본문 바로가기
네트워크

1.6 Networks Under Attack

by 정구지개발자 2023. 7. 13.
728x90

The Bad Guys Can Put Malware into Your Host Via the Internet

  • Once malware infects our device it can do all kinds of devious things, including deleting our files and installing spyware that collects our private information
  • such as social security numbers, passwords, and keystrokes, and then sends this (over the Internet, of course!) back to the bad guys. 
  • Viruses are malware that require some form of user interaction to infect the user’s device.
  • Worms are malware that can enter a device without any explicit user interaction

 

The Bad Guys Can Attack Servers and Network Infrastructure

 

  • Another broad class of security threats are known as denial-of-service (DoS) attacks.
  • Most Internet DoS attacks fall into one of three categories:
  • 1) Vulnerability attack : This involves sending a few well-crafted messages to a vulnerable application or operating system running on a targeted host.
  • 2) Bandwidth flooding : The attacker sends a deluge of packets to the targeted host—so many packets that the target’s access link becomes clogged, preventing legitimate packets from reaching the server.
  • 3) Connection flooding : The attacker establishes a large number of half-open or fully open TCP connections  at the target host

 

  • In a distributed DoS (DDoS) attack, illustrated in Figure 1.25, the attacker controls multiple sources and has each source blast traffic at the target.

 

The Bad Guys Can Sniff Packets

 

  • These packets can contain all kinds of sensitive information, including passwords, social security numbers, trade secrets, and private personal messages
  • A passive receiver that records a copy of every packet that flies by is called a packet sniffer.
  • a bad guy who gains access to an institution’s access router or access link to the Internet may be able to plant a sniffer that makes a copy of every packet going to/from the organization.
  • Sniffed packets can then be analyzed offline for sensitive information.
  • Packet-sniffing software is freely available at various Web sites and as commercial products.

 

The Bad Guys Can Masquerade as Someone You Trust

 

  • The ability to inject packets into the Internet with a false source address is known as IP spoofing, and is but one of many ways in which one user can masquerade as another user.
  • To solve this problem, we will need end-point authentication, that is, a mechanism that will allow us to determine with certainty if a message originates from where we think it does

 

728x90

댓글