Networking attack are defined as threat, intrusion, denial of service or any other attack that will probe your network to gain information or data to cause the network to become corrupted or crash. The attacker may not only be interested in exploiting the software application but they will try to obtain unauthorized access to the network devices. By doing that, they can take control the entire network of your computer. Here are some examples of threats that are commonly used in this society for network attack namely Spoofing, Sniffing, Trojans and Dos and DDos etc.
Spoofing:
IP spoofing makes any payload appear to come from any source which is difficult to find the host that sent the datagram. It takes place when internet connected device send IP datagram into the network. Such internet data packets will carry the sender’s IP address. If the attacker takes control over the software running on that network device, he can easily alter the device’s protocol to place random IP address into the data packet’s source address field.
In order to counter IP spoofing, we need to have ingress filtering. It is perform by routers. The router will check the IP addressing of incoming datagram and decide whether the source is known to be reachable via that interface or not. If it’s not in valid range, the packet will be discarded.
No comments:
Post a Comment