One of the problems of network will be Ping of Death attack.
In this attack, one of the hosts will be sending defected packet unintentionally
or intentionally. As a result, instead of sending 32 bytes of data, the host
will be sending 65,525 bytes of ping packet. This will result in buffer
overflow, crashing the computer (“Ping of”, 2012). Ping of Death is also one of
the methods for denial of service.
To solve the problem of denial of service, network
administrator can implement Intrusion Prevention System (IPS). IPS will be able
to detect any anomaly activities through signature, or “experience” of that
normal network conditions (“Intrusion prevention,” 2012). Another method will
be traffic rate limiting. In this method, they will be implementing a quota for
the traffic allowed for the network (Temasek Polytechinc, n.d.) .
Here is the video explaining the differences between IPS and
Intrusion Prevention System (IDS):
Another common networking threat will be scanning phase of
the attack. In that phase, the hacker will try to map the network of the
victim’s system (“Types of,” 2011). One of the ways will be performing banner
grabbing using Netcat to determine the victim’s Operating System (OS). By doing
so, the hacker will be able to retrieve information about OS versions and begin
to exploit the known vulnerability of that OS (Banner
grabbing, 2012) .
After scanning is completed, it will normally mean that the hacker will be
preparing for phase 3, which is gaining access to the network.
Figure 1 (Steps of
hacking (Graves, 2010, p. 8) )
Figure 2 (Phase of
scanning (Graves, 2010, p. 67) )
There are several ways to prevent any scanning from
taking place. One of the ways will be disabling unused services on the network
host (Banner grabbing, 2012) . Another way will be
using Intrusion Detection System (IDS) to notify the network administrator when
reconnaissance is taking place (Temasek Polytechinc, n.d.) .
In conclusion, these networking threats cannot be thoroughly
eliminated since ‘older’ threats are ever-changing and ‘new’ threats are
emerging. Therefore being a network administrator, it is important for them to
keep themselves updated through visiting the advisories that is made by the
manufacturer and update the latest security patches from the manufacturer.
References:
Types of network attacks: four primary classes. (2011, July 17). Retrieved April 27, 2012, from
CCNAanswers-khim:
http://ccnaanswers-khim.blogspot.com/2011/07/types-of-network-attacks-four-primary.html
Banner grabbing. (2012, February 22). Retrieved April 27, 2012, from Wikipedia:
http://en.wikipedia.org/wiki/Banner_grabbing
Intrusion prevention system. (2012, March 25). Retrieved April 26, 2012, from
Wikipedia: http://en.wikipedia.org/wiki/Intrusion-prevention_system
Ping of death. (2012, March 16). Retrieved April 2012, 2012, from Wikipedia:
http://en.wikipedia.org/wiki/Ping_of_death`
Graves, K. (2010, April 26). Certiļ¬ed ethical
hacker. Sybex.
Temasek Polytechinc. (n.d.). Overview of
internetworking security. Singapore, Singapore, Singapore.
No comments:
Post a Comment