SlideShare uma empresa Scribd logo
1 de 25
Baixar para ler offline
INFORMATION AND NETWORK SECURITY
(2170703)
TYPES OF ATTACKS
SUBMITTED TO :
Prof. BRIJESH PATEL
SUBMITTED BY :
ASHKA SONI
(140110107004)
DHRUVIN R SHAH
(140110107013)
VIVEK GANDHI
(140110107017)
Definitions • Computer Security
– Generic name for the collection of tools designed to
protect data and to thwart hackers
• Network Security
– Measures to protect data during their transmission
• Internet Security (our focus!)
– Measures to protect data during their transmission
over a collection of interconnected networks
Security
Trends
3 Aspects of
Information
Security
• Security Attack
– Any action that compromises the security of information.
• Security Mechanism
– A mechanism that is designed to detect, prevent, or
recover from a security attack.
• Security Service
– A service that enhances the security of data processing
systems and information transfers.
• Makes use of one or more security mechanisms.
Computer
Security
Concept
• Computer Security
– The protection afforded to an automated information
system in order to attain the applicable objectives of
preserving the integrity, availability and confidentiality
of information system resources (includes hardware,
software, information/data, and telecommunications).
Computer
Security
Concept
1. Confidentiality
preserving authorized restrictions on
information access and disclosure, including
means for protecting personal privacy and
proprietary information.
2. Integrity
Guarding against improper information
modification or destruction, and includes
ensuring information non-repudiation and
authenticity
3. Availability
Ensuring timely and reliable access to and
use of information.
Security
Goals
Integrity
Confidentiality
Avalaibility
Types of
Attacks
• PassiveAttacks
• Active Attacks
PASSIVE ATTACKS
Passive
Attacks
• A passive attack is a network attack in which a system
is monitored and sometimes scanned for open ports
and vulnerabilities. The purpose is solely to gain
information about the target and no data is changed
on the target.
• In passive reconnaissance, an intruder monitors
systems for vulnerabilities without interaction, through
methods like session capture. In active reconnaissance,
the intruder engages with the target system through
methods like port scans.
Types of
Passive
Attacks
• Interception Attack
• TrafficAnalysisAttack
Interception • The phenomenon of confidentiality plays an important
role in this type of attack. The data or message which is
sent by the sender is intercepted by an unauthorized
individual where the message will be changed to the
different form or it will be used by the individual for his
malicious process. So the confidentiality of the
message is lost in this type of attack.
• It is also known as “Release of message contents”.
Interception
Traffic
Analysis
• Traffic analysis is the process of intercepting and
examining messages in order to deduce information
from patterns in communication. It can be performed
even when the messages are encrypted and cannot be
decrypted. In general, the greater the number of
messages observed, or even intercepted and stored,
the more can be inferred from the traffic. Traffic
analysis can be performed in the context of military
intelligence or counter-intelligence, and is a concern in
computer security.
Traffic
Analysis
Observe traffic pattern
ACTIVE ATTACKS
Active
Attacks
• An active attack is a network exploit in which a hacker
attempts to make changes to data on the target or
data en-route to the target.
• The purpose is to gain information about the target
and no data is changed. However, passive attacks are
often preparatory activities for active attacks.
Types of
Active
Attacks
• Masquerade Attack
• Interruption Attack
• FabricationAttack
• Session ReplayAttack
• ModificationAttack
• Denial of Service (DOS)Attack
Masquerade • In a masquerade attack, the intruder pretends to be a
particular user of a system to gain access or to gain
greater privileges than they are authorized for. A
masquerade may be attempted through the use of
stolen login IDs and passwords, through finding
security gaps in programs or through bypassing the
authentication mechanism.
Interruptio
n
• This type of attack is due to the obstruction of any kind
during the communication process between one or
more systems. So the systems which are used become
unusable after this attack by the unauthorized users
which results in the wastage of systems.
Fabrication • In this type of attack a fake message is inserted into
the network by an unauthorized user as if it is a valid
user. This results in the loss of confidentiality,
authenticity and integrity of the message.
Fabricate message
Session
Replay
• In a session replay attack, a hacker steals an authorized
user’s log in information by stealing the session ID.The
intruder gains access and the ability to do anything the
authorized user can do on the website.
Modification • In a message modification attack, an intruder alters
packet header addresses to direct a message to a
different destination or modify the data on a target
machine.
Modify
message
Denial of
Service
(DOS)
• In a denial of service (DoS) attack, users are deprived of
access to a network or web resource. This is generally
accomplished by overwhelming the target with more
traffic than it can handle.
THANK YOU

Mais conteúdo relacionado

Semelhante a typesofattacks-180418113629.pdf

BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1
limsh
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
backdoor
 

Semelhante a typesofattacks-180418113629.pdf (20)

Enhancement in network security with security protocols
Enhancement in network security with security protocolsEnhancement in network security with security protocols
Enhancement in network security with security protocols
 
Unit 1
Unit 1Unit 1
Unit 1
 
BAIT1103 Chapter 1
BAIT1103 Chapter 1BAIT1103 Chapter 1
BAIT1103 Chapter 1
 
ch01.pdf
ch01.pdfch01.pdf
ch01.pdf
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
 
Lec 2- Hardening and whitelisting of devices
Lec 2- Hardening and whitelisting of devicesLec 2- Hardening and whitelisting of devices
Lec 2- Hardening and whitelisting of devices
 
2.Types of Attacks.pptx
2.Types of Attacks.pptx2.Types of Attacks.pptx
2.Types of Attacks.pptx
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security Management
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptx
 
cryptographic security
cryptographic securitycryptographic security
cryptographic security
 
Introduction to Network security
Introduction to Network securityIntroduction to Network security
Introduction to Network security
 
CNS Unit-I_final.ppt
CNS Unit-I_final.pptCNS Unit-I_final.ppt
CNS Unit-I_final.ppt
 
Dos unit 5
Dos unit 5Dos unit 5
Dos unit 5
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
abc.pptx
abc.pptxabc.pptx
abc.pptx
 
CNS new ppt unit 1.pptx
CNS new ppt unit 1.pptxCNS new ppt unit 1.pptx
CNS new ppt unit 1.pptx
 
Ne Course Part Two
Ne Course Part TwoNe Course Part Two
Ne Course Part Two
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
 
Chapter-I introduction
Chapter-I introductionChapter-I introduction
Chapter-I introduction
 
Network security chapter 1
Network security   chapter 1Network security   chapter 1
Network security chapter 1
 

Último

Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 

Último (20)

Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 

typesofattacks-180418113629.pdf

  • 1. INFORMATION AND NETWORK SECURITY (2170703) TYPES OF ATTACKS SUBMITTED TO : Prof. BRIJESH PATEL SUBMITTED BY : ASHKA SONI (140110107004) DHRUVIN R SHAH (140110107013) VIVEK GANDHI (140110107017)
  • 2. Definitions • Computer Security – Generic name for the collection of tools designed to protect data and to thwart hackers • Network Security – Measures to protect data during their transmission • Internet Security (our focus!) – Measures to protect data during their transmission over a collection of interconnected networks
  • 4. 3 Aspects of Information Security • Security Attack – Any action that compromises the security of information. • Security Mechanism – A mechanism that is designed to detect, prevent, or recover from a security attack. • Security Service – A service that enhances the security of data processing systems and information transfers. • Makes use of one or more security mechanisms.
  • 5. Computer Security Concept • Computer Security – The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources (includes hardware, software, information/data, and telecommunications).
  • 6. Computer Security Concept 1. Confidentiality preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. 2. Integrity Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity 3. Availability Ensuring timely and reliable access to and use of information.
  • 10. Passive Attacks • A passive attack is a network attack in which a system is monitored and sometimes scanned for open ports and vulnerabilities. The purpose is solely to gain information about the target and no data is changed on the target. • In passive reconnaissance, an intruder monitors systems for vulnerabilities without interaction, through methods like session capture. In active reconnaissance, the intruder engages with the target system through methods like port scans.
  • 11. Types of Passive Attacks • Interception Attack • TrafficAnalysisAttack
  • 12. Interception • The phenomenon of confidentiality plays an important role in this type of attack. The data or message which is sent by the sender is intercepted by an unauthorized individual where the message will be changed to the different form or it will be used by the individual for his malicious process. So the confidentiality of the message is lost in this type of attack. • It is also known as “Release of message contents”.
  • 14. Traffic Analysis • Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted and cannot be decrypted. In general, the greater the number of messages observed, or even intercepted and stored, the more can be inferred from the traffic. Traffic analysis can be performed in the context of military intelligence or counter-intelligence, and is a concern in computer security.
  • 17. Active Attacks • An active attack is a network exploit in which a hacker attempts to make changes to data on the target or data en-route to the target. • The purpose is to gain information about the target and no data is changed. However, passive attacks are often preparatory activities for active attacks.
  • 18. Types of Active Attacks • Masquerade Attack • Interruption Attack • FabricationAttack • Session ReplayAttack • ModificationAttack • Denial of Service (DOS)Attack
  • 19. Masquerade • In a masquerade attack, the intruder pretends to be a particular user of a system to gain access or to gain greater privileges than they are authorized for. A masquerade may be attempted through the use of stolen login IDs and passwords, through finding security gaps in programs or through bypassing the authentication mechanism.
  • 20. Interruptio n • This type of attack is due to the obstruction of any kind during the communication process between one or more systems. So the systems which are used become unusable after this attack by the unauthorized users which results in the wastage of systems.
  • 21. Fabrication • In this type of attack a fake message is inserted into the network by an unauthorized user as if it is a valid user. This results in the loss of confidentiality, authenticity and integrity of the message. Fabricate message
  • 22. Session Replay • In a session replay attack, a hacker steals an authorized user’s log in information by stealing the session ID.The intruder gains access and the ability to do anything the authorized user can do on the website.
  • 23. Modification • In a message modification attack, an intruder alters packet header addresses to direct a message to a different destination or modify the data on a target machine. Modify message
  • 24. Denial of Service (DOS) • In a denial of service (DoS) attack, users are deprived of access to a network or web resource. This is generally accomplished by overwhelming the target with more traffic than it can handle.