SlideShare a Scribd company logo
2
Most read
4
Most read
6
Most read
Layers Attack
Prof. Neeraj Bhargava
Kapil Chauhan
Department of Computer Science
School of Engineering & Systems Sciences
MDS University, Ajmer
Security
Attacks on Different Layers
IP Attacks
ICMP Attacks
Routing Attacks
TCP Attacks
Application Layer Attacks
TCP/IP was designed for connectivity
Assumed to have lots of trust
Host implementation vulnerabilities
Software “had/have/will have” bugs
Some elements in the specification were left to the
implementers
Security Flaws in IP
IP fragmentation attack
End hosts need to keep the fragments till all the
fragments arrive
Traffic amplification attack
IP allows broadcast destination
Problems?
ICMP Attacks
No authentication
ICMP redirect message
Can cause the host to switch gateways
Benefit of doing this?
 Man in the middle attack, sniffing
ICMP destination unreachable
Can cause the host to drop connection
Routing Attacks
Distance Vector Routing
Announce 0 distance to all other nodes
 Blackhole traffic
 Eavesdrop
Link State Routing
Can drop links randomly
Can claim direct link to any other routers
A bit harder to attack than DV
BGP
ASes can announce arbitrary prefix
ASes can alter path
TCP Layer Attacks
TCP Session Hijack
When is a TCP packet valid?
 Address/Port/Sequence Number in window
How to get sequence number?
 Sniff traffic
 Guess it
 Many earlier systems had predictable ISN
Inject arbitrary data to the connection
Application Layer Attacks
Applications don’t authenticate properly
Authentication information in clear
FTP, Telnet, POP
DNS insecurity
DNS poisoning
DNS zone transfer
Intrusion Detection Systems
Firewalls allow traffic only to legitimate hosts and
services
Traffic to the legitimate hosts/services can have
attacks
CodeReds on IIS
Solution?
Intrusion Detection Systems
Monitor data and behavior
Report when identify attacks
Intrusion Detection Systems
Firewalls allow traffic only to legitimate hosts and
services
Traffic to the legitimate hosts/services can have
attacks
CodeReds on IIS
Solution?
Intrusion Detection Systems
Monitor data and behavior
Report when identify attacks

More Related Content

PPT
Protocol for Secure Communication
PPT
Lecture 5 ip security
PPTX
Vpn virtual private network
PDF
Privacy Enhanced Mail (PEM)
PPT
Ch06 Wireless Network Security
PPTX
Email Security Presentation
ODP
Wifi Security, or Descending into Depression and Drink
PDF
Cns unit4
Protocol for Secure Communication
Lecture 5 ip security
Vpn virtual private network
Privacy Enhanced Mail (PEM)
Ch06 Wireless Network Security
Email Security Presentation
Wifi Security, or Descending into Depression and Drink
Cns unit4

What's hot (20)

PDF
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
PDF
Network Security Applications
PPTX
Network security
PDF
Email security & threads
DOCX
RESUME _ PRATHAMESH PISE
PPT
E-mail Security in Network Security NS5
PPTX
Wlan security
PDF
message passing interface
PDF
Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...
PPT
T C P I P Weaknesses And Solutions
PPTX
Wireless Security
PPTX
Network Security Projects
PPTX
IP Security and its Components
PDF
Rushabhraj resume
PPT
Email Security : PGP & SMIME
PPSX
Security & Privacy in WLAN - A Primer and Case Study
PPT
Wireless Device and Network level security
PPTX
WLAN SECURITY BY SAIKIRAN PANJALA
PDF
Electronic mail security
PPTX
Wireless network security
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
Network Security Applications
Network security
Email security & threads
RESUME _ PRATHAMESH PISE
E-mail Security in Network Security NS5
Wlan security
message passing interface
Attack Robustness and Security Enhancement with Improved Wired Equivalent Pro...
T C P I P Weaknesses And Solutions
Wireless Security
Network Security Projects
IP Security and its Components
Rushabhraj resume
Email Security : PGP & SMIME
Security & Privacy in WLAN - A Primer and Case Study
Wireless Device and Network level security
WLAN SECURITY BY SAIKIRAN PANJALA
Electronic mail security
Wireless network security
Ad

Similar to Layers Attacks (20)

PPTX
security problems in the tcp/ip protocol suite
PPT
Web Application Security
PPT
12 tcp-dns
PPT
3.Network
PPTX
Oss web application and network security
PPTX
Presentation1
PDF
Deep Knowledge on Network Hacking Philosopy
PDF
08 tcp-dns
PPT
6.Routing
PPTX
IP Spoofiaaaaaaaaaaaaaaaaaaaang ppt.pptx
PPT
PPT
Network Security Chapter 7
PPTX
Socket programing
PPT
Hacking Cisco
PPTX
Root via sms. 4G security assessment
PPTX
Security in network
PPT
Switch and Router Security Testing
PPT
Day4
PPTX
gkk_2021123rg5hSecurity essentials domain 2
PPTX
gkk20211e4djwew4dSecurity essentials domain 2
security problems in the tcp/ip protocol suite
Web Application Security
12 tcp-dns
3.Network
Oss web application and network security
Presentation1
Deep Knowledge on Network Hacking Philosopy
08 tcp-dns
6.Routing
IP Spoofiaaaaaaaaaaaaaaaaaaaang ppt.pptx
Network Security Chapter 7
Socket programing
Hacking Cisco
Root via sms. 4G security assessment
Security in network
Switch and Router Security Testing
Day4
gkk_2021123rg5hSecurity essentials domain 2
gkk20211e4djwew4dSecurity essentials domain 2
Ad

More from chauhankapil (20)

PPTX
Gray level transformation
PPTX
Elements of visual perception
PPTX
JSP Client Request
PPTX
Jsp server response
PPTX
Markov decision process
PPTX
RNN basics in deep learning
PPTX
Introduction to generative adversarial networks (GANs)
PPTX
Bayesian probabilistic interference
PPTX
PPTX
Exception handling in java
PPTX
Knowledge acquistion
PPTX
Knowledge based system
PPTX
Introduction of predicate logics
PPTX
Types of inheritance in java
PPTX
Representation of syntax, semantics and Predicate logics
PPTX
Inheritance in java
PPTX
Propositional logic
PPTX
Constructors in java
PPTX
Methods in java
PPT
Circular linked list
Gray level transformation
Elements of visual perception
JSP Client Request
Jsp server response
Markov decision process
RNN basics in deep learning
Introduction to generative adversarial networks (GANs)
Bayesian probabilistic interference
Exception handling in java
Knowledge acquistion
Knowledge based system
Introduction of predicate logics
Types of inheritance in java
Representation of syntax, semantics and Predicate logics
Inheritance in java
Propositional logic
Constructors in java
Methods in java
Circular linked list

Recently uploaded (20)

PPTX
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
PPT
Occupational Health and Safety Management System
PDF
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
Fundamentals of Mechanical Engineering.pptx
PDF
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
PDF
Soil Improvement Techniques Note - Rabbi
PDF
PPT on Performance Review to get promotions
PPT
introduction to datamining and warehousing
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PPTX
Information Storage and Retrieval Techniques Unit III
PDF
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPT
Total quality management ppt for engineering students
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PDF
Integrating Fractal Dimension and Time Series Analysis for Optimized Hyperspe...
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PPTX
introduction to high performance computing
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
Occupational Health and Safety Management System
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Fundamentals of Mechanical Engineering.pptx
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
Soil Improvement Techniques Note - Rabbi
PPT on Performance Review to get promotions
introduction to datamining and warehousing
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
Information Storage and Retrieval Techniques Unit III
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Total quality management ppt for engineering students
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
Integrating Fractal Dimension and Time Series Analysis for Optimized Hyperspe...
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
introduction to high performance computing

Layers Attacks

  • 1. Layers Attack Prof. Neeraj Bhargava Kapil Chauhan Department of Computer Science School of Engineering & Systems Sciences MDS University, Ajmer
  • 2. Security Attacks on Different Layers IP Attacks ICMP Attacks Routing Attacks TCP Attacks Application Layer Attacks
  • 3. TCP/IP was designed for connectivity Assumed to have lots of trust Host implementation vulnerabilities Software “had/have/will have” bugs Some elements in the specification were left to the implementers
  • 4. Security Flaws in IP IP fragmentation attack End hosts need to keep the fragments till all the fragments arrive Traffic amplification attack IP allows broadcast destination Problems?
  • 5. ICMP Attacks No authentication ICMP redirect message Can cause the host to switch gateways Benefit of doing this?  Man in the middle attack, sniffing ICMP destination unreachable Can cause the host to drop connection
  • 6. Routing Attacks Distance Vector Routing Announce 0 distance to all other nodes  Blackhole traffic  Eavesdrop Link State Routing Can drop links randomly Can claim direct link to any other routers A bit harder to attack than DV BGP ASes can announce arbitrary prefix ASes can alter path
  • 7. TCP Layer Attacks TCP Session Hijack When is a TCP packet valid?  Address/Port/Sequence Number in window How to get sequence number?  Sniff traffic  Guess it  Many earlier systems had predictable ISN Inject arbitrary data to the connection
  • 8. Application Layer Attacks Applications don’t authenticate properly Authentication information in clear FTP, Telnet, POP DNS insecurity DNS poisoning DNS zone transfer
  • 9. Intrusion Detection Systems Firewalls allow traffic only to legitimate hosts and services Traffic to the legitimate hosts/services can have attacks CodeReds on IIS Solution? Intrusion Detection Systems Monitor data and behavior Report when identify attacks
  • 10. Intrusion Detection Systems Firewalls allow traffic only to legitimate hosts and services Traffic to the legitimate hosts/services can have attacks CodeReds on IIS Solution? Intrusion Detection Systems Monitor data and behavior Report when identify attacks