Example: dental hygienist

Lecture 16: TCP/IP Vulnerabilities and DoS Attacks: IP ...

Lecture 16: TCP/IP Vulnerabilities and DoS Attacks: IP Spoofing, SYN Flooding, and The Shrew DoSAttackLecture Notes on Computer and Network Security by Avi Kak 10, 20224:58pm 2022 Avinash Kak, Purdue UniversityGoals: To review the IP and TCP packet headers Controlling TCP Traffic Congestion and the Shrew DoS Attack The TCP SYN Flood Attack for Denial of Service IP Source Address Spoofing Attacks BCP 38 for Thwarting IP Address Spoofing for DoS Attacks Python and Perl Scripts for Mounting DoS Attacks with IPAddress Spoofing and SYN Flooding Troubleshooting Networks with the Netstat UtilityCONTENTSS ection and TCP/IP Protocol Network Layer (also known as the Internet14 Layer or the IP Layer)

This 7-layer model of the protocols is referred to as the OSI (Open Systems Interconnection) model. In the literature on computer networks, you’ll also see an older 4-layer model in which the Application Layer is a combination of the top three layers of the OSI model. That is, the Application Layer in the 4-layer model combines the ...

Tags:

  Open, System, Model, Early, Interconnection, Osi model, Open systems interconnection, Relay models

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Transcription of Lecture 16: TCP/IP Vulnerabilities and DoS Attacks: IP ...

1 Lecture 16: TCP/IP Vulnerabilities and DoS Attacks: IP Spoofing, SYN Flooding, and The Shrew DoSAttackLecture Notes on Computer and Network Security by Avi Kak 10, 20224:58pm 2022 Avinash Kak, Purdue UniversityGoals: To review the IP and TCP packet headers Controlling TCP Traffic Congestion and the Shrew DoS Attack The TCP SYN Flood Attack for Denial of Service IP Source Address Spoofing Attacks BCP 38 for Thwarting IP Address Spoofing for DoS Attacks Python and Perl Scripts for Mounting DoS Attacks with IPAddress Spoofing and SYN Flooding Troubleshooting Networks with the Netstat UtilityCONTENTSS ection and TCP/IP Protocol Network Layer (also known as the Internet14 Layer or the IP Layer)

2 , The Transport Layer Protocol for versus TCP Breaks Up a Byte Stream That36 Needs to be Sent to a TCP State Transition Demonstration of the 3-Way the Handshake for Establishing52a TCP Congestion Control and the Shrew DoS Source Address Spoofing for SYN Flood71 DoS IP Source Address Spoofing With BCP DoS through IP Address Spoofing and89 SYN Flooding When The Attacking and The AttackedHosts Are in The Same the Netstat Utility for Problems113 Computer and Network Security by Avi KakLecture 16 Back to TCP and IP We now live in a world in which the acronyms TCP and IP arealmost as familiar as some other computer-related words likebits, bytes, megabytes, etc.

3 IP stands for theInternet Protocolthat deals with the routingof packets from one host to another in a network. A host can beany digital device with a communications interface. It may be acomputer, a smartphone, a router, etc. On the other hand, TCP, which stands forTransmissionControl Protocol, has the job of ensuring that the data packetsdelivered by the IP protocol did arrive at their destination. Youcould say that the TCP protocol sits on top of the IP protocol in the sense that TCP asks IP to send a packet to itsdestination and then makes sure that the packet was actuallyreceived at the destination.

4 A less reliable version of TCP is UDP (User DatagramProtocol).Despite the pejorative sense associated with thephrase less reliable ,UDP is extremely important to theworking of the internet, as you will discover in this and the3 Computer and Network Security by Avi KakLecture 16next Lecture . The different communication and application protocols thatregulate how computers work together are commonly visualizedas belonging to a layered organization of protocols that isreferred to as theTCP/IP protocol stack. Some of the moreimportant protocols in this stack are presented in the and Network Security by Avi KakLecture 16 Back to THE TCP/IP PROTOCOL STACK The TCP/IP protocol stack is most commonly conceived of asconsisting of the following seven layers:7.

5 Application Layer(HTTP, HTTPS, FTP, SMTP, SSH, SMB, POP3, DNS, NFS, etc.)6. Presentation Layer(MIME, XDR)5. Session Layer(TLS/SSL, NetBIOS, SOCKS, RPC, RMI, etc.)4. Transport Layer(TCP, UDP, etc.)3. Network Layer(IPv4, IPv6, ICMP, IPSec, IGMP, etc.)2. Data Link Layer(MAC, PPP, SLIP, ATM, etc.)1. Physical Layer(Ethernet(IEEE ), WiFi(IEEE ), USB, Bluetooth, etc.)5 Computer and Network Security by Avi KakLecture 16 This 7-layer model of the protocols is referred to as theOSI( open Systems interconnection ) model . In the literature oncomputer networks, you ll also see an older 4-layer model inwhich the Application Layer is a combination of the top threelayers of the OSI model .

6 That is, the Application Layer in the4-layer model combines the Application Layer, the PresentationLayer, and the Session Layer of the OSI model . Additionally,inthe 4-layer model , the Data Link Layer and the Physical Layerof the OSI model are combined into a single layer called theLink Layer. Also note that the Network Layer is frequentlyalso called theInternet Layerand theIP Layer. Even though TCP and IP are just two of the protocols thatreside in the stack, the entire stack is commonly referred toasthe TCP/IP protocol is because of the centralityof the roles played by the TCP and the IP restof the protocol stack would be rendered meaningless withoutthe TCP and the IP protocols.

7 Regarding theApplication Layer, the acronymHTTP standsfor the HyperText Transport Protocol and the relatedHTTPS stands for HTTP Secure. These are the main protocols used forrequesting and delivering web pages. When you click on a URLthat begins with the stringhttp://..or thestringhttps://.., you are asking the HTTP protocol in theformer case and the HTTPS protocol in the latter case to fetcha web page for you. Another famous protocol in the Application6 Computer and Network Security by Avi KakLecture 16 Layer isSMTPfor Simple Mail Transfer Protocol. With regardto the other protocols mentioned in the Application Layer, in alllikelihood you are probably already well conversant withSSH,FTP, etc.

8 [For Windows users, theSMB(Samba) protocol in the Application Layer is used toprovide support for cross-platform (Microsoft Windows, Mac OS X, and other Unix systems) sharing of filesand printers. Back in the old days, the SMB protocol operatedthrough theNetBIOS protocol in the SessionLayer. NetBIOS, which stands for Network Basic Input/Output system , is meant to provide networkrelated services at the Session Layer. Ports 139 and 445 are assigned to the SMB acronym SMB stands for Server Message Block .] The purpose of thePresentation Layeris to translate, encode,compress, and apply other transformations to the data, ifnecessary, in order to condition it appropriately for processingby the protocols in the lower layers on the mentionedin Lecture 2, the data payload in all internetcommunications is based on the assumption that it consistssolely of a set of characters that possess commonly used protocol in the PresentationLayer isMIME.

9 Which stands forMultipurpose Internet all email is transmitted using the SMTP protocol in the Application Layer through the MIME protocolin the Presentation Layer. The protocol XDR, which stands for Extensible Data Representation , is another protocol that isused for safe transfer of data between computers. As to what is meant by a session in theSession Layerprotocols,a session may consist of a single request from a client for some7 Computer and Network Security by Avi KakLecture 16data from a server, or, more generally, a session may involvemultiple back-and-forth exchanges to data between twoendpoints of a communication security is an issue,these data transfers, whether in a single client request or inmultiple back-and-forth exchanges, must be the reason for whyTLS/SSLis in the Session Layer.

10 TLSstands for for the Transport Layer Security and SSL for SecureSocket Layer. The most important protocol in theTransport LayerisTCP(Transmission Control Protocol).Its job is to provide forreliableexchange of data between two endpoints, and, equallyimportantly, to provide mechanisms forcongestion word reliable means that a sending endpoint knows forsure that the data actually arrived at the receiving a reliable service is provided by TCP (TransmissionControl Protocol). [As you would guess, ensuring reliability means that the sendingendpoint must receive an acknowledgment message from the receiving endpoint for eachtransmission.]


Related search queries