Ait Unit 3
Ait Unit 3
Ait Unit 3
On inspecting all packets for improper content, firewalls can restrict or prevent
outright the spread of networked computer worms and trojans. The additional
inspection criteria can add extra latency to the forwarding of packets to their
destination.
Application firewalls function by determining whether a process should accept
any given connection. Application firewalls accomplish their function by hooking
into socket calls to filter the connections between the application layer and the
lower layers of the OSI model. Application firewalls that hook into socket calls are
also referred to as socket filters. Application firewalls work much like a packet
filter but application filters apply filtering rules (allow/block) on a per process
basis instead of filtering connections on a per port basis. Generally, prompts are
used to define rules for processes that have not yet received a connection. It is
rare to find application firewalls not combined or used in conjunction with a
packet filter.[15]
Also, application firewalls further filter connections by examining the process ID
of data packets against a ruleset for the local process involved in the data
transmission. The extent of the filtering that occurs is defined by the provided
ruleset. Given the variety of software that exists, application firewalls only have
more complex rulesets for the standard services, such as sharing services. These
per process rulesets have limited efficacy in filtering every possible association
that may occur with other processes. Also, these per process rulesets cannot
defend against modification of the process via exploitation, such as memory
corruption exploits. Because of these limitations, application firewalls are
beginning to be supplanted by a new generation of application firewalls that rely
on mandatory access control(MAC), also referred to as sandboxing, to protect
vulnerable services.[16]
Proxies[edit]
Main article: Proxy server
A proxy server (running either on dedicated hardware or as software on a
general-purpose machine) may act as a firewall by responding to input packets
(connection requests, for example) in the manner of an application, while
blocking other packets. A proxy server is a gateway from one network to another
for a specific network application, in the sense that it functions as a proxy on
behalf of the network user.[1]
Proxies make tampering with an internal system from the external network more
difficult and misuse of one internal system would not necessarily cause a
security breach exploitable from outside the firewall (as long as the application
proxy remains intact and properly configured). Conversely, intruders mayhijack a
publicly reachable system and use it as a proxy for their own purposes; the proxy
thenmasquerades as that system to other internal machines. While use of
internal address spaces enhances security, crackers may still employ methods
such as IP spoofing to attempt to pass packets to a target network.
2 What is web-server? Name each type of web server and explain the
architecture of any one of them.
Developed by Apache Software Foundation, the Apache HTTP server is the most
popular web hosting server in the world today. This open source software can
be installed on virtually all operating systems including Windows, Linux, Mac OS
X, Unix, etc. 60% of server machines functional today run on the apache web
server.
2.
3.
Lighttpd
This is a free web hosting server software distributed along with the FreeBSD
operating system. The Lighttpd is considered fast, reliable and secure. It also
consumes lesser CPU power. Lighttpd web servers are also compatible with
Windows, Linux, Mac OS X, and Solaris operating systems.
4.
5.
Jigsaw Server
This is a free open source server for website hosting that comes straight from
the World Wide Web association. The Jigsaw web hosting server is written in
Java and supports both PHP programs and CGI scripts. It supports different
platforms like Linux, Mac OS X, Windows, Unix, FreeBSD, etc.
Although there are many other website hosting servers, the five mentioned
above are reputed for being most reliable and commonly used.
3 What are the types of attacks in terms of security? Explain DOS attack on
server.
Types of attack:
Classes of attack might include passive monitoring of communications, active
network attacks, close-in attacks, exploitation by insiders, and attacks through
the service provider. Information systems and networks offer attractive targets
and should be resistant to attack from the full range of threat agents, from
hackers to nation-states. A system must be able to limit damage and recover
rapidly
when
attacks
occur.
There are five types of attack:
Passive Attack
A passive attack monitors unencrypted traffic and looks for clear-text
passwords and sensitive information that can be used in other types of
attacks. Passive attacks include traffic analysis, monitoring of unprotected
communications, decrypting weakly encrypted traffic, and capturing
authentication information such as passwords. Passive interception of network
operations enables adversaries to see upcoming actions. Passive attacks result in
the disclosure of information or data files to an attacker without the consent or
knowledge of the user.
Active Attack
In an active attack, the attacker tries to bypass or break into secured systems.
This can be done through stealth, viruses, worms, or Trojan horses. Active
attacks include attempts to circumvent or break protection features, to introduce
malicious code, and to steal or modify information. These attacks are mounted
against a network backbone, exploit information in transit, electronically
penetrate an enclave, or attack an authorized remote user during an attempt to
connect to an enclave. Active attacks result in the disclosure or dissemination of
data files, DoS, or modification of data.
Distributed Attack
A distributed attack requires that the adversary introduce code, such as a
Trojan horse or back-door program, to a trusted component or software that
will later be distributed to many other companies and users Distribution attacks
focus on the malicious modification of hardware or software at the factory or
during distribution. These attacks introduce malicious code such as a back door
to a product to gain unauthorized access to information or to a system function
at a later date.
Insider Attack
Incomputing,
adenial-of-service(DoS)
ordistributed
denial-ofservice(DDoS)attack is an attempt to make a machine or network resource
unavailable to its intended users.
Although the means to carry out, the motives for, and targets of a DoS attack
vary, it generally consists of efforts to temporarily or indefinitely interrupt or
suspend services of a host connected to the Internet.
As clarification, distributed denial-of-service attacks are sent by two or more
persons, or bots, and denial-of-service attacks are sent by one person or system.
As of 2014, the frequency of recognized DDoS attacks had reached an average
rate of 28 per hour. [1]
Perpetrators of DoS attacks typically target sites or services hosted on highprofile web servers such as banks, credit card payment gateways, and even root
nameservers.
Denial-of-service threats are also common in business, [2] and are sometimes
responsible for website attacks. [3]
This technique has now seen extensive use in certain games, used by server
owners, or disgruntled competitors on games, such as popular Minecraftservers.
Increasingly, DoS attacks have also been used as a form of resistance. Richard
Stallman has stated that DoS is a form of 'Internet Street Protests. [4] The term is
generally used relating tocomputer networks, but is not limited to this field; for
example, it is also used in reference to CPU resource management.[5]
One common method of attack involves saturating the target machine with
external communications requests, so much so that it cannot respond to
legitimate traffic, or responds so slowly as to be rendered essentially unavailable.
Such attacks usually lead to a server overload. In general terms, DoS attacks are
implemented by either forcing the targeted computer(s) to reset, or consuming
itsresources so that it can no longer provide its intended service or obstructing
the communication media between the intended users and the victim so that
they can no longer communicate adequately.
Denial-of-service attacks are considered violations of the Internet Architecture
Board's Internet proper use policy, and also violate the acceptable use policies of
virtually all Internet service providers. They also commonly constitute violations
of the laws of individual nations. [citation needed]
The first demonstrated DDos attack was introduced by well known hacker Khan
C. Smith during a 1998 illegal Defcon event and later exposed for its use Botnet
mechanisms during a lawsuit filed by Earthlink [6] which claims has caused billions
in economic damages.
version
Description
The field that indicates
the version of the
certificate.
signature
issuer
validity
subject
The subjects
distinguished name of
the certificate.
Field
Description
fields only present in
version 3 certificates.
SSL Certificates have a key pair: a public and a private key. These keys work
together to establish an encrypted connection. The certificate also contains what
is called the subject, which is the identity of the certificate/website owner.
To get a certificate, you must create a Certificate Signing Request (CSR) on your
server. This process creates a private key and public key on your server. The CSR
data file that you send to the SSL Certificate issuer (called a Certificate Authority
or CA) contains the public key. The CA uses the CSR data file to create a data
structure to match your private key without compromising the key itself. The CA
never sees the private key.
Once you receive the SSL Certificate, you install it on your server. You also install
a pair of intermediate certificates that establish the credibility of your SSL
Certificate by tying it to your CAs root certificate. The instructions for installing
and testing your certificate will be different depending on your server.
Transport Layer Security (TLS) and its predecessor, Secure Sockets
Layer (SSL), arecryptographic protocols designed to provide
communication security over the Internet.[1] They useX.509 certificates and
hence asymmetric cryptography to authenticate the counterparty with whom
they are communicating, and to exchange asymmetric key. This session key is
then used to encrypt data flowing between the parties. This allows for
data/message confidentiality, and message authentication codes for message
integrity and as a by-product, message authentication. Several versions of the
protocols are in widespread use in applications such as web browsing, electronic
mail,Internet faxing, instant messaging, and voice-over-IP(VoIP). An important
property in this context isforward secrecy, so the short-term session key cannot
be derived from the long-term asymmetric secret key. [2]
As a consequence of choosing X.509 certificates,certificate authorities and
a public key infrastructureare necessary to verify the relation between a
certificate and its owner, as well as to generate, sign, and administer the validity
of certificates. While this can be more beneficial than verifying the identities via
a web of trust, the 2013 mass surveillance disclosures made it more widely
known that certificate authorities are a weak point from a security standpoint,
allowing man-in-the-middle attacks(MITM).[3][4]
In the Internet Protocol Suite, TLS and SSL encryptthe data
of network connections in the application layer. In OSI model equivalences,
TLS/SSL is initialized at layer 5 (session layer) and works at layer 6
(the presentation layer).[citation needed] The session layer has a handshake using an
asymmetric cipher in order to establish cipher settings and a shared key for that
session; then the presentation layer encrypts the rest of the communication
using a symmetric cipher and that session key. In both models, TLS and SSL work
on behalf of the underlying transport layer, whose segments carry encrypted
data.