Network Security Flashcards
Network attacks covered
Routing (BGP), Naming (DNS Reflection) [ddos, phishing]
Why is internet vulenarable
Designed for simplicy, on by default, Host are insecure, Attacks can look like normal traffic, federated design
What type of attacks are packet switch networks vulnerable to?
resource exhaustion
Components of security?
Availability, confidentiality, Authenticity, Integrity
Example of confidentiality attack
Man-in-the-middle or Eavesdropping
How can eavesdropping be cared out in practice?
Someone on the same LAN could put their NIC into promiscuous mode and run a packet sniffer
How can eavesdropping be used to execute an Authenticity attack?
Then man in the middle can modify some of the content that was sniffed and then reinject that into the network.
What are the negative impacts of attacks against the components of security
Theft of confidential info, Unauthorized Use, False Info, Disruption of service
Three types of control plane authentication
Session (point-to-point b/w routers), Path (protects AS path), Origin ensures that as advertising prefix is the owner.
A route hijack is an attack on which type of authentecation
Origin
How do routing attacks happen?
Config Error, Routers compromised, unscrupulous ISPs
Most common routing attack?
Hijack
Types of routing attacks
Config / Management s/w, Tamper w/software, Tamper w/routing data
How does DNS masquerading work?
An AS advertises the ip to a known DNS server using BGP. This diverts traffic from the real nameserver. The attackers can then send different destination during name resolution
MITM
Man in the middle