Thursday, 26 April 2012

Common Networking Attacks Threats and Solution

A network attack is defined as a threat or intrusion on a network that will analyse your network and gain information to eventually cause your network to crash or cause it to be corrupted.There are many different types of network threats but the common threats are spoofing, sniffing, mapping, hijacking, Trojans, Denial of Service (DOS) and DDOS and social engineering.

Network devices that are connected to the internet will send IP datagrams, which contains its IP address and application layer data, into the network. "IP Spoofing" is the process of modifying a network device's protocols to replace the source address with a random IP address by taking control of the software running on the network device. This will hide the identity of the source, and makes it difficult to determine where the datagrams come from.

The solution to spoofing is ingress filtering. Routers will usually perform ingress filtering to check the IP address of incoming datagrams, and will check if the source address is reachable via the interface. The router will then drop the datagram if the source address is not within valid range to prevent the device from getting spoofed.

Below is a picture that illustrates how spoofing is done:



Source: http://ayurveda.hubpages.com/hub/Types-of-Network-Attacks

4 comments:

  1. This comment has been removed by the author.

    ReplyDelete
  2. Hi Luke,

    Thank you for posting this. I found it remarkably informative. As I read your post, I was overwhelmed with a plethora of thoughts (and euphoria) and strongly felt the need to express my views here. To quote the first paragraph of your post, "There are many different types of network threats but the common threats are spoofing, sniffing, mapping, hijacking, Trojans, Denial of Service (DOS) and DDOS and social engineering." I felt that this is particularly true. The number of threats is over 9000!!, so much that this tiny blog of yours is unable to list all of them ('tiny' here is not used pejoratively, the size of the blog is beyond any means of our control, not that it matters though). Without security measures and controls in place, data might be subjected to an attack. Through this post, I now understand that the security of a network is of utmost importance and finally fully appreciate security and all the fields it encompasses. I've also finally found the purpose and meaning to life all thanks to this wonderful post (which epitomises exemplary literature in a revolutionary way), what a profound work of art it is! Thanks for the post once again and I look forward to all your future posts.

    Julian.

    ReplyDelete
  3. Hi Luke.

    JunRong here. After reading your post, i found that it is very information and educational.

    You have listed different types of common network threats. Furthermore, you had explain clearly on how "IP Spoofing" works and the solution to solve it. With the diagram , it further facilitate me by understanding it easier.

    Through this post, I understand that the security of a network is of utmost importance. I look forward to your future posts.

    Good job in posting this piece of good work!

    ReplyDelete
  4. Hello, Luke.

    This is Adi. I think that your post is quite well done, but it could use a bit more information. You have mentioned what the threats to network security are, but you have not gone into much detail about them or what they do. IP spoofing is the only one that has been more thoroughly explained.

    That said, though, I think that the information you've provided here about spoofing is quite good. It covers all the basics. The diagram you've provided was also quite helpful in making me understand the topic.

    My advice for you in future would be to go more in depth into the other threats mentioned in your post.

    ReplyDelete