SlideShare a Scribd company logo
INFORMATION AND NETWORK SECURITY
(2170703)
TYPES OF ATTACKS
SUBMITTED TO :
Prof. BRIJESH PATEL
SUBMITTED BY :
ASHKA SONI
(140110107004)
DHRUVIN R SHAH
(140110107013)
VIVEK GANDHI
(140110107017)
Definitions • Computer Security
– Generic name for the collection of tools designed to
protect data and to thwart hackers
• Network Security
– Measures to protect data during their transmission
• Internet Security (our focus!)
– Measures to protect data during their transmission
over a collection of interconnected networks
Security
Trends
3 Aspects of
Information
Security
• Security Attack
– Any action that compromises the security of information.
• Security Mechanism
– A mechanism that is designed to detect, prevent, or
recover from a security attack.
• Security Service
– A service that enhances the security of data processing
systems and information transfers.
• Makes use of one or more security mechanisms.
Computer
Security
Concept
• Computer Security
– The protection afforded to an automated information
system in order to attain the applicable objectives of
preserving the integrity, availability and confidentiality
of information system resources (includes hardware,
software, information/data, and telecommunications).
Computer
Security
Concept
1. Confidentiality
preserving authorized restrictions on
information access and disclosure, including
means for protecting personal privacy and
proprietary information.
2. Integrity
Guarding against improper information
modification or destruction, and includes
ensuring information non-repudiation and
authenticity
3. Availability
Ensuring timely and reliable access to and
use of information.
Security
Goals
Integrity
Confidentiality
Avalaibility
Types of
Attacks
• PassiveAttacks
• Active Attacks
PASSIVE ATTACKS
Passive
Attacks
• A passive attack is a network attack in which a system
is monitored and sometimes scanned for open ports
and vulnerabilities. The purpose is solely to gain
information about the target and no data is changed
on the target.
• In passive reconnaissance, an intruder monitors
systems for vulnerabilities without interaction, through
methods like session capture. In active reconnaissance,
the intruder engages with the target system through
methods like port scans.
Types of
Passive
Attacks
• Interception Attack
• TrafficAnalysisAttack
Interception • The phenomenon of confidentiality plays an important
role in this type of attack. The data or message which is
sent by the sender is intercepted by an unauthorized
individual where the message will be changed to the
different form or it will be used by the individual for his
malicious process. So the confidentiality of the
message is lost in this type of attack.
• It is also known as “Release of message contents”.
Interception
Traffic
Analysis
• Traffic analysis is the process of intercepting and
examining messages in order to deduce information
from patterns in communication. It can be performed
even when the messages are encrypted and cannot be
decrypted. In general, the greater the number of
messages observed, or even intercepted and stored,
the more can be inferred from the traffic. Traffic
analysis can be performed in the context of military
intelligence or counter-intelligence, and is a concern in
computer security.
Traffic
Analysis
Observe traffic pattern
ACTIVE ATTACKS
Active
Attacks
• An active attack is a network exploit in which a hacker
attempts to make changes to data on the target or
data en-route to the target.
• The purpose is to gain information about the target
and no data is changed. However, passive attacks are
often preparatory activities for active attacks.
Types of
Active
Attacks
• Masquerade Attack
• Interruption Attack
• FabricationAttack
• Session ReplayAttack
• ModificationAttack
• Denial of Service (DOS)Attack
Masquerade • In a masquerade attack, the intruder pretends to be a
particular user of a system to gain access or to gain
greater privileges than they are authorized for. A
masquerade may be attempted through the use of
stolen login IDs and passwords, through finding
security gaps in programs or through bypassing the
authentication mechanism.
Interruptio
n
• This type of attack is due to the obstruction of any kind
during the communication process between one or
more systems. So the systems which are used become
unusable after this attack by the unauthorized users
which results in the wastage of systems.
Fabrication • In this type of attack a fake message is inserted into
the network by an unauthorized user as if it is a valid
user. This results in the loss of confidentiality,
authenticity and integrity of the message.
Fabricate message
Session
Replay
• In a session replay attack, a hacker steals an authorized
user’s log in information by stealing the session ID.The
intruder gains access and the ability to do anything the
authorized user can do on the website.
Modification • In a message modification attack, an intruder alters
packet header addresses to direct a message to a
different destination or modify the data on a target
machine.
Modify
message
Denial of
Service
(DOS)
• In a denial of service (DoS) attack, users are deprived of
access to a network or web resource. This is generally
accomplished by overwhelming the target with more
traffic than it can handle.
THANK YOU

More Related Content

PPTX
e-commerce web site project
PPTX
Network attacks
PPTX
Cia security model
PDF
Virtualization for Cloud Environment
PPTX
Network security (vulnerabilities, threats, and attacks)
PPTX
Wi-Fi Technology
PDF
Web technology
e-commerce web site project
Network attacks
Cia security model
Virtualization for Cloud Environment
Network security (vulnerabilities, threats, and attacks)
Wi-Fi Technology
Web technology

What's hot (20)

PPTX
Wireless network security
PPTX
Types of cyber attacks
PPT
Network Security Threats and Solutions
PPTX
Hash function
PPTX
Encryption ppt
PPTX
Cryptography
PPTX
Data encryption
PPTX
Security services and mechanisms
PPTX
Cryptography
PPT
Intrusion detection system ppt
PPT
Information security and Attacks
PPT
Introduction To Computer Security
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
PPTX
Operating system security
PPTX
Malware ppt
PPTX
Security Mechanisms
PPTX
Cryptography
PDF
Presentation On Steganography
PPTX
What is Cryptography and Types of attacks in it
PPT
Security Attacks.ppt
Wireless network security
Types of cyber attacks
Network Security Threats and Solutions
Hash function
Encryption ppt
Cryptography
Data encryption
Security services and mechanisms
Cryptography
Intrusion detection system ppt
Information security and Attacks
Introduction To Computer Security
Cybersecurity Attack Vectors: How to Protect Your Organization
Operating system security
Malware ppt
Security Mechanisms
Cryptography
Presentation On Steganography
What is Cryptography and Types of attacks in it
Security Attacks.ppt
Ad

Similar to Types of attacks (20)

PPTX
typesofattacks-180418113629 255536155.pptx
PDF
Lec 01.pdf
PPT
Module-1.ppt cryptography and network security
PPTX
information security (network security methods)
PPTX
Information security ist lecture
PPTX
Unit 1-NETWORK Security.pptx............
PPTX
Information system security Unit 1.pptx
PPTX
Network security and cyber law (1).pptx
PPTX
CH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptx
PPTX
Chapter 1: Overview of Network Security
PPTX
cryptography introduction.pptx
PDF
Enhancement in network security with security
PDF
Enhancement in network security with security protocols
PPT
VIT311 Network Security Essentials Unit 1.ppt
PPTX
cryptography Threat - Attack presentation.pptx
PDF
BAIT1103 Chapter 1
PPTX
Computer Security Essentials.pptx
PDF
ch01.pdf
PDF
Chapter 1 Introduction of Cryptography and Network security
typesofattacks-180418113629 255536155.pptx
Lec 01.pdf
Module-1.ppt cryptography and network security
information security (network security methods)
Information security ist lecture
Unit 1-NETWORK Security.pptx............
Information system security Unit 1.pptx
Network security and cyber law (1).pptx
CH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptx
Chapter 1: Overview of Network Security
cryptography introduction.pptx
Enhancement in network security with security
Enhancement in network security with security protocols
VIT311 Network Security Essentials Unit 1.ppt
cryptography Threat - Attack presentation.pptx
BAIT1103 Chapter 1
Computer Security Essentials.pptx
ch01.pdf
Chapter 1 Introduction of Cryptography and Network security
Ad

Recently uploaded (20)

PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
Unit 5 BSP.pptxytrrftyyydfyujfttyczcgvcd
PDF
Digital Logic Computer Design lecture notes
PPT
Drone Technology Electronics components_1
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PPTX
Geodesy 1.pptx...............................................
PDF
composite construction of structures.pdf
PDF
ETO & MEO Certificate of Competency Questions and Answers
PPT
Project quality management in manufacturing
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
additive manufacturing of ss316l using mig welding
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PPTX
Fluid Mechanics, Module 3: Basics of Fluid Mechanics
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Unit 5 BSP.pptxytrrftyyydfyujfttyczcgvcd
Digital Logic Computer Design lecture notes
Drone Technology Electronics components_1
Embodied AI: Ushering in the Next Era of Intelligent Systems
Model Code of Practice - Construction Work - 21102022 .pdf
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Lesson 3_Tessellation.pptx finite Mathematics
Geodesy 1.pptx...............................................
composite construction of structures.pdf
ETO & MEO Certificate of Competency Questions and Answers
Project quality management in manufacturing
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
OOP with Java - Java Introduction (Basics)
bas. eng. economics group 4 presentation 1.pptx
additive manufacturing of ss316l using mig welding
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Arduino robotics embedded978-1-4302-3184-4.pdf
Fluid Mechanics, Module 3: Basics of Fluid Mechanics

Types of attacks

  • 1. INFORMATION AND NETWORK SECURITY (2170703) TYPES OF ATTACKS SUBMITTED TO : Prof. BRIJESH PATEL SUBMITTED BY : ASHKA SONI (140110107004) DHRUVIN R SHAH (140110107013) VIVEK GANDHI (140110107017)
  • 2. Definitions • Computer Security – Generic name for the collection of tools designed to protect data and to thwart hackers • Network Security – Measures to protect data during their transmission • Internet Security (our focus!) – Measures to protect data during their transmission over a collection of interconnected networks
  • 4. 3 Aspects of Information Security • Security Attack – Any action that compromises the security of information. • Security Mechanism – A mechanism that is designed to detect, prevent, or recover from a security attack. • Security Service – A service that enhances the security of data processing systems and information transfers. • Makes use of one or more security mechanisms.
  • 5. Computer Security Concept • Computer Security – The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources (includes hardware, software, information/data, and telecommunications).
  • 6. Computer Security Concept 1. Confidentiality preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. 2. Integrity Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity 3. Availability Ensuring timely and reliable access to and use of information.
  • 10. Passive Attacks • A passive attack is a network attack in which a system is monitored and sometimes scanned for open ports and vulnerabilities. The purpose is solely to gain information about the target and no data is changed on the target. • In passive reconnaissance, an intruder monitors systems for vulnerabilities without interaction, through methods like session capture. In active reconnaissance, the intruder engages with the target system through methods like port scans.
  • 11. Types of Passive Attacks • Interception Attack • TrafficAnalysisAttack
  • 12. Interception • The phenomenon of confidentiality plays an important role in this type of attack. The data or message which is sent by the sender is intercepted by an unauthorized individual where the message will be changed to the different form or it will be used by the individual for his malicious process. So the confidentiality of the message is lost in this type of attack. • It is also known as “Release of message contents”.
  • 14. Traffic Analysis • Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted and cannot be decrypted. In general, the greater the number of messages observed, or even intercepted and stored, the more can be inferred from the traffic. Traffic analysis can be performed in the context of military intelligence or counter-intelligence, and is a concern in computer security.
  • 17. Active Attacks • An active attack is a network exploit in which a hacker attempts to make changes to data on the target or data en-route to the target. • The purpose is to gain information about the target and no data is changed. However, passive attacks are often preparatory activities for active attacks.
  • 18. Types of Active Attacks • Masquerade Attack • Interruption Attack • FabricationAttack • Session ReplayAttack • ModificationAttack • Denial of Service (DOS)Attack
  • 19. Masquerade • In a masquerade attack, the intruder pretends to be a particular user of a system to gain access or to gain greater privileges than they are authorized for. A masquerade may be attempted through the use of stolen login IDs and passwords, through finding security gaps in programs or through bypassing the authentication mechanism.
  • 20. Interruptio n • This type of attack is due to the obstruction of any kind during the communication process between one or more systems. So the systems which are used become unusable after this attack by the unauthorized users which results in the wastage of systems.
  • 21. Fabrication • In this type of attack a fake message is inserted into the network by an unauthorized user as if it is a valid user. This results in the loss of confidentiality, authenticity and integrity of the message. Fabricate message
  • 22. Session Replay • In a session replay attack, a hacker steals an authorized user’s log in information by stealing the session ID.The intruder gains access and the ability to do anything the authorized user can do on the website.
  • 23. Modification • In a message modification attack, an intruder alters packet header addresses to direct a message to a different destination or modify the data on a target machine. Modify message
  • 24. Denial of Service (DOS) • In a denial of service (DoS) attack, users are deprived of access to a network or web resource. This is generally accomplished by overwhelming the target with more traffic than it can handle.