Day 2
Day 2
Title: P r o t o c o l S e c u r i t y A n a l y s i s
Security gaps can stem from a variety of sources, including outdated software,
misconfigured hardware, weak security protocols, or human error.
Verification: Using tools and techniques to verify that the model meets
security requirements.
1
TCP/IP Protocol Suite & Network Vulnerabilities Network Security
Use Cases: Commonly used for applications requiring low latency, such as
VoIP and online gaming.
2
TCP/IP Protocol Suite & Network Vulnerabilities Network Security
UDP Anomalies:
High Volume of UDP Traffic: An unusual spike in UDP traffic may
indicate a DoS attack or port scanning.
IP Anomalies:
IP Spoofing: Packets with source IP addresses that do not match
the expected range can indicate spoofing.
HTTP/HTTPS Anomalies:
Unusual Request Patterns: A sudden increase in requests to a
specific endpoint may indicate a web application attack (e.g., SQL
injection).
FTP Anomalies:
Brute Force Attempts: Multiple failed login attempts can indicate a
brute force attack.
3
TCP/IP Protocol Suite & Network Vulnerabilities Network Security
Filter by Protocol: Use display filters (e.g., TCP, UDP, HTTP, FTP) to focus on
specific protocols.
Look for Anomalies: Identify any deviations from normal behavior, such as
unexpected flags, unusual packet sizes, or abnormal timing.
UDP Vulnerabilities:
Reflection Attacks: Attackers send requests to a third-party server with a
spoof.
4
TCP/IP Protocol Suite & Network Vulnerabilities Network Security
b. Types of Attackers:
Hackers: Individuals who exploit vulnerabilities for various motives (e.g.,
financial gain, political reasons, or personal challenge).
5
TCP/IP Protocol Suite & Network Vulnerabilities Network Security
Espionage
Scanning: Actively probing the network to identify open ports, services, and
vulnerabilities.
Covering Tracks: Deleting logs or using other methods to hide the attacker's
presence.
SQL Injection: Inserting malicious SQL queries into input fields to manipulate
databases.
6
TCP/IP Protocol Suite & Network Vulnerabilities Network Security
b. Signatures:
Signature-Based Detection: Identifying known threats by matching them
against a database of attack signatures.
b. Prevention Techniques:
Firewalls: Implementing network firewalls to filter incoming and outgoing
traffic based on security rules.
7
TCP/IP Protocol Suite & Network Vulnerabilities Network Security
The host portion: This identifies the specific device within that network.
IPv6: It uses a 128-bit address format, allowing for a vastly larger number of
unique addresses.
8
TCP/IP Protocol Suite & Network Vulnerabilities Network Security
1. Public IPv4 addresses: They are globally routable and can be accessed over the
Internet.
126.255.255.255
128.0.0.0 - 191.255.255.255
192.0.0.0 - 223.255.255.255
2. Private IPv4 addresses: They are used in private networks which are not routable
on the Internet.
10.0.0.0 - 10.255.255.255
172.16.0.0 - 172.31.255.255
192.168.0.0 - 192.168.255.255
Subnetting
Subnetting divides a network into smaller subnets which allows an efficient
utilization of IP addresses with network segmentation.
Subnets
Subnets are smaller, manageable segments of a larger network, created by
dividing an IP address space. Subnetting allows for efficient IP address
management and better control over network resources, enabling easier
troubleshooting and reduced broadcast domains.
Each subnet has its range of IP addresses, which helps in optimizing the use of
available addresses and improving overall network efficiency.
9
TCP/IP Protocol Suite & Network Vulnerabilities Network Security
10