Free Essay

Icmp Research Paper

In:

Submitted By shwetajjw
Words 2311
Pages 10
ICMP Vulnerabilities and its Countermeasures
By
Shweta Jhunjhunwala (MITS,Lakshmangarh)
Kriti Goenka (MITS, Lakshmangarh)
Sandeep Tanwar (GPMCE,IP University, Delhi)

Abstract:
To prevent distributed denial of service (dDoS) attack via ICMP (ping).

1. Introduction
ICMP or The Internet Control Message Protocol is the de facto protocol used to communicate error messages reporting errors that might have occurred while transferring data over networks. ICMP messages are sent in several situations: for example, when adatagram cannot reach its destination, when the gateway does not have the buffering capacity to forward a datagram, and when the gateway can direct the host to send traffic on a shorter route.

The purpose of these control messages is to provide feedback about problems in the communication environment, not to make IP reliable.There are still no guarantees that a datagram will be delivered or a control message will be returned.Some datagrams may still be undelivered without any report of their loss.The higher level protocols that use IP must implement their own reliability procedures if reliable communication is required.

The ICMP messages typically report errors in the processing of datagrams.To avoid the infinite regress of messages about messages etc., no ICMP messages are sent about ICMP messages.Also ICMP messages are only sent about errors in handling fragment zero of fragemented datagrams.(Fragment zero has the fragment offeset equal zero). ICMP messages are typically generated in response to errors in IP datagrams (as specified in RFC 1122) or for diagnostic or routing purposes.

It is the responsibility of the network layer (IP) protocol to ensure that the ICMP message is sent to the correct destination. This is achieved by setting the destination address of the IP packet carrying the ICMP message. The source address is set to the address of the computer

that generated the IP packet (carried in the IP source address field) and the IP protocol type is set to "ICMP" to indicate that the packet is to be handled by the remote end system's ICMP client interface.

2. Message Format
ICMP messages are sent using the basic IP header. Unless otherwise noted under the individual format descriptions, the values of the internet header fields are as follows: * Version: This would normally be set to '4' to indicate use of ipv4. * IHL: Internet Header Length : The length of the header in 32 bit words. This field is needed since header length might vary. * Type of Service: Set to 0 by default. * Total Length: Total Length and the first data byte is the sequence number plus 1. Otherwise if the SYN flag is not present. * Identification, Flags and Fragment Offset : Taken from the IP protocol. * Time to live : How many routing hops this packet may endure. * Protocol : ICMP version used. * IP Header Checksum: used for error checking. * Source Address: The source address from whom the packet was sent. * Destination Address: The destination address of the packet. * Type: 8 bits.Specifies the format of the ICMP message. * Code: further specification of the ICMP type; e.g. : an ICMP Destination Unreachable might have this field set to 1 through 15 each bearing different meaning. * Checksum: This field contains error checking data calculated from the ICMP header+data, with value 0 for this field. * ID: This field contains an ID value, should be returned in case of ECHO REPLY. * Sequence: This field contains a sequence value, should be returned in case of ECHO REPLY.

Padding Data
After the ICMP header follows padding data (in bytes): * The LINUX "ping" utility pads ICMP to a total size of 64: sizeof(ICMP Header) - 64 = 56 * WINDOWS "ping.exe" pads to a total size of 40: sizeof(ICMP Header) - 40 = 32.

Any field labeled "unused" is reserved for later extensions and must be zero when sent, but receivers should not use these fields (except to include them in the checksum). ICMP datagram can have a maximum length of 65536.
The grey cells describe the IP header. The ICMP header consists of the green cells.

Fig1: ICMP Datagram ICMP packet | | Bit 0 – 7 | Bit 8 - 15 | Bit 16 - 23 | Bit 24 - 31 | IP Header
(160 bits OR 20 Bytes) | Version/IHL | Type of service | Length | | Identification | flags and offset | | Time To Live(TTL) | Protocol | Checksum | | Source IP address | | Destination IP address | ICMP Payload
(64+ bits OR 8+ Bytes) | Type of message | Code | Checksum | | Quench | | Data (optional) |

3. Ping Application
Ping is a computer network tool used to test whether a particular host is reachable across an IP network; it is also used to self test the network interface card of the computer, or as a speed test. It works by sending ICMP “echo request” packets to the target host and listening for ICMP “echo response” replies. Ping measures the round-trip time and records any packet loss, and prints when finished a statistical summary of the echo response packets received, the minimum, mean, max and in some versions the standard deviation of the round trip time.

3. Distributed Denial of Service Attack

A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the concerted efforts of a person or persons to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Perpetrators of DoS attacks typically target sites or services hosted on high-profile web servers such as banks, credit card payment gateways, and even root nameservers. This attack is possible only on statuc live IPs.
This attack can be achieved by many ways like * teardrop attack * peer to peer attack * ICMP flood
And many other. Our target for this paper is preventing ICMP flood. ICMP flood is achieved by sending extremely large ICMP datagrams via PING command by using the following command:

ping –l “size of packet” “destination IP/Domain name”

As we know that the ICMP has a maximum datagram size of 65536 bytes, in DoS attack (which is restricted and is obsolete now) the packet of more than this size was used to send, say 65540 (called as ping of death), this way the destination system’s network adapter goes into infinite loop of resolving the packet size which is actually not mentioned in its dictionary. This way the network adapter it distorted and the server goes down. But this is no more exists in the operating systems after Windows NT and 98.
After DoS attack’s prevention, hacker came up with the idea of distributed DoS attack. For preventing Dos attack the OS manufactures had added a mechanism for discarding packets more then 65536.
But hacker are no less, they came up with the idea of DDoS attack in which a packet large enough, say 65000 Byte, are sent from many systems, say 10, to a single system, this way each packet being within the acceptable range is stored in the network adapter buffer. As the size of the packet is very large th e network adapter takes time to analyses the packet and generate a reply for each packet, but the senders do not wait and are continuously sending such large ICMP packets. This overflows the buffer and hence the adapter is destroyed. This buffer can be seen in the task manager of Windows or in any of the network analyzing software. Actually the DDoS attack is achieved by analyzing the network traffic graph when such large ICMP packets are sent and according to the graph the number of systems required to send the ICMP packets via PING are calculated.

5. Countermeasure
As we know, the ICMP packets are generated in two ways: * When any error is generated in any TCP/IP connections and communications. * Deliberately by ping and traceroute applications.

In both the ways, ICMP packets can be used for DDoS attacks, by increasing the size of ICMP packets.
Now one way of avoiding such attacks is to configure the firewall in such a way that they discard the ICMP packets. But many a times ICMP packets are needed. So stopping the protocol is not a wise solution.
But this can be prevented by bringing upon slight changes in the ICMP protocol.
The size of the IP packet is 65536 Bytes, which is redundantly wasteful in case of ICMP, as this protocol is solely used for connection checking and error message generation, and it has nothing to do with transfer of data. For this purpose of control message transfers we require not more than 64 Bytes (that to in the Linux). So this huge size is left only for the use of the Hackers!
Hence by bring upon the change in the size of ICMP packets DDoS attack via ICMP can be prevented.
If we bring the change in a protocol, then all the related services, which are actually implemented with the help of some programming, has to be updated.
Here we are pointing out at the traceroute (in Linux)/ tracert( in Windows) , ping , and all the protocols such as routing protocols, IP etc all need to implement these changes. Taking example of ping application on Unix/Linux platform, which was first developed by Mike Muuss, U. S. Army Ballistic Research Laboratory, in 1983.
We have tried to bring upon the desired changes in the same program. And this is working perfectly fine on Linux.
This change can be implemented in the new systems. But the real problems are the already implemented systems. Logically, such system becomes victim when if they are connected to internet. And we know that whenever we connect our system to internet our vendors send us the updates for the systems. So the new implementations of ICMP protocols can be sent via net to all the systems this way every system becomes updated with the new implementation of them.

6. Other vulnerabilities 1. The various ICMP messages having different code and type values can be used to get different kinds of information on the remote system. Information gathering is the first step that a hacker goes through in his attempt to detect any loopholes in the target system. Although sending ICMP messages will not tell you everything that you will need to know about the target system, but still they will give you quite a lot of information. The Echo request message is the ICMP message with a type value of 8 and a code value of 0, while the Echo reply message is the ICMP message with a type value of 0 and a code value of 0. We can use the ICMP Echo Request and Echo Reply messages to determine whether or not the target host is connected to the Internet (is alive) or not.
In order to determine whether the target host is alive or not, all we have to do is send an Echo Request message to the remote system and wait for an Echo reply message. * If the remote system replies with an Echo Reply message, then it means that it is alive and is connected to the Internet. * However, if we do not receive any reply from the remote system, then it probably means that the remote system is not connected to the Internet.
However, one note of caution, it is more than possibility that the target host to whom you send out the Echo request datagram might have a filtering device installed which discards all Echo Request ICMP messages, thus showing that the remote system is not connected to the Internet even though it might as well be connected. Some better firewalls even send out spoofed Echo Replies on encountering such echo requests, thus throwing the malicious intruders off the track. 2. The "traceroute" program also contains a client interface to ICMP. Like the "ping" program, it may be used by a user to verify an end-to-end Internet Path is operational, but also provides information on each of the Intermediate Systems (i.e. IP routers) to be found along the IP Path from the sender to the receiver. Traceroute uses ICMP echo messages. These are addressed to the target IP address. The sender manipulates the TTL (hop count) value at the IP layer to force each hop in turn to return an error message.
This can be avoided (in case of cyber crime) by TTL spoofing which can be achieved by deploying sniffers at the servers which can catch the packet and change the intended value of TTL. This is called as TTL spoofing. Alternatively, by using some programming TTL spoofers can also be made.
6. Case Study

Though the above solution is valid, but many servers have actually implemented many remedies on their servers. Taking the example of the ISPs like, Airtel Broadband Services and Reliance have restricted the packet size to 1472 bytes, beyond this we get an error message “request timed out”.
Not only this, many servers such as Google and Yahoo also implemented some filtering for large packets.
But on the other hand, while sitting with in the network, say a wireless LAN or wired LAN, a packet of 65536 can easily be sent which can destroy any system in that LAN. Almost all corporate companies and universities etc have a live IP, not only this within many of them has their own DHCP servers through which they use a combination of static and dynamic IPs, such networks are always in danger of DDoS attack (network level).
This shows that though there is awareness amongst the ISPs and few web service providers, but the general mass still stands as the potential victims of such attacks.

Bibliography: * RFC 792, Internet Message Transfer Protocol. * ICMP, ping, Wikipedia. * The story of Ping, http://ftp.arl.mil/~mike/ping.html?sess=4f8272bd1e5da03d1a16ba4a69452d93. * Article ID 217014, Microsoft support. * Research Paper by Ofir Arfin.

Similar Documents

Free Essay

Packet Sniffing

...thank the members of the teaching and non-teaching staff of Fr.CRCE for the timely help extended by them. Lastly thanking our parents, for their morale support and encouragement. Kunal Gopal Thakur Vishal Shirguppi Justin Francis Shazia Ali ABSTRACT: Packet sniffing is a technique of monitoring every packet that crosses the network. A packet sniffer is a piece of software or hardware that monitors all network traffic. The security threat presented by sniffers is their ability to capture all incoming and outgoing traffic, including clear-text passwords and usernames or other sensitive material. While packet sniffers can be fully passive, some aren’t, therefore they can be detected. This paper discusses the different methods that Anti-Sniff uses to detect these...

Words: 3356 - Pages: 14

Free Essay

System Engineerring Roles in Software Enginerring

...Lovely professional university term paper topic-system engineerring roles in software enginerring cap 590 rollno.46 section-1101 reg no-11001009 submitted to-pawan sir submitted by-jaspreet singh TABLE OF CONTENTS Introduction to tcp/ip tcp ip operaction ,s of tcp/ip layers in tcp/ip model tcp/ip protocols References INTRODUCTION TCP/IP------------ The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite (IP), and is so common that the entire suite is often called TCP/IP. TCP provides reliable, ordered, error-checked delivery of a stream of octets between programs running on computers connected to a local area network, intranet or the public Internet. It resides at the transport layer. Web browsers use TCP when they connect to servers on the World Wide Web, and it is used to deliver email and transfer files from one location to another. HTTP, HTTPS, SMTP, POP3, IMAP, SSH, FTP, Telnet and a variety of other protocols are typically encapsulated in TCP. Applications that do not require the reliability of a TCP connection may instead use the connectionless User Datagram Protocol (UDP), which emphasizes low-overhead operation and reduced latency rather than error checking and delivery validation. TCP---------- The Transmission Control Protocol (TCP) is one...

Words: 2390 - Pages: 10

Free Essay

Snmp

...of extensiveness, simplicity and generality we can collect the information of person computer and router in order to help us to analyses the situation of the network. This article first has made the analysis of technology development of our own country and all over the world. Then we proposed the detection technology of situational awareness of network when we combining with project background. Finally we come up with the idea of a method to do the detection based on the SNMP. The information we need to collect mainly in the SNMP’s MIB database .It includes interface group, IP group and ICMP group. After we collect the information we need we can begin the analysis work. We use data mining technique to do the data analysis. Finally our aim is that we can get the current network state. After the method is raised we will construct the test platform then realize the thesis. At the end of the paper I will summarizes the work and put forward the further...

Words: 296 - Pages: 2

Premium Essay

Network Support for Ip Traceback

...226 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 9, NO. 3, JUNE 2001 Network Support for IP Traceback Stefan Savage, David Wetherall, Member, IEEE, Anna Karlin, and Tom Anderson Abstract--This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back toward their source. This work is motivated by the increased frequency and sophistication of denial-of-service attacks and by the difficulty in tracing packets with incorrect, or "spoofed," source addresses. In this paper, we describe a general purpose traceback mechanism based on probabilistic packet marking in the network. Our approach allows a victim to identify the network path(s) traversed by attack traffic without requiring interactive operational support from Internet Service Providers (ISPs). Moreover, this traceback can be performed "post mortem"--after an attack has completed. We present an implementation of this technology that is incrementally deployable, (mostly) backward compatible, and can be efficiently implemented using conventional technology. Index Terms--Computer network management, computer network security, network servers, stochastic approximation, wide-area networks. I. INTRODUCTION D ENIAL-OF-SERVICE attacks consume the resources of a remote host or network, thereby denying or degrading service to legitimate users. Such attacks are among the hardest security problems to address because they are simple to implement, difficult to prevent, and very difficult...

Words: 11860 - Pages: 48

Premium Essay

Qbt1 - Task 1

...Danielle J Adams 000296145 QBT1 Language & Communication 14 May 2003 References Hickey, A. (2010). Cloud Computing. The Year of the Cloud...For Real This Time. Para 3. Retrieved from http://www.crn.com/slide-shows/cloud/232301107/10-cloud-predictions-for-2012.htm This reference offers information on the direction that Cloud Computing has taken and is taking in 2012. Hickey, offers the reader a perspective into prediction based on his account of current corporations and organizations direction into the significance of this service. Tadjer, R. (2010). Cloud Computing. What is Cloud Computing? Para 2 – 3. Retrieved from www.pcmag.com/article2/0,2817,2372163,00.asp This reference offers the reader understanding into how cloud computing is used in capitalism and the effects on the average consumer. This reference also offers understanding into privacy factors that come into play with cloud computing. Evans, B. (2013). Oracle Software Chief Thomas Kurian: 10 Strategic Cloud Computing Insights. Retrieved from http://www.forbes.com/sites/oracle/2013/05/08/oracle-software-chief-thomas-kurian-10-strategic-cloud-computing-insights/ This reference offers information regarding important issues expressed by customers of Oracle and the challenges faced when using this cloud computing software. This article gives insight to some of the implemented changes made by Executive V.P. of Product Development for Oracle software Thomas Kurian. Kurian discusses some...

Words: 728 - Pages: 3

Free Essay

Csec 620 Individual Assignment 2

...Estonia Banks Targeted University of Maryland University College CSEC 620 Individual assignment # 2 Table of Contents Introduction …………………………………………………………………………………………………………. 3 Estonia under attack……………………………………………………………………………………………….. 4 Types of attacks ……………………………………………………………………………………………………… 5 Threats actors and their motives ……………………………………………………………………………. 6 Who were responsible for the attacks ……………………………………………………………………. 7 Strategic Shifts in Response to attacks ……………………………………………………………………. 8 Conclusions ……………………………………………………………………………………………………………. 10 Introduction The Baltic state of Estonia was attacked by hackers in April of 2007. Scores of government and private sector website were shut down. Estonian’s daily activities, such as pumping gas or making withdrawals from ATM machines were severely impacted. The architecture of the Internet allowed networks of bots, called botnets, to direct millions of packets to the servers of the Estonian targets, overloading and rendering them inaccessible to visitors. Digital traffic from servers ranging all the way to Peru, Vietnam and the United States overwhelmed Estonian websites, overloading their buffers with superfluous data. At the apex of this DDoS flooding, government websites that had been receiving 1,000 visits each day were suddenly inundated with 2,000 per second (Crouch, Pg 1). No overt financial motivations were discovered as the driver of these attacks, with the principal motivation being political...

Words: 2634 - Pages: 11

Free Essay

Ping Sweeps and Port Scans

...AS YOUR OWN, BUT USE IT AS A GUIDE WHILE WRITING YOUR OWN… I REQUEST YOU TO GIVE ME AN “A” RATING ON THIS PAPER; THANK YOU!!! Insert Your Name Name of University SEC 280 Week 1 Insert Tutor’s Name 1st, October, 2012 Outline 1) Introduction (pg.3) 2) Ping Sweeps & Port Scans (pg.3) a) Ping Sweeps (pg.3) b) Port Scans (pg.4) 3) Recommendations & Conclusion (pg.5) 4) References (pg.7) Ping Sweeps & Port Scans While running businesses, owners must be aware of crucial security threats that their organizations are exposed to in order to formulate effective strategies of mitigating potential risks. Statistics show that there are numerous computer threats that can put an organization’s success in jeopardy especially if they are never detected and controlled beforehand. Examples of such threats are ping sweeps and port scans, which are actually nefarious computer activities that can be used by hackers and crackers to access sensitive business information (Teo, 2000; Wild Packet, 2002). Ping sweeps and port scans can possibly go unnoticed if security measures to detect and block them are not put in place and can have dangerous repercussions on a business. Fortunately, there are many ways through which organizations can detect and eliminate potential damages associated with the activities. In this paper, therefore, the author seeks to establish the impact that ping sweeps and port scans can have on a business...

Words: 1200 - Pages: 5

Free Essay

Firewalls: Guidelines and Procedures

...postures. While firewalls are often discussed in the context of Internet connectivity, they may also have applicability in other network environments. For example, many enterprise networks employ firewalls to restrict connectivity to and from the internal networks used to service more sensitive functions, such as accounting or personnel. By employing firewalls to control connectivity to these areas, an organization can prevent unauthorized access to its systems and resources. Inclusion of a proper firewall provides an additional layer of security (Broida, 2011). This research paper will give a background on firewalls. The background will cover an overview of firewall technologies, as well as firewall technologies, the common requirements of firewalls, and firewall policies. This paper will also give an analysis of firewalls which will consist of what I have learned in doing this research and my opinion on the research. Overview of Firewall Technologies Several types of firewall technologies are available. One way of comparing their capabilities is to look at the Transmission Control Protocol/Internet Protocol [TCP/IP] layers that each is able to examine. TCP/IP communications are composed of four layers that work together to transfer data between hosts. When a user wants to transfer data across networks, the data is passed from the highest layer through intermediate layers to the lowest layer, with each layer adding more information. The lowest layer sends the accumulated data...

Words: 3077 - Pages: 13

Free Essay

Information Hiding - Steganography

...of information secret, its also keeps the existence of the information secret. This is achieved by hiding information behind another information. This paper gives an overview of Steganography and its techniques, types, and also its advantages and disadvantages. Keywords-component; steganography; information hiding; security; confidentiality; techniques. INTRODUCTION Steganography help hides the fact that communication is taking place by hiding some information behind another information thereby making the communication invisible. The origin of the word “steganography” is from the Greek words “steganos” and “graphia” which is interpreted as “covered” and “writing” respectively thereby defining steganography as “covered writing”. Steganography and cryptography are both part of information hiding but neither alone is without flaws. The goal of steganography is defeated once the hidden message is found or noticed even while still in the original message (carrier). For safely transmission of hidden messages or information in steganography, multimedia files like audio, video and images are mostly used has the carrier or cover source. METHODOLOGY The Methodology used for this paper is based on the knowledge derived through online resources such as online publications, journals and research papers. ORIGIN OF STEGANOGRAPHY As information hiding techniques is receiving enormous attention lately, it was also used way back in Greece. Herodotus...

Words: 1519 - Pages: 7

Free Essay

Ceh Test Questions

...Exam : 312-50 Title : Ethical Hacker Certified Ver : 02-23-2009 312-50 QUESTION 1: What is the essential difference between an 'Ethical Hacker' and a 'Cracker'? A. The ethical hacker does not use the same techniques or skills as a cracker. B. The ethical hacker does it strictly for financial motives unlike a cracker. C. The ethical hacker has authorization from the owner of the target. D. The ethical hacker is just a cracker who is getting paid. Answer: C Explanation: The ethical hacker uses the same techniques and skills as a cracker and the motive is to find the security breaches before a cracker does. There is nothing that says that a cracker does not get paid for the work he does, a ethical hacker has the owners authorization and will get paid even if he does not succeed to penetrate the target. QUESTION 2: What does the term "Ethical Hacking" mean? A. Someone who is hacking for ethical reasons. B. Someone who is using his/her skills for ethical reasons. C. Someone who is using his/her skills for defensive purposes. D. Someone who is using his/her skills for offensive purposes. Answer: C Explanation: Ethical hacking is only about defending your self or your employer against malicious persons by using the same techniques and skills. QUESTION 3: Who is an Ethical Hacker? A. A person whohacksfor ethical reasons B. A person whohacksfor an ethical cause C. A person whohacksfor defensive purposes D. A person whohacksfor offensive purposes Answer:...

Words: 34575 - Pages: 139

Free Essay

Cyber Crime

...Cyber-crimes: A Practical Approach to the Application of Federal Computer Crime Laws Eric J. Sinrod† and William P. Reilly†† I. Introduction Cyber-crime, once the domain of disaffected genius teenagers as portrayed in the movies “War Games” and “Hackers,” has grown into a mature and sophisticated threat to the open nature of the Internet. “Cyber-criminals,” like their non-virtual traditional criminal counterparts, seek opportunity and are attracted to vacuums in law enforcement. The news media is filled with reports of debilitating denial of service attacks, defaced web sites, and new computer viruses worming their way through the nation’s computers. However, there are countless other cyber-crimes that are not made public due to private industry’s reluctance to publicize its vulnerability and the government’s concern for security.[1] Along with the phenomenal growth of the Internet has come the growth of cyber-crime opportunities.[2] As a result of rapid adoption of the Internet globally, computer crimes include not only hacking and cracking, but now also include extortion, child pornography, money laundering, fraud, software pirating, and corporate espionage, to name a few.[3] Law enforcement officials have been frustrated by the inability of legislators to keep cyber-crime legislation ahead of the fast-moving technological curve.[4] At the same time, legislators face the need to balance the competing interests between individual rights, such as privacy...

Words: 23991 - Pages: 96

Free Essay

Rootkit Technology Analysis

...Table of Contents CHAPTER 1 …………………………………………………………………….. 4 INTRODUCTION………..……………………………………………………….4Aim & Objective of Research …………………………………………………..4 Research Questions …………………………………………………………….5 Hypothesis ………………………………………………………………………..5 CHAPTER 2 ……………………………………………………………………...6 LITERATURE REVIEW …………………………………………………………6 Overview of Rootkit Technology ……………………………………………….6 How a Rootkit Functions ….……………………………………………………6 Functionality Approaches of Rootkit ……………………………….…………..7 Types of Rootkit ………………………………………………………………….8 CHAPTER 3 …………………………………………………………………….11 DISCUSSION ………………………………………………………………….11 Rootkit Detection & Prevention ……………………………………………….11 Rootkit Prevention & Removal Approaches …………………………………12 Rootkit Detection & Prevention Tools ………………………………………..13 CHAPTER 4 …………………………………………………………………….14 CONCLUSION……………………………………………………………..……14 CHAPTER 5 ………………………………………………………….…………15 REFERENCES …………………………………………………………………15 EXECUTIVE SUMMARY This research paper is divided into 5 main chapters like introduction, literature review, discussion, conclusion and references. The major points of this detailed research are summarized as below. * Rootkit technologies cause severe security attacks in today’s cyber world. This research discusses the significance of effective security strategies that should be formulated against security attacks. * Detailed analysis of rootkit technologies and functionalities are done. Different rootkit types, attack...

Words: 2465 - Pages: 10

Premium Essay

Wgu Itsecurity Capstone

...Conclusion…………………………………………………………………………………………………………………………………………….35 References 37 Appendix 1: Competency Matrix 38 Appendix 2: Cisco ASA 5555-X Firewall Specifications…………………………………………………………….40 Appendix 3: ABC Inc. Project Schedule…………………………………………………………………………………….44 Appendix 4: High-Availability Design Screenshots……………………………………………………………………45 Appendix 5: Screenshots of inside to outside access; outside to DMZ access; NAT rules and configurations; and performance graphs and performance results….........................................51 Capstone Report Summary Internet of Everything (IoE) and “Big Data” equates to competitive advantages to the modern business landscape. Numerous white papers are circulating on the Internet highlighting the business case supporting the IoE initiative. For instance, in a white paper conducted by Cisco Inc. on the Value Index of IoE in 2013 reported the following: In February 2013, Cisco released a study predicting that $14.4 trillion of value (net profit) will be at stake globally over the next decade, driven by connecting the unconnected –people-to-people (P2P), machine-to-people (M2P), and machine-to-machine (M2M) - via the Internet of Everything (IoE). Cisco defines the Internet of Everything as the networked connection of people, process, data,...

Words: 9337 - Pages: 38

Free Essay

Use of Ipsec in Mobile Ip

...Department of Electrical and Computer Engineering ELEG 777 Internet Engineering ( TERM PAPER ) Use of IPSec in Mobile IP DONE BY: SALEM ITANI SUBMITTED TO: Dr. AYMAN KAYSSI DATE: MAY 21, 2001 ID #: 20011003 INTRODUCTION As mobile computing has become a reality, new technologies and protocols have been developed to provide to mobile users the services that already exist for non-mobile users. Mobile IP, one of these technologies, enables a node to change its point of attachment to an internet in a manner transparent to applications running on top of the protocol stack, since its IP address does not change. To provide this transparency, new elements are required: the “home agent”(HA), located in the home network, will forward all incoming packets addressed to the mobile node’s (MN) new location. The foreign agent (FA) is responsible for providing a temporary address to the MN. The flexibility of communication through the Internet allows the existence of such protocols as Mobile IP. As much as this is true, it is as well the fact that every time new protocols or services are made available on the Internet, new security challenges arise. IPSec has been developed as a protocol to provide security at the IP layer. That is to say, using IPSec all communications on the Internet can be accomplished in a secure fashion. Providing security is not an easy task, since many situations have to be taken into account. The approach IPSec uses to address...

Words: 9748 - Pages: 39

Free Essay

Secure Cloud Node

...SECURING CLOUD NETWORK NODES AGAINST DoS ATTACKS Turnitin Score 15% Boman K. Avong Health Informatics and Administration University of Maryland University College Author Note This research paper is prepared for ITEC 610 9043 taught by Dr. Richard Taylor of the University of Maryland University College Abstract Cloud computing is an emerging technological advancement and in recent times the technology has gained popularity because of its ability to increase system performance, efficient use of computer resources and also scalability. As with any internet technology, security is a big challenge for cloud computing services. Denial of Service (DoS) attacks targeted at cloud end node systems are possible because of how vulnerable these node systems are. The level of security at the node systems is not matched to that at the server level. Cloud node networks are the major entry points for DoS attacks and other malicious attacks in a cloud computing environment. This paper will discuss various DoS attacks and techniques and also discuss the role of Distributed Denial of Service (DDoS) on distributed computer networks. I will also discuss how DoS attacks are the major threats to cloud services, entry points of DoS which are cloud end nodes and recommend how these attacks can be mitigated. DoS attacks on the cloud node computers are the major security challenges cloud services face. I will also recommend techniques that can prevent DoS on cloud node networks. Introduction ...

Words: 2565 - Pages: 11