Summary
network security
packet sniffer
- in broadcast media (like wifi), anyone can capture packets
- promiscuous network interface reads/records all packets passing by
IP spoofing
- attacker sends packets with a forged source IP address
Denial of Service (DoS) attack
- flood a target with traffic to overload it
- Distributed DoS (DDoS): use many compromised systems to launch the attack
Lines of Defense
- Authentication: verify user identity (passwords, biometrics)
- Confidentiality: encrypt data to prevent unauthorized access
- Integrity: ensure data is not altered during transmission (checksums, hashes)
- Access restrictions: password-protected networks
- Firewalls: middleboxes in access and core networks
- off-by-default: block all incoming traffic unless explicitly allowed
- detectingreacting to DOS attack