Preview

Transport Layer Security Paper

Good Essays
Open Document
Open Document
1605 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Transport Layer Security Paper
A Man in the Middle (MitM) attack occurs where communication between two network devices is intercepted by an attacker. The attacker can then impersonate both communicating devices, relaying information between the two, such that the communicating network devices will not know that their communication has been compromised. This allows the attacker to read potentially confidential data only intended for the two devices communicating, or even change information as they see fit.

The challenge for an attacker is finding vulnerabilities in software or in web protocols in order to intercept communication between two devices. Common target protocols to exploit are the Address Resolution Protocol (ARP), and the Domain Name System (DNS). Steps have been taken to make these protocols more secure in order to prevent MitM attacks. Furthermore, the Transport Layer Security (TLS) (and its predecessor, Secure Sockets Layer (SSL)) mitigate the risk from MitM attacks over the internet.

One of the more targeted protocols to exploit is the Address Resolution Protocol (ARP). This protocol converts
…show more content…
If a host wants to look up an IP address for a matching domain, it passes its request to a DNS server. If the server does not have a matching IP/domain address binding, it sends a request to another DNS server. This process continues until a match is found. Upon finding a match, DNS servers will store IP/domain address bindings in a cache which can be used to resolve future queries without the requirement to make requests to other places. In a simple example of DNS spoofing attack, an attacker can send a DNS request from a client and then, while the client recursively requests other clients for the correct IP address, the attacker can spam illegitimate replies trying to match a 16-bit query ID (65536 possibilies). If the attacker get a reply with a matching query ID before the legitimate reply arrives, it gets accepted and cached by the now compromised

You May Also Find These Documents Helpful

  • Better Essays

    of the System/Application domain is loss of data. System/application attacks are generalized into three categories: denial or destruction, alteration,…

    • 1234 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    In this Multi-Layered Security Plan, I will provide information on how to better improve the security of each domain and protect the data of Richman Investments. We shall secure all ports for incoming and outgoing traffic, only allowing the information that is needed through certain ports and to conduct business fast and efficiently. We will also be using the latest and most updated firewall protection and anti-virus software to add a better degree of security. This will be implemented throughout the entire company and we will inform all employees of this MLS plan.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 01

    • 424 Words
    • 2 Pages

    Allows a network device to intercept and read each network packet that arrives in its entirety.…

    • 424 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt1330 Unit 3.1 Essay

    • 488 Words
    • 2 Pages

    MITM attacks are difficult to avoid because even if they are occurring you do not often know about them. The best we can do is mitigate the chance of them occurring by making it more difficult for attackers by using cryptographic techniques. This can then be followed up with other techniques to further enhance the secureness and private-ness of our communications. We want to protect against MITM attacks to keep our sensitive data private and avoid any negative implications that releasing this data may…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Technical Paper

    • 2659 Words
    • 9 Pages

    Global Finance, Inc. (GFI) is a hypothetical company, which has grown rapidly over the past year. GFI has invested in its network and designed it to be fault tolerant and resilient from any network failures. However, although the company’s financial status has matured and its network has expanded at a rapid pace, its overall network security posture has not kept up with the company growth. The trusted computing base (TCB) internal network within the Global Finance, Inc. Network Diagram hosts the company’s mission critical systems that are vital to the company’s operations that also affect the overall financial situation. The most vital application servers is the company is their Oracle database and email system. GFI cannot afford system or network outages, as its cash flow and financial systems heavily depend on the network stability and availability. GFI has recently experienced multiple network attacks resulting in a total estimated loss at more than $1,000,000.…

    • 2659 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Robot/intermediary process is a form of attack that is lunched on one computer but attacks another computer.…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lesson 1

    • 457 Words
    • 2 Pages

    10 The primary method for transmitting IPv6 traffic over an IPv4 network is called Tunneling…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Apt Spoofing Attack

    • 300 Words
    • 2 Pages

    Address Resolution Protocol (ARP) spoofing attack is a typical man-in-the middle attack where an attacker intercepts communication between two computers (Host B and Host A) by linking the victim's IP address with his MAC address. As a result, all the traffic that is meant for the victim, will reach the attacker first. The attacker eventually can steal sensitive information or prepare for more attacks. An attacker can intercept traffic through passive or active attacks. In a passive attack, an attacker eavesdrops or listen to traffic and this can reveal sensitive information, for example unencrypted clear text such as login usernames or identification and password. Active attack on the hand can be used to spoofing and more.…

    • 300 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Web-based attacks – the increasing pervasiveness of Web browser applications along with increasingly common, easily exploited Web browser application security vulnerabilities has resulted in the widespread growth of Web-based threats. Attackers wanting to take advantage of client-side vulnerabilities no longer need to actively compromise specific networks to gain access to those computers. Instead, they can focus on attacking and compromising websites to mount additional, client-side attacks.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Huhuhu

    • 1690 Words
    • 7 Pages

    DNS servers maintain a database containing IP addresses mapped to their corresponding domain names. To access a computer on the Internet, users need only specify its domain name.…

    • 1690 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Hacking2E Lab03 AW

    • 563 Words
    • 3 Pages

    provides the names and IP addresses of all intermediate systems. That can be used for an attack by…

    • 563 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    In last several years, Daniel of Service attack (DoS)/ Distributed Daniel of Service attack (DDoS) has become one of the most critical threats for internet security, though it’s easily accomplished by the intruders. Even, proven and practicable attacking software are also available on the Internet. To get rid of this attack, first of all we have to know its consequences.…

    • 1021 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Masking one 's IP address is a standard practice when conducting illicit activities. A well-configured proxy provides robust anonymity and does not log activity, thereby frustrating law enforcement efforts to identify the original location of the person(s) involved. A proxy allows actors to send network traffic through another computer, which satisfies requests and returns the result. Students or employees can use proxies to communicate with blocked services such as Internet Relay Chat (IRC) and instant messaging, or to browse websites that administrators block. Attackers also use proxies because Internet Protocol (IP) addresses are traceable, and they do not want to reveal their true locations. As one example, iDefense wrote about the fast-flux architecture (ID# 484463), which uses a proxy infrastructure to satisfy requests. Proxies are also a common source of spam e-mail messages, which use open relays (a simple mail transfer protocol [SMTP] proxy).…

    • 1647 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    The Dawn of The net

    • 399 Words
    • 1 Page

    The dawn of the net is a more or less 20 minutes show that illustrates the process or the sequence involving the internet. As I watched the show, I was really amazed how the internet works, how the message was being send and what the computer usually do whenever there are unacceptable websites. The show usually more on what is inside the computer. Through this, I was able to know the warriors of the net and they are the TCP packet or known as Transfer Control Protocol, the ICMP or Internet Control Message Protocol, the UDP, Router, Ping of death, and Router Switch. The Transfer Control Protocol looks like the bus where the information is being packed. The Router is programmable memory. The router's switch on the other hand is more specific of the destination of the packet. The Ping of death in the computer refers to the police that captures the hacker and destroys the unacceptable sites. The process involving is a little bit long.Whenever the user types something in the website, the information is packed and it is already called as the TCP packet. the TCP packet is the labeled and the address is being placed and it will be send to the Router. The Router sends the TCP packet into the Router Switch which guides it to the network interface and it will be received by the proxy or sometimes referred to as the mailman. It is then that the TCP packet is being opened and its contents are checked. If the contents of the TCP packet consist of sites that are unacceptable just like pornographic sites it is destroyed. After this, the firewall will chose what TCP packets can come inside. There would be few that will be remained to enter the spider web. After the spider web, it will be received again by the firewall wherein the TCP packet is then categorized into 80 or 25. The packet would be destroyed if it does not fall into either 80 or 25. After this it will go to the proxy server where it would be open and unpacked. And lastly, the information is being send back to you. It…

    • 399 Words
    • 1 Page
    Good Essays
  • Good Essays

    Warrior Net

    • 653 Words
    • 3 Pages

    Well it is possible The clip shows how the process are done. Let’s say I’m using a web browser and I’m typing the site google.com on the address bar, when I hit enter ,the flow of information begins. And this information is what we called the packets or data and they are delivered by a personal mailroom (the packet packages) . Before the information was sent on its way to the network, the sender’s address, receiver’s address, proxy server address and the type of packet containing the information is modified and attached together in a packet and…

    • 653 Words
    • 3 Pages
    Good Essays