Network Security Threats
2024-08-25 17:52:39
Network Security
- Combination of low-cost powerful computing and high-performance networks is a two-edged sword:
- Many powerful new services and applications are enabled
- But computer systems and networks become highly susceptible(敏感) to a wide variety of security threats
- Openness vs Security
- Network security involves countermeasures(对策) to protect computer systems from intruders(入侵者)
- Firewalls, security protocols, security practices, etc.
Eavesdropping
- Information transmitted over network can be observed and recorded by eavesdroppers (using a packet sniffer)
- Information can be replayed(重播) in attempts to access server
- Requirements: privacy, authentication(认证), non-repudiation(否认)
Client Imposter
client imposter(冒名顶替者)
- Imposters attempt to gain unauthorized(未经授权的) access to server
- Ex. bank account or database of personal records
- For example, in IP spoofing(戏弄) imposter sends packets with false source IP address
Requirements: privacy, authentication
Server Imposter
- An imposter impersonates(模拟) a legitimate(合法的) server to gain sensitive information from a client
- E.g. bank account number and associated user password
- Requirements: privacy, authentication, non-repudiation
Denial of Service (DoS) Attack
- Attacker can flood a server with requests, overloading the server resources (er. TCP Three-way handshake)
- Results in denial of service to legitimate clients
- Distributed denial of service attack on a server involves coordinated attack from multiple (usually hijacked) computers
- Requirement: availability
TCP SYN Flood
- The attacker sends a repeated same packet, to every port on the target server over using a fake IP address.
- The server will send back ack continunously, prevents other client sending syn.
Man-in-the-Middle Attack
- An imposter manages to place itself as man in the middle
- convincing the server that it is legitimate client
- convincing legitimate client that it is legitimate server
- gathering sensitive information and possibly hijacking(劫持) session
- Requirements: integrity, authentication
Malicious Code
- A client becomes infected with malicious code
- Virus: code that when executed, inserts itself in other programs
- Worms: code that installs copies of itself in other machines attached to a network
- Requirements: privacy, integrity, availability
Security Requirements
Security threats motivate requirements:
- Privacy: information should be readable only by intended recipient(接受者)
- Integrity: recipient can confirm that a message has not been altered during transmission
- Authentication: it is possible to verify that sender or receiver is who he claims to be
- Non-repudiation*(不可抵赖性): sender cannot deny having sent a given message.
- Availability: of information and services
Countermeasures
- Secure communication channels
- Encryption
- Cryptographic checksums and hashes (加密校验和和散列)
- Authentication
- Digital Signatures
- Secure borders
- Firewalls
- Virus checking
- Intrusion detection(入侵检测)
- Authentication
- Access Control (访问控制)
最新文章
- c#smtp多线程
- julia的优化?
- Eclipse+Tomcat+MAVEN+SVN项目完整环境搭建
- 多台linux服务器时间同步
- C#基础知识系列一(goto、i++、三元运算符、ref和out、String和string、重载运算符)
- 用javascript在客户端删除某一个cookie键值对
- C#中通过Selenium定位<;a>;标签的问题
- Maven依赖范围及依赖传递
- 手把手教你Windows下Go语言的环境搭建
- SQLHELPER 帮助类
- App热补丁动态修复技术介绍
- MongoDB之Java测试代码(DAO层)
- Revit通过API创建共享参数
- POJ 2728 Desert King (01分数规划)
- linux部署Web项目总结
- java 分布式与集群的区别和联系(转)
- 第8章 传输层(2)_UDP协议
- Ubuntu下配置PHP和CakePHP记录
- Get方法和post方法有何不同?
- 20155315 2016-2017-2 《Java程序设计》第九周学习总结
热门文章
- poi-word导出,导出多图片到word
- CSS3之盒模型
- 11.6NOIP模拟赛解题报告
- QQ 聊天机器人小薇发布!
- javax.swing.JComponent 调用顺序
- GitHub教程(二) 删除已有仓库
- LINUX下 informatica9.0.1 启动与关闭
- 页面引入(include)方式的研究及性能比较
- .net通过代码发送邮件
- 什么是封装? ----------------php中";public";类似的访问修饰符分别有什么作用?----什么是抽象?抽象的关键字以及用法----- 什么是接口?接口的关键字以及用法-------------