Вы находитесь на странице: 1из 19

A SEMINAR ON

NETWORK SECURITY

NETWORK
THE PURE DEFINITION OF COMPUTER NETWORK REFERS TO THE INTERCONNECTION OF THE SYSTEMS IN ORDER TO EXCHANGE INFORMATION.

Internet
What is the Internet? The Internet is the world's largest network of networks . When you want to access the resources offered by the Internet, you don't really connect to the Internet; you connect to a network that is eventually connected to the Internet backbone , a network of extremely fast network components.

IP ADDRESS CLASSES
CLASS A B C D E RANGE 1.0.0.0 -127.255.255.255 128.0.0.0-139.255.255.255 140.0.0.0-191.255.255.255 192.0.0.0-239.255.255.255 240.0.0.0-247.255.255.255

ATTACKS ON IP ADDRESS
ATTACK THROUGH IRC. ATTACKING THROUGH E-MAIL. ATTACKING THROUGH SCRIPTS. IP SPOOFING. IP SESSION HIJACKING.

COUNTERMEASURES AGAINST IP ATTACKS


1.SURF USING ANNONYMOUS WEB SEVICES 2.USE ANNONYMOUS E-MAIL SEVICES. 3.USE PROXY THAT HIDE YOUR IP. 4.USE MULTIPLE PROXIES IN ORDER TO HAVE GOOD SECURITY. 5.USE FIREWALL.

UNWRAPPING THE TCP LAYER


ITS A TRANSCONTROL PROTOCOL. A THREE WAY HANDSHAKE TAKES PLACE WHILE TRANFERING DATA.

HOST-----SYN----SOURCE SOURCE----ACK-----HOST
If connection is established

HOST-------FIN-----SOURCE. If connection is not established HOST-------RST-----SOURCE.

ATTACKS ON TCP.
1.SYN FLOOD ATTACK. 2.FIN ATTACK 3 NULL ATTACK

ATTACKS ON UDP.
1 IN THIS ATTACK THE HACKER TRIES TO CREATE INFINITE LOOP BETWEEN TWO UDP CONNECTION USER.

COUNTERMEASURES AGAINST TCP UDP.


1. REDUCE TIME DURATION FOR TIMED OUT OF A CONNECTION. 2.INCREASE QUEUE OF REQUEST. 3 INSTALL VENDOR SPECIFIC UPDATES.

RISK MANAGEMENT
ITS A GAME OF SECURITY WHERE THE ORGANIZATION DECIDES HOW MUCH RISK IS ACCOMNIED AND HOW MUCH SECURITY THEY CAN PROVIDE.

DDOS ATTACKS
1.PING OF DEATH 2.TEAR DROP 3.SYN FLOODING 4.LAND ATTACK. 5.DISTRIBUTED DOS ATTACK.

COUNTERMEASURES AGAINST DDOS ATTACKS


1.ALMOST ALL NEW SYSTEM ARE BOUND TO BE NOT VULNERABLE TO THE PING ATTACK. 2.REDUCE TIME OUT SESSION OF ACONNECTION TO TAKE PLACE. 3.DISABLE ALL ECHO SERVICES THAT YOU DONT NEED. 4.USE PACKET FILTERING. 5.DISTRIBUTED DOS ATTACK.

TROJANS ATTACKS
TROJAN IS A ONE KIND OF SOFTWARE THAT IS INSTALLED ON EITHER ON THE SYSTEM OF VICTIM OR ON THE ATTACKERS SYSTEM THAT CAN BE USED FOR MALLICIOUS PURPOSE.

COUNTERMEASURES AGAINS TROJANS ATTACKS


1.TROJANS ENTER INTO THE SYSTEM BY SPECIFIC PORTS SO COMPARE THOSE PORTS WITH TROJAN PORT , IF ANY SERVICE IS RUNNING CLOSE THAT PORT.
2.DONT ACCEPT ANY UNKNOWN FILE. 3.DOWN LOAD EXE FILES FROM TRUSTED SITES.

FIREWALLS
ITS A SOFTWARE OR HARDWARE OR COMBINATION OF SOFTWARE & HARDWARE THAT FILTERS THE ALL INCOMING MESSAGE.

CONCLUSIONS:SECURITY IS REALLY A DIFFICULT TOPIC.EVERYONE HAS DIFFERENT IDEA WHAT SECURITY IS AND WHAT LEVELS OF RISK ARE ACCEPTABLE.THE KEY TO BUILD SECURE NETWORK FOR AN ORGANISATION IS TO DEFINE WHAT SECURITY MEAN TO YOUR ORGANISATION.ONCE IT HAS BEEN DEFINED EVERYTHING THAT GOES ON TO THE NETWORK CAN BE EVALUATED. SECURITY IS EVERYONES BUSINESS AND ONLY WITH EVERYBODYS COOPERATION AN INTELLIGENT POLICY WILL BE AVAILABLE

References:1 The New Lexicon Webster's Encyclopedic Dictionary of the English Language. New York: Lexicon. 2 R.T. Morris, 1985. A Weakness in the 4.2BSD Unix TCP/IP Software. Computing Science Technical Report No. 117, AT&T Bell Laboratories, Murray Hill, New Jersey. 3 S.M. Bellovin. Security Problems in the TCP/IP Protocol Suite. Computer Communication Review, Vol. 19, No. 2, pp. 32-48, April 1989. 4 Y. Rekhter, R. Moskowitz, D. Karrenberg, G. de Groot, E. Lear, ``Address Allocation for Private Internets.'' RFC 1918. 5 J.P. Holbrook, J.K. Reynolds. ``Site Security Handbook.'' RFC 1244. 6 M. Curtin, ``Snake Oil Warning Signs: Encryption Software to Avoid.'' USENET <sci.crypt> Frequently Asked Questions File.

7 Shield your computer from internet crime. By Richard Mansfield 8 Internet security by Chris Prossie.. 9 Incident Response by KevinMandia. 10 802.7 security by Bruce Potter

ANY
QUERY ?

Вам также может понравиться