当前位置:网站首页>[principle and technology of network attack and Defense] Chapter 1: Introduction
[principle and technology of network attack and Defense] Chapter 1: Introduction
2022-07-07 18:01:00 【Godams】
1.1 Overview of Cyberspace Security
“ cyberspace ” Of 4 elements : facilities ( Internet 、 Communication network 、 Computer system 、 Automatic control system 、 Digital devices )、 user ( people )、 operation ( application 、 service ) And data .
Cyberspace Security mainly includes 4 Two levels of security :
- Equipment layer security
- System layer security
- Data layer security
- Application layer security
The basic concept of network attack and defense :
Attack :⾮ French envoy ⽤ Or get ⽹ Information in the network or ⽹ Normal circulation of collaterals ⾏ Of ⾏ by 、 technology .
prevent : Protect your computer ⽹ Various techniques of network .
⽹ Collateral attack and defense are essentially both offensive and defensive ⽅ Around right ⽹ Cognition of network vulnerability ⽽ Into the ⾏ The game of .
⽹ Network attack technology is both ⽹ The motivation for the development of collateral Defense Technology , It's also ⽹ The defense object of Network Defense Technology .
APT Advanced Sustainable attack
Advanced Persistent Threat.
For specific objects ,⻓ period 、 Planned 、 organized ⽹ Collateral attack ⾏ by : Latency 、 Continuity 、 complexity
⽹ Network space (Cyberspace)
Information Age ⼈ We depend on ⽣ Stored information environment , Is a collection of all information systems
⽹ Network space security involves ⽹ Electromagnetic equipment in network space 、 electric ⼦ The information system 、 shipment ⾏ Data and systems should ⽤ Security problems in . It is necessary to prevent ⽌、 Protect “ Information and communication technology systems ” And the data it carries are damaged. We should also deal with the political security caused by these ICT systems 、 Economic security 、⽂ Chemical safety 、 Social security and national defense security .
⽹ Main research on network space security ⽹ Security threats and protection in Cyberspace .
Including infrastructure 、 Security and credibility of information system 、 And the confidentiality of relevant information 、 integrity 、 can ⽤ sex 、 Authenticity and controllability
1.2 Network security protection
1.2.1 Network security attributes
- confidentiality
- integrity
- Usability : To guarantee legality ⽤ The legitimacy of information ⽤. Resources can only be provided by legitimate parties ⼈ send ⽤.
- Non repudiation or non repudiation
1.2.2 Cyber security threats
- Environmental and disaster factors :⾃ However, disasters such as ⽕ disaster ⽔ Disaster, lightning, etc. may damage data , You need to be prepared in advance .
- Human factors :⼈ Negligence or ⿊ Guest attack .
- The system itself : Hardware system failure 、 Software failure or security defect 、⽹ Network and communication protocol defects
1.2.3 Network security protection system
- Bucket principle : Improve the lowest point of safety of the whole system
- The principle of integrity
- Principle of balance
- The principle of hierarchy
- The principle of consistency
- Principle of operability
- The principle of combining technology and management
- Plan as a whole 、 Step by step implementation principle
- Dynamic development principle
1.2.4 The development of network security protection technology
The development of network security protection technology has mainly experienced three stages :
- First generation security technology : For the purpose of protection , Clear network boundaries , Access control 、 Physical security , Cryptography
- Second generation security technology : For the purpose of security , Take detection technology as the core , Backed by recovery , Integrated protection 、 testing 、 Response and recovery technologies fall into four categories . prevent ⽕ wall Firewall、⼊ Intrusion detection system IDS、 Virtual specialty ⽤⽹ VPN、 Public key infrastructure PKI
- Third generation security technology : For the purpose of persistence , That is, the system is under attack 、 In case of faults and accidents , Still have the ability to continue to perform all or key missions for a certain period of time . Its core technology is intrusion tolerance technology , Real time performance 、 function 、 Safety adjustment 、 Real time condition perception and response .
Network security challenges :
- The computing power of general computing devices is getting stronger
- The challenges of the increasingly complex and diverse computing environment
- The development of information technology itself brings problems
- The complexity and dynamics of network and system attacks are still difficult to grasp
To meet these challenges , The development of network security protection technology will be credible 、 Networking 、 The direction of integration and visualization .
1.2.5 Four levels of security
- Equipment layer security :⽹ Information system equipment in network space ⾃ body ⾯ Right, the safety problem ,⽐ Such as physical security 、 Hardware security 、 Radiation leak, etc .
- System layer security :⽹ Information system in network space ⾃ body ⾯ Right, the safety problem .⽐ Ruyun ⾏ Security 、⽆ Line channel safety 、 Computing security, etc .
- Data layer security : stay ⽹ Security problems when processing data in network space .⽐ Such as : Data security 、 Data protection 、 Password cracking, etc .
- Should be ⽤ Layer security : Information should ⽤ Safety problems in the process .⽐ Such as : Content security 、 Privacy protection 、 Identity security, etc .
1.3 Network attack technology
1.3.1 Several features of Internet that are exploited by attackers
- Packet switching
- all ⽤ Users share resources , To give ⼀ individual ⽤ Customers' services will be affected by other ⽤ Household impact
- Attack packets will be forwarded to the victim before they are judged to be malicious .
- Certification and traceability
- Int ⽹ No authentication mechanism , It can lead to IP cheating . An attacker can forge the contents of any area in the packet , Then send the packet to Internet ⽹ in .
- The router does not have data tracking function . It's hard to verify ⼀ Does the packet originate from its claimed address . Attackers can get through IP Cheat and hide the source .
- Best effort service strategy
- best-effort As long as the service strategy is the data handed over to the network ,⽆ It is normal ⽤ The normal traffic sent by the user or the malicious traffic sent by the attacker , The network will deliver as much as possible ⽬ Land .
- hold ⽹ The distribution and fairness of network resources are entrusted to the terminal ⽤ Household ⾃ Legal .
- Anonymity and privacy
- Ordinary ⽤ Household ⽆ I know it's right ⽅ The true identity of , also ⽆ FA refuses information from unknown sources ( Mail, etc. )
- Global ⽹ Dependence on network infrastructure
- The global ⽹ Network infrastructure does not provide reliability 、 Security assurance . This allows attackers to release ⼤ Its attack effect ⼒.
- ⾸ First ,⼀ Some improper protocol design leads to ⼀ Some packets ⽐ Other packets consume more resources. Second , Int ⽹ yes ⼀ individual ⼤ collective . Many unsafe systems will seriously threaten the whole ⽹ Network safety .
1.3.2 IP Protocol and its security flaws
IP The agreement is stateless 、 No authentication protocol , Its own features are easy to be exploited by attackers .
- IP The protocol has no authentication mechanism , Almost all fields can be forged
- Packet fragmentation , Cause attackers to take advantage of , Such as : Bypass firewall check
- Addressing and protocol options , The addressing information and protocol options of packets expose the network topology information
- IP There is no access control and bandwidth control , Without access control, the attacker can view the content of the upper layer protocol , No bandwidth control may lead to packet storm .
1.3.3 The general process of network attack
⽹ Definition of network attack : benefit ⽤ Security defects of network system , For stealing 、 modify 、 Falsify or destroy information and reduce 、 damage ⽹ Collateral function ⽽ Various measures taken and ⾏ dynamic . damage ⽹ Integrity of network information system 、 can ⽤ sex 、 Confidentiality and non repudiation .
⽹ Collateral attack ⼀ It is divided into three stages
- Preparation stage : Determine attack ⽬ Of 、 Prepare to attack ⼯ Tools and collection ⽬ Bid information
Collection and ⽬ Bid related information .⽐ Such as ⽹ Network information ( domain name ,⽹ Network topology 、IP)、 system information ( Operating system version 、 Open ⽹ Contact services )、⽤ User information (⽤ User ID 、 Email account number 、 contact ⽅ Formula, etc ) - implementation phase : hide ⾃⼰ The location of 、 benefit ⽤ Get the account and password to log in to the host with the collected information , benefit ⽤ Loopholes or other ⽅ Can't get control of the host and steal ⽹ Network resources and privileges . Access
- The aftermath stage : Eliminate traces of attack 、 plant ⼊ after ⻔, After exiting the installation ⻔(⽊⻢ etc. ) System ⽇ Clear your mind 、 Should be ⽤ Program ⽇ Clear your mind
边栏推荐
- 【4500字归纳总结】一名软件测试工程师需要掌握的技能大全
- Win11C盘满了怎么清理?Win11清理C盘的方法
- imageswitcher的功能和用法
- Mrs offline data analysis: process OBS data through Flink job
- Functions and usage of ratingbar
- Face recognition attendance system based on Baidu flying plasma platform (easydl)
- MySQL index hit level analysis
- Use seven methods to enhance all the images in a folder
- Tips of this week 135: test the contract instead of implementation
- ICer知识点杂烩(后附大量题目,持续更新中)
猜你喜欢
Robot engineering lifelong learning and work plan-2022-
datepicket和timepicket,日期、时间选择器的功能和用法
Native JS verification code
科学家首次观察到“电子漩涡” 有助于设计出更高效的电子产品
Please insert the disk into "U disk (H)" & unable to access the disk structure is damaged and cannot be read
原生js验证码
YARN Capacity Scheduler容量调度器(超详细解读)
In depth understanding of USB communication protocol
Interviewer: why is the page too laggy and how to solve it? [test interview question sharing]
zdog.js火箭转向动画js特效
随机推荐
SD_DATA_SEND_SHIFT_REGISTER
Yarn capacity scheduler (ultra detailed interpretation)
Functions and usage of serachview
三仙归洞js小游戏源码
Pro2: modify the color of div block
基于RGB图像阈值分割并利用滑动调节阈值
[answer] if the app is in the foreground, the activity will not be recycled?
[distributed theory] (I) distributed transactions
Dateticket and timeticket, functions and usage of date and time selectors
What is agile testing
SD_DATA_RECEIVE_SHIFT_REGISTER
深度学习机器学习各种数据集汇总地址
Deep learning machine learning various data sets summary address
Functions and usage of viewswitch
< code random recording two brushes> linked list
[OKR target management] value analysis
USB通信协议深入理解
Mui side navigation anchor positioning JS special effect
Chapter 3 business function development (to remember account and password)
Youth experience and career development