Professional Documents
Culture Documents
Introduction To Network Security
Introduction To Network Security
Definition I
Network Properties I
Network Properties II
Common Attacks I
Common Attacks II
Common Attacks IV
Network layer I
Network layer II
Defense: Both end-host and network-based solutions to the
SYN flooding attack have merits. Both types of defense are
frequently employed, and they generally do not interfere when
used in combination. Because SYN flooding targets end hosts
rather than attempting to exhaust the network capacity, it seems
logical that all end hosts should implement defenses, and that
network-based techniques are an optional second line of de-
fense that a site can employ.End-host mechanisms are present
in current versions of most common operating systems. Some
implement SYN caches, others use SYN cookies after a thresh-
old of backlog usage is crossed, and still others adapt the SYN-
RECEIVED timer and number of retransmission attempts for
SYN-ACKs.Because some techniques are known to be ineffec-
tive (increasing backlogs and reducing the SYN-RECEIVED timer),
Introduction to Network Security
The link layer, which is the method used to move packets from
the network layer on two different hosts, is not really part of the
Internet protocol suite, because IP can run over a variety of dif-
ferent link layers. The processes of transmitting packets on a
given link layer and receiving packets from a given link layer can
be controlled both in the software device driver for the network
card, as well as on firmware or specialist chipsets. These will
perform data link functions such as adding a packet header to
prepare it for transmission, then actually transmit the frame over
a physical medium.
Introduction to Network Security
Security Mechanisms I
Security Mechanisms II
Hash Functions: There is no usage of any key in this al-
gorithm. A hash value with fixed length is calculated as
per the plain text which makes it impossible for contents of
plain text to be recovered. Many operating systems use
hash functions to encrypt passwords. Examples of such
functions are SHA-256 and SHA3-256,
Asymmetric Key Cryptography: Under this system a pair
of keys is used to encrypt and decrypt information. A pub-
lic key is used for encryption and a private key is used for
decryption. Public key and Private Key are different. Even
if the public key is known by everyone the intended receiver
can only decode it because he alone knows the private
key. Examples of asymmetric key cryptography are Diffie-
Hellman, ECC, El Gamal, DSA and RSA
Introduction to Network Security
Security Mechanisms IV
Introduction to Network Security
Security Mechanisms V
Security Mechanisms VI