Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

***Please Check Answer already given and add to*** Question: In this conference,

ID: 363981 • Letter: #

Question

***Please Check Answer already given and add to***

Question:

In this conference, we will focus on typical attacks in the Internet affecting confidentiality, integrity and availability at various layers: Layer 1: Physical; Layer 2: Link; Layer 3: Network; Layer 4: Transport, and Layer 5: Application. (This is IP Layering; in IP layering, roughly Session, Presentation and Application of the OSI layers are combined into a single Application layer). Pick one layer and describe typical attacks in that layer and the controls that are employed in the layer to minimize the attack or vulnerability that leads to the attack. For example, in the link and network layers, there can be packet sniffing attacks, in the IP (network layer), there could be spoofing attacks, and in various layers, there could be denial of service attacks. Be as specific and as complete as possible and cite your reference materials in your response. You may create a new topic for your response or respond to someone's topics expanding upon it or challenging it.

Answer:

The Transport layer provides services for both "connection-mode" transmissions and "connectionless-mode" transmissions. For connection-mode transmissions, a transmission may be sent or arrive in the form of packets that need to be reconstructed into a complete message at the other end. In the OSI model, the transport layer is the fourth layer of this network structure. Transport layer use two protocol TCP (Transmission Control Protocol) & UDP (User Datagram Protocol) which the attackers use for attack. TCP/IP is the most widely used protocol suite. (Rajwal, Band &Yadav 2013).

The following are attacks that can affect the Transport layer;

Session Hijacking

TCP Land Attack

UDP Flooding Attack

TCP & UDP Port Scanning Technique

BIND DNS

Mail Transport System

Session hijacking is specific to the transport layer in the network protocol stack. Session hijacking: Here, an adversary takes control over a session between two nodes. Since most authentication processes are carried out only at the start of a session, once the session between two nodes gets established, the adversary node masquerades as one of the end nodes of the session and hijacks the session. Transport Layer Security (TLS) is the successor of the Secure Sockets Layer (SSL) cryptographic protocol, and it provides secure communication of the datagrams of the transport layer protocols as part of an end-to-end connection across the network. TLS has been used for a wide-variety of applications like web browsing, electronic mail, voice-over-IP, instant messaging, etc.(Meghanathan).

Explanation / Answer

The layer 3(network layer) attacks are ping floods and a smurf attack.A ping flood attack is defined as a simple denial-of-service attack where the attacker overwhelms the victim with ICMP Echo Request (ping)packets. This means it is most effective by using the flood option of ping which sends ICMP packets as fast as possible without waiting for replies. Moreover, most implementations of ping require the user to be privileged in order to specify the flood option. It is most successful if the attacker has more bandwidth than the victim.As a result, it leads to a collection of pings causing flooding.

In order to overcome this attack, The most common cure to the ping flood attack is to simply ban the IP address from accessing your network.

On the other have we have the smurf attack.The Smurf attack is defined as a distributed denial-of-service attack in which large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim's spoofed source IP are broadcast to a computer network using an IP broadcast address. This can lead to a total inactivity and access to the resource.In order to overcome this attack, we can use a firewall which protects and prevents unauthenticated users from monitoring the data traffic flow.This helps to create data security and protection a great extent.