Network Security Flashcards
Define
Network Protocol
Network Security
Transports data between nodes of a network and defines the syntax/semantics (how)
Define
Layering
Network Security
Stacks of protocols for modularization (separation)
What is the TCP/IP Layering?
Network Security
Link (data transfer)
Transport (process to process transport)
Netowrk (source to dest route)
Application (supporting network applications)
Define
Internet Protocol
Network Security
Connectionless, unreliable, best-effort datagram delivery between any nodes on the Internt with reliance on lower-level layer protocols
Define
IP Address
Network Security
4 byte value unqiue to each network separated by .
Components of IP Datagram
Network Security
- Expiration
- Protocol
- Source Address
- Destination Address
Describe
Delivery of an IP datagram: same physical network
Network Security
Direct delivery in lower-level
Describe
Delivery of an IP datagram: different physical networks
Network Security
Pass through devices of intermediate networks
What are the two intermediate networks?
Network Security
Inter-networks: routers
Intra-networks: switches
Define
Ethernet
Network Security
Link-layer protocol that includes dest address, source address, and type
Define
Switches
Network Security
- Connects machines in the Local Area Networks (LAN)
- Stores/forwards Ethernet
- Examines incoming MAC addresses
- Maintains a table that maps MAC addresses and their respective ports
Types of Network Attacks
Network Security
- Local Area Network (LAN) Attacks
- Network Layer Attacks
- Transport Layer Attacks
Describe
Local Area Network (LAN) Attacks
Network Security
- Impersonate host
- Denial of service
- Access information
- Tamper with delivery mechanisms
Define
Sniffing/Eavesdropping
Network Security
Gathering traffic from a local traffic (promiscuous mode) to collect credentials/emails/files, etc.
Can sniffing go undetected?
Network Security
Mainly yes but can be detected by software
Define
Address Resolution Spoofing
Network Security
Sniffing all traffic between two hosts in a switched environment (intra-network)
How is Address Resolution Spoofing possible?
Network Security
Replies in a switched environments don’t need requests to be accepted
Define
Address Resolution Protocol (ARP)
Network Security
Mapping a host’s IP address to its link-layer address associated with peer’s hardware for direct delivery and sends messages through the underlying link-layer
Defenses against Address Resolution Spoofing
Network Security
- Static ARP entities
- Cache poisoning resistance
- Monitor changes and report sus mappings
Describe
Defense to Address Resolution Spoofing: Static ARP Entities
Network Security
Ignores dynamic updates
Limitation: difficult to manage in a large system
Describe
Defense to Address Resolution Spoofing: Cache Poisoning Resistance
Network Security
Ignoring unsolicited ARP replies and updates based on timeouts
Limitations: susceptible to hijacking, timeouts have limited usefulness
Hijacking is the product of
Network Security
Sniffing and spoofing
Describe
Process of hijacking
Network Security
Once the attacker sniffs and spoof the necessary information, they are racing against the legit host to reply to the client’s request
Define
Rogue Gateway
Network Security
First hop for all Internet traffic
What happens if an attacker gains control of a rogue gateway?
Network Security
Attacker can sniff, intercept, block, and modify traffic
Define
Broadcast Protocol
Network Security
Enables transmission of messages
Securing LAN Mechanisms
Network Security
- Do nothing and assume that it is secure
- Smart switching/active monitoring
Define
Smart switching/active monitoring
Network Security
- Don’t broadcast traffic
- Forward Ethernet to the right path
- Filter requests to limit listening/filtering replies to limit replying
Define
Dynamic Host Configuration Protocol
Network Security
Dynamically allocates the IP address to hosts of a network and provides information about DNS server, gateway, and period of lease
Threats against Dynamic Host Config Protocol
Network Security
- Fake DNS server => redirection of DNS lookups
- Fake gateway router => interception of traffic, relay/modification of contents between host and remote machine
Define
Network Layer Attack
Network Security
Gaining access to a system that is isolated from other networks
What are the two types of Network Layer Attacks?
Network Security
IP Spoofing and Blind Spoofing