Subject Web Engineering Presentation Topic: "Network Attacks"
Subject Web Engineering Presentation Topic: "Network Attacks"
Subject Web Engineering Presentation Topic: "Network Attacks"
Web Engineering
---------------------------------------------------------------------
Presentation Topic
“NETWORK ATTACKS”
---------------------------------------------------------------------
Presented by
---------------
---------------
Abdul Basit Khan
(2551 – 2018)
Presentation Overview
• Network Attacks
• Types of Network Attacks
• Discussing Basic Network Attacks
• Prevention Techniques Against Them
• Conclusion
Introduction
• Active
• Passive
Types of Network Attacks
Passive Attack: Attackers gain access to a network and can monitor or steal sensitive information, but without
making any change to the data, leaving it intact.
Active Attack: Attackers not only gain unauthorized access but also modify data, either deleting, encrypting or
otherwise harming it
Basic Network Attacks
• A brute force attack, also known as an exhaustive search, is a cryptographic hack that relies on guessing possible
combinations of a targeted password until the correct password is discovered. The longer the password, the
more combinations that will need to be tested.
• Hybrid brute force attacks: these hackers blend outside means with their logical guesses to attempt a break-in.
A hybrid attack usually mixes dictionary and brute force attacks. These attacks are used to figure out combo
passwords that mix common words with random characters.
2- Malware Attack:
All an attacker needs to do is inject malware into the computer, which will then install itself into the browser without
the user's knowledge. The malware will then record the data that is being sent between the victim and specifically
targeted websites
Basic Network Attacks
3- DDoS Attack:
• A denial-of-service (DoS) attack is a tactic for overloading a machine or network to make it unavailable.
• The DDoS attack alone doesn’t allow the malicious hacker to breach the security but will temporarily or
permanently render the site offline.
• A botnet usually creates a vast number of requests, which is distributed among previously infected computers.
• E.g. buffer overflow attack, SYN flooding, HTTP get Request Flooding, Ping of death.
Basic Network Attacks
• Use Load Balancing – (Load balancers also add resiliency by rerouting live traffic from one server to another if a
server falls prey to DDoS attacks or otherwise becomes unavailable.)
• Handle Spikes in Traffic – (Use Content Delivery Network “CDN” {enhances the response time})
Basic Network Attacks
4- IP Spoofing:
• n IP spoofing, a hacker uses tools to modify the source address in the packet header to make the receiving
computer system think the packet is from a trusted source, such as another computer on a legitimate network, and
accept it.
• This type of attack is common in Denial-of-Service (DoS) attacks, which can overwhelm computer networks with
traffic.
• A variation on this approach uses thousands of computers to send messages with the same spoofed source IP
address to a huge number of recipients. The receiving machines automatically transmit acknowledgement to the
spoofed IP address and flood the targeted server.
Basic Network Attacks
• While IP spoofing can’t be prevented, measures can be taken to stop spoofed packets from infiltrating a network.
• Ingress filtering is a form of packet filtering usually implemented on a network edge device which examines
incoming IP packets and looks at their source headers. If the source headers on those packets don’t match their
origin or they otherwise look fishy, the packets are rejected.
Basic Network Attacks
5- SQL Injection Attacks:
• When an attacker finds out that input fields are not sanitized properly, he can add SQL strings to maliciously craft
a query which is executed by the web browser.
• He may store malicious/unrelated data in the database; when the website is requested, it will show irrelevant data
on the website, thus displaying a defaced website.
6- Phishing Attacks:
• Phishing Attack is the practice of sending emails that appear to be from trusted sources with the goal of gaining
personal information or influencing users to do something.
• It could involve an attachment to an email that loads malware onto your computer.
• It could also be a link to an illegitimate website that can trick you into downloading malware or handing over
your personal information.
Conclusion
“Let’s face it: the future is now. We are already living in a cyber society, so we need to stop ignoring it or pretending
that is not affecting us.”
-Marco Ciapelli
THANK YOU
---------------------------------------------------------------------
ANY QUERIES???
Feel free to Ask..!!