Types
of Attacks:-
We shall classify
attacks with respect to two views: the common person’s view and a
technologist’s vies.
1 Attacks: A General View
From a common person’s
point of view, we can classify attacks into three categories, as shown below.
Criminal
Attacks criminal
attacks are the simplest to understand. Here, the sole aim of the attackers is
to maximize financial gain by attacking computer systems. The lists some forms
of criminal attacks.
Attack
|
Description
|
Fraud
Scams
Destruction
Identity theft
Intellectual property theft
Brand theft
|
Modern fraud attacks concentrate on
manipulating some aspects of electronic currency, credit cards, electronic
stock certificates, checks, letters of credit, purchase orders, ATMs, etc.
Scams come in various forms, some of the
most common ones being sale of services, auctions, multi-level marketing
schemes, general merchandise and business opportunities, etc. People are
enticed to send money in return of great profits, but end up losing their
money. A very common example is the Nigeria scam, where an email from Nigeria
(and other African countries ) entices people to deposit money into a bank account with a promise of hefty
gains. Whosoever gets caught in this scam loses money heavily.
Some sort of grudge is the motive behind
such attacks. For example, unhappy employees attack their own organization,
whereas terrorists strike at much bigger levels. For example, in the year
2000, there was an attack against popular Internet sites such as Yahoo!, CNN,
eBay, Buy.com, Amazon.com and E*TRADE where authorized users of these sites
failed to log in or access these sites.
This is best understood with a quote from
Bruce Schneier: Why steal from someone when you can just become that person?
In other words, an attacker does not steal anything from a legitimate user –
he becomes that legitimate user! For example, it is much easier to manage to
get the password of someone else’s bank account or to actually be able to get
a credit card on someone else’s name. Then that privilege can be misused
until it gets detected.
Intellectual property theft ranges from
stealing companies’ trade secrets, databases, digital music and videos,
electronic documents and books, software and so on.
It is quite easy to set up fake Web sites
that look like real Web sites. How would a common user know if she is
visiting the HDFC Bank site or an attacker’s site? Innocent users end up
providing their secrets and personal details on these fake sites to the
attackers. The attackers use these details to then access the real site,
causing an identity theft.
|
Publicity
Attacks:-
Publicity
attacks occur because the attackers want to see their names appear on
television news channels and newspapers. History suggests that these types of attackers are usually not
hardcore criminals. They are people such as students in universities or
employees in large organizations, who seek publicity by adopting a novel approach
of attacking computer systems.
One form of publicity
attacks is to damage (or deface) the Web pages of a site by attacking it. One
of the most famous such attacks occurred on the US Department of Justice’s Web
site in 1996. The New York times home page was also famously defaced two years
later.
Legal
Attacks:-
This
form of attack is quite novel and unique. Here, the attacker tries to make the
judge or the jury doubtful about the security of a computer system. This works
as follows. The attacker attacks the computer system and the attacked party
(say a bank or an organization) manages to take the attacker to the court.
While the case is being fought, the attacker tries to convince the judge and
the jury that there Is inherent weakness in the computer system and that she
has done nothing wrongful. The aim of the attacker is to exploit the weakness
of the judge and the jury in technology matters.
For example, an
attacker may sue a bank for a performing an online transaction, which she never
wanted to perform. In court, she could innocently say something like the bank’s
Web site asked me to enter a password and that is all that I provided; I do not
know what happened thereafter. A judge is likely to sympathize with the
attacker!
2 Attacks: A Technical View:-
From the technical point of view, we can classify
the type of attacks on computer and network systems into two categories for
better understanding: (a) Theoretical concept behind these attacks and (b)
Practical approaches uses by the attackers. Let us discuss these one-by-one.
Theoretical
Concepts As
we discuss earlier, the principles of security face threat from various
attacks. These attacks are generally classified into four categories, as
mentioned earlier, they are:
·
Interception – Discussed in the context
of confidentiality, earlier. It means that an unauthorized party has gained
access to a resource. The party can be a person, program or computer- based
system. Examples of interception are copying of data or programs and listening
to network traffic.
·
Fabrication -- Discussed in the context of authentication,
earlier. This involves creation of illegal object on a computer system. For
example, the attacker may add fake records to a database.
·
Modification – Discussed in the context
of integrity, earlier. For example the attacker may modify the values in a
database.
·
Interruption -- Discussed in the context
of availability, earlier. Here, the resource becomes unavailable, lost or
unusable. Examples of interruption are causing problems to a hardware device,
erasing program, data or operating systems components.
These attacks are
further grouped into two types: Passive
attacks and Active attacks. Let
us discuss these two attacks now.
Passive
Attacks: Passive attacks are those, wherein the
attacker indulges in eavesdropping or monitoring of data transmission. In other
words, the attacker aims to obtain information that is in transit. The term
passive indicates that the attacker does not attempt to perform any
modifications to the data. In fact, this is also why passive attacks are harder
to detect. Thus, the general approach to deal with passive attack is to think
about prevention, rather than detection or corrective actions.
Passive
attacks do not involve any modifications to the contents of an original
message.
Fig. Shows further classification of passive
attacks into two sub-categories. These categories are namely, release of message contents and traffic analysis.
Release of message
contents is quite simple to understand. When we send a confidential email
message to our friend, we desire that only she be able to access it. Otherwise,
the contents of the message are released against our wishes to someone else.
Using certain security mechanisms, we can prevent release of message contents.
For example, we can encode messages using a code language, so that only the
desired parties understand the contents of a message, because only they know
the code language. However, if many such messages are passing through, a
passive attacker could try to figure out similarities between them to come up
with some sort of pattern that provides her some clues regarding the
communication that is taking place. Such attempts of analyzing (encoded)
messages ot come up with likely patterns are the work of the traffic analysis
attack.
Active
attacks: unlike
passive attacks, the active attacks are based on modification of the original
message in some manner or the creation of a false message. These attacks cannot
be prevented easily. However, they can be detected with some effort and
attempts can be made to recover from them. These attacks can be in the form of
interruption, modification and fabrication.
In
active attacks, the contents of the original message are modified in some way.
·
Trying to pose as another entity
involves masquerade attacks.
·
Modification attacks can be classified
further into replay attacks and alteration of messages.
·
Fabrication causes Denial of Service (DOS)
attacks.
Masquerade is caused
when an unauthorized entity pretends to be another entity. As we have seen,
user C might pose as user A and send a message to user B. User B might be led
to believe that the message indeed came from user A. In masquerade attacks, an entity
poses as another entity. In attack may involve capturing the user’s
authentication sequence (e.g. user ID and password). Later, those details can
be replayed to gain illegal access to the computer system.
In a replay attack, a
user captures a sequence of events or some data units and re-sends them. For
instance, suppose user A wants to transfer some amount to user C’s bank
account. Both users A and C have account with bank B. User A might send an
electronic message to bank B, requesting for the funds transfer. User C could
capture this message and send a second copy of the same to bank B. Bank B would
haven o idea that this is an unauthorized message and would treat this as a
second and different, funds transfer request from user A. Therefore, user C would
get the benefit of the funds transfer twice: once authorized, once through a
replay attack.
Alteration of messages
involves some change to the original message. For instance, suppose user A
sends an electronic message Transfer $1000 to D’s account to bank B. User C
might capture this and change it to Transfer $10000 to C’s account.
Not that both the
beneficiary and the amount have been changed – instead, only one of these could
have also caused alteration of the message. Denials of service (DOS) attacks
make an attempt to prevent legitimate users form accessing some services, which
they are eligible for. For instance, an unauthorized user might send too many
login requests to a server using random user ids one after the other in quick
succession, so as to flood the network and deny other legitimate users from
using the network facilities.
3 The Practical side of Attacks
The attacks discussed
earlier can come in a number of forms in real life. They can be classified into
two broad categories: application- level attacks and network –level attacks, as
shown in fig.
Let us discuss these as
follows.
·
Application
level attacks – These attacks happen at an application
level in the sense that the attacker attempts to access, modify or prevent
access to information of a particular application or to the application itself.
Examples of this are trying to obtain someone’s credit card information on the
Internet or changing the contents of a message to change the amount in a
transaction, etc.
·
Network
level attacks – These attacks generally aim at reducing
the capabilities of a network by a number of possible means. These attacks
generally make an attempt to either slow down or completely bring to halt, a
computer network. Note that this automatically can lead to application level
attacks, because once someone is able to gain access to a network, usually she
is able to access/modify at least some sensitive information, causing havoc.
These two types of
attacks can be attempted by using various mechanisms, as discussed next. We
will not classify these attacks into the above tow categories, since they can
span across application as well as network levels.
Security
attacks can happen at the application level or the network level.
4 Programs that Attack
Let us now discuss a
few programs that attack computer systems to cause some damage or to create
confusion.
Virus One can launch an
application-level attack or a network level attack using a virus. In simple
terms, a virus is a piece of program code that attaches itself to legitimate
program code and runs when the legitimate programs runs. It can then infect
other programs in that computer or programs that are in other computers but on
the same network. This is shown in Fig. In this example, after deleting all the
files from the current user’s computer, the virus self-propagates by sending
its code to all users whose email addresses are stored in the current user’s
computer, the virus self-propagates by sending its code to all users whose
email addresses an restored in the current user’s address book.
Virus can also be
triggered by specific events (e.g. a virus could automatically execute at 12 PM
every day). Usually viruses cause damage to computer and network systems to the
extent that it can be repaired, assuming that the organization deploys good backup
and recovery procedures.
A virus is a computer
program that attaches itself to another legitimate program and causes damage to
the computer system or to the network.
During its lifetime, a
virus goes through four phases:
(a) Dormant phase: Here, the virus is
idle. It gets activated based on certain action or event (e.g. the user typing
a certain key or certain date or time is reached, etc). This is an optional
phase.
(b) Propagation phase: In this phase, a virus copies itself and each
copy starts creating more copies of self, thus propagating the virus.
(c) Triggering phase: A dormant virus moves into this phase when
the action/event for which it was waiting is initiated.
(d) Execution phase: This is the actual work of the virus, which
could be harmless (display some message on the screen) or destructive (delete a
file on the disk).
Viruses can be classified into the
following categories:
(a)
Parasitic
virus: This
is the most common form of viruses. Such a virus attaches itself to executable
files to attach itself and spread.
(b)
Memory-resident
virus: This
type of virus first attaches itself to an area of the main memory and then
infects every executable program that is executed.
(c)
Boot
sector virus:
This type of virus infects the master boot record of the disk and
spreads on the disk when the operating system starts booting the computer.
(d)
Stealth
virus: This virus has intelligence built in, which
prevents anti-virus software programs from detecting it.
(e)
Polymorphic
virus: A virus that
keeps changing its signature (i.e. identity) on every execution, making it very
difficult to detect.
There is another
popular category of viruses, called as the Macro virus. This virus affects
specific application software, such as Microsoft Word or Microsoft Excel. These
viruses affect the documents created by users and spread quite easily since
such documents are very commonly exchanged over email. There is a feature
called as macro these application software programs, which allows the users to
write small useful utility programs within the documents. Viruses attack these
macros and hence the name macro virus.
Worm: Similar in concept to a
virus, a Worm is actually different in implementation. A virus modifies a
program (i.e. it attaches itself to the
program under attack). A worm, however, does not modify a program. Instead, it
replicates itself again and again. This is shown in Fig. The replication grows so much that ultimately
the computer or the network on which the worm resides, becomes very slow,
finally coming to a halt. Thus, the basic purpose of a worm attack is different
from that of a virus. A worm attack attempts to make the computer or the
network under attack unusable by eating all its resources.
A worm does not perform
any destructive actions and instead, only consumes system resources to bring it
down.
Trojan
horse A
Trojan horse is a hidden piece of
code, like a virus. However, the purpose of a Trojan horse is different. Whereas
the main purpose of a virus is to make some sort of modifications to the target
computer or network, a Trojan horse attempts to reveal confidential information
to an attacker. The name (Trojan horse)
is due to the Greek soldiers, who hid inside a large hollow horse, which
was pulled by Troy citizens, unaware of its contents. Once the Greek soldiers
entered the city of Troy, they opened the gates for the rest of Greek soldiers.
In a similar fashion, a
Trojan horse could silently sit in the code for a login screen by attaching
itself to it. When the user enters the user id and password, the Trojan horse
could capture these details and send this information to the attacker without
the knowledge of the user who had entered the id and password. The attacker can
then merrily use the user id and password to gain access to the system. This is
shown in Fig.
A Trojan horse allows
an attacker to obtain some confidential information about a computer or a
network.
Comments
Post a Comment