SlideShare une entreprise Scribd logo
1  sur  8
Attack on the Physical layer
The physical layer defines the means of transmitting raw bits rather than logical data packets
over a physical link connecting network nodes. The bit stream may be grouped into code words
or symbols and converted to a physical signal that is transmitted over a hardware transmission
medium. The physical layer provides an electrical, mechanical, and procedural interface to the
transmission medium.
The physical layer consists of the basic networking hardware transmission technologies of a
network.
Typically, networking hardware includes gateways, routers, network bridges, switches, hubs, and
repeaters. But it also includes hybrid network devices such as protocol converters, modem,
wireless access points and networking cables.
Types of attack:
1) Direct attack:
Such attack includes:
*attack at network transmission tapping, tapping and jamming signal processing.
*attack at optical amplifier local or remote or cross talk.
*attack at optical transmission fiber cut.
2) Indirect attack:
Certain network elements are more likely to be attacked indirectly, because it is too
complicated to attack them directly, or they are not easily accessible.
Such attack includes:
*Indirect cross talk.
*Unauthorized access through add/drop ports.
3) Pseudo-attacks:
Anomalies which are not intrusions, but may be interpreted as such, due to significant
Changes in the signal quality depending on the physical network design.
Attack can be classified by its resources (passive or active), its means of attack
(transmission/reception, protocol, control system), the target (specific users or network/sub
network), the intended effect (service disruption or tapping), the location of the attack (terminal,
node, link, multiple locations), and the attacker’s willingness to be discovered (covert, subtle,
open).
Optical fibers propagate light of different wavelengths. Light that propagates through the fiber is
kept in its core by total internal reflection, which keeps radiation from the fiber at a negligible
level, thus making the fiber immune to electromagnetic interference. However, the fiber is not
shielded, and an attacker with a physical access to it can easily cut the fiber or bend it slightly, so
that the light can be radiated into or out of the core. Fiber cut, which can be considered as a
component fault, causes denial of service. Light radiating out of the fiber can not only degrade
the quality of service, but it can also deliver the carried information straight into the hands of the
attacker i.e. tapping. Another way of performing tapping is by exploiting fiber nonlinearities.
Under normal operating conditions fibers are fairly linear, but under high input power (e.g. at the
output of an amplifier) or long distances, they exhibit certain nonlinear characteristics which
cause signals on different wavelengths to affect each other. For instance, cross-phase modulation
and Raman effects may cause a signal on one wavelength to amplify or attenuate a signal on
another wavelength. A sophisticated attacker may take advantage of this crosstalk to co
propagate a malicious signal on a fiber and decrease quality of services.
When light is radiated into the fiber, service can be interrupted on a single wavelength by
injecting light on the same wavelength, without breaking or otherwise disrupting the fiber.
This technique is called in-band jamming, and the attack is difficult to localize. If tapping is
combined with jamming, an especially efficient service disruption attack is achieved. This kind
of attack is called correlated jamming. In it, an attacker first taps a signal at one point and then
injects a signal down stream, which has especially harmful effects to signals with relatively low
signal-to-noise ratio.
Optical amplifiers have specific characteristics, which can be exploited to perform physical-layer
attacks. Gains competitions is a common target for attackers. An amplifier has a finite amount
of gain available(a limited pool of upper-state photons) which is divided among the incoming
signals. Thus bus injecting a high power signal with in a amplifier passband, an attacker can
deprive other signal of power while increasing it’s own allowing it to propagate through the
network causing service degradation or even service denial.
Gain competition can be used to create a powerful out of-band jamming attack. In it, the
attacker injects a powerful signal on a wavelength different from those of other, legitimate
signals (Authorized), but still within the pass band of the amplifier. The amplifier, unable to
distinguish between the attack signal and legitimate data signals, will provide gain to each signal
indiscriminately. This means that the stronger, attacking signal will be provided with higher gain
than weaker, legitimate signals, robbing them of power. Thereby, the quality of service level on
the legitimate signals will deteriorate, potentially leading to service denial.
Passive Attack:
These attacks are not harmful to the networks; they take place for information-gathering. A
malicious user just listens to the all inbound (moving inward) and outbound (That is going out)
traffic of a wireless network. As we know, traffic contains packets, and each packet contains
juicy information such as packet sequence numbers, MAC address, and much more. The nature
of these attacks is silent, that is why they are hard to detect. Using this attack, a malicious
attacker can make an active attack to the wireless network. Sometimes malicious users use
packet-deciphering tools (Convert code into ordinary language) in order to steal information by
decrypting the data from it. Deciphering packets in WEP is really easy, as WEP’s security is very
low and easily breakable. Sometimes this technique is also called WAR DRIVING. (War
driving is the act of searching for Wi-Fi wireless network by a person in a moving vehicle, using
a portable computer, smartphone or personal digital assistant).
Active Attack:
As the attacker does a passive attack in order to get information about the wireless network, now
she/he will do an active attack. Mostly, active attacks are IP spoofing & Denial of Service attack.
IP Spoofing: In this attack scenario, the attacker accesses the unauthorized wireless network. IP
spoofing is the creation of Internet Protocol (IP) packets with a source IP address, with the
purpose of concealing the identity of the sender or impersonating another computing system. Not
only that, but also she/he does packet crafting in order to impersonate the authorization of that
server or network.
Denial of Service Attack: Here the attacker makes an attack on a particular target by flooding
(Become filled to overflowing) the packets to the server. In most cases, SYN packets are used
because they have those capabilities of generating the flood storm.
The attack involves having a client repeatedly send SYN (synchronization) packets to every port
on a server, using fake IP addresses. When an attack begins, the server sees the equivalent of
multiple attempts to establish communications. The server responds to each attempt with a
SYN/ACK (synchronization acknowledged) packet from each open port, and with a RST (reset)
packet from each closed port.
MITM Attack: The (man-in-the-middle attack) is a form of active eavesdropping (is secretly
listening to the private conversation of others without their consent) in which the attacker makes
independent connections with the victims and relays messages between them, making them
believe that they are talking directly to each other over a private connection, when in fact the
entire conversation is controlled by the attacker.
Here the attacker accesses the information of the AP of any active SSID. Here dummy APs are
created. The attacker listens the communication between to end points. (The SSID is a
unique identifier that wireless network devices use to establish and maintain wireless
connectivity).
Let’s suppose a client is having a TCP (Transmission Control Protocol) connection with any
server, then the attacker will be the man in the middle and she/he splits that TCP connection into
two separate connections, whose common node will be an attacker himself/herself. So the first
connection is from client to an attacker, and the second connection will be from the attacker to
the server. So each and every request and response will be taking place between client and server
via an attacker. So an attacker can steal information passing in the air between them.
Wireless Signal Jamming Attack: In this attack scenario, wireless radio signals are used. An
attacker may have a stronger antenna for a signal generator. First, the attacker identifies the
signal patterns around him or the target AP. Then she/he creates the same frequency pattern radio
signals and starts transmitting in the air in order to create a signal tornado of a wireless network.
As a result, the target AP gets jammed. On top of that, the legitimate user node also gets jammed
by signals. It disables the AP connection between a legitimate user of wireless network and the
network itself. There can be mainly three reasons for jamming the wireless network:
1. Fun – Prevent the legitimate user from receiving any kind of data from the Internet.
2. Spy – Delay in packet deployment to the legitimate user can give more time to an
attacker for deciphering the packet in order to steal the information.
3. Attack – Attacker may spoof the packets and send it to the victim in order to take control
over the user’s machine or network.
This is a type of DOS attack on the wireless networks. This attack takes place when any fake or
rough RF frequencies are making trouble with the legitimate wireless network operation. In some
cases, those are false positives, such as a cordless telephone that uses the identical frequency to
the wireless network. So in that case, you might see some
results in your wireless monitoring software or mechanism, but it is actually not a jamming of
signal. It is not a very common attack, as it requires a ton of capable hardware.
Pre-Shared Key Guessing: As we all know, a pre-shared key is used by the node in order to
encrypt the data communication. Generally administrators of those Wi-Fi networks don’t change
the default key in place. Professional hackers always try to find the manufacturer of wireless
access points in order to get the default ID and password.
Frame injection attack: To perform this kind of attack, an attacker must have a deep
understanding and knowledge of the protocol. Any professional hacker will perform this method
in order to perform an injection attack on wireless networks. Firstly, she/he will perform passive
information gathering of that network. Then the attacker creates wireless protocol frames in
order to send it to the targeted network. There are basically two ways of doing so. One can either
create a false packet or insert it into that network. The other way is to sniff the network traffic.
Once these packets are sent to the server, the response from that wireless network is captured,
intercepted and modified by an attacker to perform a man-in-the-middle attack. This is hard to
detect, as it happens at layer two.
Denial of sleep attack: Sometimes wireless networks don’t use radio transmission. So in order
to reduce consumption, it regulates the communication of that particular node. A malicious user
can take advantage of this mechanism. An attacker may drain the power supply of the sensor
device in order to make node’s life very short, or attack the MAC layer to reduce the sleep period
of it. If a number of drained nodes go high, the whole network can be disrupted. Only the MAC
protocol has an ability to create longer sleep duration. Without that, you cannot extend the
lifetime of your wireless network.
Collision attack:In this type of attack, the attacker tries to spoil the packets to be transmitted to
the receiver. So when the attacker is successful, the resulting packet’s checksum will not be
expected at the receiver’s end. As a result of that, the whole packet will be discarded at the
receiver’s node. Now retransmission of that packet will consume high energy of that particular
sensor node. A second approach to collision attack can be defined as this: Sometimes, messages
get transmitted on the node via same frequency, and it can also generate collision. An illustration
of this same frequency problem can be understand in the figure below.
De-Synchronization Attack: In this attack, the attacker tries to modify the control flags and
sometimes the sequence numbers in order to forge the packets, or messages. As a result, the
attacker limits the legitimate user from exchanging the messages between the server and client. It
will continuously request retransmission of those messages. This attack causes an infinite cycle
of retransmission. It acquires a lot of energy. We can also say that the attacker disturbs the
established connection between two end points.
Flooding Attack: There are plenty of DoS attacks which reduce the network lifetime in different
ways. One of the common methods is Denial of Service attack. An attacker sends a huge amount
of packets in order to stop the network from communicating with different nodes. The main aim
of this attack is to exhaust the resources on the victim’s machine.
Reply Attack: In this process, transmission data is repeated maliciously. An attacker intercepts
the data in order to retransmit it further. It’s a part of masquerade attack (In system security
masquerade attack is a type of attack in which one system assumes the identity of another) this
can be carried away by substitution of an IP packet. A stream cipher attack can be taken place
into that.
An attacker repeats copies of the packets to the victim in order to exhaust the energy or power
supply. This kind of attack has ability to crash applications which are designed poorly.
Selective Forwarding Attack: It may also refer as ‘gray hole attack’. In this form of attack, an
attacker may stop the node to pass packets through by forwarding or dropping those messages. In
one form of selective forwarding attack, a node selectively rejects the packets by dropping them
from coming into that network from an individual node or a group of individual nodes.
The above figure illustrates this attack. Here you can see that a malicious node is selectively
dropping packets from a certain node or group of nodes. It may do that or forward it to
somewhere else which will create no trustable routing information due to forwarding packets to
any wrong path within the network.
Unauthorized Routing Update Attack: In the routing process, many components take place
such as hosts, base station, access points, nodes, routing protocols, etc. A malicious user may try
to update all this information in order to update the routing table. It may be possible that due to
this attack, some of the nodes get isolated from the base station. Also, a network partition may
occur due to this attack. Packets may be dropped after the TTL expires. Packets can be
forwarded to any unauthorized user. All of these incidents are the impact of this attack.
Wormhole Attack: In this type of attack, an attacker copies the whole packet or message by
tunneling them to another network from the originator. Then the attacker transmits them to the
destination node. When the attacker transmits the copied messages or packets to the destination
node, she/he transmits it speedily in such a way that copied packets reach the destination node
before the original packets (from the legitimate user) reach it. To do that, the attacker uses a
wormhole tunnel. Wormhole nodes are fully invisible.
Sink Hole Attack: This is a special kind of selective forwarding attack which draws attention on
the compromised node. A compromised node attracts all maximum possible traffic of the
network. Then it places malicious node to the closest base station and it enables the selective
forwarding attack. It is a very complex attack. Detection of a sinkhole attack is very hard and it
affects the higher layer applications. The below figure illustrates the architecture of a sinkhole
attack.
Impersonate Attack & Sybil Attack: This attack is very common and well known. The attacker
may obtain the legitimate person’s IP address or MAC address in order to steal his/her identity
and make it his/her own. Then the attacker may attack another victim and can do plenty of things
with that new stolen identity of the legitimate user. A Sybil attack is an advanced version of an
impersonate attack in which a malicious user (attacker) may steal multiple identities. In technical
terms, a malicious node represents itself to the other fellow nodes by acquiring multiple
identities within it self. Impacts will be the same as in an impersonate attack.
Traffic Analysis Attack: Here an attacker gains the information of the network traffic as well as
the behavior of the nodes. Traffic analysis can be done via checking the message length, pattern
of message, and duration in which it stayed within the session. Then the attacker might correlate
all this inbound and outbound traffic to any single custom router, which might violate the privacy
of the members due to being linked with those messages. Sometimes an attacker might able to
link two nodes with an unrelated connection within the network.
USB Port: With one on almost every device in your plant, USB ports are the easiest way to
introduce viruses into or remove secrets from a system.
Plugs: Network systems can be shut down if someone unplugs a cable or plugs it into the wrong
location. Mostly attackers do this to shut down the other security systems.
Cables: The easiest way to get information is cables tampering. Attacker can easily do inside the
organization or outside the organization.
Research by: Muhammad Ahad.
Department BSIT
Submitted to: Sir Shafan.

Contenu connexe

Tendances

Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
Piyush Mittal
 
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
IJNSA Journal
 

Tendances (19)

Hg3312711275
Hg3312711275Hg3312711275
Hg3312711275
 
Cit877[1]
Cit877[1]Cit877[1]
Cit877[1]
 
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANETA Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANET
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
 
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsn
 
Black hole attack
Black hole attackBlack hole attack
Black hole attack
 
Rm presentation on research paper
Rm presentation on research paperRm presentation on research paper
Rm presentation on research paper
 
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
 
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
 
Providing The Security Against The DDOS Attack In Mobile Ad Hoc Networks
Providing The Security Against The DDOS Attack In Mobile Ad Hoc NetworksProviding The Security Against The DDOS Attack In Mobile Ad Hoc Networks
Providing The Security Against The DDOS Attack In Mobile Ad Hoc Networks
 
wireless sensor network security
wireless sensor network securitywireless sensor network security
wireless sensor network security
 
1705 1708
1705 17081705 1708
1705 1708
 
Security issues in manet
Security issues in manetSecurity issues in manet
Security issues in manet
 
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...
 
I030102056063
I030102056063I030102056063
I030102056063
 

En vedette

Ccna topology based projects
Ccna topology based projectsCcna topology based projects
Ccna topology based projects
tcpipguru
 
E commerce vietnam
E commerce vietnamE commerce vietnam
E commerce vietnam
Pham Duc
 
Presentation on telnet
Presentation on telnetPresentation on telnet
Presentation on telnet
Amandeep Kaur
 

En vedette (17)

Comparison of Relational Database and Object Oriented Database
Comparison of Relational Database and Object Oriented DatabaseComparison of Relational Database and Object Oriented Database
Comparison of Relational Database and Object Oriented Database
 
04 Client Server Computing
04 Client Server Computing04 Client Server Computing
04 Client Server Computing
 
CMIT 320 FINAL PROJECT. NETWORK SECURITY
CMIT 320 FINAL PROJECT. NETWORK SECURITYCMIT 320 FINAL PROJECT. NETWORK SECURITY
CMIT 320 FINAL PROJECT. NETWORK SECURITY
 
CMIT 320 FINAL PROJECT NETWORK SECURITY.
CMIT 320 FINAL PROJECT NETWORK SECURITY.CMIT 320 FINAL PROJECT NETWORK SECURITY.
CMIT 320 FINAL PROJECT NETWORK SECURITY.
 
Ccna topology based projects
Ccna topology based projectsCcna topology based projects
Ccna topology based projects
 
Laporan resmi FIREWALL
Laporan resmi FIREWALLLaporan resmi FIREWALL
Laporan resmi FIREWALL
 
2G...All about second generation of cellular networks.
2G...All about second generation of cellular networks.2G...All about second generation of cellular networks.
2G...All about second generation of cellular networks.
 
2.5G, second and half generation, All about 2.5..
2.5G, second and half generation, All about 2.5..2.5G, second and half generation, All about 2.5..
2.5G, second and half generation, All about 2.5..
 
Data Modeling Basics
Data Modeling BasicsData Modeling Basics
Data Modeling Basics
 
Network security projects
Network security projectsNetwork security projects
Network security projects
 
E commerce vietnam
E commerce vietnamE commerce vietnam
E commerce vietnam
 
Data center proposal
Data center proposalData center proposal
Data center proposal
 
Data Center Proposal (System Network Administration)
Data Center Proposal (System Network Administration)Data Center Proposal (System Network Administration)
Data Center Proposal (System Network Administration)
 
Telnet
TelnetTelnet
Telnet
 
Python programming course
Python programming coursePython programming course
Python programming course
 
Network testing course
Network testing courseNetwork testing course
Network testing course
 
Presentation on telnet
Presentation on telnetPresentation on telnet
Presentation on telnet
 

Similaire à Research by ahad attack on the physical layer

security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
Vishnu Kudumula
 
Different Types of Attacks and Detection Techniques in Mobile Ad Hoc Network
Different Types of Attacks and Detection Techniques in Mobile Ad Hoc NetworkDifferent Types of Attacks and Detection Techniques in Mobile Ad Hoc Network
Different Types of Attacks and Detection Techniques in Mobile Ad Hoc Network
Editor IJCATR
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)
Mumbai Academisc
 

Similaire à Research by ahad attack on the physical layer (20)

security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
Wireless Sensor Network Security
Wireless Sensor Network  Security Wireless Sensor Network  Security
Wireless Sensor Network Security
 
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKPERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
 
aGHLecture2_2017.pptx
aGHLecture2_2017.pptxaGHLecture2_2017.pptx
aGHLecture2_2017.pptx
 
Ii3415521555
Ii3415521555Ii3415521555
Ii3415521555
 
Sunilkumar2017
Sunilkumar2017Sunilkumar2017
Sunilkumar2017
 
Sunilkumar2017
Sunilkumar2017Sunilkumar2017
Sunilkumar2017
 
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
 
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKS
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKSVARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKS
VARIOUS TYPES OF ATTACKS ON WIRELESS NETWORKS
 
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSNREPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Distributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor NetworksDistributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor Networks
 
Protecting Global Records Sharing with Identity Based Access Control List
Protecting Global Records Sharing with Identity Based Access Control ListProtecting Global Records Sharing with Identity Based Access Control List
Protecting Global Records Sharing with Identity Based Access Control List
 
Different Types of Attacks and Detection Techniques in Mobile Ad Hoc Network
Different Types of Attacks and Detection Techniques in Mobile Ad Hoc NetworkDifferent Types of Attacks and Detection Techniques in Mobile Ad Hoc Network
Different Types of Attacks and Detection Techniques in Mobile Ad Hoc Network
 
Securing the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in LibrariesSecuring the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in Libraries
 
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
 
D0961927
D0961927D0961927
D0961927
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
 

Plus de Muhammad Ahad

Plus de Muhammad Ahad (20)

11. operating-systems-part-2
11. operating-systems-part-211. operating-systems-part-2
11. operating-systems-part-2
 
11. operating-systems-part-1
11. operating-systems-part-111. operating-systems-part-1
11. operating-systems-part-1
 
10. compute-part-2
10. compute-part-210. compute-part-2
10. compute-part-2
 
10. compute-part-1
10. compute-part-110. compute-part-1
10. compute-part-1
 
09. storage-part-1
09. storage-part-109. storage-part-1
09. storage-part-1
 
08. networking-part-2
08. networking-part-208. networking-part-2
08. networking-part-2
 
08. networking
08. networking08. networking
08. networking
 
07. datacenters
07. datacenters07. datacenters
07. datacenters
 
06. security concept
06. security concept06. security concept
06. security concept
 
05. performance-concepts-26-slides
05. performance-concepts-26-slides05. performance-concepts-26-slides
05. performance-concepts-26-slides
 
05. performance-concepts
05. performance-concepts05. performance-concepts
05. performance-concepts
 
04. availability-concepts
04. availability-concepts04. availability-concepts
04. availability-concepts
 
03. non-functional-attributes-introduction-4-slides
03. non-functional-attributes-introduction-4-slides03. non-functional-attributes-introduction-4-slides
03. non-functional-attributes-introduction-4-slides
 
01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure01. 03.-introduction-to-infrastructure
01. 03.-introduction-to-infrastructure
 
01. 02. introduction (13 slides)
01.   02. introduction (13 slides)01.   02. introduction (13 slides)
01. 02. introduction (13 slides)
 
Chapter14
Chapter14Chapter14
Chapter14
 
Chapter13
Chapter13Chapter13
Chapter13
 
Chapter12
Chapter12Chapter12
Chapter12
 
Chapter11
Chapter11Chapter11
Chapter11
 
Chapter10
Chapter10Chapter10
Chapter10
 

Dernier

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 

Research by ahad attack on the physical layer

  • 1. Attack on the Physical layer The physical layer defines the means of transmitting raw bits rather than logical data packets over a physical link connecting network nodes. The bit stream may be grouped into code words or symbols and converted to a physical signal that is transmitted over a hardware transmission medium. The physical layer provides an electrical, mechanical, and procedural interface to the transmission medium. The physical layer consists of the basic networking hardware transmission technologies of a network. Typically, networking hardware includes gateways, routers, network bridges, switches, hubs, and repeaters. But it also includes hybrid network devices such as protocol converters, modem, wireless access points and networking cables. Types of attack: 1) Direct attack: Such attack includes: *attack at network transmission tapping, tapping and jamming signal processing. *attack at optical amplifier local or remote or cross talk. *attack at optical transmission fiber cut. 2) Indirect attack: Certain network elements are more likely to be attacked indirectly, because it is too complicated to attack them directly, or they are not easily accessible. Such attack includes: *Indirect cross talk. *Unauthorized access through add/drop ports. 3) Pseudo-attacks: Anomalies which are not intrusions, but may be interpreted as such, due to significant Changes in the signal quality depending on the physical network design. Attack can be classified by its resources (passive or active), its means of attack (transmission/reception, protocol, control system), the target (specific users or network/sub network), the intended effect (service disruption or tapping), the location of the attack (terminal, node, link, multiple locations), and the attacker’s willingness to be discovered (covert, subtle, open). Optical fibers propagate light of different wavelengths. Light that propagates through the fiber is kept in its core by total internal reflection, which keeps radiation from the fiber at a negligible level, thus making the fiber immune to electromagnetic interference. However, the fiber is not shielded, and an attacker with a physical access to it can easily cut the fiber or bend it slightly, so that the light can be radiated into or out of the core. Fiber cut, which can be considered as a component fault, causes denial of service. Light radiating out of the fiber can not only degrade the quality of service, but it can also deliver the carried information straight into the hands of the attacker i.e. tapping. Another way of performing tapping is by exploiting fiber nonlinearities.
  • 2. Under normal operating conditions fibers are fairly linear, but under high input power (e.g. at the output of an amplifier) or long distances, they exhibit certain nonlinear characteristics which cause signals on different wavelengths to affect each other. For instance, cross-phase modulation and Raman effects may cause a signal on one wavelength to amplify or attenuate a signal on another wavelength. A sophisticated attacker may take advantage of this crosstalk to co propagate a malicious signal on a fiber and decrease quality of services. When light is radiated into the fiber, service can be interrupted on a single wavelength by injecting light on the same wavelength, without breaking or otherwise disrupting the fiber. This technique is called in-band jamming, and the attack is difficult to localize. If tapping is combined with jamming, an especially efficient service disruption attack is achieved. This kind of attack is called correlated jamming. In it, an attacker first taps a signal at one point and then injects a signal down stream, which has especially harmful effects to signals with relatively low signal-to-noise ratio. Optical amplifiers have specific characteristics, which can be exploited to perform physical-layer attacks. Gains competitions is a common target for attackers. An amplifier has a finite amount of gain available(a limited pool of upper-state photons) which is divided among the incoming signals. Thus bus injecting a high power signal with in a amplifier passband, an attacker can deprive other signal of power while increasing it’s own allowing it to propagate through the network causing service degradation or even service denial. Gain competition can be used to create a powerful out of-band jamming attack. In it, the attacker injects a powerful signal on a wavelength different from those of other, legitimate signals (Authorized), but still within the pass band of the amplifier. The amplifier, unable to distinguish between the attack signal and legitimate data signals, will provide gain to each signal indiscriminately. This means that the stronger, attacking signal will be provided with higher gain than weaker, legitimate signals, robbing them of power. Thereby, the quality of service level on the legitimate signals will deteriorate, potentially leading to service denial. Passive Attack: These attacks are not harmful to the networks; they take place for information-gathering. A malicious user just listens to the all inbound (moving inward) and outbound (That is going out) traffic of a wireless network. As we know, traffic contains packets, and each packet contains juicy information such as packet sequence numbers, MAC address, and much more. The nature of these attacks is silent, that is why they are hard to detect. Using this attack, a malicious attacker can make an active attack to the wireless network. Sometimes malicious users use packet-deciphering tools (Convert code into ordinary language) in order to steal information by decrypting the data from it. Deciphering packets in WEP is really easy, as WEP’s security is very low and easily breakable. Sometimes this technique is also called WAR DRIVING. (War driving is the act of searching for Wi-Fi wireless network by a person in a moving vehicle, using a portable computer, smartphone or personal digital assistant). Active Attack: As the attacker does a passive attack in order to get information about the wireless network, now she/he will do an active attack. Mostly, active attacks are IP spoofing & Denial of Service attack.
  • 3. IP Spoofing: In this attack scenario, the attacker accesses the unauthorized wireless network. IP spoofing is the creation of Internet Protocol (IP) packets with a source IP address, with the purpose of concealing the identity of the sender or impersonating another computing system. Not only that, but also she/he does packet crafting in order to impersonate the authorization of that server or network. Denial of Service Attack: Here the attacker makes an attack on a particular target by flooding (Become filled to overflowing) the packets to the server. In most cases, SYN packets are used because they have those capabilities of generating the flood storm. The attack involves having a client repeatedly send SYN (synchronization) packets to every port on a server, using fake IP addresses. When an attack begins, the server sees the equivalent of multiple attempts to establish communications. The server responds to each attempt with a SYN/ACK (synchronization acknowledged) packet from each open port, and with a RST (reset) packet from each closed port. MITM Attack: The (man-in-the-middle attack) is a form of active eavesdropping (is secretly listening to the private conversation of others without their consent) in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. Here the attacker accesses the information of the AP of any active SSID. Here dummy APs are created. The attacker listens the communication between to end points. (The SSID is a unique identifier that wireless network devices use to establish and maintain wireless connectivity). Let’s suppose a client is having a TCP (Transmission Control Protocol) connection with any server, then the attacker will be the man in the middle and she/he splits that TCP connection into two separate connections, whose common node will be an attacker himself/herself. So the first connection is from client to an attacker, and the second connection will be from the attacker to the server. So each and every request and response will be taking place between client and server via an attacker. So an attacker can steal information passing in the air between them.
  • 4. Wireless Signal Jamming Attack: In this attack scenario, wireless radio signals are used. An attacker may have a stronger antenna for a signal generator. First, the attacker identifies the signal patterns around him or the target AP. Then she/he creates the same frequency pattern radio signals and starts transmitting in the air in order to create a signal tornado of a wireless network. As a result, the target AP gets jammed. On top of that, the legitimate user node also gets jammed by signals. It disables the AP connection between a legitimate user of wireless network and the network itself. There can be mainly three reasons for jamming the wireless network: 1. Fun – Prevent the legitimate user from receiving any kind of data from the Internet. 2. Spy – Delay in packet deployment to the legitimate user can give more time to an attacker for deciphering the packet in order to steal the information. 3. Attack – Attacker may spoof the packets and send it to the victim in order to take control over the user’s machine or network. This is a type of DOS attack on the wireless networks. This attack takes place when any fake or rough RF frequencies are making trouble with the legitimate wireless network operation. In some cases, those are false positives, such as a cordless telephone that uses the identical frequency to the wireless network. So in that case, you might see some results in your wireless monitoring software or mechanism, but it is actually not a jamming of signal. It is not a very common attack, as it requires a ton of capable hardware. Pre-Shared Key Guessing: As we all know, a pre-shared key is used by the node in order to encrypt the data communication. Generally administrators of those Wi-Fi networks don’t change the default key in place. Professional hackers always try to find the manufacturer of wireless access points in order to get the default ID and password. Frame injection attack: To perform this kind of attack, an attacker must have a deep understanding and knowledge of the protocol. Any professional hacker will perform this method in order to perform an injection attack on wireless networks. Firstly, she/he will perform passive information gathering of that network. Then the attacker creates wireless protocol frames in order to send it to the targeted network. There are basically two ways of doing so. One can either create a false packet or insert it into that network. The other way is to sniff the network traffic. Once these packets are sent to the server, the response from that wireless network is captured, intercepted and modified by an attacker to perform a man-in-the-middle attack. This is hard to detect, as it happens at layer two. Denial of sleep attack: Sometimes wireless networks don’t use radio transmission. So in order to reduce consumption, it regulates the communication of that particular node. A malicious user can take advantage of this mechanism. An attacker may drain the power supply of the sensor device in order to make node’s life very short, or attack the MAC layer to reduce the sleep period of it. If a number of drained nodes go high, the whole network can be disrupted. Only the MAC protocol has an ability to create longer sleep duration. Without that, you cannot extend the lifetime of your wireless network.
  • 5. Collision attack:In this type of attack, the attacker tries to spoil the packets to be transmitted to the receiver. So when the attacker is successful, the resulting packet’s checksum will not be expected at the receiver’s end. As a result of that, the whole packet will be discarded at the receiver’s node. Now retransmission of that packet will consume high energy of that particular sensor node. A second approach to collision attack can be defined as this: Sometimes, messages get transmitted on the node via same frequency, and it can also generate collision. An illustration of this same frequency problem can be understand in the figure below. De-Synchronization Attack: In this attack, the attacker tries to modify the control flags and sometimes the sequence numbers in order to forge the packets, or messages. As a result, the attacker limits the legitimate user from exchanging the messages between the server and client. It will continuously request retransmission of those messages. This attack causes an infinite cycle of retransmission. It acquires a lot of energy. We can also say that the attacker disturbs the established connection between two end points. Flooding Attack: There are plenty of DoS attacks which reduce the network lifetime in different ways. One of the common methods is Denial of Service attack. An attacker sends a huge amount of packets in order to stop the network from communicating with different nodes. The main aim of this attack is to exhaust the resources on the victim’s machine. Reply Attack: In this process, transmission data is repeated maliciously. An attacker intercepts the data in order to retransmit it further. It’s a part of masquerade attack (In system security masquerade attack is a type of attack in which one system assumes the identity of another) this
  • 6. can be carried away by substitution of an IP packet. A stream cipher attack can be taken place into that. An attacker repeats copies of the packets to the victim in order to exhaust the energy or power supply. This kind of attack has ability to crash applications which are designed poorly. Selective Forwarding Attack: It may also refer as ‘gray hole attack’. In this form of attack, an attacker may stop the node to pass packets through by forwarding or dropping those messages. In one form of selective forwarding attack, a node selectively rejects the packets by dropping them from coming into that network from an individual node or a group of individual nodes. The above figure illustrates this attack. Here you can see that a malicious node is selectively dropping packets from a certain node or group of nodes. It may do that or forward it to somewhere else which will create no trustable routing information due to forwarding packets to any wrong path within the network. Unauthorized Routing Update Attack: In the routing process, many components take place such as hosts, base station, access points, nodes, routing protocols, etc. A malicious user may try
  • 7. to update all this information in order to update the routing table. It may be possible that due to this attack, some of the nodes get isolated from the base station. Also, a network partition may occur due to this attack. Packets may be dropped after the TTL expires. Packets can be forwarded to any unauthorized user. All of these incidents are the impact of this attack. Wormhole Attack: In this type of attack, an attacker copies the whole packet or message by tunneling them to another network from the originator. Then the attacker transmits them to the destination node. When the attacker transmits the copied messages or packets to the destination node, she/he transmits it speedily in such a way that copied packets reach the destination node before the original packets (from the legitimate user) reach it. To do that, the attacker uses a wormhole tunnel. Wormhole nodes are fully invisible. Sink Hole Attack: This is a special kind of selective forwarding attack which draws attention on the compromised node. A compromised node attracts all maximum possible traffic of the network. Then it places malicious node to the closest base station and it enables the selective forwarding attack. It is a very complex attack. Detection of a sinkhole attack is very hard and it affects the higher layer applications. The below figure illustrates the architecture of a sinkhole attack.
  • 8. Impersonate Attack & Sybil Attack: This attack is very common and well known. The attacker may obtain the legitimate person’s IP address or MAC address in order to steal his/her identity and make it his/her own. Then the attacker may attack another victim and can do plenty of things with that new stolen identity of the legitimate user. A Sybil attack is an advanced version of an impersonate attack in which a malicious user (attacker) may steal multiple identities. In technical terms, a malicious node represents itself to the other fellow nodes by acquiring multiple identities within it self. Impacts will be the same as in an impersonate attack. Traffic Analysis Attack: Here an attacker gains the information of the network traffic as well as the behavior of the nodes. Traffic analysis can be done via checking the message length, pattern of message, and duration in which it stayed within the session. Then the attacker might correlate all this inbound and outbound traffic to any single custom router, which might violate the privacy of the members due to being linked with those messages. Sometimes an attacker might able to link two nodes with an unrelated connection within the network. USB Port: With one on almost every device in your plant, USB ports are the easiest way to introduce viruses into or remove secrets from a system. Plugs: Network systems can be shut down if someone unplugs a cable or plugs it into the wrong location. Mostly attackers do this to shut down the other security systems. Cables: The easiest way to get information is cables tampering. Attacker can easily do inside the organization or outside the organization. Research by: Muhammad Ahad. Department BSIT Submitted to: Sir Shafan.