Common Network Attacks And Standard Network Defense Mitigation

Verified

Added on  2022/05/12

|8
|1360
|23
AI Summary
In this assignment, we discuss Common Network Attacks And Standard Network Defense Mitigation the goal of security is to prevent unwanted access, exploitation, and alteration of the network resources while also ensuring that all network traffic is operating effectively and monitoring the communication channel.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Common network attacks and standard network defense
mitigation

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
Introduction..............................................................................................................................2
Network and Security..............................................................................................................2
Attacks on a network...............................................................................................................3
Virtual Private Network..........................................................................................................5
Conclusion.................................................................................................................................6
Document Page
Introduction
Security is to provide and ensure that all the network traffic are working properly and also to
keep track of the communication channel by avoiding unauthorized access and exploitation
and modification of the network resources. Network infrastructure is ideally the key
components such as software or even hardware that makes the computer to operate smoothly
through the network and its traffic.
Network and Security
In operation and management of the communication path and all the networking services are
being governed by the several application services that lay the foundation between the user
and the external network or even the internet as a whole 1. In this the designed network is to
meet and attain several specific businesses and operational functional objectives: That
includes.
Services that are secure
Up to date applications and integration
Information processing that is adaptive
Measurability
The identified user for the network will be the 2 administrators and the fulltime
employees
Devices such as routers, server modes switches, load balancer, and firewall are some of the
various networking infrastructure components that lead to the success of a communication
channel and the interaction of nodes. One of the biggest challenges that are faced on this is
the compatibility of the devices to be able to sustain the uptime of the network and the
transfer rate in which it shares the data packets across given network traffic.
1M. Pooja and, D.Y, Singh,. Security issues and Sybil attack in wireless sensor
networks. International Journal of P2P Network Trends and Technology, 3(1), pp.7-13, 2013
Document Page
Depending on the way the network is laid out it can be super vulnerable to various attacks
more specifically on the router. Such attacks can cause traffic to go through some
compromised host by advertising of false routes. On the ARP address resolution protocol, it
can confuse gateway into sending traffic from node A to node B. By this act that is proxy
traffic attackers can easily inject packets into session B's session example being the wireless
network. Attackers can cause the whole network to send traffic to a victim up to a designated
attackers address.
Some of the packet sniffers software can simply get a password and therefore take control of
suitable accounts.
The passwords can be obtained by the attacker by uniquely installing packet sniffer software
and overthrowing the account by getting the root password2. The use of the challenge
password response password generator will be an effective way to prevent the password-
sniffing attacks. The use of protocols such as; Kerberos, to prevent the flow of clear text
passwords over a Local Area Network (LAN)
Attacks on a network
Some of the attacks in networking include the following.
Denial-of-service Attack
Sometimes known as the DOS attacks involve the resources of the system are snatched away
from the administrator of the system and thus the system being unable to serve its intended
purpose. Distributed DOS is similar to the DOS attack, the only difference being that the
DDOS will affect a large scale of the distributed systems; this can be done from one node
within a network.
Password Attack
Considering the fact that the use of a password as a way of authentication is popular and
widely used, the can be a source of causing password attacks where the attacker collects
various passwords. These passwords can be gathered from a person’s personal surrounding.
Sniffing is referred to the efficiency of the network to derive information by going through a
number of ways such as:
2 T. Nitin, , S.R Singh and P.G. Singh, Intrusion Detection and Prevention System (IDPS)
Technology-Network Behavior Analysis System (NBAS). In International Science Congress
Association (pp. 51-56),2012.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Use of social engineering
Accessing a password database
Guessing
The final approach can either be carried out in an orderly or unorderly way:
Brute-force – this is randomly guessing passwords in order to get the actual password
by luck.
Dictionary attack- this is a commonly used password to bypass the password
authentication processes
Phishing attack
Over time this attack has been common where a person receives an email from a trusted
source and the intention of the attacker is to lure the person into giving his/her personal
information3. The procedures to prevent this attack include:
Extreme thinking.
moving over the links
Identifying the email headers
Sandboxing
There some of the Advanced attacks that majorly focuses on multiple nodes and complete
destruction and isolation of the entire network. They include.
Byzantine attack
Within a given set of operating computers and nodes that operate the receiver and the sender
where there arise some unpleasant alterations, these include; transferring packets over
optional pathways, generating loops, dropping selective packets. Eventually, they may lead to
the breakdown of the routing services.
Location disclosure attack
Destructive nodes gather the information from the nodes and their route by computing and
critically examining the network’s traffic. The destructive node may execute several attacks
across the network.
3 D.G, Padmavathi and, M, Shanmugapriya. A survey of attacks, security mechanisms and challenges
in wireless sensor networks. arXiv preprint arXiv:0909.0576,2009.
Document Page
One can prevent various network attacks by using the certain remedy to secure their network.
Virtual Private Network
The Virtual Private Networks, in other terms referred to as VPN, can be used to transfer
traffic over a network that is not secure and monitored. This is integrating both the encryption
authentication and subway4.
Point-to-Point Tunnelling Protocol (PPTP) ·
Internet Protocol Security (IPsec) ·
Layer 2 Tunnelling Protocol (L2TP) ·
The SOCKS VPN will ensure that the user is provided with both security and privacy,
considering that it is nearly impossible to pinpoint the geographical position of the
intended use since the network data can be distributed across several hosts worldwide
before it arrives at its destination. This can be used to evade a variety of blocks and
firewalls in a website.
Hardware Firewalls:
Hardware-based firewalls secured the majority of the end computers that are within your
network. It is easy to manage, maintain, administer and repaired compared to individual
software dedicated firewalls5. VPN basically supports antivirus, content filtering, and other
security technologies.
Antivirus:
Antivirus and Internet security are designed software programs that can protect an executable
programmable device from malicious software by detecting and eliminating threated viruses.
Antivirus software was actually created and keenly developed to automatically detect and
eliminate potential computer viruses hence the name. Some Antivirus software also include
4 B Gleeson, , A. Lin, Heinanen, J., Armitage, G. and Malis, A., . A framework for IP based virtual
private networks,2010.
5 N. Doraswamy, and, D. Harkins, IPSec: the new security standard for the Internet, intranets, and
virtual private networks. Prentice Hall Professional, 2013.
Document Page
protection from other computer thread, such as infected and undesirable URL, spam, scan and
phishing attacks, and social techniques,
Conclusion
Network security is very important in any organization or company. Similar to
confidentiality, maintaining integrity can be applied to a bunch of messages or a single
message. Total steam protection can be an effective and efficient way to secure information.
The connection-oriented integrity service can be used to prevent some faults that may arise
with streams of messages such as:
Duplication
Alterations
Reordering
Replays

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
References
Doraswamy, N. and Harkins, D.. IPSec: the new security standard for the Internet, intranets,
and virtual private networks. Prentice Hall Professional, 2013.
Gleeson, B., Lin, A., Heinanen, J., Armitage, G. and Malis, A. A framework for IP based
virtual private networks, 2010.
Nitin, T., Singh, S.R. and Singh, P.G., July. Intrusion Detection and Prevention System
(IDPS) Technology-Network Behavior Analysis System (NBAS). In International Science
Congress Association (pp. 51-56), 2012.
Padmavathi, D.G. and Shanmugapriya, M.. A survey of attacks, security mechanisms and
challenges in wireless sensor networks. arXiv preprint arXiv:0909.0576,2009.
Pooja, M. and Singh, D.Y, Security issues and Sybil attack in wireless sensor
networks. International Journal of P2P Network Trends and Technology, 3(1), pp.7-13,
2013.
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]