tools named as Sniffers available and developed
frequently to intercept the data packages.
S ECURITY S OLUTIONS
Entertaining encryption strategy will secure you a way out from eavesdropping. Using encryption
measures like digital certificates (SSL certificates) will definitely lessen the risk of eavesdropping attacks.
Apply network segmentation which will prevent eavesdropping as well as other network attacks.
Employing Network Access Control enhances the security of your network by checking the
authenticity of every device before establishing any connection.
THREAT #4 IP SPOOFING
IP spoofing means presuming the IP of a network, creating an illusion of being a valid IP
by creating Internet Protocol packets with disguised intentions of harming the actual
owner of the IP address.
By forging the headers in order to insert fallacious information in the e-mail headers to
mislead the receiver from the original destination is also a type of spoofing which is
known as Spamming.
S ECURITY S OLUTIONS
Filtering of packets entering into the network is one of the methods of preventing Spoofing. On
other hand, filtering of incoming and outgoing traffic should also be implemented.
ACLs help prevent Spoofing by not allowing falsified IP addresses to enter.
Accreditation to encryption should be provided in order to allow only trusted hosts to
communicate with.
SSL certificates should be used to reduce the risk of spoofing to a greater extent.
THREAT #5 MAN-IN-THE-MIDDLE-ATTACK
MITM is one of the most dreadful network threats. An intruder here establishes an
independent connection with both sender and receiver, intercepts their messages one
by one, modifies those messages and relays them back to the sender and receiver. This
all occurs so smoothly that both the sender and receiver never come to know that they
are being overheard by someone. In addition, it exposes your network to several other
threats.
S ECURITY S OLUTIONS
Using Public Key Infrastructures based authentications. It not only protects the applications from
eavesdropping and other attacks but also validates the applications as a trusted ones. Both the ends are
authenticated hence preventing (MITM) Man-in-the-middle-attack.
Setting up passwords and other high-level secret keys in order to strengthen the mutual
authentication.
Time testing techniques such as Latency examination with long cryptographic hash functions
confirming the time taken in receiving a message by both ends. Suppose if the time taken by a message
to be delivered at one end is 20 seconds and if the total time taken exceeds up to 60 seconds then it
proves the existence of an attacker.
S ECURITY S OLUTIONS
A user should increase the password’s length, and the complexity of a password should be
increased.
A limited login should be enabled like after three failed attempts; a user will be locked.
Multi-factor Authentication can help to avert brute force attack as it works as an additional layer
when a login attempt is made.
S ECURITY S OLUTIONS
Enterprise can use browser isolation where a website runs in a cloud to access it.
Antivirus is a solution to prevent browser attack at some point.
Operating system isolation is an option where each device is divided into multiple segments and
its operating system. Each device will connect to the invisible network virtualization layer.
S ECURITY S OLUTIONS
The network admin can perform penetration testing, intrusion testing, as well limit network access
control.
Implement an HSTS policy in which a browser is forced to allow open HTTPS pages only.
Enable HTTPS on a domain name. Educate users about the use of HTTPS.
S ECURITY S OLUTIONS
Prevent cache by limiting users’ access to resolver as hackers could not manipulate a resolver’s
cache. It would help if you closed any open resolver on the network.
Do audit your DNS zones, including CNAME, MX records, and IP addresses. Moreover, it would
be best to keep an updated DNS server in case of your servers.
Keep authoritative and resolving functions separately using different servers.
S ECURITY S OLUTIONS
ICMP functionality should be disabled about a specific router or any device. Disable the
send and receive ability of ICMP includes request processing and Echo reply.
Consequently, the device will not accept any ping request.
S ECURITY S OLUTIONS
Users should avoid free public Wi-Fi or any unsecured network to avoid data sniffing over the
network.
Use of encryption that binds travelling information between network and users.
Scan and monitor the traffic on the network to find any suspicious activity.
Hire a certified ethical hacker to watch over network activities.
S ECURITY S OLUTIONS
These were some of the vulnerabilities prevailing in network security. Other prevalent
vulnerabilities consist of data loss, data modification, sniffer attack, application-layer
attack, password-based attacks and so on.
Security stands as the toughest challenge as it gets more and more vulnerable to
attacks day by day.
As far as the network security is concerned, paying attention to some of the aspects will
help to achieve proper secure environment such as: