Some attacks gain system knowledge or personal

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: , it is not necessarily more secure than IPv4. The approach to security is only slightly better, not a radical improvement. Common attack methods and the security technology will be briefly discussed. Not all of the methods in the table above are discussed. The current technology for dealing with attacks is understood in order to comprehend the current research developments in security hardware and software. 2.1 Common Internet Attack Methods 2. Attacks through the Current Internet Protocol IPv4 Common internet attacks methods are broken down into categories. Some attacks gain system knowledge or personal information, such as eavesdropping and phishing. Attacks can also interfere with the system’s intended function, such as viruses, worms and trojans. The other form of attack is when the system’s resources are consumes uselessly, these can be caused by denial of service (DoS) attack. Other forms of network intrusions also exist, such as land attacks, smurf attacks, and teardrop attacks. These attacks are not as well known as DoS attacks, but they are used in some form or another even if they aren’t mentioned by name. There are four main computer security attributes. They were mentioned before in a slightly different form, but are restated for convenience and emphasis. These security attributes are confidentiality, integrity, privacy, and availability. Confidentiality and integrity still hold to the same definition. Availability means the computer assets can be accessed by authorized people [8]. Privacy is the right to protect personal secrets [8]. Various attack methods relate to these four security attributes. Table 1 shows the attack methods and solutions. 7 personal data, such as credit card numbers, online banking credentials, and other sensitive Interception of communications by an information. unauthorized party is called eavesdropping. Passive eavesdropping is when the person only secretly 2.1.6 IP Spoofing Attacks listens to the networked messages. On the other hand, active eavesdropping is when the intruder Spoofing means to have the address of the listens and inserts something into the computer mirror the address of a trusted computer communication stream. This can lead to the in order to gain access to other computers. The messages being distorted. Sensitive information identity of the intruder is hidden by different can be stolen this way [8]. means making detection and prevention difficult. With the current IP protocol technology, IP‐ 2.1.2 Viruses spoofed packets cannot be eliminated [8]. 2.1.1 Eavesdropping Viruses are self‐replication programs that use files to infect and propagate [8]. Once a file is opened, the virus will activate within the system. 2.1.7 Denial of Service 2.2.1 Cryptographic systems Denial of Service is an attack when the system receiving too many requests cannot return communication with the requestors [9]. The system then consumes resources waiting for the 2.1.3 Worms handshake to complete. Eventually, the system A worm is similar to a virus because they both are cannot respond to any more requests rendering it self‐replicating, but the worm does not require a without service. file to allow it to propagate [8]. There are two main 2.2 Technology for Internet Security types of worms, mass‐mailing worms and network‐ aware worms. Mass mailing worms use email as a means to infect other computers. Network‐aware Internet threats will continue to be a major issue in worms are a major problem for the Internet. A the global world as long as information is network‐aware worm selects a target and once the accessible and transferred across the Internet. worm accesses the target host, it can infect it by Different defense and detection mechanisms were developed to deal with these attacks. means of a Trojan or otherwise. 2.1.4 Trojans Trojans appear to be benign programs to the user, bu...
View Full Document

Ask a homework question - tutors are online