Computer Networks Note
Computer Networks Note
NIST (Autonomous)
Overview
Security Components and Threats
Security Policy and Issues
Types of Malware and Attacks
Security Mechanisms
Network Security Audit
The Orange Book
Legal Issues
References
1. Gert De Laet and Gert Schauwers,
“Network Security Fundamentals,” Cisco
Press, 2005.
TCPTransport
Layer 5: SMB, NFS, Socks
attacks, Routing attack,
Session SYN flooding, Sniffing
Layer 4: TCP,
Transpor UDP
Internet
Layer 3: IPv4, IPv6, ICMP, IPSec
t Network Ping/ICMP Flood
Layer 2: ARP, Token
Ring
Data Link Network
ARP spoofing,Access
MAC flooding
Physical
Types of Attacks
Denial of Service (DoS): Flooding with
traffic/requests
Buffer Overflows: Error in system programs.
Allows hacker to insert his code in to a program.
Malware
Brute Force: Try all passwords.
Man-in-the-middle-attack: intercepts
messages that are intended for a valid device
Port Scanning:
⇒ Disable unnecessary services and close ports
Network Mapping (nmap)
nmap
• network mapper is a utility for port scanning
large networks:
TCP connect() scanning,
TCP SYN (half open) scanning,
TCP FIN, Xmas, or NULL (stealth) scanning,
TCP ftp proxy (bounce attack) scanning
SYN/FIN scanning using IP fragments (bypasses some packet
filters),
TCP ACK and Window scanning,
UDP raw ICMP port unreachable scanning,
ICMP scanning (ping-sweep)
TCP Ping scanning
Direct (non portmapper) RPC scanning
Remote OS Identification by TCP/IP Fingerprinting (nearly 500)
Reverse-ident scanning.
Why Do You Care?