Part III: Threats, Attacks & Defense

DNS Protection

Cache Poisoning Attack

DNSSEC (Security Extension)

BGP

image23

How BGP Works

BGP Vulnerabilities

image24 - EX: In 2008, Pakistan decided to block YouTube by creating a BGP route that led into a black hole. Instead this routing information got transmitted to a hong kong ISP and from there accidentally got propagated to the rest of the world meaning millions were routed through to this black hole and therefore unable to access YouTube. - Potentially, the greatest risk to BGP occurs in a denial of service attack in which a router is flooded with more packets than it can handle. Network overload and router resource exhaustion happen when the network begins carrying an excessive number of BGP messages, overloading the router control processors, memory, routing table and reducing the bandwidth available for data traffic. - Refer : https://medium.com/bugbountywriteup/bgp-the-weak-link-in-the-internet-what-is-bgp-and-how-do-hackers-exploit-it-d899a68ba5bb - Router flapping is another type of attack. Route flapping refers to repetitive changes to the BGP routing table, often several times a minute. Withdrawing and re-advertising at a high-rate can cause a serious problem for routers, since they propagate the announcements of routes. If these route flaps happen fast enough, e.g., 30 to 50 times per second, the router becomes overloaded, which eventually prevents convergence on valid routes. The potential impact for Internet users is a slowdown in message delivery, and in some cases packets may not be delivered at all.

BGP Security

Web Based Attacks

HTTP Response Splitting Attacks

Cross-Site Request Forgery (CSRF or XSRF)

Cross-Site Scripting (XSS) Attacks

Document Object Model (DOM) XSS Attacks

Clickjacking

DataBase Attacks & Defenses

SQL injection Attacks

image25

SQL Injection Attack Defenses

VPN

A virtual private network (VPN) is a service that offers a secure, reliable connection over a shared public infrastructure such as the Internet. Cisco defines a VPN as an encrypted connection between private networks over a public network. To date, there are three types of VPNs:

Security Breach

In spite of the most aggressive steps to protect computers from attacks, attackers sometimes get through. Any event that results in a violation of any of the confidentiality, integrity, or availability (CIA) security tenets is a security breach.

Denial of Service Attacks

Distributed Denial of Service Attacks

Wiretapping

Backdoors

Malicious Attacks

Birthday Attack

Brute-Force Password Attacks

Dictionary Password Attacks

Replay Attacks

Man-in-the-Middle Attacks

Masquerading

Eavesdropping

Social Engineering

Phreaking

Phishing

Pharming