Vous êtes sur la page 1sur 4

Common Network Attack Types and Defense Mechanisms

Resul Daş Abubakar Karabade Gurkan Tuna


Department of Software Department of Software Department of Computer
Engineering, Technology Faculty Engineering, Technology Faculty Programming, Trakya University,
Firat Univ., 23119 Elazığ, Turkey Firat Univ., 23119 Elazığ, Turkey 22020, Edirne, Turkey
rdas@firat.edu.tr karabadeabubakar@gmail.com gurkantuna@trakya.edu.tr

Abstract – For every organization having a well secured II. NETWORK ATTACKS AND DEFENSE
network is the primary requirement to reach their goals. A TECHIQUES
network is said to be secure if it can protect itself from
The network attacks are used to disrupt and exhaust the
sophisticated attacks. Due to the rapid increase in the number of
legitimate traffic and in this way prevent the users from
network users, security becomes the main challenge in the area of
accessing sensitive data. This section analyzes common
network field. Most security related threats target the layers of the
OSI reference model. Sophisticated attack types such as
network attack types which are directed to the OSI reference
Distributed Denial of Service (DDoS), Man-in-the-Middle and IP
model and reviews defense techniques against these attack
spoofing attacks are used to attack these layers. In this paper, we types.
analyze most of the attack types that cause serious problems in
computer networks and defense techniques to stop or prevent A. MAC Flooding Attacks
these attacks. Media Access Control (MAC) can be seen as an identifier given
to the network interfaces to provide communication in a
Keywords: Network attacks; network defense mechanisms; physical network segment. MAC flooding attack is an attack
attack analysis; attacks detection. technique used to compromise the security of a network switch.
As shown in Figure 1, in a MAC flooding attack, a network
I. INTRODUCTION switch is fed many Ethernet frames by the attacker with
The Open Systems Interconnection (OSI) reference model different source MAC addresses. The aim is to consume the
consists of seven of layers and plays a key role in computer limited memory set aside in the switch and in this way force
networks. In the OSI reference model, each layer performs legitimate MAC addresses out of the MAC address table. As a
different tasks and passes the packet to the next layer until it result, the switch becomes unable to learn new MAC address
reach to the destination layer: physical or application layer. In and large quantities of incoming frames are flooded out on all
the last decade, computer networks have started to be ports. Therefore, attackers can hear the traffic flow through the
switch [3, 4].
widespread. However, in parallel with this and due to the
change in the information security space, security-related Defense Mechanisms: To mitigate MAC flooding attacks,
concerns have arisen severely due to the increasing awareness switch-related counter measures are used.
among people. Different from the past when simple exploitation
to deface web sites or a destructive worm was the norm, Port security: It allows network administrators to specify the
nowadays, most attackers try to access to sensitive data [1]. The number of MAC addresses for a particular switch port.
techniques used by talented attackers are efficient that they are
IEE 802.1X suite Application: It provides packet filtering rules
hardly visible and generally not noticed. Due to these reasons,
to be installed.
many organizations are concerned about how they will protect
their network against the attackers and hackers, and provide
confidentiality, integrity and availability of their valuable data
[2].
Source MAC : xxx.xxx.xxx
Source MAC : xxx.xxx.xxx
In this paper, common network attack types and defense Source MAC : xxx.xxx.xxx
mechanisms that can be used to prevent these attack types from
damaging computer networks are analyzed. The remainder of
this paper is as follows. Common network attack types and Attacker floods the CAM table
with malicious invalid source
defense techniques to stop or prevent these attack types are Attacker
MAC address.
reviewed in Section II. Section III concludes the paper.
Fig. 1. MAC Flooding Attacks

978-1-4673-7386-9/15/$31.00 ©2015 IEEE


B. IP Spoofing Attack Defense Mechanism: To prevent session hijacking attacks,
Internet Protocol (IP) spoofing attack or IP address spoofing is router based filters or intrusion detection tools are used.
the creation of IP packets with a source IP address. Its aim is to
conceal the identity of the sender or impersonate another String as Session key: It prevents an attacker from guessing a
computing system [5, 6]. As shown in Figure 2, this way, a valid session key through the Brute Force attack.
“backdoor” is created and hackers are allowed to have access to
Encryption: It prevents the attacker from learning valid IP
the destination host. The figure 2 shows IP spoofing attacks.
addresses.

D. Man-in-the-Middle Attacks
User1 As shown in Figure 4, Man-in-the-Middle Attack is an attack
192.102.45.0 type where the attacker secretly relays and possibly alters the
communication between two communicating parties who
believe they are directly communicating with each other [9, 10].

User2 Server
193.145.0.129 195.45.12.10
Attacker

IP Spoofing
Attacker Source

Router
Fig. 2. IP Spoofing Attack

Defense Mechanism: To mitigate or prevent IP spoofing


attacks, router based filters or intrusion detection tools are used. Destination

Router based filter: It is done by matching incoming traffic Fig. 4. Man-in-the-Middle Attack
interface with associated normal interface of IP source traffic in
the MAC table. Defense mechanism: Man-in-the-Middle Attacks are generally
prevented using cryptographic techniques.
Intrusion detection tools: Bad ARP messages are maintained
and the stability of the MAC table is detected. E. DHCP Starvation Attack
As shown in Figure 5, Dynamic Host Configuration Protocol
C. Session Hijacking Attacks (DHCP) starvation attacks work by broadcasting DHCP
Session hijacking can be described as the exploitation of a requests with spoofed MAC addresses. If enough requests are
valid computer session to gain unauthorized access to sent, the network attackers can exhaust the address space
information or services in a computer system. As shown in available to the DHCP servers for a period of time [11, 12].
Figure 3, when the attacker accesses the session, he pretends to Since the clients are starved of the DHCP resources, DHCP
be the original user and can do whatever the original user is starvation attack can be classified as a Denial of Service (DoS)
authorized to do on the network [7, 8]. attack. Then, the attackers can set up a rogue DHCP server on
the system and in this way force the clients to use the rogue
DHCP server. They can also perform man- in-the-middle
Session ID
attacks or sniff packets by simply setting their machine as the
default gateway.
Server
victim
Defenses Mechanism: To prevent DHCP starvation attacks,
Sniffing good session DHCP snooping technique is employed.
1. Reducing the number of MAC address allowed on the
switch ports.
2. Limiting the number of hosts allowed on the switch ports.
Attacker
Fig. 3. Session Hijacking Attacks
1. Volume based attacks: They generally include ICMP
floods and User Datagram Protocol (UDP) floods and aim
DHCP Server
DHCP Server
at consuming the bandwidth of the victim host.
DHCP Server
2. Protocol based attacks: They generally include SYN
floods, fragmented packet attacks, Ping of death attacks,
Router
and Smurf attacks.
Client 3. Application layer based attack: Zero-day attack is an
example of application layer based attack. It is generally
Attacker sends many
difference DHCP request targeted to Windows and Apache servers. Figure 7
with many MAC address illustrates a DDoS attack.

Attacker
Fig. 5. DHCP Starvation Attack.

F. ICMP Attack Zombies


While Internet Control Message Protocol (ICMP) is commonly
used for diagnostic purposes, error reporting and querying
servers, it is now used by attackers for malicious goals. As
shown in Figure 6, ICMP attacks are realized by sending Server
Attacker Internet
spoofed ICMP messages from the original host gateway to the
destination in order to intercept the packets [13, 14].

Fig. 7. DDoS attack


Victim
Defense mechanism: To prevent or mitigate DDoS attacks, a
The attacker sends compromise packet number of devices and techniques including firewall, IDS, IP
trace back, push back and Packet filters can be used. These
defense mechanisms typically limit the rate of traffic.

H. Telnet Attack
The telnet protocol does not have a built-in encryption
mechanism and is unsecure. Therefore, its weaknesses can be
ICMP responses message then forwards used by the attackers to get remote access to the network system
and compromise the network.

Defense mechanism: To prevent Telnet attacks, a number of


Attacker techniques including the use of strong passwords, shutting
down unused ports, controlling physical access device, IDS and
Fig. 6. ICMP Attack firewalls can be used.
Defense Mechanism: To prevent or mitigate ICMP attacks,
generally Intrusion Detection System (IDS) and firewalls are İ. Wireless Evil Twin Attack
used. While the availability of Wi-Fi provides great flexibility and
availability to network users, it provides an opportunity to
G. DoS/DDoS Attack attackers to use unsecure services to attack the organizations.
Denial of Service (DoS) or Distributed DoS (DDoS) attack is Basically, the evil twin attack can imitate any hot spot Wi-Fi.
an attempt to make a server or network resource unavailable to Then, the attacker can make the hot spot Wi-Fi like free network
its intended users.A DoS attack can be seen as a set of attempts service and the connected users become open to numerous
to temporarily or permanently interrupt or suspend services of attacks [21].
a server connected to the Internet [15-17].
Different from DoS attacks, DDoS attacks are indirectly Defense mechanism: To prevent wireless evil attacks, multi-
launched with many compromised system [18-20].The DDoS hop detection can be used.
attacks divided into three categories:
III. CONCLUSION [18] Sandeep, Rajneet.(2014). “ A Study of DoS & DDoS – Smurf Attack and
Preventive Measures”, “International Journal of Computer Science and
In this paper, we reviewed common and well-known network Information Technology Research”, Vol. 2, 1-6.
attack types directed to computer networks. We specifically [19] Beitollahi, H., Deconinck, G.(2012). “A Four-Step Technique for
paid attention to and analyzed network attack types used to Tackling DDoS Attacks”, “The 3rd International Conference on Ambient
Systems, Networks and Technologies (ANT-2012)”, Procedia Computer
eavesdrop traffic, manipulate data and deny the flow of Science 10 ( 2012 ) 507 – 516, 1-10.
information, which include MAC flooding attacks, DHCP [20] Gündüz, M.Z., Daş, R., "Kablosuz Yerel Alan Ağlarına Sızma
starvation attack, IP spoofing and DDoS attacks. In addition, we Uygulaması ve Temel Güvenlik Önerileri", 7. Uluslararası Bilgi
Güvenliği ve Kriptoloji Konferansı (7th International Conference on
investigated defense mechanisms used to protect computer Information Security and Cryptology - ISCTURKEY 2014), pp.295-300,
networks against the most common attack types. In the future 17-18 Ekim 2014, İstanbul Teknik Üniversitesi, İstanbul.
work of this study we are planning to simulate the most [21] Salsabil, Um, Tanseer, m, al, manrul, MD, Is A pratical approach to asses
a fatal attacks in enterprise newtowrk to identify effective mitigation
common attack types and analyze their behavior in a set of case techaniques (2014) . 1-8.
studies.

REFERENCES
[1] Futoransky, A., Notarfrancesco,L., Richarte, G., Sarraute C.(2003)
“Building Computer Network Attacks”, “Core Security Technologies” 1-
10.
[2] Yang, G., “Introduction to TCP/IP Network Attacks”, 1-10., 2010.
[3] Buhr, A., Lindskog, D., Zavarsky, P., Ruhl R., “Media Access Control
Address Spoofing Attacks against Port Security”, 1-8., 2011.
[4] Lundberg, S., “VLAN Hopping”, “Advanced LAN Technologie” 1-8.,
2014.
[5] Abdur Rahman, Md. F., Kamal, P., “Holistic Approach to ARP Poisoning
and Countermeasures by Using Practical Examples and Paradigm”,
“International Journal of Advancements in Technology”,Vol. 5, 1-10.,
2014.
[6] Bruschi, D., Ornaghi, A., Rosti, E. (2013). “S-ARP: A Secure Address
Resolution Protocol”, “Italian Dept. of Education and Research F.I.R.S.T.
Project”, 1-9.
[7] Prasad, B., K., M., Reddy, A., R., M., Venugopal R., K., “DoS and DDoS
Attacks: Defense, Detection and Traceback Mechanisms -A Survey”,
“Global Journal of Computer Science and Technology: E Network, Web
& Security”, Vol. 14, 1-19., 2014.
[8] Choudhary, Kavita, Meenaksh, and Shilpa. Smurf Attacks: Attacks Using
ICMP (2011): 1-3, 2011.
[9] Duany, Z., Yuan, X., Chandrashekar, J., “Controlling IP Spoong Based
DDoS Attacks Through Inter-Domain Packet Filters”, “IEEE INFOCOM
2006”, Vol. 5, 1-30, 2006.
[10] Mirkovic, J., Jevtic, N., Reiher, P., “A Practical IP Spoofing Defense
through Route-Based Fltering”, 1-14, 2005.
[11] Geneiatakis, D., Vrakas, N., Lambrinoudakis, C. (2009). “ Utilizing
Bloom Filters for Detecting Flooding Attacks against SIP Based
Services”, “Computer security”, 1-14.
[12] Maj, S. P., Veal, D., Makasiranondh, W. (2010). “Using State Model
Diagrams to Manage Secure Layer 2 Switches”, “International Journal of
Computer Science and Network Security”, Vol. 10, 1-4.
[13] Prasad, B., K., M., Reddy, A., R., M., Venugopal R., K. (2014). “DoS
and DDoS Attacks: Defense, Detection and Traceback Mechanisms -A
Survey”, “Global Journal of Computer Science and Technology: E
Network, Web & Security”, Vol. 14, 1-19.
[14] Karabade, A., Daş, R., “Analysis of the Data Link and Network Layer
Attacks and Defence Mechanisms”, The Third International Symposium
on Digital Forensics and Security (ISDFS 2015), 11-12 May, 2015, Gazi
University, Ankara.
[15] Gtakhbayar, N., Battulga, D., Sodbileg, Sh. (2012). “Classification of
Artificial Intelligence IDS for Smurf Attack”, “International Journal of
Artificial Intelligence & Applications (IJAIA)”, Vol. 3, 1-5.
[16] Alomar, E., Gupta, B., B., Ppayah, S., K. (2012). “Botnet-based
Distributed Denial of Service (DDoS) Attacks on Web Servers:
Classification and Art”, 1-6.
[17] Elleithy, K., M.(2011). “Denial of Service Attack Techniques: Analysis,
Implementation and Comparison”, “Systemics, Cybernetics and
Informatics”, Vol. 3, 1-6.

Vous aimerez peut-être aussi