• Improving Network Security Using Elliptic Curve Cryptosystem

  • CHAPTER TWO -- [Total Page(s) 11]

    Page 11 of 11

    Previous   7 8 9 10 11
    • 2)    Trust Exploitation
      Trust exploitation is a situation where by an individual is taking advantage of a trustable and reliable relationship within a network. An example of such an attack is a perimeter network connected to a corporate network. Hacker leverages on the existing trust relationships. Several trust models that exist:
      I.    Windows
      II.    NIS+
      III.    Active directory
      IV.    NIS
      V.    Linux and UNIX
      VI.    Domains
      3)    Port Redirection
      Port redirection attacks are a type of trust exploitation attack, which uses a host that is fragile in passing traffic that would otherwise be dropped via a firewall. A host on the outside can contact the host on the public services segment (mostly known as the demilitarized zone [DMZ]) (Host A), but not the host on the inside (Host B). The host on the public services segment can be reached by the host on both the inside and outside. If hackers successfully compromise the public services segment host, they will be able to install software to channel traffic from the outside host directly to the inside host. Even though neither communication fails to agree with the rules implemented in the firewall, the outside host has now achieved a good network connectivity to the inside host simply through the port redirection process on the public services host. A good example of an application that can render this kind of access is Netcat.
      4)    Man-In-The Middle Attack
      A man-in-the-middle attack necessitates that the hacker possess access to network packets that come via a network. A man-in-the-middle attack could be implemented using network packet sniffers and routing and transport protocols.
      Theft of information, hijacking of an ongoing session to gain access to internal network resources, traffic analysis to derive information about the network and its users, denial of service, corruption of transmitted data, and introduction of new information into network sessions are possible tools uses by man-in-the-middle attacks to attack a network. Someone working for an internet service provider (ISP) can gain access to all network packets and perform all of the above operations.
      2.9.1    DENIAL OF SEVICE ATTACKS
      A denial of service (DoS) attack damages or corrupts a computer system or denies all forms of access to the networks, systems or services even within the hacker’s community. Denial of Service (DoS) attacks is regarded as less important and considered a bad form because they require little effort to execute. Although DoS implementation is easy and can cause little potential significant damage the attacks deserve special attention from security administrators. DoS attacks can consist of the following:
      1.    IP SPOOFING
      IP spoofing; this is a technique used to acquire unauthorized access to computers. In this kind of technique, the intruder sends illegitimate messages to a computer with an IP address which shows that the message is coming from a reliable and trusted host. Engaging in IP spoofing, hackers firstly use a variety of techniques to look for an IP address of a trusted host, then they modify their packet headers to appear as though the packets are coming from that trusted host. Furthermore, attackers can also engage other unsuspecting hosts in order to generate traffic and make it appear like its coming from a trusted host, hence, flooding the network.
      2.    DISTRIBUTED DENIAL OF SERVICE
      DDoS (Distributed Denial of Service) attacks refer to the next generation of DoS attacks on the Internet. TCP SYN flooding and UDP, ICMP echo-request floods, and ICMP directed broadcasts (also referred to as surf attacks) are similar to DDos attacks, however, the attack has a new scope. Victims of DDoS attack experiences packet flooding from various sources perhaps spoofed IP source addresses that brings their network connectivity to a grinding malfunction. In the past, an attempt to flood a target host with packets is the typical DoS attack. The hacker uses a terminal to scan for systems to hack. After handler systems are accessed, the hacker installs software on these systems. This software attempts to scan for, compromise, and infect agent systems. When the agent systems are accessed, the intruder then loads remote control attack software to accomplish the DDoS attack. [Bidou 2000]
      2.9.2    WORM, VIRUS AND TROJAN HORSE ATTACKS
      Some threat are categorized according to minor or primary vulnerabilities for the end-user, which could be handled by a layman by just explaining what he/she has to do. These attacks could be solved by the use of antivirus software or by restoring the affected machine to factory settings.
      1.    VIRUS
      Viruses are known as malicious software, which are attached to other programs and execute a particular undesirable or unwanted function on a user workstation. Typically, a virus propagates itself by infecting other programs on the same computer where it resides. Viruses can do serious damage, like erasing an entire storage media or erasing and manipulating files. These kinds of viruses cannot affect a new computer without human aid such as introducing a virus-infected file on a CD, or as an email attachment and mostly through file sharing.
      2.    WORMS
      A worm is a self-replicating malware, which executes arbitrary code and also installs copies of itself on memory of infected computer; it can then infect other hosts from the infected computer. A worm is also a program that propagates itself like viruses do, but a worm can as well spread itself automatically across the network from one computer to the next unlike viruses that need human media to spread. They always take advantage of features of automatic file sending and receiving, found on many computers to propagate.
      3.    TROJAN HORSE
      A Trojan horse does two things at a go: it can infect and convert the infected, and a Trojan can attack on three levels. It can attack as virus, as worm and as itself. A virus known as the Love Bug is a typical example of a Trojan horse because a love bug pretends to be a love letter when it actually carries a harmful program. Love Bug is definitely a virus because it infects all image files on the attacked disk, and turns them into new Trojans. Finally, Love Bug is worm as it propagates itself across the Internet by hiding in the Trojan horses, which is sent out using addresses in the attacked email address contact.

  • CHAPTER TWO -- [Total Page(s) 11]

    Page 11 of 11

    Previous   7 8 9 10 11
    • ABSRACT - [ Total Page(s): 1 ]ABSTRACTSecuring a network wired or wireless for network administrator has been a big challenges for network administrators in the present day of Internet usage. This project presents ECDSA Cryptosystem as a solution to the problem been faced by network administrators and Engineers. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA) with the attractiveness that there is no sub exponential algorithm known to solve the ell ... Continue reading---

         

      TABLE OF CONTENTS - [ Total Page(s): 1 ]TABLE OF CONTENTTittle Page    Declaration    Certification    Dedication    Acknowledgements   Abstract    Tables of contents    Table of Content1.0    CHAPTER ONE (INTRODUCTION)1.1    BACKGROUND TO THE WORK    1.2    PROBLEM DEFINITION    1.3    PROJECT JUSTIFICATION    1.4    OBJECTIVES    2.0    CHAPTER TWO (LITERATURE REVIEW)2.1    NETWORK SECURITY    2.2    CHARACTERISTICS OF NETWORK SECURITY   2.3    MAIN THREATS TO NETWORK S ... Continue reading---

         

      CHAPTER ONE - [ Total Page(s): 2 ]CHAPTER ONE1.0    INTRODUCTION1.1    BACKGROUND TO THE WORKThe fast development of the modern Internet technology and information technology cause the individual, enterprise, school and government department joining the Internet, Which cause more illegal users to attack and destroy the network by using the fake websites, fake mail, Trojan horse and backdoor virus at the same time. The target of the attacks and intrusion on the network are computers, so once the intruders succeed, it will c ... Continue reading---

         

      CHAPTER THREE - [ Total Page(s): 8 ]CHAPTER THREE3.0    METHODOLOGY3.1    BACKGROUND OF ELLIPTIC CURVE CRYPROGRAPHYElliptic curve cryptography provides a methodology for obtaining high-speed, efficient, and scalable implementations of network security protocols. The security of these protocols depends on the difficulty of computing elliptic curve discrete logarithm in the elliptic curve group.The group operations utilize the arithmetic of points which are elements of the set of solutions of an elliptic curve equation d ... Continue reading---

         

      CHAPTER FOUR - [ Total Page(s): 10 ]Step 3: verifying the signatureAt this stage the program try to verify the signature weather it’s correct or not. It will display VALID or INVALID to ascertain the validity.Result:The result above what gotten using Secp256kr1 algorithm as shown above, the private and public key was gotten based on previous work inculcated into the database for the key generation and FRANCIS was used as the message string in other to get a signature value. ... Continue reading---

         

      CHAPTER FIVE - [ Total Page(s): 1 ]CHAPTER FIVESUMMARY, CONCLUSION, AND RECOMMENDATIONElliptic Curve Digital Signature Algorithm (ECDSA) which is one of the variants of Elliptic Curve Cryptography (ECC) proposed as an alternative to established public key systems such as Digital Signature Algorithm (DSA) and Rivest Shamir Adleman (RSA), have recently gained a lot of attention in industry and academia.The main reason for the attractiveness of ECDSA is the fact that there is no sub exponential algorith known to solve the elliptic c ... Continue reading---