Students are advised to carefully study the given scenario and complete three tasks based on this scenario.
Reconnaissance attack is defined as the unauthorized discovery and mapping of systems, services, or
vulnerabilities of the target network. If an attacker or intruder wants to attack a network, he needs some
information about target network like which IP (Internet Protocol) addresses are alive, which ports and
services are active on those IP addresses and what operating system is running. With reconnaissance attacks,
an attacker can gather such information and can execute an actual attack on the target network. For a
considerable time reconnaissance attacks are not detected because they have no impact on the network.
Operation of reconnaissance attacks
Reconnaissance attack is an initial step for an intruder to attack a network. To gather information
about the target network, first, an intruder performs a ping sweep of the target network to get IP addresses
that are alive. Then, the intruder performs port scans to determine which ports or services are active on the IP
addresses which are alive. After determining live ports, the intruder starts querying the ports to find what
operating system is running, the type and version of the applications, software running and the configuration
that has been applied on the target host. Reconnaissance attack can be used as an administrative tool or as an
attacking tool.
Access Attacks
Access attacks can be said as accessing network traffic in an illegal way. With the help of access attacks
intruders can retrieve data, gain access and can escalate their access privileges across the networks or
systems. They are used to gain access to confidential databases, web accounts and other sensitive
information. Access attack can occur in different ways.
DoS and DDoS
After reconnaissance attacks, DoS attacks are the most common form of security attacks. DoS attacks
are the most difficult attacks to eliminate completely because they are not targeted to gain access to the
network or the information on the network. Attackers use DoS attack to prevent legitimate users from
accessing information or services in the network.
Task-1
Reconnaissance attacks consist of Packet sniffers, Port scans, Ping sweeps and Internet information queries.
Describe each of these and discuss mitigation techniques for each one.
Task 2
Access attacks consist of Password attacks, Trust exploitation, Port redirection, Man-in-the-middle attacks and
Buffer overflow. Describe each type of access attack and also discuss how these attacks can be mitigated.
Task 3
Illustrate Denial of Service attack and Distributed Denial of Service attack with suitable examples of these
attacks.
Task 4
Select a published paper (preferably from the ACM DL or IEEE CSDL) that is discussing one aspect of Network
Security (For example, Latest encryption and decryption techniques, different types of attacks and their
mitigation etc). Summarize this paper in one page. The summary should include the main ideas presented in
the paper. The paper you select MUST NOT BE DISCUSSED BY ANOTHER STUDENT.