0% found this document useful (0 votes)
69 views13 pages

Network Security Threats and Measures

This document discusses threats to network security and measures to protect against attacks. It outlines various types of attacks like viruses, Trojans, and buffer overflows that target networks. It also explains vulnerabilities in older firewall technology and the benefits of new unified threat management systems that integrate firewalls, deep packet inspection, intrusion prevention, anti-virus, and anti-spyware to dynamically update protections against a changing threat landscape. The document stresses the importance of regularly updating security databases to protect networks from both known and unknown threats.

Uploaded by

Navpreet Singh
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
69 views13 pages

Network Security Threats and Measures

This document discusses threats to network security and measures to protect against attacks. It outlines various types of attacks like viruses, Trojans, and buffer overflows that target networks. It also explains vulnerabilities in older firewall technology and the benefits of new unified threat management systems that integrate firewalls, deep packet inspection, intrusion prevention, anti-virus, and anti-spyware to dynamically update protections against a changing threat landscape. The document stresses the importance of regularly updating security databases to protect networks from both known and unknown threats.

Uploaded by

Navpreet Singh
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 13

THREAT TO NETOWRK SECURITY & MEASURES AGAINST ATTACK

PRESENTED TO: Mrs. Inderpreet PRESENTED BY: DIKSHA ROLL NOL: 6 CLASS 10TH

Attack Sophistication vs. Intruder Technical Knowledge


High

Auto Coordinated
Cross site scripting

Tools
Staged

stealth / advanced scanning techniques packet spoofing denial of service sniffers

Intruder Knowledge

sweepers

distributed attack tools www attacks automated probes/scans GUI

back doors disabling audits network mgmt. diagnostics hijacking burglaries sessions Attack Sophistication exploiting known vulnerabilities password cracking

self-replicating code

Low
1980

password guessing

Intruders
1995 2004

1985

1990

E-mail Viruses
E-mail has become the
Corp Network

primary means for distributing threats Trojans are easy to deliver and install HTML viruses (no user intervention) with webmail E-mails with attachments containing:
Macros, VB scripts, java scripts and html scripts

File Based Threats


File Server

Example: Internet download Viruses and malicious code


infection:

Peer to Peer Instant Messaging apps Shareware sites Compromised servers Legitimate corporations Web based email

Corp Network

Threats pass through


stateful packet inspection firewalls Once inside the network, others are easily affected

File Based Threats

Example: Netbios file

Corp Network

File Server

transfers Viruses can be uploaded to network drives Once on the network drive users can be affected Nimda was a virus that attacked file servers and opened up a hole to allow a hacker to obtain control of the server

Application Attacks
Buffer Overflow Malicious Hacker

Unpatched Servers: Scob Servers do not get up to


date patches Attacker sends malicious code through a buffer overflow Executes program instructions
to the victims computer for execution Can also be used as denialof-service attack, causing the computer to crash

Server is infected New users who access


server get infected

Software Development Mistakes


Double Free

Format String

Integer Overflow
3%

Unknown 6% 2%

Access Validation Error

Input Validation Error

Boundary Condition Error

Configuration Error Others

Buffer Overflows

Failure to Handle Exceptional Conditions

Design Error

CERT Advisories

Security Focus

What is Spyware/Adware?
Spyware is any software that utilizes a computers Internet
According to certain experts, approximately 90% of
computers have some form of Spyware
access without the hosts knowledge or explicit permission

Aids in gathering information:


Browsing habits (sites visited, links clicked, etc.) Data entered into forms (including account names, passwords, text
of Web forms and Web-based email, etc.) Key stokes and work habits

Spyware Infection
A - Downloading programs
B - Trojans that are delivered or
Kazaa / screensavers / windows utilities Download managers / file sharing sw / demo software

downloaded in e-mail C - In free, banner ad-based software Popups D - The most notorious enabler of Spyware is Microsofts ActiveX module

User Zone

C/D

Random IPs Server Zone

MEASURES AGAINST NETWORK ATTACK

Firewall Technology
Typical firewalls are effective for port blocking

If a port is open it is assumed any data can pass Intrusion detection is a reactive approach that does
not actively protect

Security must be built upon deep packet inspection,


AV/Spy/Intrusion prevention with dynamic updates

User Zone

Server Zone

The New Standard - UTM

Unified Threat Management Integration of Firewall



Deep Packet Inspection Intrusion Prevention for blocking network threats Anti-Virus for blocking file based threats Anti-Spyware for blocking Spyware

Faster updates to the dynamic changing threat


environment and elimination of False Positives

Hidden threats
Typical User Activity Typical Network Traffic: Email

Our World View Firewall View


Network communication, like email, file transfers and web sessions are packetized

Traffic = multiple packets of information


HEA DER

DATA One Packet = Header info and Data Firewall Traffic Path

Security Must Be Updated


Signature Database
ATTACK-RESPONSES 14BACKDOOR 58BAD-TRAFFIC 15DDOS 33DNS 19DOS 18EXPLOIT >35FINGER 13FTP 50ICMP 115Instant Messenger 25IMAP 16INFO 7Miscellaneous44MS-SQL 24MSSQL/SMB 19MULTIMEDIA 6MYSQL 2NETBIOS 25NNTP 2ORACLE 25P2P 51POLICY 21POP2 4POP3 18RPC 124RSERVICES 13SCAN 25SMTP 23SNMP 17TELNET 14TFTP 9VIRUS 3WEB-ATTACKS 47WEB-CGI 312WEB-CLIENT

AV Database IPS Database Spy Database Content Filtering Database

Stateful Packet Inspection

Deep Packet Inspection

Gateway Anti-Virus Anti-Virus Anti-Spyware

Content Content Filtering Inspection Service

Firewall Traffic Path

You might also like