Wednesday, 25 April 2012

Common Networking Attacks:Threats and Solution

Alright, now lets kick start this blog with a post about common threats faced in the networking world. We already know that having pesky viruses, malicious softwares and worms hiding and wreaking havoc in one computer system is a pain in the butt, but imagine having your network(such as a couple of host computers and servers)services disrupted by other threats such as the infamous DOS attack? Fixing the problem will be one BIG headache.

"Screw this, I'm gonna use paper instead."

DOS Attack

Symantec Guide to Scary Internet Stuff
Also known as a Denial of Service attack. This attack involves using up the computer or network resources so that it cannot be used by other users. For example, an attacker decides to send multiple packets to a network server, causing it to overload and in the end, it will stopped working properly. In the end, users will not be able to access the data information stored in the server.

Solutions to DOS attacks

Although we cannot predict when a DOS attack will occur, we can still prevent it from happening. One such way is to implement data traffic limit in the network. By doing so, any tell-tale signs of a DOS attack such as sudden flood of data packets will be stopped.

IP Address Spoofing

Imagine this scenario: A man walks into a company and steals an ID badge that belongs to an employee of the company. With that badge, he can access parts of the company resources whichever he likes. How would the employee feel when the blame is pin-pointed to him when he is not the one doing the dirty deed?

Similarly in the digital world, this can be done when a person masquerades as a trusted user of a network by changing his IP address to the trusted user's IP address. This way, he can gain access to the network as the trusted user.

Solutions to IP Spoofing

Just like an DOS attack, we have no idea when an intrusion using this method will occur. But we can prevent IP spoofing through various methods such as filtering both inbound and outbound traffic occurring in the network. Another way is to configure the routers and switches to reject packets that enter the network which claims to originate from within the network.
Alright, I shall start on a new post tomorrow on security policies. Have a great day ahead everyone!

4 comments:

  1. From your post about networking threats and solutions, I have learned more about these threats and the solutions to them. Firstly, I have understood more about DoS attack, also known as a Denial of Service attack, which uses the computer or network resources so that it is unable to be used by other users. Secondly, I have understood more about IP Address Spoofing, which is when a user masquerades as a trusted user of a network by changing his IP address to the trusted user's IP address to gain access to the network. With the necessary precautions taken, the occurrences of these threats will be considerably reduced.

    ReplyDelete
  2. To OP:

    Great job adding in the images that lightens up the whole document. The DoS Solution that you have currently stated does not work on a larger scale DoS, only effective for a small scale DoS. Whistle there is no single way to stop a large scale DoS or even a DDoS, it is possible to minimize the effect through the use of backup. In the case of which a web server (I.E Yahoo!) is being DoS or DDoS'd, immediately when the first server is taken offline, a second server will take its place, using a totally different IP from the first server, thus allowing for less downtime. Nevertheless, good work on the explanations!

    Kudos,
    Zhi Yao

    ReplyDelete
  3. This blog post explains the common network attacks as well as security policies well as examples are included at the end in order to allow the reader to understand it better. Things like scenarios in which the user can relate to are included in as well which I believe makes it a good blog post as the blogger has put himself into the reader’s shoe and tried to explain it in a manner the users would be able to understand. Pictures have also been included into the blog post which even though might not help the user understand the situation better but it makes the post much less duller and keeps the user awake as the blog post is not all about all the technical IT stuffs.

    -Amos Lee

    ReplyDelete
  4. This comment has been removed by the author.

    ReplyDelete