Concerning network security in the application layer. THANK YOU :) <3 2. Suppose
ID: 3887839 • Letter: C
Question
Concerning network security in the application layer. THANK YOU :) <3
2. Suppose Alice and Bob are sending packets to each other over a computer network. Sup pose Sybil positions herself in the network so that she can capture all the packets sent by Alice and send whatever she wants to Bob; she can also capture all the packets sent by Bob and send whatever she wants to Alice. a) List some of the malicious things Sybil can do from this position. b) List some techniques (if any) that could be employed to counter the threats you listed above.Explanation / Answer
The given scenario is commonly known as MAN IN THE MIDDLE (MITM) ATTACK. In MITM the attacker(Sybil)
position herself in the network such that she can eavesdrop or impersonate one of the parties(Alice/Bob).
Some of the malicious things that Sybil can do from this position are given below:-
1. Sybil can steal personal information as she can intercepts the messages.
2 She can manipulate the Information being sent from/to Alice/Bob.
3 Sybil can asks for confidential information like login credentials, credit card
details from Alice/Bob.
Sybil entered into the network using ARP SPOOFING.In general stopping ARP Spoofing is quite
difficult however,we can take few precations.
1 We can use encryped network(SSL) provided by HTTPS.
2 VPN (Virtual Private Network) can provide security to prevent such attacks.
These two method encrypt the network traffic and the attacker will find it difficult
to decrypt the information.
However, above methods may not work everytime so we should avoid connecting on insecure/compromised networks.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.