ijiret sapna hd network security issues measures and tools for intruder attacks

4
ISSN: XXXX-XXXX Volume X, Issue X, Month Year Network Security Issues, Measures and Tools for Intruder Attacks Sapna H D Dept of Computer Science and Engineering BTL Institute of Technology Bangalore, India [email protected] ABSTRACT Network Security concerns with concept of designing a secured network .It is the crucial task in any enter- prise or organization development. The security threats are increasing day by day and making high speed wired/wireless network and internet services, insecure and unreliable. Now a - days security measures works more importantly towards fulfilling the cutting edge demands of today’s growing indus- tries. The need is also induced in to the areas like defense, where secure and authenticated access of resources are the key issues related to information security Securing a network mainly involves applying poli- cies and procedures to protect different network de- vices from unauthorized access. Servers such as web servers, file servers, mail servers, etc., are the im- portant devices in a network. Hence, securing these servers is the essential step followed in every security implementation mechanism. This paper explores the important security measures related to different net- work scenarios, so that a fully secured network envi- ronment could be established in an organization. INTRODUCTION Network security is an important task that must be seriously considered when designing a network. Network security is composed of the provisions and policies adopted by a network administrator .It helps to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. The policies should be such that they should protect the network devices from threats and simultaneously, the unauthorized users must be prevented from accessing the network. Network security involves the authorization of access to data in a network, which is controlled by the net- work administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a va- riety of computer networks, both public and private, that are used in everyday jobs conducting transac- tions and communications among businesses, gov- ernment agencies and individuals. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and over-

Category:

Documents


2 download

TRANSCRIPT

Page 1: IJIRET Sapna HD Network Security Issues Measures and Tools for Intruder Attacks

ISSN: XXXX-XXXX Volume X, Issue X, Month Year

Network Security Issues, Measures and Tools for

Intruder Attacks

Sapna H D

Dept of Computer Science and Engineering

BTL Institute of Technology

Bangalore, India

[email protected]

ABSTRACT

Network Security concerns with concept of designing

a secured network .It is the crucial task in any enter-

prise or organization development. The security

threats are increasing day by day and making high

speed wired/wireless network and internet services,

insecure and unreliable. Now – a - days security

measures works more importantly towards fulfilling

the cutting edge demands of today’s growing indus-

tries. The need is also induced in to the areas like

defense, where secure and authenticated access of

resources are the key issues related to information

security

Securing a network mainly involves applying poli-

cies and procedures to protect different network de-

vices from unauthorized access. Servers such as web

servers, file servers, mail servers, etc., are the im-

portant devices in a network. Hence, securing these

servers is the essential step followed in every security

implementation mechanism. This paper explores the

important security measures related to different net-

work scenarios, so that a fully secured network envi-

ronment could be established in an organization.

INTRODUCTION

Network security is an important task that must be

seriously considered when designing a network.

Network security is composed of the provisions and

policies adopted by a network administrator .It helps

to prevent and monitor unauthorized access, misuse,

modification, or denial of a computer network and

network-accessible resources. The policies should be

such that they should protect the network devices

from threats and simultaneously, the unauthorized

users must be prevented from accessing the network.

Network security involves the authorization of access

to data in a network, which is controlled by the net-

work administrator. Users choose or are assigned an

ID and password or other authenticating information

that allows them access to information and programs

within their authority. Network security covers a va-

riety of computer networks, both public and private,

that are used in everyday jobs conducting transac-

tions and communications among businesses, gov-

ernment agencies and individuals. Network security

is involved in organizations, enterprises, and other

types of institutions. It does as its title explains: It

secures the network, as well as protecting and over-

Page 2: IJIRET Sapna HD Network Security Issues Measures and Tools for Intruder Attacks

International Journal of Innovatory research in Engineering and Technology - IJIRET

ISSN: XXXX-XXXX Volume X, Issue X, Month Year 10

seeing operations being done. The most common and

simple way of protecting a network resource is by

assigning it a unique name and a corresponding

password.

BACKGROUND

Types of Security Attacks

Networks are subject to attacks from malicious

sources. Attacks are of two categories:

1. "Passive" when a network intruder inter-

cepts data traveling through the network.

2. "Active" in which an intruder initiates com-

mands to disrupt the network's normal oper-

ation.

Passive Attacks

This type of attacks includes attempts to break the

system by using observed data. Example of the pas-

sive attack can be plain text attacks, where both plain

text and cipher text are already known to the attacker.

Active Attacks

This type of attack requires the attacker to send data

to one or both of the parties, or block the data stream

in one or both directions. The attributes of active at-

tacks are as follows,

• Interruption: attacks availability such as denial-of-

service attacks.

• Modification: attacks integrity.

• Fabrication: attacks authenticity.

3. SECURITY METHODS

a) Cryptography

• The most widely used tool for securing information

and services.

• Cryptography relies on ciphers, which is nothing

but mathematical functions used for encryption and

decryption of a message

.

b) Firewalls

A firewall is simply a group of components that col-

lectively form a barrier between two networks

There are three basic types of firewalls:

1) Application Gateways

This is the first firewall and is sometimes also known

as proxy gateways as shown in figure 1. These are

made up of bastion hosts so they do act as a proxy

server. This software runs at the Application Layer of

the ISO/OSI Reference Model. Clients behind the

firewall must be categorized & prioritized in order to

avail the Internet services. This is been the most se-

cure, because it doesn't allow anything to pass by

default, but it also need to have the programs written

and turned on in order to start the traffic passing.

Figure 1: A sample application gateway

Source: [2]

2) Packet filtering

Page 3: IJIRET Sapna HD Network Security Issues Measures and Tools for Intruder Attacks

International Journal of Innovatory research in Engineering and Technology - IJIRET

ISSN: XXXX-XXXX Volume X, Issue X, Month Year 11

Packet filtering systems path the packets between

internal and external hosts, but they do it selectively.

They allow or block certain types of packets in a way

that reflects a site's own security policy as shown in

Figure 2. The kind of router used in a packet filtering

firewall is known as a screening router.

It can make a distinction between a packet that

came from the Internet and one that came from our

internal network. Also It can be recognized which

network the packet came from with certainty, but it

can't get more specific than that.

.

Figure 2: A sample packet filtering gateway

Source: [2]

3) Hybrid Systems

In an attempt to combine the security feature of the

application layer gateways with the flexibility and

speed of packet filtering, some developers have cre-

ated systems that use the principles of both.

NETWORK SECURITY

MEASURES

The measures taken to secure the Network are

1. Strong firewall and proxy to be used to keep un-

wanted people out.

2. A strong Antivirus software package and Internet

Security Software package should be installed.

3.For authentication, use strong passwords and

change it on a weekly/bi-weekly basis.

4.When using a wireless connection, use a robust

password.

5.Employees should be cautious about physical secu-

rity.

6. Prepare a network analyzer or network monitor

and use it when needed.

7.Implementation of physical security measures like

closed circuit television for entry areas and restricted

zones.

8.Security barriers to restrict the organization's pe-

rimeter.

NETWORK SECURITY

TOOLS

Following tools are used to secure the Network

-map Security Scanner is a free and open source

utility for network exploration or security auditing.

protocol analyzer for UNIX and Windows.

-weight network intrusion detection

and prevention system excels at traffic analysis and

packet logging on IP networks.

ty that reads and writes

data across TCP or UDP network connections.

SECURITY MANAGEMENT

ISSUES

is a big challenge nowadays. Organizations have

some pre-defined security policies and procedures

Page 4: IJIRET Sapna HD Network Security Issues Measures and Tools for Intruder Attacks

International Journal of Innovatory research in Engineering and Technology - IJIRET

ISSN: XXXX-XXXX Volume X, Issue X, Month Year 12

but they are not implementing it accordingly.

Through the use of technology, we should impose

these policies on people and process.

-quality resources for

deployment and efficient management of network

security infrastructure.

c-

tive to deploy and manage day-to–day network secu-

rity operations and troubleshoots in the long run.

Ensuring a fully secure networking environment

without degradation in the performance of business

applications.

On a day-to-day basis, enterprises face the chal-

lenge of having to scale up their infrastructure to a

rapidly increasing user group, both from within and

outside of the organizations. At the same time, they

also have to ensure that performance is not compro-

mised.

m-

ber of point products in the network. Securing all of

them totally while ensuring seamless functionality is

one of the biggest challenges they face while plan-

ning and implementing a security blueprint.

u-

rity blueprint is a challenge.

Network Security cuts across all functions and

hence initiative and understanding at the top level is

essential. Security is also crucial at the grassroots

level and to ensure this, employee awareness is a big

concern. Being update about the various options and

the fragmented market is a challenge for all IT man-

agers. In the security space, the operational phase

assumes a bigger importance. Compliance also plays

an active role in security; hence the business devel-

opment team, finance, and the CEO's office have to

matrix with IT to deliver a blueprint.

CONCLUSION

Security has become important issue for large com-

puting organizations. We can get different definitions

and ideas for the security and risk measures from the

perspective of different persons. Security policies

should be designed first before its

implementation in such a way, so that future altera-

tion and adoption can be acceptable and easily man-

ageable. The security system must be tight but must

be flexible for the end-user to make him comfortable,

he should not feel that security system is moving

around him. Users who find security policies and

systems too restrictive will find

ways around them. same time easily manageable and

adoptable.

REFERENCES [1] A beginner’s guide to network security, CISCO

Systems ,2001

[2] Next Generation Firewall in Modern Network

Security Prof. Dr. K. N. Barbole1, Prof. S.D. Sa-

tav21Professor, Department of Electronics

&Telecommunication Engineering JSCOE, Hadapsar, Pune.

2 Asst. Professor, Department of Computer Engineer-

ing, JSCOE, Hadapsar, Pune.

[3]Enhancing Network Security in Linux Environ-

ment, Technical Report, IDE1202,February 2012

[4] Al-Akhras, M.A., “Wireless Network Security

Implementation in Universities” In Proc. of Infor-

mation and Communication

Technologies, 2006. ICTTA '06., Vol. 2, pp. 3192 –

3197, 2006.

[5] Brenton, C. and Hunt, C. (2002): Mastering Net-

work Security, Second Edition, Wiley