COIT20262Term2,2019 Question 1.Packet Capture and Analysis Part (d) Message Sequence Chart Page2of9
COIT20262Term2,2019 Part (e) Information from netcat Packets InformationAnswer Client port37318 TCP connection duration0.000626000 Payload length6, 46 bytes Hex value of timestamp91 c6 1f c0 58 3d 14 98 00 00 00 00 a0 02 72 10 ae 02 00 00 02 04 05 b4 04 02 08 0a 00 00 85 22 00 00 00 00 01 03 03 05 Hex value of checksum0x00002469 Binary value of flags0x00000018 Part (f) Information from scp Packets InformationAnswer Server port41796 OpenSSH version7.2 SSH name of key exchangeSSH v2.0 Key exchange protocol/schemeElliptic Curve Diffie-Hellman Key Exchange Init Last 4 hex digits of public key0457 Number of encrypted packets11 Last 4 hex digits of MAC1300 Part (g) Comparison between SSH and TELNET: Based on Authentication SSHmeansSecureShell,whichuses‘public-keycryptography’forallowingthe authentication to the users may it be remote or local. There are various ways of using it; one is to use password while logging in and other one is using automatically generated ‘public- Page3of9
COIT20262Term2,2019 private key pairs’ to do the encryption of a network connection. This cryptographic network protocol is used by many OS. Hence, there is a security threat on using Telnet and for that reason Telnet is not being used anymoretoaccessanynetworkdevicesoverthesharednetwork.Nopoliciesfor authentication. Based on Confidentiality SSH is a very reliable and secure network protocol by default, which runs on port 22; however ports are changeable. In SSH, the encryption method is complicated hence it’s difficult to decrypt that encrypted data. Therefore, the encrypted passwords which are under the protocol of SSH can travel on a public network carrying its security. All the data which is shared over the network are in encrypted format. Whereas, Telnet is not a secure communication protocol as its network protocol does not provide security. Hence, anyone can do the sniffing attack by decrypting the shared packets to obtain the information. Therefore TELNET is not safe to use as it does not provide any method to maintain confidentiality. All the data which is shared over the network are in plain text. Based on Performance Telnet serves an interface of command line for communicating with the remote servers. Bi- directional interaction is used for a good performance. The SSH works faster as it is convenient and comes in handy. And the performance can be improved even if the file size gets higher. Ciphers are used here for a better performance. Part (h) ChaCha20 is an encryption algorithm used to encrypt a message, in which a key and a nonce is present. This encryption method helps to keep the data confidential. In this stream cipher, permutation of 128 fixed bits is operated, a 64 bit nonce and another 64 bit counter is operated into 64 bytes of output. It has throughput and it is used to create one-time secret keys of Poly1305 from public nonce values which results in authenticator, called ChaCha20- Poly1305. ChaCha20-Poly1305 accepts 4 inputs; a key of 256-bit, a nonce of 96-bit, a plaintext of random length and an additional authenticated data (AAD) of random length. As the name implies ‘nonce’ of 96-bit cannot be used more than once. Both encryption and authentication is offered by this stream cipher, in which 256 bit keys are necessary that are used by two separate instances. The key of first instance is used to encrypt the data packet of 4 byte and the second instance is used for conjunction purpose. Whereas, AES uses a simple algebraic structure of encryption and same pattern is followed for every block. 1.ChahCha20 is used for the 32 bit or higher variant processor if there is no predefined instruction rather than AES as ChahCha20 is faster. Extra XOR (ARX) rotation makes the ChahCha20 faster. Also, the ARX is CPU friendly. AES uses lookup table for computation which makes it efficient. Page4of9
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
COIT20262Term2,2019 2.Using the lookup table makes AES vulnerable in front of time cache attack. For resolving it ChahCha20 can be deployed. Question 2.Cryptography Part (c) The information that is required to be secured through the encryption is different in terms of size, format and content of the information as well. The different algorithms that are described in this context contains instructions, which executes different process according to therequirements.Encryptionisimportantforprotectingthedatafromanytypeof unauthorized access. There are several of encryption process in which many are weak and many are strong. Different algorithm serves different level of encryption, some are very complex and some are easy to decrypt. There are two categories of Cryptography: Symmetric key and Asymmetric key cryptography, which are even further categorized. Part (d) MD5 is cryptographic hash function which is prone to be attacked by the collisions. ‘Birthday attack’ assists these attacks to process faster, a hash of ‘n’ bits can be decrypted within 2n/2 time. Some major extension of collision attack is ‘chosen-prefix collision attack’, which is very strong. In this collision attack two different ‘prefixes’ are there and two appendages are involved which gets into operation of concatenation. The Flame malware was a new version of ‘chose-prefix collision attack’, which did the spoofing attack on code signing and its elements against MD5. Hash collision can be used for the MD5 for finding two inputs which produces same hash value. Content of the message remains intact in this attack. SHA is an important algorithm for encryption which can produce 160-bit hash value. Functions of SHA is vulnerable to partial-message collision attacks. MD5 hash function contains 128 bit whether for SHA, it is 256 bits. However, it is easy to calculate hash function for any provided input. The MD5 algorithm has security issues due to collisions and therefore, not considered trustworthy. Part (e) A masquerade attack utilizes a fake identity over the network to acquire illegal access to information. The weaker the authorization process the stronger the masquerade attack. These attacks can be performed by using theft passwords and logons. The attackers can be present in the organization itself or can be an outsider. In case of attacker within the organization, gaining access to someone’s account is easier by simply stealing the victim’s account ID and its password. If once the attacker gets the access then the gaining all the essential and sensitive information would not be difficult. The attacker can do the modification in the data which will violate the confidentiality and authorization. To detect the masquerade attack user Page5of9
COIT20262Term2,2019 behaviour profiling can be used. Two categories of detection are the biometrics and command sequence. Part (f) If suspicious activity is detected properly, it is easier to prevent these type of security vulnerabilities. However, effective algorithm is required in this context. This type of profiling have limitations while operating the behaviour of keystroke, for example if someone’s hand is weak or broken then the keystroke would be quite different from a normal user. Other techniques of biometric faces these kind of challenges. In the second category, analysing the frequency of the occurrence, duration of the events, multiple events. The unusual sequences of command is mainly focused. Six masquerade detection methods were applied by Schonlau to a dataset of UNIX shell commands. One of them is called ‘uniqueness’, in which the unique training data is detected. Another detection method was ‘one-step transitions’ from one command to the other and this was originally approached by DuMouchel. Part (g) If the algorithm is applied properly, then it is easier to identify different activities in the network that tries to exploit the security of the network through illegal access to the network for accessing the information. Along with that, it is also possible to alert the owner of the network if several attempts are made for network exploitation as well. Detection method can be used for defeating the masquerade attack. Various of detection method can be used in this case. When the uniqueness of the attackers command is detected then it is easier to prevent the masquerade attack. The main part is the sequence, sequence of the command is essential in detection in this type of profiling. And another one was detecting behaviour, which is again someone’s uniqueness. Page6of9
COIT20262Term2,2019 Question 3.Malware Research What is ransomware? Scareware involves software for security which is rogue. Many pop-up messages appears on the screen which shows that ‘malware has been detected’ and demands for payment. And later if no action is taken then bunch of pop-ups might appear which is disturbing. Ransomware is a typical type of malware software which blocks the users from accessing their own personal system. Screenlockers leads to terror alert, when screenlockers invades into the computer then the screen gets frozen out. And when the computer is started then a full-size window will showed up, which might be accompanied by an authorized-looking FBI viewing illegal activities has been detected (Brewer 2016). This messages can terrify the users by demanding fines for the so-called illegal activities. The third one is Encrypting ransomware, which is extremely malicious as the attackers grab the users’ files and encrypt those according to their methods and demands payment for the solution. This type of ransomware is highly un-secure as the attackers has the accessibility to do anything with the theft files. Even if the payment is done, there is no guarantee in the confidentiality of the data. Infection Methods There are various methods that ransom can infect the computers of the organization. The Malspam are used to trick the users, so that the users will open the attachments and some links are even sent to the users with some attracting phrases hence, users might click on the links. For ransom attacks, the cybercriminals are responsible. Spam emails are used for delivering the ransomware malware to the other systems. Malware remains as attachment in the email. Another infection method is Malvertising, which is very popular. Malvertising means malicious advertising, which uses the online platform for the advertisements to spread the malware with a single click. While browsing any web page or website, users can be directed to the malicious page through the main URL without even clicking on the advertisements (Mohurle and Patil 2017). By this the attackers can access the location of the victim’s computer through the server. The iframe is used in malvertising which shows invisible element of the webpage to the victim then the user is redirected to the exploited web page. Through the exploit kit a malicious code is invaded into the system. Role of Cryptography While on the other cryptographic encryption can be done to prevent the attacks. There are various algorithm of cryptography: secret key cryptography, public key cryptography and hash functions. Cryptography plays an important role in the ransomware attack. For the cyber-attack crypto locker is used and the cryptography is also used for scrambling the file’s content. MD5 uses hash functions with a 128-bit hash value. It has various application for security. RSA algorithm uses one public key and a private key, the encryption is done through the public key and is decrypted by private key. The keys are created by applying few methods. Page7of9
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
COIT20262Term2,2019 AES uses the symmetric key algorithm which uses the same key for encryption as well as for decryption. In this algorithm principle of ‘substitution-permutation’ network is followed. Not Pay Ransom The attackers can encrypt the files of their own can scramble the contents of files and can either return or not. In most cases, if ransom is not paid then the files are never returned. If the university does not want to pay the ransomware then they must be having a local backup from which data can be restored. Pay Ransom Since the attackers are not loyal they can return the files but in encrypted form and data of files might not be exact. Hence, payment does not assure of confidentiality of the data. If the files are important then ransom for the files need to be paid but it is not assured that the affected files will always going to be recovered (Brewer 2016). The payment is done through a cryptocurrency medium. Payment is done online, as the attackers prefers early payment as the attackers would not reveal their identity. The attackers sends links for the payment which are later altered so that the link cannot be traced further after payment. The attackers prefers this platform for the payment which is beneficial for them. Recommendations To avoid these infections the organizations are recommended to maintain some precautions. The first and important recommendation is that proper backup must be taken for security of the data. Also, anti-malware programs must be installed within the system so that system always remains safe from any type of malware attack including the ransomware attack. Verifying the links before clicking on it is essential to prevent attacks. The email that seems to be suspicious should be deleted and by avoiding the clicking on provided links. These steps could avoid phishing, the cyber-attack. Highly recommended precaution is to keep the system updated. As the technologies are getting evolved gradually the security is also getting evolved hence, the updated system will prevent the general ransom attacks. Page8of9
COIT20262Term2,2019 Bibliography Brewer,R.,2016.Ransomwareattacks:detection,preventionandcure.Network Security,2016(9), pp.5-9. Kumar, S.D., Patranabis, S., Breier, J., Mukhopadhyay, D., Bhasin, S., Chattopadhyay, A. and Baksi, A., 2017, September. A practical fault attack on ARX-like ciphers with a case study on ChaCha20. In2017 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)(pp. 33-40). IEEE. Lim, J.P. and Nagarakatte, S., 2019, February. Automatic equivalence checking for assembly implementations of cryptography libraries. In2019 IEEE/ACM International Symposium on Code Generation and Optimization (CGO)(pp. 37-49). IEEE. Mohurle, S. and Patil, M., 2017. A brief study of wannacry threat: Ransomware attack 2017.International Journal of Advanced Research in Computer Science,8(5). Velea, R., Gurzău, F., Mărgărit, L., Bica, I. and Patriciu, V.V., 2016, May. Performance of parallel ChaCha20 stream cipher. In2016 IEEE 11th International Symposium on Applied Computational Intelligence and Informatics (SACI)(pp. 391-396). IEEE. Page9of9