+ All Categories
Home > Documents > 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

Date post: 12-Jan-2016
Category:
Upload: charlotte-watts
View: 225 times
Download: 4 times
Share this document with a friend
Popular Tags:
60
1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy
Transcript
Page 1: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

1

Modern Network Security Threats

Source:CCNA SecurityCisco Networking Academy

Page 2: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

2

Modern Network Security Threats 1.1 Fundamental Principles of a Secure

Network 1.2 Viruses, Worms, and Trojan Horses 1.3 Attack Methodologies

Page 3: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

3

1.1 Fundamental Principles of a Secure Network

1.1.1 Evolution of Network Security

1.1.2 Drivers for Network Security

1.1.3 Network Security Organizations

Page 4: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

4

1.1.1 Evolution of Network Security

In July 2001, the Code Red worm attacked web servers globally, infecting over 350,000 hosts.

Security of the network is ultimately the responsibility of everyone that uses it.

Page 5: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

5

Evolution of Network Security

"Necessity is the mother of invention."

Page 6: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

6

Evolution of Network Security

Page 7: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

7

Evolution of Network Security

Internal threats can cause even greater damage than external threats.

Page 8: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

8

Evolution of Network Security

Confidentiality Integrity Availability

Page 9: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

9

Evolution of Network Security

Confidentiality Prevent the disclosure of sensitive information from

unauthorized people, resources, and processes Integrity

The protection of system information or processes from intentional or accidental modification

Availability The assurance that systems and data are

accessible by authorized users when needed

Page 10: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

10

1.1.2 Drivers for Network Security

Hackers Negative Positive

Hacking is a driving force in network security.

Page 11: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

11

Drivers for Network Security

Hacker: 1960s: Phreaking,

John Draper 1980s: Wardialing

1990s: Wardriving ……

Page 12: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

12

Drivers for Network Security

Page 13: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

13

Drivers for Network Security Network security professionals

Page 14: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

14

1.1.3 Network Security Organizations

www.infosyssec.com

www.sans.org

www.cisecurity.org

www.cert.org

www.isc2.org

www.first.org

www.infragard.net

www.mitre.org

www.cnss.gov

Page 15: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

15

1.2 Viruses, Worms, and Trojan Horses 1.2.1 Virus Malicious software which attaches to another program to

execute a specific unwanted function on a computer. 1.2.2 Worm

Executes arbitrary code and installs copies of itself in the memory of the infected computer, which then infects other hosts.

1.2.3 Trojan Horse An application written to look like something else. When a

Trojan Horse is downloaded and opened, it attacks the end-user computer from within.

1.2.4 Mitigating Virus, Worms, and Trojan Horse

Page 16: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

16

1.2.1 Viruses

Page 17: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

17

1.2.2 Worms

Page 18: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

18

Worms Three major components to most worm attacks:

Enabling vulnerability - A worm installs itself using an exploit mechanism (email attachment, executable file, Trojan Horse) on a vulnerable system.

Propagation mechanism - After gaining access to a device, the worm replicates itself and locates new targets.

Payload - Any malicious code that results in some action. Most

often this is used to create a backdoor to the infected host.

Page 19: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

19

Worms Five basic phases of attack of worm and virus:

Page 20: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

20

1.2.3 Trojan Horses The term Trojan Horse originated from Greek mythology. A Trojan Horse in the world of computing is malware

software. It have to be “spread” via human engineering or by manually

emailing them. It does not replicate itself, and it does not infect other files.

Page 21: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

21

Trojan Horses Classify of Trojan horse:

Remote-access Trojan Horse (enables unauthorized remote access)

Data sending Trojan Horse (provides the attacker with sensitive data such as passwords)

Destructive Trojan Horse (corrupts or deletes files) Proxy Trojan Horse (user's computer functions as a proxy

server) FTP Trojan Horse (opens port 21) Security software disabler Trojan Horse (stops anti-virus

programs or firewalls from functioning) Denial of Service Trojan Horse (slows or halts network

activity)

Page 22: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

22

1.2.4 Mitigating Viruses, Worms, and Trojan Horses

Viruses and Trojan Horses tend to take advantage of local root buffer overflows. A root buffer overflow is a buffer

overflow intended to attain root privileges to a system.

Worms such as SQL Slammer and Code Red exploit remote root buffer overflows.

The primary means of mitigating virus and Trojan horse attacks is anti-virus software. Anti-virus products are host-based

and do not prevent viruses from entering the network.

Network security professional needs to be aware of the major viruses and keep track of security updates regarding emerging viruses.

Page 23: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

23

Mitigating Viruses, Worms, and Trojan Horses

Worms are more network-based than viruses. The response to a worm infection can be

broken down into four phases: Containment Inoculation Quarantine Treatment

Page 24: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

24

Mitigating Viruses, Worms, and Trojan Horses

Containment (抑制 ) Limiting the spread of a worm infection to areas of the

network that are already affected. Requires compartmentalization and segmentation of the

network to slow down or stop the worm and prevent currently infected hosts from targeting and infecting other systems.

Requires using both outgoing and incoming ACLs on routers and firewalls at control points within the network.

Inoculation (防疫注射 ) All uninfected systems are patched with the appropriate

vendor patch for the vulnerability. The process further deprives the worm of any available targets.

A network scanner can help identify potentially vulnerable hosts.

Page 25: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

25

Mitigating Viruses, Worms, and Trojan Horses

Quarantine (隔離 ) Involves tracking down and identifying infected machines

within the contained areas and disconnecting, blocking, or removing them. This isolates these systems appropriately for the treatment phase.

Treatment (治療 ) Actively infected systems are disinfected of the worm. This

can involve terminating the worm process, removing modified files or system settings that the worm introduced, and patching the vulnerability the worm used to exploit the system.

In more severe cases, can require completely reinstalling the system to ensure that the worm and its byproducts are removed.

Page 26: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

26

Mitigating Viruses, Worms, and Trojan Horses

Example ( SQL Slammer worm): Malicious traffic was detected on UDP port 1434. Prevent the spreading:

Block this port on all devices throughout the internal network. In some cases, the port on which the worm is

spreading might be critical to business operation: Require to access the SQL Server for legitimate

business transactions. In such a situation, alternatives must be considered. If

the network devices using the service on the affected port are known, permitting selective access is an option.

Page 27: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

27

1.3 Attack Methodologies Reconnaissance (偵察 ) Attacks

Reconnaissance attacks involve the unauthorized discovery and mapping of systems, services, or vulnerabilities.

Known as information gathering and, in most cases, precedes an access or DoS attack.

Access Attacks Access attacks exploit known vulnerabilities in authentication

services, FTP services, and web services. Denial of Service Attacks

Denial of service attacks send extremely large numbers of requests over a network or the Internet.

These excessive requests cause the target device to run suboptimally.

Consequently, the attacked device becomes unavailable for legitimate access and use.

Social Engineering Attacks Class of attacks that uses trickery (欺騙 ) on people instead of

computers.

Page 28: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

28

1.3.1 Reconnaissance Attack Reconnaissance attacks use various tools to

gain access to a network: Packet sniffers Ping sweeps Port scans Internet information queries

Page 29: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

29

Reconnaissance Attack A packet sniffer is a software application. Uses a network adapter card in promiscuous (混雜 )

mode to capture all network packets that are sent across a LAN.

Some network applications distribute network packets in unencrypted plaintext.

Numerous freeware and shareware packet sniffers.

Page 30: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

30

Reconnaissance Attack

Page 31: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

31

Reconnaissance Attack Keep in mind that reconnaissance attacks are typically the

precursor to further attacks. A network security professional can detect when a

reconnaissance attack is underway by configured alarms that are triggered when certain parameters are exceeded, such as ICMP requests per second.

Host-based intrusion prevention systems and standalone network-based intrusion detection systems can also be used to notify when a reconnaissance attack is occurring.

Cisco IOS security images running on ISRs

Page 32: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

32

1.3.2 Access Attacks Hackers use access attacks on networks or systems

for three reasons: retrieve data, gain access, and escalate access privileges.

There are five types of access attacks: Password attack Trust exploitation Port redirection Man-in-the-middle attack Buffer overflow

Page 33: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

33

Access Attacks Password attack

An attacker attempts to guess system passwords. Most password attacks refer to brute-force attacks,

which involve repeated attempts based on a built-in dictionary to identify a user account or password.

Page 34: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

34

Access Attacks Password attack

Example A user can run the L0phtCrack, or LC5, application to

perform a brute-force attack to obtain a Windows server password.

When the password is obtained, the attacker can install a keylogger, which sends a copy of all keystrokes to a desired destination.

Or, a Trojan Horse can be installed to send a copy of all packets sent and received by the target to a particular destination, thus enabling the monitoring of all the traffic to and from that server.

Page 35: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

35

Access Attacks Trust exploitation

An attacker uses privileges granted to a system in an unauthorized way, possibly leading to compromising the target.

Page 36: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

36

Access Attacks Port redirection

A compromised system is used as a jump-off point for attacks against other targets. An intrusion tool is installed on the compromised system for session redirection.

Page 37: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

37

Access Attacks Man-in-the-middle attack

An attacker is positioned in the middle of communications between two legitimate entities in order to read or modify the data that passes between the two parties.

A popular man-in-the-middle attack involves a laptop acting as a rogue access point (惡意存取點 ) to capture and copy all network traffic from a targeted user. Often the user is in a public location on a wireless hotspot.

Page 38: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

38

Access Attacks Man-in-the-middle attack

Page 39: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

39

Access Attacks Buffer overflow

A program writes data beyond the allocated buffer memory resulting in that valid data is overwritten or exploited to enable the execution of malicious code.

Page 40: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

40

Access Attacks Detect the Access Attacks:

Reviewing logs Check the numbers of failed login attempts.

Bandwidth utilization Detect the Man-in-the-middle attacks.

Man-in-the-middle attacks often involve replicating data. An indication of such an attack is an unusual amount of network activity and bandwidth utilization.

Process loads Detect the buffer overflow attacks.

A compromised system would likely be revealed by sluggish activity due to ongoing buffer overflow attacks, as indicated by active process loads viewable on a Windows or UNIX system.

Page 41: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

41

1.3.3 Denial of Service Attacks A DoS attack (阻斷服務攻擊 ) is a network attack. DoS attacks attempt to compromise the availability of a

network, host, or application. There are two major reasons a DoS attack occurs:

A host or application fails to handle an unexpected condition. A network, host, or application is unable to handle an

enormous quantity of data.

Page 42: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

42

Denial of Service Attacks DDoS — Distribute DoS

A Distributed Denial of Service Attack (DDoS) is similar in intent to a DoS attack, except that a DDoS attack originates from multiple coordinated sources.

In addition to increasing the amount of network traffic from multiple distributed attackers, a DDoS attack also presents the challenge of requiring the network defense to identify and stop each distributed attacker.

Page 43: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

43

Denial of Service Attacks DDoS — Distribute DoS

Example A hacker scans for systems that

are accessible. After the hacker accesses several "handler" systems, the hacker installs zombie (殭屍 ) software on them.

Zombies then scan and infect agent systems. When the hacker accesses the agent systems, the hacker loads remote-control attack software to carry out the DDoS attack.

Source:Security+ Guide to Network Security Fundamentals, Thomson

Page 44: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

44

Denial of Service Attacks Three common DoS attacks:

Ping of Death Smurf Attack TCP SYN Flood

Page 45: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

45

Denial of Service Attacks Ping of Death

A hacker sends an echo request in an IP packet larger than the maximum packet size of 65,535 bytes.

Sending a ping of this size can crash the target computer.

A variant of this attack is to crash a system by sending ICMP fragments, which fill the reassembly buffers of the target.

ping -t -l 65550 192.168.1.1

Page 46: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

46

Denial of Service Attacks Smurf Attack

In a smurf attack, a perpetrator (犯罪者 ) sends a large number of ICMP requests to directed broadcast addresses, all with spoofed source addresses.

If the routing device delivering traffic to those broadcast addresses forwards the directed broadcasts, all hosts on the destination networks send ICMP replies, multiplying the traffic by the number of hosts on the networks.

On a multi-access broadcast network, hundreds of machines might reply to each packet.

Page 47: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

47

Denial of Service Attacks Smurf Attack

Page 48: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

48

Denial of Service Attacks TCP SYN Flood

A flood of TCP SYN packets is sent, often with a forged sender address. Each packet is handled like a connection request, causing the server to spawn a half-open connection by sending back a TCP SYN-ACK packet and waiting for a packet in response from the sender address.

However, because the sender address is forged, the response never comes. These half-open connections saturate the number of available connections the server is able to make, keeping it from responding to legitimate requests until after the attack ends.

The three-way handshake is correctly performed

Source:http://en.wikipedia.org/wiki/SYN_flood

Page 49: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

49

Denial of Service Attacks TCP SYN Flood

Page 50: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

50

Denial of Service Attacks To date, hundreds of DoS attacks have been documented. There are five basic ways that DoS attacks can do harm:

Consumption of computational resources, such as bandwidth, disk space, or processor time

Disruption of configuration information, such as routing information Disruption of state information, such as unsolicited resetting of TCP

sessions Disruption of physical network components Obstruction of communication between the victim and others.

Page 51: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

51

1.3.4 Social Engineering Attacks Social Engineering Attacks

Tricking a person into revealing some confidential information. An attack based on deceiving users or administrators at the

target site. Done to gain illicit (不法的 ) access to systems or useful

information. The goals of social engineering are fraud, network intrusion,

industrial espionage, identity theft, etc.

Page 52: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

52

1.3.5 Mitigating Network Attacks

Reconnaissance attacks can be mitigated (緩解 ) in several ways: Using strong authentication such as a One-Time

Password (OTP). Encryption makes the captured data not readable. Antisniffer tools to determine whether the hosts are

processing more traffic than their own traffic loads would indicate.

A switched infrastructure which makes it difficult to capture any data except that on your immediate collision domain, which probably contains only one host.

Network-based IPS and host-based IPS can usually notify an administrator when a reconnaissance attack is under way.

Page 53: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

53

Mitigating Network Attacks

Page 54: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

54

Mitigating Network Attacks Techniques are available for

mitigating access attacks: Strong password policy:

Disabling accounts after a specific number of unsuccessful logins. This practice helps to prevent continuous password attempts.

Not using plaintext passwords. Use either a one-time password (OTP) or encrypted password.

Using strong passwords. Strong passwords are at least eight characters and contain uppercase letters, lowercase letters, numbers, and special characters.

Page 55: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

55

Mitigating Network Attacks Techniques are available for mitigating access

attacks: Principle of minimum trust

The principle of minimum trust should also be designed into the network structure.

This means that systems should not use one another unnecessarily.

For example, if an organization has a server that is used by untrusted devices, such as web servers, the trusted device (server) should not trust the untrusted devices (web servers) unconditionally.

Cryptography Using encryption for remote access to a network is

recommended.

Page 56: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

56

Mitigating Network Attacks

Page 57: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

57

Mitigating Network Attacks Mitigating DDoS attacks requires careful diagnostics,

planning, and cooperation from ISPs. The most important elements for mitigating DoS attacks

are firewalls and IPSs.

Page 58: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

58

Mitigating Network Attacks Social Engineering Countermeasures

Take proper care of trash and discarded items. Ensure that all system users have periodic

training about network security.

Source:Security+ Guide to Network Security Fundamentals, Thomson

Page 59: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

59

Mitigating Network Attacks There are 10 best practices for your network:1. Keep patches up to date by installing them weekly or daily, if possible,

to prevent buffer overflow and privilege escalation attacks.

2. Shut down unnecessary services and ports.

3. Use strong passwords and change them often.

4. Control physical access to systems.

5. Avoid unnecessary web page inputs.

6. Perform backups and test the backed up files on a regular basis.

7. Educate employees about the risks of social engineering, and develop strategies to validate identities over the phone, via email, or in person.

8. Encrypt and password-protect sensitive data.

9. Implement security hardware and software firewalls, IPSs, virtual private network (VPN) devices, anti-virus software, and content filtering.

10. Develop a written security policy for the company.

Page 60: 1 Modern Network Security Threats Source: CCNA Security Cisco Networking Academy.

60

Mitigating Network Attacks


Recommended