As part of the series of topics on network security.
Hope you will like it.
Hope you will like it.
Security Attacks:
An action that compromises, the security of information.
1. Passive Attacks
It intercepts the message, learns about the makes use of the
message, but does not affect system resources.
Passive attacks can be of:
1.
Release of Message contents
Any message or file transferred over the
network is intercepted. This intercepted data can contain sensitive information.
2
Traffic Analysis:
If the data is masked/encrypted, intruder may
not be directly able to read it. Intruder would be able to read the pattern of
the message, identify the host’s communicating, length and the frequency of the
message.
2. Active Attacks
This form of attack, intercepts the message, modifies or
recreates a false stream of message.
Active Attacks can be of:
1.
Masquerade.
One pretends to be a different entity. Authentication sequence can be
captured and replayed after a valid authentication. And using this information
to impersonate and get illegal access.
Masquerading occurs when one person uses the identity of another to gain
access to a computer. This may be done in person or remotely
2.
Replay
Capture the data and retransmit the data.
3.
Modification of messages.
Actual message: “allow xyz to read a file”,
Post modification: “allow gs to read a file”.
Here ‘xyz’ is been replaced by ‘ gs’ by the middle man.
4.
Denial of Service.
There are two forms of denial of service.
First form: Suppressing all messages directed to a particular
destination.
Second form: disrupted the network by disabling the network or by
overloading it with messages to degrade the performance.(Bottle neck)
3. Insider Attack
It involves any insider eavesdrop, steal or
damage information. Use that stolen information any purpose.
Example:
Credit card or Cell phone holder information shared
to external person.
4. Close-in attack:
Social engineering is best way to describe this kind of attack.
Attacker
cans the advantages of being physically close to the target devices.
Example:
Shoulder
surfing is one such example. Person looking
over someone's shoulder, to get information such as password, PIN.
5. Distribution attack:
Introduction
of Trojan horse or back-door program. This code gets distributed across the network
to gain unauthorized access to information or to a system function and disrupts the functionality of the
system.
Difference between masquerade and replay attacks:
Masquerade is any attack wherein the attackers acts as if attcker was some other user or entity in the system.
Replay attack is plain attack, where use intercepts the data, resend the same data.
In Simple words, Masquerade manipulates the request.
Replay attack just sends the intercepted request without manipulating it.
No comments:
Post a Comment