Ijsrp - Network Security DJ SANGHVI
Ijsrp - Network Security DJ SANGHVI
ISSN 2250-3153
Network Security
Priyank Sanghavi, Kreena Mehta*, Shikha Soni**
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 3, Issue 8, August 2013 2
ISSN 2250-3153
to vulnerabilities in the network. Understanding the security above the physical layer are also used to accomplish the network
issues of the internet greatly helps to develop secure solutions to security required. Authentication is performed on a layer above
protect the networks from the internet. the physical layer. Network security in the physical layer requires
failure detection, attack detection mechanisms, and intelligent
The types of attacks through the internet need to also be counter measure strategies [2].
studied to be able to detect and guard against them. Intrusion
detection systems are established based on the types of attacks
most commonly used. Network intrusions consist of packets IV. INTERNET ARCHITECTURE AND VULNERABLE
that are introduced to cause problems for the following reasons: SECURITY ASPECTS
To consume resources uselessly Fear of security breaches on the Internet is causing
To interfere with any system resource’s intended organizations to use protected private networks or intranets. The
function Internet Engineering Task Force (IETF) has introduced security
To gain system knowledge like passwords, logins that mechanisms at various layers of the Internet Protocol Suite [4].
can be exploited in later attacks These security mechanisms allow for the logical protection of
data units that are transferred across the network. The current
version and new version of the Internet Protocol are analyzed to
III. DIFFERENTIATING DATA SECURITY AND determine the security implications. Although security may exist
NETWORK SECURITY within the protocol, not all attacks are guarded against. These
Data security is the aspect of security that allows a client’s attacks are analyzed to determine other security mechanisms that
data to be transformed into unintelligible data for transmission. may be necessary.
Even if this unintelligible data is intercepted, a key is needed to The security architecture of the internet protocol known as IP
decode the message. This method of security is effective to a Security is a standardization of internet security. IP security, IP
certain degree. Strong cryptography in the past can be easily sec, covers the new generation of IP (IPv6) as well as the current
broken today. Due to advancement of hackers, cryptographic version (IPv4). Although new techniques, such as IP sec, have
methods have to develop constantly to be one step ahead. been developed to overcome internet’s best‐known deficiencies,
When transferring cipher text over a network, it is helpful to they seem to be insufficient [5].
have a secure network. This will allow for the cipher text to be
protected, so that it is less likely for many people to even attempt
to break the code. A secure network will also prevent someone
from inserting unauthorized messages into the network.
Therefore, hard ciphers are needed as well as attack‐hard
networks.
The relationship of network security and data security to the V. ATTACKS THROUGH THE CURRENT INTERNET
OSI model is shown in Figure 1. It can be seen that the PROTOCOL IPV4
cryptography occurs at the application layer; therefore the
application writers are aware of its existence. The user can 1. Common Internet Attack Methods
possibly choose different methods of data security. Network Common internet attacks methods are broken down into
security is mostly contained within the physical layer. Layers categories. Some attacks gain system knowledge or personal
information, such as eaves dropping and phishing. Attacks can
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 3, Issue 8, August 2013 3
ISSN 2250-3153
also interfere with the system’s intended function, such as 2. Technology for Internet Security
viruses, worms and trojans. The other form of attack is when the Internet threats will continue to be a major issue in the global
system’s resources are consumes uselessly, these can be caused world as long as information is accessible and transferred across
by denial of service (DoS) attack. Other forms of network the Internet. Different defense and detection mechanisms were
intrusions also exist, such as land attacks, surf attacks, and developed to deal with these attacks.
teardrop attacks. These attacks are not as well-known as DoS
attacks, but they are used in some form or another even if they 2.1 Cryptographic systems
aren’t mentioned by name. Cryptography is a useful and widely used tool in security
engineering today. It involved the use of codes and ciphers to
1.1 Eavesdropping transform information into unintelligible data. These
Interception of communications by an unauthorized party is unintelligible data is thus transferred in the network safely.
called eavesdropping. Passive eavesdropping is when the person
only secretly listens to the networked messages. On the other 2.2 Firewall
hand, active eaves dropping are when the intruder listens and A firewall is a typical border control mechanism or perimeter
inserts something into the communication stream. This can lead defense. The purpose of a firewall is to block traffic from the
to the messages being distorted. Sensitive information can be outside, but it could also be used to block traffic from the inside.
stolen this way [8]. A firewall is the frontline defense mechanism against intruders. It
is a system designed to prevent unauthorized access to or from a
1.2 Viruses private network. Firewalls can be implemented in both hardware
Viruses are self‐replication programs that use files to infect and software, or a combination of both [8].
and propagate [8]. Once a file is opened, the virus will activate
within the system. 2.3 Intrusion Detection Systems
An Intrusion Detection System (IDS) is an additional
1.3 Worms protection measure that helps ward off computer intrusions. IDS
A worm is similar to a virus because they both are systems can be software and hardware devices used to detect an
self‐replicating, but the worm does not require a file to allow it to attack. IDS products are used to monitor connection in
propagate [8]. There are two main types of worms, mass‐mailing determining whether attacks are been launched. Some IDS
worms and network‐ aware worms. Mass mailing worms use systems just monitor and alert of an attack, whereas others try to
email as a means to infect other computers. Network‐aware block the attack.
worms are a major problem for the Internet. A network‐aware
worm selects a target and once the worm accesses the target host, 2.4 Anti‐Malware Software and Scanners
it can infect it by means of a Trojan or otherwise. Viruses, worms and Trojan horses are all examples of
malicious software, or Malware for short. Special so‐called
1.4 Trojans anti‐Malware tools are used to detect them and cure an infected
Trojans appear to be benign programs to the user, but will system.
actually have some malicious purpose. Trojans usually carry
some payload such as a virus [8]. 2.5 Secure Socket Layer (SSL)
The Secure Socket Layer (SSL) is a suite of protocols that is
1.5 Phishing a standard way to achieve a good level of security between a web
Phishing is an attempt to obtain confidential information browser and a website. SSL is designed to create a secure
from an individual, group, or organization [9]. Phishers trick channel, or tunnel, between a web browser and the web server, so
users into disclosing personal data, such as credit card numbers, that any information exchanged is protected within the secured
online banking credentials, and other sensitive information. tunnel. SSL provides authentication of clients to server through
the use of certificates. Clients present a certificate to the server to
1.6 IP Spoofing Attacks prove their identity.
Spoofing means to have the address of the computer mirror
the address of a trusted computer in order to gain access to other
computers. The identity of the intruder is hidden by different VI. SECURITY ISSUES OF IP PROTOCOL IPV6
means making detection and prevention difficult. With the IPv6 is the next thing everyone’s talking about. From a
current IP protocol technology, IP‐ spoofed packets cannot be security point of view, IPv6 is a considerable advancement over
eliminated [8]. the IPv4 internet protocol Despite the IPv6’s great security
mechanisms; it still continues to be vulnerable to threats. Some
1.7 Denial of Service areas of the IPv6 protocol still pose a potential security issue.
Denial of Service is an attack when the system receiving too The new internet protocol does not protect against is configure
many requests cannot return communication with the requestors servers, poorly designed applications, or poorly protected sites.
[9].The system then consumes resources waiting for the
handshake to complete. Eventually, the system cannot respond to The possible security problems emerge due to the following:
any more requests rendering it without service. 1. Header manipulation issues
2. Flooding issues
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 3, Issue 8, August 2013 4
ISSN 2250-3153
www.ijsrp.org
International Journal of Scientific and Research Publications, Volume 3, Issue 8, August 2013 5
ISSN 2250-3153
used. The current development in network security is not very [4] Molva, R., Institut Eurecom,“Internet Security Architecture,” in Computer
Networks & ISDN Systems Journal, vol. 31, pp. 787‐804, April 1999
impressive.
[5] Sotillo, S., East Carolina University, “IPv6 security issues,” August 2006,
Originally it was assumed that with the importance of the www.infosecwriters.com/text_resources/pdf/IPv6_SSot illo.pdf.
network security field, new approaches to security, both [6] Andress J., “IPv6: the next internet protocol,” April 2005,
hardware and software, would be actively researched. It was a www.usenix.com/publications/login/2005‐04/pdfs/andress0504.pdf.
surprise to see most of the development taking place in the same [7] Warfield M., “Security Implications of IPv6,” Internet Security Systems
technologies being currently used. Combined use of IPv6 and White Paper, documents.iss.net/whitepapers/IPv6.pdf
security tools such as firewalls, intrusion detection, and [8] Adeyinka, O., "Internet Attack Methods and Internet Security Technology,"
authentication mechanisms will prove effective in guarding Modeling & Simulation, 2008. AICMS 08. Second Asia International
Conference on, vol., no., pp.77‐82, 13‐15 May 2008
intellectual property for the near future. The network security
[9] Marin, G.A., "Network security basics," Security & Privacy, IEEE , vol.3,
field may have to evolve more rapidly to deal with the threats no.6, pp. 68‐72, Nov.‐Dec. 2005
further in the future.
AUTHORS
REFERENCES
[1] Dowd, P.W.; McHenry, J.T., "Network security: it's time to take it
First Author – Priyank Sanghavi, Final Year - EXTC, D.J
seriously," Computer, vol.31, no.9, pp.24‐28, Sep 1998 Sanghvi College of Engineering, priyanksanghavi92@gmail.com
[2] Kartalopoulos, S. V., "Differentiating Data Security and Network Security," Second Author – Kreena Mehta, Final Year – IT, Sardar Patel
Communications, 2008. ICC '08. IEEE International Conference on, Institute of Technology, kreenasmehta@gmail.com
pp.1469‐1473, 19‐23 May 2008 Third Author – Shikha Soni, Final Year - EXTC, D.J Sanghvi
[3] “Security Overview,” www.redhat.com/docs/manuals/enterprise/RHEL‐4‐ College of Engineering, shiksoni92@gmail.com
Manual/security‐guide/ch‐sgs‐ov.html.
www.ijsrp.org