Question

In: Computer Science

•Describe security problems inherent to the TCP/IP protocol suite..

•Describe security problems inherent to the TCP/IP protocol suite..

Solutions

Expert Solution

Though commonly used together, TCP and IP are actually separate protocols. The “connectionless” Internet Protocol (IP) allows information streams to be broken up into segments known as data packets (or simply, packets), which may then be sent from point to point via various routing protocols used by the machines along the transit route.

IP takes either of two forms: IPv4 or IPv6. The Address Resolution Protocol (ARP), Internet Group Multicast Protocol, and Internet Control Message Protocol (ICMP) are transmission mechanisms that also exist at the internet layer. When information is broken up into packets, the IP source generates a listing of the routes that packets must take to reach their intended destination. This listing may in turn be used by the recipient to send information back to the sender.

Unfortunately, at this stage attackers can also gain access to the source path, and modify the options in the route for a data packet. In what’s known as a source route attack, an attacker may also be at liberty to read the data packets, potentially gaining access to confidential information, financial details, or intellectual property. This risk may be offset to some extent by dropping or forwarding any data packets which carry the source route option.

TCP and Reassembly

TCP is a connection-based protocol, requiring a formal connection to be established between sender and receiver before any data is passed. This is done via a “three-way handshake“, in which a client first sends a SYN segment to a server requesting that a connection be set up, the server responds with a SYN-ACK segment acknowledging the request, and the client sends back an ACK segment to confirm, establishing the connection.

Data packets reaching their destination may arrive in a logical sequence, or out of order. In some cases, they may not arrive at all. At the data’s origin point, it’s the job of the Transmission Control Protocol or TCP to break the information into packets, which it then assigns numbers to for reassembly at the destination point.

Predicting TCP Sequences

With some diligent application of the right kind of algorithms, it’s possible for an attacker to guess the sequence of numbers that TCP assigns to a stream of data packets. Knowing the next number in a transmission sequence, an attacker may potentially “step in” to an ongoing communication and pose as the originator of the message.

TCP sequence numbers are typically increased by a constant amount each second, and by half of that number each time a connection begins. So one way of guarding against the prediction of the next number in a sequence by an attacker who may have gained access to a server through apparently legitimate means is to generate a random increment for the initial sequence number.

TCP Blind Spoofing

Here, an attacker is able to guess both the sequence number of an ongoing communication session and its port number. They are then in a position to carry out an injection attack, inserting corrupted or fraudulent data into the stream – or worse, malicious code or malware.

SYN Flooding

Remember those SYN and ACK segments needed to establish a TCP connection? Under the protocol rules, a client or server receiving these requests is required to respond to them, to keep the communication going. This requirement is the basis of a SYN flooding attack, whereby multiple SYN packets are spoofed using a bogus source address, then sent to a targeted server.

Under compulsion to respond, the server will send out SYN-ACK packets to an address that doesn’t exist, creating a flood of half-opened sessions awaiting replies that will never come. During this time, no fresh connections will be allowed by the server, and connection requests from legitimate users will be ignored – a Denial of Service or DoS scenario.

Session Hijacking

Using a packet sniffer (a tool for detecting the presence and movement of data packets), an attacker may capture data packets and gain full access to an HTTP session. If there’s weak authentication between a web server and its clients, the attacker may assume full control of the client’s rights, switching the communication to one directly between them and the targeted server.

Man-in-the-Middle Attacks

In an unsecured communication, data may pass between sender and receiver as “clear text” – unprotected and unencrypted information which may include user credentials and passwords. By spoofing an IP address, and attacker may intercept an ongoing transmission and become the man (or woman, or bot) in the middle of a communication, steering valuable data towards themselves – or misinformation and malware toward the recipient.

Web Application and Browser Security Weaknesses

Typically, a web browser will create a cache of the sites you’ve visited, consisting of a portion of your hard drive where data from various pages (including images, passwords, and credentials) is stored for easy access. If a device becomes compromised, a hacker may gain access to this cache and your confidential data without the need for authentication on their part. That’s why it’s advisable to clear your browser caches and disable the automatic saving of passwords on unsecured machines.

Cookie Poisoning

Many web applications and resources use cookies to store your credentials and activity histories so that you don’t have to log into them on repeat visits. These are stored on your machine and may be modified (poisoned) or stolen by an attacker who may use cookies containing your login details to gain access to web sites from their own system – or even go on to steal your identity.

Cookie poisoning attacks may be blunted by a Web Application Firewall (WAF), which can analyze HTTP sessions and trace the conditions set for cookies deposited by a given web server.

Replay Attacks

In this specialized form of man-in-the-middle attack, a hacker may spoof the IP address of a client, redirect their machine, and send the same data repeatedly to a targeted server. This replayed data may also be modified or corrupted prior to its repeat sending.

Enhanced session tracking features on a web browser can help reduce the risk of these replay attacks, as they may red flag the repeat data traffic as illegitimate, based on their stored history.

Cross-site Scripting

This form of assault begins with a session hijacking, after which an attacker injects malicious code into a web application or browser that will be executed when it gets to its destination. The hijacking typically occurs using cookies or tokens stolen from a legitimate user’s previous sessions.

Enabling enhanced security controls for cookie-dependent user authentication and/or disabling the running of scripts on visited sites are guards against this.

DNS Protocol Attacks

Assaults on the Domain Name System (DNS, which resolves alpha-numeric IP addresses with more recognizable host domain names like MyWebsite.com) allow attackers to modify DNS records so that they misdirect traffic to incorrect or spoofed IP addresses.

DNS cache poisoning falsifies information in the DNS cache, with the aim of redirecting traffic to a site or resource set up by the attackers – the classic pharming ploy that lures unsuspecting users to a bogus web site that’s identical in appearance to a legitimate one, for harvesting user credentials or financial data. DNS spoofing alters the IP address of a computer to match that of a DNS server, re-routing traffic to the attacker’s own machines.

A set of extensions known as DNSSEC (DNS security) have been issued to help address DNS security vulnerabilities.


Related Solutions

1) a) Describe the design principles of the TCP/IP protocol that explain the decentralised nature of...
1) a) Describe the design principles of the TCP/IP protocol that explain the decentralised nature of the Internet and Web. How does the TCP/IP protocol promote decentralisation? b) Explain how individual machines and end users are empowered by the TCP/IP and HTTP protocols. Give illustrations to support your answers.
Describe the difference between IP and Network Access layer in TCP protocol and also explain the...
Describe the difference between IP and Network Access layer in TCP protocol and also explain the control information embedded in these two layers
A protocol architecture, such as the TCP/IP architecture or OSI, provides a framework for standardization. Within...
A protocol architecture, such as the TCP/IP architecture or OSI, provides a framework for standardization. Within such an architecture, the overall communications function is decomposed into a number of distinct layers with a special design principle used. What is this principle and how does it work? Describe in detail.
Research on TCP, UDP, and IP. And Define TCP, UDP, and IP Compare the header of...
Research on TCP, UDP, and IP. And Define TCP, UDP, and IP Compare the header of TCP, UDP, and IP packets. Why are there more fields in PCP header than UDP and IP?
Describe the services of the IP protocol, and potentially ICMP protocol, with respect to flow control...
Describe the services of the IP protocol, and potentially ICMP protocol, with respect to flow control (ensuring the sender does not overwhelm the receiver).
1.ARPANET originally used TCP/IP as a routing protocol for messages True False 2. Programming language developed...
1.ARPANET originally used TCP/IP as a routing protocol for messages True False 2. Programming language developed for business use and meant to run on multiple different computers. COBOL Fortran LISP BASIC 3.Transistors and vacuum tubes are no longer used in computers True False 4.The PDP series of minicomputers were developed by IBM. True False 5.Programming language popular with engineers because the code looked like algebra COBOL Fortran LISP BASIC
Describe the concept of flow control and briefly describe the mechanism/s implemented by the TCP protocol...
Describe the concept of flow control and briefly describe the mechanism/s implemented by the TCP protocol for this purpose.
Briefly describe the operation of TCP/IP in the process of sending a message from port 3...
Briefly describe the operation of TCP/IP in the process of sending a message from port 3 on host A to port 1 on host B.
n a short one half page essay, briefly describe TCP/IP. What is it? When was it...
n a short one half page essay, briefly describe TCP/IP. What is it? When was it introduced? Why is it called a suite? What is a Request for Comment (RFC)? Create a table showing the five standards organizations involved with TCP/IP. Include in the table:                     Name                     Brief History                        Responsibilities              Website URL
Describe the major benefits and concerns of installing Internet Protocol (IP) based cameras for surveillance systems....
Describe the major benefits and concerns of installing Internet Protocol (IP) based cameras for surveillance systems. Name four building types that are suitable for adopting IP-based cameras.。。。。
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT