IJRIT International Journal of Research in Information Technology, Volume 1, Issue 10, October, 2013, Pg. 98-105

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

Study On Network Security: Threats and Safety Shafali Jain1, Smita Bhardwaj2, Sonia Tewari3 123

1

IT Department Students, Dronacharya College of Engineering

[email protected],

2

[email protected],[email protected] Abstract

With the emergence of new technologies and their enormous use the threats also increase over the network as its use increases. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. The three primary goals of network security which are confidentiality, integrity and availability can be achieved by using the technologies like firewall, cryptography, anti-malware and many more from network threats like virus, worms etc. Security of network is important as it contains those data which if gets into unauthorized person’s hand than could create a huge problem over wide network area. Network security is not only concerned with the security in computers at each end of the communication chain hut also the computers being their connected in the network. The use of different network security components, such as firewalls and network intrusion detection systems (NIDSs), is the dominant method to monitor and guarantee the security policy in current corporate networks. To properly configure these components, it is necessary to use several sets of security rules. Network Security is becoming of great importance because of the intellectual property that can be easily acquired though internet.

Keyword: VPN (Virtual Private Network), Spoofing, firewall, Access, Network Intrusion Detection, Access Control List,

1. Introduction Now a day the new emerging technologies have a huge influence in day to day life. For example Electronics, computers, multimedia and many other sources which are now become a part of one’s life. In these on of the most use technology of human history is Internet, bringing enormous changes on one’s life or in development of any particular task of an organization. Internet is basically the global interconnecting network of different computers located around the world. Network is a group of two or more computers which are being interlinked with each other for the purpose of sharing the data or information other needed. Since there is wide use of Internet over the whole world undoubtedly a lot information, data would been travelling in the networking lines from a device node to

Shafali Jain,IJRIT

98

another. Some may be a general data while other may be highly confidential containing some unrevealed data that to passed securely. The term network security interpolate to a specialized form of computer networking field that comprises the computer network infrastructure. Network security consist of provisions and policies which are being adopted by the network administrator to prevent and supervise the network from the unauthorized access, misuse, modification or denial of a computer network and network-accessible resources. Network security involves the authorization of access to a data in a network ,which is controlled by the network administrator. Basically in terms of fundamental network only two are available currently: data networks and synchronous network comprised of switches. The internet is considered a data network. The synchronous network does not buffer data as it consist of switches and therefore are not threatened by attackers.

2. Network Security While considering network security, it must be emphasized that the whole network is secure. Network security is not only concerned with the security in computers at each end of the communication chain. When transmitting data, communication channel should not be vulnerable that an unauthorized person could target the channel, obtain the data, and decrypt it and re‐insert a false message. Securing the network is as important as securing the computers and encrypting a message. Following need to be taken in consideration when developing a secure network: 1. Access – authorized users are provided the means to communicate to and from a Particular network. 2. Confidentiality – Information in the network remains private. 3. Authentication – Ensure the users of the network are who they say, they are. 4. Integrity – Ensure the message has not been modified in transit. The use of different network security components, such as firewalls and network intrusion detection systems (NIDSs), is an assertive method to monitor and guarantee the security policy in current corporate networks. Network intrusions consist of packets that are introduced to cause problems for the following reasons: I. II. III.

To consume resources uselessly. To interfere with any system resource’s intended function. To gain system knowledge that can be exploited in later attacks.

2.1 Types of Network Threats 2.1.1Eavesdropping: Interception of communications by an unauthorized party is called eavesdropping. I. II.

Passive Eavesdropping is when the person only secretly listens to the networked messages. Active eavesdropping is when the intruder listens and inserts something into the communication stream. This can lead to Messages being distorted.

III.

2.1.2. Viruses Viruses are self‐replication programs that use files to infect and propagate. Once a file is opened, the virus will activate within the system.

Shafali Jain,IJRIT

99

2.1.3. Worms

A worm is similar to a virus because they both are self‐replicating, but the worm does not require a file to allow it to propagate. There are two main types of worms: 1. 2.

Mass‐mailing worms- Use email as a means to infect other computers. Network-aware worms-They selects a target and once the worm accesses the target host, it can infect it by any means.

2.1.4. Backdoors: A backdoor is a method of bypassing normal authentication procedures. 2.1.5. Trojans: Trojans appear to be programs to the user, but will actually have some malicious purpose. 2.1.6. Phishing: Phishing is an attempt to obtain confidential information from an individual, group, or organization. 2.1.7. IP Spoofing Attacks: Spoofing means to have the address of the computer mirror the address of a trusted computer in order to gain access to other computers. 2.1.8. Denial-of-Service: DoS (Denial-of-Service) attacks are probably most difficult to address. The DoS attack is simple: send more requests to the machine than it can handle. The attacker's program simply makes a connection on some service port, perhaps forging the packet's header information that says where the packet came from, and then dropping the connection. Steps to be taken to reduce the denial of service attacks include: 1. 2.

Using packet filtering to prevent obviously forged packets from entering into your network address space. Keeping up-to-date on security-related patches for your hosts' operating systems.

2.1.9. Unauthorized Access: “Unauthorized access” is a very high-level term that can refer to a number of different sorts of attacks. The goal of these attacks is to access some resource that a particular machine should not provide the attacker. 2.1.10. Executing Commands Illicitly: It's undesirable for an unknown and untrusted person to be able to execute commands on an authorized server machines. There are two main classifications of the severity of this problem: 1. Normal user access: - A normal user can do a number of things on a system that an attacker should not be able to do. This is what all the access that an attacker needs. 2. Administrator access:-If an attacker might wish to make configuration changes to a host than the attacker will need to gain administrator privileges on the host. 2.1.11. Destructive Behavior Among the destructive sorts of break-ins and attacks, there are two major categories. 1.

Shafali Jain,IJRIT

Data Diddling:-The data diddler is likely the worst sort, since the fact of a break-in might not be immediately obvious.

100

2.

Data Destruction:-Some of those perpetrate attacks are simply twisted jerks who like to delete things.

3. Firewalls Important terms used in firewalls: 1. Bastion host. : A general-purpose computer used to control access between the internal (private) network (intranet) and the Internet (or any other untrusted network). 2. Router: A special purpose computer for connecting networks together. Routers also handle certain functions, such as managing the traffic on the networks. 3. Access Control List (ACL): Many routers have the ability to selectively perform their duties, based on a number of facts about a packet that comes to it. These can be employed to limit the sorts of packets that are allowed to come in and go out of a given network. 4. Demilitarized Zone (DMZ): The DMZ is a critical part of a firewall: it is a network that is neither part of the untrusted network, nor part of the trusted network. But, this is a network that connects the untrusted to the trusted. 3.1. Proxy: This is the process of having one host act in behalf of another. A host that has the ability to fetch documents from the Internet might be configured as a proxy server, and host on the intranet might be configured to be proxy clients. A proxy server (running either on dedicated hardware or as software on a general-purpose machine) may act as a firewall by responding to input packets in the manner of an application, while blocking other packets. A proxy server is a gateway from one network to another for a specific network application, in the sense that it functions as a proxy on behalf of the network user. Proxies make tampering with an internal system from the external network more difficult and misuse of one internal system would not necessarily cause a security breach exploitable from outside the firewall. 3.2. Packet-Filtering Firewalls Packet-filtering firewalls validate packets based on protocol, source and/or destination IP addresses, source and/or destination port numbers, time range, Differentiate Services Code Point (DSCP), type of service (ToS), and various other parameters within the IP header. Packet filtering is generally accomplished using Access Control Lists (ACL) on routers or switches and are normally very fast, especially when performed in an Application Specific Integrated Circuit (ASIC).

3.2.1. Advantages 1. They are located in just about every device on the network. Routers, switches, wireless access points, Virtual Private Network (VPN) concentrators. 2. Routers from the very smallest home office to the largest service-provider devices inherently have the capability to control the flow of packets through the use of ACLs. 3. Switches may use Routed Access-Control Lists (RACLs), which provide the capability to control traffic flow on a "routed" interface. 4. Other networking devices may also have the power to enforce traffic flow through the use of ACLs.

Shafali Jain,IJRIT

101

3.2.2. Limitations 1. The challenge with packet-filtering firewalls is that ACLs are static, and packet filtering has no visibility into the data portion of the IP packet. 2. Tip - Packet-filtering firewalls do not have visibility into the payload. 3. Because packet-filtering firewalls match only individual packets, this enables an individual with malicious intent, also known as a "hacker," "cracker," or "script kiddie," to easily circumvent your security.

3.3. Application/Proxy Firewalls Application-layer firewalls work on the application level of the TCP/IP stack and may intercept all packets traveling to or from an application. They block other packets .On inspecting all packets for improper content, firewalls can restrict or prevent outright the spread of networked computer worms and trojans. The additional inspection criteria can add extra latency to the forwarding of packets to their destination. 1. 2. 3. 4.

Application firewalls function by determining whether a process should accept any given connection. Application firewalls accomplish their function by hooking into socket calls to filter the connections between the application layer and the lower layers of the OSI model. These firewalls that hook into socket calls are also referred to as socket filters. They work much like a packet filter but application filters apply filtering rules (allow/block) on a per process basis instead of filtering connections on a per port basis.

LAN WAN

Firewall Figure1: Firewall Application firewalls filter connections by examining the process ID of data packets against a rule set for the local process involved in the data transmission. The extent of the filtering that occurs is defined by the provided rule set. Given the variety of software that exists, application firewalls only have more complex rule sets for the standard services, such as sharing services. These per process rule sets cannot defend against modification of the process via exploitation, such as memory corruption exploits. Because of these limitations, application firewalls are beginning to be supplanted by a new generation of application firewalls that rely on mandatory access control (MAC), also referred to as sandboxing, to protect vulnerable services.

4. Cryptographic System Cryptography is a study of techniques for secure communication in the presence of third parties; in today’s aura it is effectively synonymous with encryption.

Shafali Jain,IJRIT

102

4.1. Encryption Encryption is the process of encoding messages in such a way that eavesdroppers or hackers cannot read it, but that authorized parties can. In an encryption scheme, the message or information is encrypted using an encryption algorithm, turning it into an unreadable cipher text (ibid.). This is usually done with the use of an encryption key, which specifies how the message is to be encoded. Any adversary that can see the cipher text should not be able to determine anything about the original message. An authorized party, however, is able to decode the cipher text using a decryption algorithm that usually requires a secret decryption key. 4.1.1Two types of Encryption: 1. Symmetric-key algorithms: They are a class of algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of cipher text. The keys may be identical or there may be a simple transformation to go between the two keys. 2. Public-key cryptography: It refers to a cryptographic system requiring two separate keys, one of which is secret and one of which is public. Although different, the two parts of the key pair are mathematically linked. One key locks or encrypts the plaintext, and the other unlocks or decrypts the cipher text. Neither key can perform both functions by itself. The algorithms used for public key cryptography are based on mathematical relationships.

Smith’s Public Jay Emly

Plain Text

Kerith

Kerith’s Public Key Ciphertext

Encryption Algorithm

Kerith’s Plain Text

Decryption algorithm

Figure2: The message encrypt and then reaching the destination it got decrypt again

5. Anti-Virus And Anti-Malware Software A specific component of the Anti-virus and anti-malware software commonly referred as the on-access or real-time scanner, hooks deep into the operating system's core or kernel functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system. If the file is considered a malware by the scanner, the access operation will be stopped, the file will be dealt by the scanner in pre-defined way. Anti-malware programs can combat malware in two ways: 1. They can provide real time protection against the installation of malware software on a computer. 2. Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer.

Shafali Jain,IJRIT

103

6. Secure Modems There are some remote access systems that have the feature of a two-part procedure to establish a connection. The first part is the remote user dialing into the system, and providing the correct userid and password. The system will then drop the connection, and call the authenticated user back at a known telephone number. Other possibilities include one-time password schemes, where the user enters his userid, and is presented with a ``challenge,'' a string of between six and eight numbers.

7. Virtual Private Networks Given the ubiquity of the Internet, and the considerable expense in private leased lines, many organizations have been building VPNs (Virtual Private Networks).

Regional Office

Internet

Headoffice Regional Office

Remote Users

Figure 3: Virtual Private Network VPNs provide the ability for two offices to communicate with each other in such a way that it looks like they're directly connected over a private leased line. The session between them, although going over the Internet, is private (because the link is encrypted), and the link is convenient, because each can see each other’s internal resources without showing them off to the entire world.

8. Secure Socket Layer The Secure Sockets Layer (SSL) is a commonly-used protocol for managing the security of a message transmission on the Internet. It has recently been succeeded by Transport Layer Security (TLS), which is based on SSL. SSL uses a program layer located between the Internet's Hypertext Transfer Protocol (HTTP) and Transport Control Protocol (TCP) layers.

10. Conclusion With the advancement of the new technologies over the world wide network, it’s important to keen the network safe and secure preventing it from untrusted users hence very all protecting confidential information to be leaked. Network is the backbone of the wide communication which is spread throughout the world, so the security of this network is equally important. With the uses of certain equipment and technologies like firewall, cryptography, using anti-malware ,VPN is must now a days. Securing the network from various threats is stopping the biggest cybercrime around the world. For the efficient use of the network security tools and technologies it’s necessary for one to understand about the various threats to the network world ,solving these problems, introducing various algorithms and applying it .In future it

Shafali Jain,IJRIT

104

would be keen to increase the strength of the network security in order to preserve one’s network from getting hacked, so the study of the security of network would be one of the essential part of the network. Network Security is like a immune system of the network which prevent it from getting attacked by undesirable cells. Security of network has high influence over in all those organization whose communication travels through network, sharing private and unleaded data setting up far locations between them. Thus, preventing a great loss to happen in the world of networks by protecting and saving it from the untrusted and unauthorized eye. Network Security is applicable worldwide from home to large business, educational institute ,government, small and medium scale business almost everywhere.

11. Acknowledgement Sincere thanks to Mr.Amitesh Kumar, Assistant Professor, IT Dept., Dronacharya College of Engg, and Gurgaon, who guided us and supported us towards the development of this research work.

12. References [1] Bhavya Daya,”Network Security: History, Importance, and Future”, University of Florida Department of Electrical and Computer Engineering [2]J. G. Alfaro, N. Boulahia-Cuppens, F.Cuppens,”Complete analysis of configuration rules to guarantee reliable network security policies”, Int J INF Secur (2007) manuscript No. (Preprint). [3]Network Security, http://en.wikipedia.org/wiki/Network_security. [4]Network Security and Cryptography, http://en.wikipedia.org/wiki/Network_Security_%26_Cryptography [5] “Improving Security,”http://www.cert.org/tech_tips, 2006. [6] Ramy K. Khalil, Fayez W. Zaki , Mohamed M. Ashour, and Mohamed A. Mohamed,"A Study of Network Security Systems",IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.6, June 2010. [7]Firewall

(Computing),

http://en.wikipedia.org/wiki/Firewall_

(computing)

#Second_generation:_.22stateful.22_filters. [8]Network Security, http://www.tldp.org/HOWTO/Security-HOWTO/network-security.html. [9]Encryption,http://en.wikipedia.org/wiki/Encryption. [10] Introduction to Network Secutrity,http://www.interhack.net/pubs/network-security/. [11] S.M. Bellovin. Security Problems in the TCP/IP Protocol Suite. Computer Communication Review, Vol. 19, No. 2, pp. 32-48, April 1989. [12] Kartalopoulos, S. V., "Differentiating Data Security and Network Security," Communications, 2008. ICC '08.IEEE International Conference on, pp.1469‐1473, 19‐23 May 2008. [13] Improving Security: http://www.cert.org/tech_tips, 2006

Shafali Jain,IJRIT

105

Study On Network Security: Threats and Safety - IJRIT

proxy server is a gateway from one network to another for a specific network .... Securing the network from various threats is stopping the biggest cybercrime ...

218KB Sizes 2 Downloads 226 Views

Recommend Documents

Study On Network Security: Threats and Safety - IJRIT
Security of network is important as it contains those data which if gets into unauthorized person's .... process involved in the data transmission. ... They can provide real time protection against the installation of malware software on a computer.

Network Security on safety-critical systems: a case study ... - GitHub
SFD | Start-of-Frame Delimiter, 1 octet of 0xd5. DA / SA | MAC Destination Address / MAC Source Address ..... 11:56:57.340515 00:00:00:00:00:01 > 00:1f:16:37:b1:3d, ethertype IPv4. (0x0800), length 79: (tos 0x0, ttl 64, id 0, offset 0, flags ..... ht

Network Defense Security Policy And Threats ...
Network Defense Security Policy And Threats #RE8XOR3W by EC-Council. #++ (-EPub-) Network Defense Security Policy and Threats. BOOK BY EC-COUNCIL ...

Network Security using IP Traceback Techniques - IJRIT
The original aim of the Internet was to provide an open and scalable network among ... Blocking the availability of an Internet service may imply large financial.

Network Security using IP Traceback Techniques - IJRIT
And the toughest problem of Network Security is to trace the ... annual Computer Security Institute (CSI) computer crime and security survey reported that ...

Enforcing Reverse Circle Cipher for Network Security Using ... - IJRIT
User's authentication procedures will be design for data storage and retrieval ... In this paper we are going to discuss two tier security approaches for cloud data storage ... in public and private key encryption cipher such as RSA (Rivest Shamir, .

Enforcing Reverse Circle Cipher for Network Security Using ... - IJRIT
... key encryption cipher such as RSA (Rivest Shamir, Adleman) uses in internet with .... I would like to give my sincere gratitude to my guide Aruna K. Gupta, H.O.D. ... Wireless Sensor Networks”,Transactions on Sensor Networks (TOSN), ACM ...

Study and Investigate Effect of Input Parameters on ... - IJRIT
to apply DOE techniques to achieve desired design of gearbox for control the temperature and noise .... replication total 32 experiments will be performed as shown in table ΙΙ. ... will be carried out using dB meter or by using ultrasonic sensor.

Security and Communication Network
Soft computing techniques, such as Fuzzy Logic, Neural Networks, Evolutionary. Computing, Rough Sets and other similar techniques, have been proved ...

Security and Communication Network
pattern detection, data segmentation, data mining, adaptive control, information assurance, etc. Recently, soft computing is widely used in information system for assurance. For example, neural networks are used for intrusion detection or prevention,

Security threats facing investment banks
On a business level, investment banks face the same ... head of IT security at a major bank, speaking on ... The doctors' ID card contains informa- tion about their ...

Advance Java Study - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 2, Issue 9, September 2014, Pg. ... Java and Object-Oriented technology are a major.

Advance Java Study - IJRIT
interpreter, and that is indistinguishable in speed from C++.Java offers two flavors of programming, Java applets and Java application. Applets are small Java programs (mostly) that can be downloaded over a computer network and run from a web page by

A Review on Neural Network for Offline Signature Recognition ... - IJRIT
Based on Fusion of Grid and Global Features Using Neural Networks. ... original signatures using the identity and four Gabor transforms, the second step is to ...

PDF Improving Web Application Security: Threats and ...
Online PDF Improving Web Application Security: Threats and Countermeasures (Patterns Practices), Read PDF Improving Web Application Security: Threats ...

pdf-1873\cyberspace-and-national-security-threats-opportunities ...
Try one of the apps below to open or edit this item. pdf-1873\cyberspace-and-national-security-threats-opportunities-and-power-in-a-virtual-world.pdf.

Safety and Security Procedures.pdf
Retrying... Whoops! There was a problem loading this page. Retrying... Safety and Security Procedures.pdf. Safety and Security Procedures.pdf. Open. Extract.

Download Cryptography and Network Security: Principles and ...
Download Cryptography and Network Security: Principles and Practice: United States Edition. (The William Stallings Books on Computer & Data.

Security and Interoperability in Cloud Computing and Their ... - IJRIT
online software applications, data storage and processing power. ... Interoperability is defined as Broadly speaking, interoperability can be defined ... Therefore, one of the solutions is to request required resources from a cloud IaaS provider.