Network Security : Ping Attacks , Vulnerabilities and Password Cracking

 

This blog entry seeks to describe several known issues when considering network security. Attacks, vulnerabilities are discussed. Suggestions for improvement and best practice are included.

PING ATTACKS

There are a number of attacks that can be associated with ping commands. “Denial of service (DoS) attacks prevent access to resources by users authorized to use those resources. An attacker may attempt to bring down an e-commerce website to prevent or deny usage by legitimate customers. DoS attacks are common on the Internet, where they have hit large companies such as Amazon, Microsoft, and AT&T. .. In a DoS attack on an application, the attack may bring down a website while the communications and systems continue to operate…. A common DoS attack involves opening as many TCP sessions as possible; this type of attack is called a TCP SYN flood DoS attack. Two of the most common types of DoS attacks are the Ping of Death and the Buffer Overflow Attack. The ping of death crashes a system by sending Internet Control Message Protocol (ICMP) packets (think echoes) that are larger than the system can handle.” (Pastore, 2004)

“Hackers can use this technique for these kinds of denial-of-service hacks or “smurf“ attacks. They use whole networks of computers to direct an overwhelming amount of traffic to a victim's machine.” (Gibbs, 1999)

“Buffer overflow attacks, as the name implies, attempt to put more data (usually long input strings) into the buffer than it can hold.  A Distributed Denial of Service (DDoS) attack is similar to a DoS attack. This type of attack amplifies the concepts of a DoS by using multiple computer systems to conduct the attack against a single organization. These attacks exploit the inherent weaknesses of dedicated networks such as DSL and cable. “ (Pastore, 2004)

SECURITY HOLES/VULNERABILITIES

Computer systems lie exposed on the internet. Security holes and vulnerabilities are natural,  in a matter of speaking,  as software engineers create code to accomplish their software tasks asked of them. There are always unsavory elements that will seek to intrude, rob or disturb this software or take advantage of the information the code provides. Hence the need to protect this software from harm and exploitation falls on the shoulders of developers that create security, such as in the form of firewalls or other means.  Security holes (as the name implies), are the vulnerabilities or weaknesses in software that could allow a targeted piece of code or technique to infiltrate and penetrate the system.

Two suggestions to be made to more effectively patch these holes in the system are software defined networks and security scanners.  Security Scanners can help protect up to 60% more than the most secure standalone software.(Lerida, 1999). Software Defined Networks, or SDNS, are a fairly recent development that come with their own issues, but are much more cost-effective than some other measures on a large scale at least.  “Network functions virtualization  (NFV) leverages virtualization to deploy Network Functions (NFs) on high-volume servers. This will enable innovations and opportunity for industry and academia. In contrast with traditional networks, NFV reduces the capital expenditure (CAPEX) and operating expenses (OPEX). However, its security becomes crucial. Specifically, virtualized network functions (VNFs) are an important part of NFV.”(Aljuhani, 2017)

PASSWORD CRACKING:

Passwords are our keys for logging into our devices, log into websites where we transact , log into social media  - plus a host of other needs. They are the single personal means by which we grant ourselves access to our 21st Century lives. But there are those elements out there who want those passwords for their own nefarious purposes. As Users of systems, our job is to protect those passwords. For others, their job is to crack the code. “Security issues in text-based password authentication are rarely caused by technical issues, but rather by the limitations of human memory, and human perceptions together with their consequential responses.”(Yildirim, 2019)  We should take these kinds of threats very seriously. “Passwords are considered one of the most significant risk factors in terms of security in information systems as they are vulnerable to attacks [8]. This vulnerability is mainly due to user behaviors and practices and not related to the password system itself. The main problem arises from the memorability issue which ultimately causes the other problems related to passwords such as reusing, sharing and choosing weak passwords. These problems are well known, and they are called the human factor problems’ by researchers in the password authentication domain. “ (Herley, 2009) 

The challenges are how to create passwords simple enough to remember and difficult enough to keep others from guessing them.  Is there a universal answer? According to the experts, it’s like chasing a rabbit down a hole.  How can we now and in the future be relatively sure our passwords will remain secure? It’s a numbers game, because there are growing numbers of hackers with super-fast algorithms that can guess passwords easily – if given the time do it. One very reasonable solution is the use of a professional password management system. There are many on the market available and keeping very long and complex passwords secure is a very good idea.(Kamat, 20018)  How do we create these highly valuable passwords? Make them long and complex, such as through password generation software. (Yildirim, 2019, p. 756)

 

 

References

Aljuhani, A., & Alharbi, T. (2017). Virtualized Network Functions security attacks and vulnerabilities. 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), Computing and Communication Workshop and Conference (CCWC), 2017 IEEE 7th Annual, 1–4. https://doi.org/10.1109/CCWC.2017.7868478.

Connolly, P. J. (2001, October 15). SECURITY ADVISER: Tomorrow is too late - SANS Institute’s Top 10 security holes expands to Top 20; it’s never too early to fight common vulnerabilities. InfoWorld, 23(42).

Stiawan,D.,  Suryani,M., Susanto,I., Aldalaien, M., Alsharif, N.,& Budiarto.R. (2021). Ping Flood Attack Pattern Recognition Using a K-Means Algorithm in an Internet of Things (IoT) Network. IEEE Access, 9, 116475–116484. https://doi.org/10.1109/ACCESS.2021.3105517

Gibbs, M. (1999). Attacked by Smurf. Network World, 16(8), 36. Retrieved from https://www.proquest.com/trade-journals/attacked-smurf/docview/215958615/se-2?accountid=32521

Herley, C., van Oorschot, P., Patrick, A.: Passwords: If we’re so smart, why are we still using them? In: Dingledine, R., Golle, P. (eds.) Financial Cryptography and Data Security, FC 2009. Lecture Notes in Computer Science, vol. 5628, pp. 230–237. Springer, Berlin (2009)

Kamat, C. Tomar, A. Tainwala and S. Akram, Performance analysis and survey on security of password managers and various schemes of p2p models, 2018 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), 2018, pp. 23-26, doi: 10.1109/RTEICT42901.2018.9012612.

Kelley, P. G., Komanduri, S., Mazurek, M. L., Shay, R., Vidas, T., Bauer, L., Christin, N., Cranor, L. F., & Lopez, J. (2012). Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms. 2012 IEEE Symposium on Security and Privacy, Security and Privacy (SP), 2012 IEEE Symposium On, 523–537. https://doi.org/10.1109/SP.2012.38

Kerner, S. M. (2019). How HTML5 Ping Is Used in DDoS Attacks. EWeek, N.PAG.

Lerida,J. & Grackzy,S.  A. Vina and J. M. Andujar, Detecting security vulnerabilities in remote TCP/IP networks: an approach using security scanners, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303), 1999, pp. 446-460, doi: 10.1109/CCST.1999.797953.

Liu, E., Nakanishi, A., Golla, M., Cash, D., & Ur, B. (2019). Reasoning Analytically about Password-Cracking Software. 2019 IEEE Symposium on Security and Privacy (SP), Security and Privacy (SP), 2019 IEEE Symposium On, 380–397. https://doi.org/10.1109/SP.2019.00070

Pastore, M. A., & Dulaney, E. A. (2004). Security+ Study Guide : Exam SY0-101: Vol. 2nd ed. Sybex.

Winder, D. (2022). Six security holes you need to plug now. PC Pro, 333, 100–102.

Yihunie, F., Abdelfattah, E., & Odeh, A. (2018). Analysis of ping of death DoS and DDoS attacks. 2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT), Systems, Applications and Technology Conference (LISAT), 2018 IEEE Long Island,1–4. https://doi.org/10.1109/LISAT.2018.8378010

Yıldırım, M., & Mackie, I. (2019). Encouraging users to improve password security and memorability. International Journal of Information Security, 18(6), 741–759. https://doi.org/10.1007/s10207-019-00429-y

Comments

Popular posts from this blog

Completing My Information Technology Blog - for now

RAM rods