A Review Paper on Network Security Attacks and Defences

Similar documents
Chapter 4. Network Security. Part I

Training UNIFIED SECURITY. Signature based packet analysis

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

Security Awareness. Presented by OSU Institute of Technology

Computer Security. Assoc. Prof. Pannipa Phaiboonnimit. Adapted for English Section by Kittipitch Kuptavanich and Prakarn Unachak

Management of IT Infrastructure Security by Establishing Separate Functional Area with Spiral Security Model

Objectives. Classes of threats to networks. Network Security. Common types of network attack. Mitigation techniques to protect against threats

Online Threats. This include human using them!

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.

CTS2134 Introduction to Networking. Module 08: Network Security

The Tension. Security vs. ease of use: the more security measures added, the more difficult a site is to use, and the slower it becomes

Securing Information Systems

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 1 Introduction to Security

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Chapter 10: Security and Ethical Challenges of E-Business

Malware, , Database Security

Ethics and Information Security. 10 주차 - 경영정보론 Spring 2014

SECURING INFORMATION SYSTEMS

Symantec Protection Suite Add-On for Hosted Security

Securing Your Business Against the Diversifying Targeted Attacks Leonard Sim

Computer Network Vulnerabilities

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

CERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES

Introduction to Security. Computer Networks Term A15

Quick Heal AntiVirus for Server. Optimized Antivirus Scanning. Low on Resources. Strong on Technology.

Seqrite Antivirus for Server

Discovering Computers Living in a Digital World

Chapter 1 B: Exploring the Network

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network

Technology in Action

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management

Chair for Network Architectures and Services Department of Informatics TU München Prof. Carle. Network Security. Chapter 8

3.5 SECURITY. How can you reduce the risk of getting a virus?

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

Security and Authentication

Office 365 Buyers Guide: Best Practices for Securing Office 365

Threat Modeling. Bart De Win Secure Application Development Course, Credits to

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems

Future-ready security for small and mid-size enterprises

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

Cyber Security Practice Questions. Varying Difficulty

Types Of Computer Virus Sources Of Virus Virus Warning Signs Virus Detection(Anti-Virus) Virus Prevention and Removal

Unit 2 Assignment 2. Software Utilities?

CEH: CERTIFIED ETHICAL HACKER v9

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

Network Security Issues and Cryptography

Proxy server is a server (a computer system or an application program) that acts as an intermediary between for requests from clients seeking

Securing Information Systems

All-in one security for large and medium-sized businesses.

CHAPTER 8 SECURING INFORMATION SYSTEMS

Seqrite Endpoint Security

Course Outline (version 2)

MESSAGING SECURITY GATEWAY. Solution overview

Ethical Hacking and Prevention

Introduction to Information Security Dr. Rick Jerz

Chapter 9. Firewalls

EC-Council C EH. Certified Ethical Hacker. Program Brochure

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

Chapter 6 Network and Internet Security and Privacy

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

COMPUTER NETWORK SECURITY

Personal Cybersecurity

Quick Heal Total Security

Chapter 12. Information Security Management

The Challenge of Spam An Internet Society Public Policy Briefing

Troubleshooting and Cyber Protection Josh Wheeler

ITU WSIS THEMATIC MEETING ON CYBERSECURITY, GENEVA, SWITZERLAND, 28 JUNE -1 JULY PAPER ON THE STATE OF CYBERSECURITY IN UGANDA.

Principles of ICT Systems and Data Security

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Security Gap Analysis: Aggregrated Results

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.

ClearPath OS 2200 System LAN Security Overview. White paper

E-Commerce Security Pearson Prentice Hall, Electronic Commerce 2008, Efraim Turban, et al.

HOW TO CHOOSE A NEXT-GENERATION WEB APPLICATION FIREWALL

Mobility, Security Concerns, and Avoidance

Technology in Action 12/11/2014. Cybercrime and Identity Theft (cont.) Cybercrime and Identity Theft (cont.) Chapter Topics

MTA Networking Fundamentals Exam.

Online Security and Safety Protect Your Computer - and Yourself!

Employee Security Awareness Training

THE BUSINESS CASE FOR OUTSIDE-IN DATA CENTER SECURITY

MEMORY AND BEHAVIORAL PROTECTION ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Free antivirus software download

Network Security Fundamentals

Hands-On Ethical Hacking and Network Defense 3 rd Edition

Securing Information Systems

Barracuda Advanced Threat Protection. Bringing a New Layer of Security for . White Paper

Get Max Internet Security where to buy software for students ]

ELECTRONIC BANKING & ONLINE AUTHENTICATION

Introduction. Logging in. WebMail User Guide

Fighting Spam, Phishing and Malware With Recurrent Pattern Detection

Education Network Security

Information Technology Enhancing Productivity and Securing Against Cyber Attacks

Security Policy (EN) v1.3

Security and Privacy. Xin Liu Computer Science University of California, Davis. Introduction 1-1

Elementary Computing CSC 100. M. Cheng, Computer Science

Intelligent and Secure Network

Transcription:

EUROPEAN ACADEMIC RESEARCH Vol. IV, Issue 12/ March 2017 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.4546 (UIF) DRJI Value: 5.9 (B+) A Review Paper on Network Security Attacks and ALLYSA ASHLEY M. PALAMING College of Computer Studies Masters in Information Technology (MIT) Tarlac State University Abstract: In this paper it involves the decision making in multiple levels and multiple time scales, given the limited resources available to both malicious attackers and administrators defending networked systems. Data security is the extreme critical factor in ensuring the transmission of information via the network. In this paper we study about various types of attacks on network security and how to handle or prevent this attack. There are more network security measure to protect the data from attackers like antivirus software, firewalls, cryptography etc. Network security is a challenging problem due to the complexity of underlying hardware, software, and network interdependencies. There was also a discussion about antivirus and internet security programs can protect a programmable device from malware by detecting and eliminating viruses; Antivirus software was mainly shareware in the early years of the Internet, but there are now several free security applications on the Internet to choose from for all platforms. Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, displaying political or humorous messages on the user's screen, spamming their contacts, logging, or even rendering the computer 10206

useless. Black hat or Cracker- The opposite of White Hat, this term is used to describe those individuals who use their knowledge of computer systems and programming skills. In the implementation of cloud antivirus involves scanning suspicious files using multiple antivirus engines which was an early implementation of the cloud antivirus concept called CloudAV. In online scanning to maintain websites with free online scanning capability of the entire computer, critical areas only, local disks, folders or files. Parallel scanning of files using potentially incompatible antivirus scanners is achieved by spawning a virtual machine per detection engine and therefore eliminating any possible issues. Periodic online scanning is a good idea for those that run antivirus applications on their computers because those applications are frequently slow to catch threats. Key words: network security, attack, network management, wireless sensor, network I. INTRODUCTION Network security is an important aspect in every field like government offices, educational institute and any business organization. Network security is a challenging problem due to the complexity of underlying hardware, software, and network interdependencies as well as human and social factors. It involves decision making in multiple levels and multiple time scales, given the limited resources available to both malicious attackers and administrators defending networked systems. The resources vary from bandwidth, computing, and energy at the machine level to manpower and scheduling at the organizational level. Data security is the extreme critical factor in ensuring the transmission of information via the network. Threats to data privacy are powerful tools in the hands of hackers that could use the vulnerabilities of a network to corrupt, destroy and steal the sensitive information. 10207

There are more network security measure to protect the data from attackers like antivirus software, firewalls, cryptography etc. In this paper we study about various types of attacks on network security and how to handle or prevent this attack. II. REVIEW AND ANALYSIS Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Some of the common forms of the Attacks are: computers virus, Spam pashing spyware, Adware, Hacking, Cracking, etc. These threats are primarily present due to the ignorance shown by the users, weak technology and bad design of the network.to protect data from such network viruses one of the network security measure is antivirus programmed. Virus - a computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected". Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, displaying political or humorous 10208

messages on the user's screen, spamming their contacts, logging, or even rendering the computer useless. As the types of threats, attacks, and exploits grow, various terms have been used to describe the individuals involved. Some of the most common terms are as follows: A. White hat- These are network attackers who looks for vulnerabilities in systems or networks and then reports these vulnerabilities to the owners of the system so that they can be fixed. They are ethically opposed to the abuse of computer systems. A white hat generally focuses on securing IT systems. B. Hacker- This is a general term that is used to describe a computer programming expert. These are normally used in a negative way to describe an individual that attempts to gain unauthorized access to network resources with malicious intent. C. Black hat or Cracker- The opposite of White Hat, this term is used to describe those individuals who use their knowledge of computer systems and programming skills to break into systems or networks that they are not authorized to use, this of course is done usually for personal or financial gain. D. Phreaker- This term is often used to describe an individual who manipulates the phone network in a bid to perform a function that is not allowed. The phreaker breaks into the phone network, usually through a payphone, to make free or illegal long distance calls. E. Spammer- This is often used to describe the persons who sends large quantities of unsolicited e-mail messages. Spammers often use viruses to take control of home computers and use them to send out their bulk messages. F. Phisher- Uses e-mail or other means to trick others into providing sensitive information, such as credit card numbers or passwords. A phisher masquerades as a trusted party that would have a legitimate need for the sensitive information. 10209

This part of the report explained the prevention measures such as: 1. Firewall - Firewalls impose restrictions on incoming and outgoing Network packets to and from private networks. Incoming or outgoing traffic must pass through the firewall; only authorized traffic is allowed to pass through it. Firewalls create checkpoints between an internal private network and the public Internet, also known as choke points (borrowed from the identical military term of a combat limiting geographical feature). How to Secure Your Network with Windows Firewall: A firewall is a hardware or software that monitors the traffic moving through a network gateway. Firewall can be configured to block or allow traffic based on defined criteria (ACLs). Firewalls blocks or allows random pings from a remote site to your computer or programs from your computer that attempts to access remote sites without your knowledge. A. Network firewalls: It prevents unknown programs and processes from accessing the system. However, they are not antivirus systems and make no attempt to identify or remove anything. They may protect against infection from outside the protected computer or network, and limit the activity of any malicious software which is present by blocking incoming or outgoing requests on certain TCP/IP ports. B. Hardware Firewalls: Hardware-based firewalls protect all the computers on your network. A hardware-based firewall is easier to maintain and administer than individual software firewalls. Hardware firewall integrated into a comprehensive security solution. In addition to a firewall, the solution should include virtual private network (VPN) support, antivirus, antispam, antispyware, content filtering, and other security technologies. 2. Antivirus - Antivirus and Internet security programs can protect a programmable device from malware by detecting 10210

and eliminating viruses; Antivirus software was mainly shareware in the early years of the Internet, but there are now several free security applications on the Internet to choose from for all platforms.antivirus software was originally developed to detect and remove computer viruses hence the name. Some Antivirus software also include protection from other computer thread, such as infected and malicious URL, spam, scan and phishing attacks, online identity (privacy), online banking attacks, social techniques, Advance Persistent Thread (APT),botnets DDoS attacks. III. RECAPITULATION AND CONCLUSION Antivirus works on a very basic principle; they can scan a file and then matches, its digital signature against the known malwares. If the signature is match in the database is reports, delete it or even disinfect it depending on the clients setting. This system however easy has a huge drawback, whenever a new malware found; it takes time before the antivirus database can be updated and during this period the malware can already take complete control of the system, disables the antivirus or even hides itself from the antivirus. To prevent this antivirus companies introduced a new system called online scanning and cloud antivirus. Cloud antivirus is a technology that uses lightweight agent software on the protected computer, while offloading the majority of data analysis to the provider's infrastructure. To implementing cloud antivirus involves scanning suspicious files using multiple antivirus engines which was an early implementation of the cloud antivirus concept called CloudAV. CloudAV was designed to send programs or documents to a network cloud where multiple antivirus and behavioral detection programs are used simultaneously in order to improve detection rates. Parallel scanning of files using potentially incompatible antivirus scanners is achieved by spawning a virtual machine 10211

per detection engine and therefore eliminating any possible issues. CloudAV is a solution for effective virus scanning on devices that lack the computing power to perform the scans themselves. In online scanning to maintain websites with free online scanning capability of the entire computer, critical areas only, local disks, folders or files. Periodic online scanning is a good idea for those that run antivirus applications on their computers because those applications are frequently slow to catch threats. Because of these two approaches digital signature is scanned across the database but also across millions of computer and servers across the world. IV. REFERENCES 1. Orbit-Computer Solutions.Com. 2. www.google.com 3. Network Security A Decision and Game-Theoretic Approach. 4. Cryptography and Network Security by Atul Kahate. 10212