Computer Network Security and Attacks on Wireless Sensor Network, Hacking Issues PDF
Document Details
Uploaded by Deleted User
Tags
Related
- Chapter 11 - 04 - Discuss and Implement Wireless Network Security Measures - 02_ocred.pdf
- Chapter 11 - 01 - Understand Wireless Network Fundamentals - 02_ocred_fax_ocred.pdf
- Chapter 11 - 02 - Understand Wireless Network Encryption Mechanisms - 03_ocred_fax_ocred.pdf
- Chapter 11 - 04 - Discuss and Implement Wireless Network Security Measures - 03_ocred_fax_ocred.pdf
- Combined Question Set - Past Paper PDF
- Secure Networks Chapter 4-3 PDF
Summary
This document discusses computer network security, focusing on the attacks and issues related to wireless sensor networks and hacking. It provides an overview of the topic, including background information and different types of hackers.
Full Transcript
Computer Network Security and Attacks on Wireless Sensor Network , Hacking issues Agenda as follows TYPESOF HACKER BASIC NEEDFOR BACKGROU...
Computer Network Security and Attacks on Wireless Sensor Network , Hacking issues Agenda as follows TYPESOF HACKER BASIC NEEDFOR BACKGROUND ATTACKS ONWNS -Hacking methods HACKING INTRODUCTION -Security goals -Attacks on WNS & Solutions -Prevention on hacking -Hacker goals Computer network security --Securitychallenges -Conclusion & References This is the study aims to how to secure computer network. In the network security cybercrime technologies have brought many good things to prevent hacking. As with most technological advances, there is also an other side: criminal hackers. Governments, companies, and private citizens around the world are anxious to be a part of this revolution, but they are afraid that some hacker will break into network. This seminar describes ethical hackers: their skills, their attitudes, and how they go about helping their customers find and plug up security holes. “HACKING” ?A word which shakes every one. Some rules that he should learn to become an Ethical Hacker which is also called as penetrate testing. These rules include knowledge of HTML, Java Scripts, Computer Tricks, Cracking & Breaking etc. In this seminar explains about the hacking techniques and the functions of how it takes place in the network and the methods to be solved. 1.Introduction Computer Network Security Computer Networks Security is becoming more important nowadays because of increasing demand for internet based technologies. The increase in users‟privacy concerns is related to the increasing use of the internet A user may find security mechanisms unnecessary and neglect using them, which might lead to Using Peer to Peer Client server security breaches in certain systems or simply loss Architecture of privacy of the user. Architecture Architecture Using architecture In peer- to-peer all nodes In client-server also we can classify Today everyone use computer networks to share can communicate with architecture aspecific the networks. each other without any resource and to exchange information. This node can act as a NT Widely known computer network can be classified into many types specific server node to Domain Controller, architectures are based on the properties like protocol, topology and control. which controls all the peer-to peer and nodes of anetwork. architecture. client-server.. It is suitable for small companies or institutions All the nodes can login where the number of to the server to get a nodes is less. Generally specific service. The We study the computer network security and concept of hackingissues. this type of architecture Because of security used to shareresources. reasons many big companies uses this type of architecture. 2. Background Security Goals: When dealing with security in WSNs, we mainly focus on the problem of achieving some of all of the following security contributes or services: CONFIDENTIALITY INTEGERITY Confidentiality refers to data in transit to be Integrity measures that the received data is kept secret fromeavesdroppers. Here not altered in transit by an adversary. symmetric key ciphers preferred for their low power consumption. NON-REPUDIATION AUTHENTICATION It denotes that a node cannot deny sending a Authentication enables a node to ensure the message it has previously sent identity of the peer with which it is communicating. DATAFRESHNESS AVAILABILITY & AUTHORIZATION It suggests that the data is recent, and it The service should be available all the time ensures that no old messages have been and It ensures that only authorized nodescan replayed. be accessed to network services or resources. Security Challenges: The above goals are not ensured by traditional security techniques. Therefore, new security measures are needed to address the specific security challenges of wireless sensor networks. We summarize security challenges in sensor networks as follows Sensor network deployment Minimizing resource Large scale and Node adding and failure renders more link attacks consumption and node mobility make make the network topology maximizing security Wireless communication the affair more dynamic. performance. characteristics render complex. traditional wired-based security schemes unsuitable. 3. Attacks on wireless sensor network Attacks and Solution: Comparable to any wireless network, WSNs are suffering from many different attacks. In this section, PHYSICALLAYER we introduce the major attacks to WSNs. Jamming. One of the attacks interfering with the radio frequencies that a network's nodes are using is DATALINK LAYER jamming soln: Frequency hoping & code spreading. Collision. A collision occurs when two nodes attempt to transmit on the same frequency simultaneously. Tampering, If a physical access is given to a node, an attacker can draw sensitive information Exhaustion. Repetitivecollisions can also be made such as cryptographic keys or other data on the use of by an attacker to cause resource depletion. node. NETWORKLAYER TRANSPORT LAYER Selective Forwarding. A malicious node attempts Flooding. An attacker may make new connection to block the packets in the network by rejecting to requests over and over until the resources required by forward or drop the messages passing through each connection are depleted or reached a maximum them. limit Soln: Using multiple paths & detect malicious node. Desynchronization. The adversary repetitively pushes Wormholes Attacks. an attacker gets packets at messages which convey sequence numbers to one or one point in the network, “tunnels” them to another both of the endpoints. point in the network, and then replays them into the network from that point. SECUTIRYPROTOCOL Soln: Encryption & Authentication helps to prevent TinySec & MiniSec have used the Skipjack the Wormholeattack algorithm of 80-bit size TinySec cannot prevent ENCRYTIONALOGORITHM & OPERTION MODES message retransmission attacks while MiniSec cannot guarantee data integrity RC5, DES,AES block encryption algorithm & RC2,RC4 bit stream IEEE 802.15.4 has been used in WSN due to its encryption algorithm isused. low energy consumption, low cost, and flexibility. ECB, CBC, OFB, CTR, OCB mode are used. for data confidentiality, the key size should be at 4. TYPES OFHACKER 1 3 2 BLACK HATHACKER GREYHATHACER WHITE HAT HACKER Also referred as cracker A BlackHat They are Skilled Hacker who Also referred as Ethical Hacker or Hacker's intention is to break into sometimes acts legally and sometimes called as Sneakers. A others Network, and wish to secure sometime not. In simple word WhiteHat Hacker mainly focuses on his own machine. you may call a Grey Hathacker securing corporate Network from They often use different techniques as Hybrid between White Hat outsider threat. for breaking into systems which can and Black Hat hacker They are with good intention that involve advanced programming skills fights against BlackHat. and social engineering PREVENTIONS Hacking Preventions: Check the URL when login into any social networks and else to prevent from such attacks it is sufficient if we just see the source code and find the word “action” and see the task related to it. EMAIL SPOOFING This represents the act of fake emails that we receive in our mail box saying that 01 they are from some higher authority and ask for your username and password. This can also be associated to phishing. BRUTE FORCEATTACKS A brute force attack consists of trying every possible code, combination, or 02 password until you find the right one. The hacker tries out different combinations of dictionary to match the username and password. So if they match, the account is under control of the hacker. The difficulty of a brute force attack depends on severalfactors. KEYLOGGING 03 Keystroke logging (often called key logging) is a method of capturing and recording user keystrokes. The technique and name came from before the era of the graphical user interface; loggers nowadays would expect to capture mouse operations and screenshots KEYLOGGER 04 Key loggers come in two types: hardware and software. A hardware key logger can be fitted between the keyboard cable and the computer and can be activated with a few keystrokes. A software key logger is installed on a system and effectively has the same function, however, it is a little bit more complex to use since it must be installed to run stealthily to be effective PACKET SNIFFING 05 A sniffer is a piece of software that's grabs information "packets‟ that travel along a network. That network could be running a protocol, such as Ethernet, TCP/IP, or others.The purpose of sniffer is to place the network interface into "promiscuous‟ mode and, by doing so, capture all network traffic 5. BASIC NEED FOR HACKING Skill sets How to secure yourself (proxy, hiding Ip etc) Learn how to make a few batch FTPTCP/IP, UDP, DHCP Learn to use a UNIX Operating files Get your hands dirty with networking System Learn DOS Learn how to use Exploits and compile them Learn about hardware- basically Learn Artificial intelligence, how your computerworks embedded programming. Learn about different types of software Port scanning. Learn a few programming languagesHTML, C++, Python, Perl HACKING GOALS Then following are the main goals of the hackers in which it can be processed by means of ethical hacking Home computers Business Data bases Web site defacing Software theft ISPs Hacktivism DDOS Computer time Theft of intellectualproperty Corporate espionage Access Info warfare Creditcards Web site defacing Computer control GOALS CONCULSION In this presentation, a survey is given on existing attacks in wireless networks. covered the countermeasures and potential solutions against those attacks, and mentioned some open research issues This presentation helps the readers to have better view of attacks and countermeasures in networks, and find their way to start secure designs for these networks. And also Hacking is now an issue that does not have any conclusion. The only way we can stop a hacker is by learning hacking. By learning we can read the minds of a hacker which enables us to know the reality. Hacking is not a crime but It is made a crime by misusing the knowledge of programming. Every hacker is a perfect programmer even more than a normal programmer. Everyone should know the ethics of hacking and follow them to be safer. THANK YOU