RelativeResourceManager4444444

RelativeResourceManager4444444 - CprE 530 Lecture 5 Topics...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
CprE 530 Lecture 5 Topics Network Security Model Header attacks Protocol Attacks • Protocol Attacks Authentication Attacks Traffic attacks
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Network Security • Who (authentication) – Good guys – Bad Guys • What to Attack – Protocols – Network connected Applications – Infrastructure Layered Model of Attack Data Application TCP Payload Application Protocol TCP Protocol Payload Header User • Each layer receives data from the layer below and passes data to the layer above it without looking at it IP Physical Network Payload Header Payload Header Payload Header IP Protocol Physical Network Protocol Internet Payload Header Attacker Generated Packet • An attacker can insert information into the payload in order to send data to a particular layer
Background image of page 2
Threat Model •Attacker 1 & 3 can attack any layer on computers connected to the same network •Attacker 2 can attack the TCP & Application the TCP & Application layers of computers A1 & B1 and the IP layer of any device •Attacker 4 has taken over the computer Vulnerabilities, Exploits and Attacks Vulnerability Design Vulnerability Implementation Vulnerability Configuration Vulnerability Exploit Attack Code Attacks
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Attack Time Line 1980 ARPANET virus (accidental) 1988 Internet worm infects over 6,000 hosts 1980 1990 1982 First Computer Virus (Apple ][) 1986 First PC virus Numerous viruses •Time between attacks has decreased and scale of attacks 2000 2006 1995 First Macro Virus 1999 Melissa worm 2000 Nimda, code Red, Sircam, Numerous others 2003 Sober , Sobig, Blaster, Slammer 2004 Sasser , MyDoom, has increased
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 11/22/2009 for the course CPR E 530 taught by Professor Staff during the Spring '08 term at Iowa State.

Page1 / 13

RelativeResourceManager4444444 - CprE 530 Lecture 5 Topics...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online