1. Security Attacks
X.800 and RFC 2828, classified security attacks in terms of passive and active. A passive attack attempts to learn or make use of
information from the system but does not affect system resources. An active
attack attempts to alter system resources or affect their operation.
1.1. Passive Attacks
Passive attacks are in the nature of eavesdropping on, or monitoring of, transmissions. The goal of the opponent is to obtain information that is being transmitted. Two types of passive attacks are the release of message contents and traffic analysis.
Release of message contents: A
telephone conversation, an electronic mail message, and a transferred file may
contain sensitive or confidential information. We would like to prevent an
opponent from learning the contents of these transmissions.
Traffic analysis: Suppose that we had a way of
masking the contents of messages or other information traffic so that
opponents, even if they captured the message, could not extract the information
from the message. The common technique for masking contents is encryption. If
we had encryption protection in place, an opponent still might be able to
observe the pattern of these messages. The opponent could determine the
location and identity of communicating hosts and could observe the frequency
and length of messages being exchanged. This information might be useful in
guessing the nature of the communication that was taking place.
Passive attacks are very difficult to detect, because they
do not involve any alteration of the data. Typically, the message traffic is
sent and received in an apparently normal fashion, and neither the sender nor
the receiver is aware that a third party has read the messages or observed the
traffic pattern. However, it is feasible to prevent the success of these
attacks, usually by means of encryption. Thus, the emphasis in dealing with
passive attacks is on prevention rather than detection.
1.2. Active Attacks
Active attacks involve some modification of the data stream
or the creation of a false stream and can be subdivided into four categories:
masquerade, replay, modification of messages, and denial of service.
Masquerade takes place when one entity pretends to be
a different entity. A masquerade attack usually includes one of the other forms
of active attack. For example, authentication sequences can be captured and
replayed after a valid authentication sequence has taken place, thus enabling
an authorized entity with few privileges to obtain extra privileges by
impersonating an entity that has those privileges.
Replay involves the passive capture of a data unit
and its subsequent retransmission to produce an unauthorized effect.
Modification
of messages simply means that some portion of a legitimate message is
altered, or that messages are delayed or reordered, to produce an unauthorized
effect. For example, a message meaning “Allow John Smith to read confidential
file accounts” is
modified to mean “Allow Fred Brown to read confidential file accounts."
The denial of service prevents or inhibits the normal use or management of communications facilities. This attack may have a specific target; for example, an entity may suppress all messages directed to a particular destination (e.g., the security audit service). Another form of service denial is the disruption of an entire network either by disabling the network or by overloading it with messages so as to degrade performance.
In a fabrication attack, an individual inserts counterfeit information, resources, or services into the network. These attacks are attacks against the authentication, access control, and authorization capabilities of the network. Sydney CCTV
ReplyDeleteThis comment has been removed by the author.
ReplyDeleteInformative.
ReplyDeleteBellwether
ISO 27001 Consulting Company