Skip to content

Securing Systems

Network Layer

Layer Protocol Attacks Solution
Application HTTP Machine-in-the-Middle attacks:
1. Script injection
2. Session hijacking using cookies
3. SSL/TLS Stripping: Redirecting to fake website
1. HSTS: Hint from server to browser to always use TLS
2. VPN
3. URL redirecting of suspicious links
HTTPS
(~SSL~TLS)
SSH
Transport Port Scanning Penetration testing
Network Unsecured Packet sniffing: Adversary can be on the same network, or using an antenna Firewall
Deep Packet Inspection
Proxy
Secured
WPA: Wi-Fi Protected Access

Attacks

  • Malware
  • Virus
  • Worm: virus that can transfer through port-scanning
  • Botnet
  • DDOS: Distributed Denial of Service
    • Attempt to disrupt normal services by flooding machines/networks with superfluous requests, typically at high volume and frequency
    • Can be directed at occupying bandwidth, drive space, or CPU
    • Source: one or distributed (botnet)
    • Features of Log
      • Duration
      • No of packets sent
      • No of received packets
      • Interval of sending packets
      • Interval of receiving packets
      • Upload speed by source
      • Download speed by destination
      • Label: Normal (0)/DDOS (1)
    • Challenges in Data
      • Labelling
        • They don't label themselves
        • Not definite if DDOS is happening
        • Labelling is expensive and time-consuming
      • Benign network traffic is variant across different infrastructures
        • University: students streaming videos
        • Enterprise: High SMTP load
  • Zero-day attacks

Solutions

  • Antivirus (with auto-updates)
    • Cannot handle zero-day attacks
Last Updated: 2024-12-26 ; Contributors: AhmedThahir, web-flow

Comments