0% found this document useful (0 votes)
95 views30 pages

Week2 Module5 PDF

The document classifies and describes common types of cyber attacks including DoS/DDoS, XSS, SQL injection, man-in-the-middle, birthday, password, eavesdropping, phishing, drive-by download attacks. It provides details on each attack type including how they work and examples.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
95 views30 pages

Week2 Module5 PDF

The document classifies and describes common types of cyber attacks including DoS/DDoS, XSS, SQL injection, man-in-the-middle, birthday, password, eavesdropping, phishing, drive-by download attacks. It provides details on each attack type including how they work and examples.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

CYBER SECURITY

Week 2: Cyberattacks – Classification of Attacks –


Vulnerabilities – Threats – Risks
Module 5: Classification of Cyber Attacks
Course Co-Ordinator Content Reviewer Content Writer
Dr. Padmavathi Ganapathi Dr V Rhymend Uthariaraj Ms. M. Kalaivani
Professor-Department of Professor, Assistant Consultant
Computer Science Department of Information Tata Consultancy Services
Avinashilingam Institute for Technology TCS Centre, Infopark
Home Science and Madras Institute of Technology Kakkanad, Kochi-682042.
Higher Education for Women Campus, kalaivanim@gmail.com
(Deemed-to-be-University), Anna University, +919597390087
Coimbatore Chennai-600 044.
padmavathi.avinashilingam@ rhymend@annauniv.edu
gmail.com +919444150081
9486772744

1
Objectives

✓Familiarize the technical classification of Cyber


Attacks
✓Demonstrate how the Cyber Attacks affect the
system and what are the damages caused to
the system

2
Learning Outcomes

✓Classify the Cyber Attack types based on


certain factors
✓Appraise the common types of Cyber Attack

3
Outline
Typical Cyber-attack types
DoS and DDoS Attack
XSS attack
SQL injection attack
Man-in-the-middle attack
Birthday attack
Password attack
Eavesdropping attack
Phishing and spear phishing
Drive-by download attack

4
Most Common types of Cyber-attacks

DoS and DDoS attack


Drive-by download XSS attack
attack

Phishing and spear


SQL Injection attack
phishing attack Cyber Attack
types

Eavesdropping attack Man-in-the-Middle attack

Password attack Birthday attack

5
DoS and DDoS Attack

• DoS makes the system unresponsive to the


actual service requests
• It does so by overpowering the system resources
• DDoS attack is similar to the DoS attack
• Difference is that the attack is launched from a
series of host machines

6
DoS and DDoS Attack types

Dos and
DDoS Attack
Types

SYN flood Botnets


Attack

TCP SYN Ping of death


flood attack attack
Tear Drop Smurf
attack attack

7
SYN flood attack

• This attack compromises the


initial handshake process
• It makes the server unavailable
for the actual traffic
• It sends SYN packets repeatedly
and eventually overwhelms the
targeted server

8
TCP SYN flood attack
• During TCP connection establishment the attacker
fills up the target machine with multiple connection
requests
• It makes target machine to timeout, awaiting for
permission to connect from the server

9
Tear Drop attack
• It is a DoS attack where fragmented packets
are sent to a target machine
• This makes the victim’s computer to crash
overwhelming with packets

Packet #1 IP ID = x
Packet length = 820
IP Header Fragment offset = 0
More fragments = 1
Packet #2
IP ID = x
IP Header Packet length = 820
Fragment offset = 800
More fragments = 0

10
Smurf attack

• It is a DoS attack which involves IP spoofing


• A Ping is issued to the entire IP Broadcast
addresses
• It stimulates response to the ping packet and
the target computer
• The process is repeated and automated to
generate large amount of network congestion

11
An Example for Smurf Attack

12
Ping of death attack

• It happens when the network packets are used


to ping the target machine with large packet size

13
Botnets
• Botnets are millions of computers compromised
with viruses by the hacker who is under control
of DDoS attacks
• As these bots can be located anywhere, they
are generally very difficult to identify

14
Cross-site scripting attack (XSS Attack)

2 The Attacker injects a payload The website transmits the


3
in the website’s database with victim’s browser the page with
malicious JavaScript that the attacker’s payload. The
steals cookies. victim’s browser executes the
Website malicious scripts.

5 The attacker extracts victim’s


cookie, after which he use it
for session hijacking.

Attacker
Website Visitor

1 Attacker discovers a website 4 After script execution victim sends


for having script injection
his cookie to the attacker.
vulnerabilities.

15
SQL injection attack

• This attack is most common in database-driven


websites
• Here SQL query is executed to the database
as the input from the client and the server
• It mostly works if a website uses dynamic SQL

16
Man-in-the-middle attack (MITM Attack)

• This happens when a hacker manipulates the


traffic by being in between the client and server

17
Types of MITM Attack

Session
Hijacking

MitM Attacks

Replay
IP Spoofing
Attack

18
Session hijacking
• This happens when a hacker hijacks the
established connection between a client and
server
• The attacker changes the IP address for a
trusted client
• Then it makes the computer believe it is
communicating with the actual server

19
An example of Session hijacking

20
IP Spoofing Attack

• It is used to convince the victim that he or she


is connected to a trusted and known entity

21
Replay Attacks

• It is also known as play-back attack


• It happens when a data transmission is hacked
and purposely delayed or repeated

22
Birthday attack

• Message Digest (MD) of fixed length is


produced by the hash function
• It uniquely characterizes the message
independent of its length
• The birthday attack refers to the probability that
two random message generates have the
same Message Digest

23
Password attack
• It happens by guessing passwords randomly or
in systematic manner

Brute-force Attack

Dictionary Attack

24
Eavesdropping attack
• Hacking of user confidential information sent
over the network
• It occurs through the interruption of network
traffic

Eavesdropping
Attack

Active Passive
Eavesdropping Eavesdropping
Attack Attack
25
Phishing and Spear Phishing attacks

• Sending an email in the name of trusted


sources by an attacker is known as phishing
• When a phishing attack is conducted on a
targeted audience it is spear phishing
• This forces user to download malicious
program on victim systems exposing personal
data

26
Example for phishing attack

27
Drive-by Download attack

• These attacks are usually used for scattering


malware
• Unsecured websites are searched by the
hackers
• They run malicious script into web pages
installing malware on to the host directly
• The victim will be redirected to download
operations in a website controlled by hackers

28
Conclusion

• Cyber Attacks are on the rise, because there


are various ways and means through which a
system can be compromised
• It is absolutely necessary to understand the
technical functioning of the Cyber Attacks to
prevent and handle them better

29
Thank you

30

You might also like