Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Concerning network security in the application layer. THANK YOU :) <3 2. Suppose

ID: 3887839 • Letter: C

Question

Concerning network security in the application layer. THANK YOU :) <3

2. Suppose Alice and Bob are sending packets to each other over a computer network. Sup pose Sybil positions herself in the network so that she can capture all the packets sent by Alice and send whatever she wants to Bob; she can also capture all the packets sent by Bob and send whatever she wants to Alice. a) List some of the malicious things Sybil can do from this position. b) List some techniques (if any) that could be employed to counter the threats you listed above.

Explanation / Answer

The given scenario is commonly known as MAN IN THE MIDDLE (MITM) ATTACK. In MITM the attacker(Sybil)

position herself in the network such that she can eavesdrop or impersonate one of the parties(Alice/Bob).

Some of the malicious things that Sybil can do from this position are given below:-

1. Sybil can steal personal information as she can intercepts the messages.

2 She can manipulate the Information being sent from/to Alice/Bob.

3 Sybil can asks for confidential information like login credentials, credit card

details from Alice/Bob.

Sybil entered into the network using ARP SPOOFING.In general stopping ARP Spoofing is quite

difficult however,we can take few precations.

1 We can use encryped network(SSL) provided by HTTPS.

2 VPN (Virtual Private Network) can provide security to prevent such attacks.

These two method encrypt the network traffic and the attacker will find it difficult

to decrypt the information.

However, above methods may not work everytime so we should avoid connecting on insecure/compromised networks.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote