Replay attack is basically a network category where an attacker gets to know about the data transmission and deliberately makes the data transmission delayed or makes it repeated. The repeat or delay of data transmission is basically carried out by sender or by some malicious entity who intercepts data as well as retransmits them (Zhu & Martínez, 2014). The replay attack is commonly known as a security protocol that uses data transmission replays from different sender to intended receiving system. By this replay attacks the senders are actually fooled by making them believe that they have transmitted the data successfully. This type of attack mainly helps the intruders or the attackers for gaining success on a network, gain all the information that would not be easily accessible or the attacker even might conduct some duplicate transaction.
Replay attack is most commonly known as playback attack. If the replay attack is not mitigated, then the computers or the system network are subjected to replay attacks. The victims would see the progress of attack as the legitimate messages. There are many examples of replay attack, out of which one is the messages that are send over a particular network to some particular authorized user are replayed by some attacker and sends out wrong messages to the user (Smith, Wiliem & Lovell, 2015). The messages that are sent through the network is expected to be encrypted and the hacker might not use the actual decryption keys. Valid data retransmission or the logon messages might help the attacker to get access to network. Replay attack mostly gains access to all the resources by getting access of an authenticated message and replaying them that can create a confusion to the receiver.
The best technique that can be used for mitigating the replay attacks is by the use of digital signatures along with timestamps. There is another technique that would use to prevent replay attack is through creation of session keys that are generated randomly. These session keys are mostly time bound as well as process bound. Another method for preventing the replay attacks is for each request there is one-password generated (Patel et al., 2015). This one-time password is used frequently by banks in banking operations. There are other methods as well that includes non-acceptance of the duplicated messages as well as sequencing the messages.
The working process of replay attack is describe below with the help of an example. Fr example, an employee of a company sends an encrypted message for some financial transfer. The employee sends the message to the financial administrator of the company and at that time the attacker eavesdrops the message, get access to the encrypted message and then resends the message by changing the content of the message (Alegre, Janicki & Evans,2014). It is not possible for financial administrator to get to know about the data change and data resending of the message. The message looks real to the administrator. This will make the financial administrator to transact money to the attacker’s account.
The only way to prevent a replay attack is proper encryption method that will help to mitigate replay attack. The encrypted messages that are sent carries keys within them and when the messages are received by the receiver, the messages are decrypted at the transmission end and finally the message is opened (Zhang, Lin & Qu, 2015). The work of an attacker for conducting a replay attack is to get hold of the original message and then replays the message again. Decrypting the key of the original message is not the work of the attacker. To mitigate this, the sender as well as receiver has to establish a random key session between them. This key session consists of one code that is valid only for one transaction and it cannot be reused.
Four general goals for securing networking are confidentiality, integrity, availability, and non-repudiation. All the goals are stated below with examples.
Confidentiality: To implement a network security, the first goals is to maintain the confidentiality. The main function of confidentiality is protecting the business data that are stored in the system from an unauthorized person (Luan et al., 2015). To maintain the confidentiality in a network security, it is made sure that the data is only available to the intended as well as authorized person. The business data should only be accessible to the employees of the companies or the sender and the receiver. The persons who are authorized to access the data should only get the access of the data. Confidentiality mainly deals with controlling the access of the files in the storage or the transit. For maintaining the confidentiality, there should be system configuration or the products configuration.
For example: Taking the example of bank records, all the customers associated with the bank should be able to access their data along with the employees of the bank who helps to conduct a transaction. No other person should get the right to access them. Confidentiality fails when the data is accessed by some other person intentionally or accidentally. Failure of confidentiality is most commonly known as data breach. If the details of the bank are made public, then it will be accessible to all others. Majority of the incidents that are reported recently involves confidentiality loss.
Integrity: Integrity is the second goal for the Network Security. The main aim of integrity involves assuring as well as maintaining the consistency and accuracy of the data. Function of integrity is maintaining a proper accurate data and the data should be reliable and also ensures that the hackers or any unauthorized person will not be able to change the data (Yan & Wang, 2017). Data that is received by the receiver is exactly same as the sender sends it without any changing of data in the way of transmission. To ensure integrity means version control that makes sure that the documents are changed only by the right people.
Example of Integrity: Taking the example of a website. The main motive of a website owner is to sell the products online through the website. If somehow an attacker changes the prices of the product, it hampers the integrity of data. The changing of prices in the website leads to integrity failure because the data is altered without the consent of the data owner.
Availability: Availability is the third goal of Network security. The main function this goal in the Network Security is making the data, network services as well network resources available to all authenticated users (Behringer et al., 2015). Any other unauthenticated users should not get the access of the network service or the network resource. Availability is a rare goal of network security. The information or data are to be kept safe from any other unauthorized hackers. If hackers get hold of the information, then the actual user of the data cannot get it when needed. So, there is a need to keep backups of all data in the storage with the bandwidth as well as re-examine the facilities that many of the users leave out even without have a security planning.
Non-repudiation: The last and the fourth goal of network security is non-repudiation. The non-repudiation is an ability that proves as well as disproves that some uncommon has happened in the financial transaction or in the binding signature of the legal agreement (Yan & Yu, 2015). Non-repudiation has roots in the legal processes that are intended for preventing the entities from claiming that the hackers have not agreed or signed a document.
For example: Taking the example of a retailer. A retailer provides their customer with electronically generated invoices using the integration interface. The interface that is used confirms by taking confirmation from the partner associated that they have decrypted the message that was send to them along with the public key that was found in the digital certificate of the partner. This is done by sending a hash code that is encrypted and requires the partner to decrypt it and finally sends back the message to the network (Burke et al., 2014). To decrypt the message with the hash code by its partner needs an audit trail to be created. The partner can only claim that the transaction have not occur is by saying that the private keys are being compromised.
The operation that is done by a stateful firewall is usually very complex. The internal complexity of stateful firewall is capable of making implementation of stateful firewall much easily. The firewall maintains a state table through conducting operation (Edeline et al., 2016). The entries for individual configuration are not actually required by an ACL configuration. Mainly the thing that is required for the firewall sis the need of configuring internal interface as well as external interface. The firewalls are mostly used by people without noticing the interface of the firewall. This is because in most of the houses, there are internet routers which implements the stateful firewall by using the port of LAN as an interface of internal firewall. The port of WAN is also connected as interface of external firewall (Liet al., 2017). This mainly helps the traffic to flow freely from internal interface to Internet without allowing the external traffic to flow in the internal network. This shows the importance of stateful firewall and the operation of the stateful router and the way it can be used for securing the internal networks.
The toughest part of operation with the stateful firewall is about how the firewall deals with the UDP (User Datagram Protocol) as well as the ICMP (Internet Control Message Protocol). The operation becomes tough as none of the protocols is similar to that of the TCP (Alcock, Möller & Nelson, 2016). With the help of UDP, there must be track state of the firewall by using the source address as well as the destination address as well as destination and source port numbers. The UDP connection is not that much secure as state tracking which is much more easily available with the TCP. With the UDP connection, a mechanism is offered that is much easier for using as well as maintaining with the ACLs. The UDP as well as ICMP brings additional complications in state tracking. This happens because the UDP mainly utilizes the ICMP for the assistance connection and ICMP is mostly inherently one of the many ways of it operations (Lin et al., 2017). With the ICMP only, it can be tracked truly within the state table for many operations that takes place. The operations that have been built up includes reply packets. The reply packets includes echo as well as echo-reply. For all the operations that are associated with the firewall must maintain a related state. This state is usually used when the ICMP packet is retransmitted in the response of the existing UDP entry of state table.
There are also information of connectionless sessions that are kept with same session table as for doing the TCP traffic. The value of timeout mostly allows closing session if the application layer protocol is kept unknown that does not allow the commands termination or communication errors (Naik & Jenkins, 2016). If after applying the gateway of application layer the session gets closed out as soon as possible. After applying the gateway, the firewall gets to know about the protocol and so can keep a track on the closed session. For example- For an ICMP Echo Request, there are session information that can be removed when ICMP Echo Reply, not reachable, timeout and such other messages are received.
Security Baseline can be defined as group of basic objectives of security that must satisfied given by and service or any system. The main objective that are chosen for security baseline are needed to be pragmatic as well as complete. These objectives do not impose technical means. So, how the security objectives are achieved are particularly mentioned in the document separately. The document which mentions the objective is known as Security Implementation Document (Bauer et al., 2016). The details that are mentioned in the security baseline document depends on operational environment on which the service or the system is deployed in and so the details can be used creatively used as well as applied with any particular security measure. Derogations from baseline are expected as well as possible that are marked explicitly.
All the systems or the services that are implemented or deployed in the compliance with the Security Implementation Document. Any kind of non-compliance with mostly lead to the reduced connectivity network for affective systems and the services. This involves closure of the CERN firewall openings, access many other network domains or disconnect the network from the CERN network.
The standards of security baseline mainly refers to some individual sets consisting of necessary procedures for security as well as objectives that are set aside for some given system or the service that are to be meet. The choices of the objectives should confirm the completeness as well as pragmatism and the objective should not impose the technical means. So, all details that are involved in the objective of security baseline are then set as well as fulfilled by some particular system or some services (DiMase et al., 2015). The details are then documented in different document of implementation of security baseline. The details of the security baseline mainly depends on the background of specific or particular operational environment where the service or the system runs. The type of security measures that are used is limited to the creativity as well as relevant application of the developer. There are derogations from security baselines also that are always expected as well as possible to occur, the most appropriate way is to note them periodically as well as mark them to avoid any other further derogations.
The most primary as well as primary objective for establishing as well as following up the security baseline is done so that the baseline is strengthened as well as promoted by an organization’s security specifically related to the computing assets (Lestari et al., 2016). The first way that are necessary for successfully achieving the objective is adopting MSB (Minimum Security Baselines). The implementation as well adoption of different security systems helps to enhance the host of the system. The MSB helps to allow the use of time much efficiently as well as makes provision of the technical support of system and the service that makes the user to use the objective easily (Qi et al., 2014). These compliances will be possible because of the compliance of system that is known and is tested for some application set that is used by the organizations.
Security baseline are basically some set of principles in a particular way where there is no way of conflict with the security system. The objectives of the security baseline are mostly optimized as the tools that are used for implementing the ideas and the goals that are stipulated for the security system. The goals of security baseline reflects the ways as well as the means that makes the prevailing security to work more efficiently (Layton, 2016). The baseline of security mostly reflects the provisions of security policy and then highlights all such necessary guidelines that are necessary for the preparation of many individual system that are applicable for the production purpose.
References
Alcock, S., Möller, J. P., & Nelson, R. (2016, November). Sneaking Past the Firewall: Quantifying the Unexpected Traffic on Major TCP and UDP Ports. In Proceedings of the 2016 Internet Measurement Conference (pp. 231-237). ACM.
Alegre, F., Janicki, A., & Evans, N. (2014, September). Re-assessing the threat of replay spoofing attacks against automatic speaker verification. In Biometrics Special Interest Group (BIOSIG), 2014 International Conference of the (pp. 1-6). IEEE.
Bauer, E., Schluga, O., Maksuti, S., Bicaku, A., Hofbauer, D., Ivki?, I., … & Tauber, M. (2016). Towards a Security Baseline for IaaS-Cloud Back-Ends in Industry 4.0.
Behringer, M., Pritikin, M., Bjarnason, S., Clemm, A., Carpenter, B., Jiang, S., & Ciavaglia, L. (2015). Autonomic networking: Definitions and design goals (No. RFC 7575).
Burke, J., Gasti, P., Nathan, N., & Tsudik, G. (2014, August). Secure sensing over named data networking. In 2014 IEEE 13th International Symposium on Network Computing and Applications (NCA) (pp. 175-180). IEEE.
DiMase, D., Collier, Z. A., Heffner, K., & Linkov, I. (2015). Systems engineering framework for cyber physical security and resilience. Environment Systems and Decisions, 35(2), 291-300.
Edeline, K., Kühlewind, M., Trammell, B., Aben, E., & Donnet, B. (2016). Using UDP for internet transport evolution. arXiv preprint arXiv:1612.07816.
Layton, T. P. (2016). Information Security: Design, implementation, measurement, and compliance. Auerbach Publications.
Lestari, F., Kurniawidjaja, M. L., & Hartono, B. (2016). Baseline survey on the implementation of laboratory chemical safety, health and security within health faculties laboratories at Universitas Indonesia. Journal of Chemical Health and Safety, 23(4), 38-43.
Li, H., Deng, J., Hu, H., Wang, K. C., Ahn, G. J., Zhao, Z., & Han, W. (2017, June). Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control. In Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies (pp. 129-131). ACM.
Lin, S., Zhang, D., Fu, Y., & Wang, S. (2017, October). A design of the ethernet firewall based on FPGA. In Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), 2017 10th International Congress on (pp. 1-5). IEEE.
Luan, T. H., Lu, R., Shen, X., & Bai, F. (2015). Social on the road: Enabling secure and efficient social networking on highways. IEEE Wireless Communications, 22(1), 44-51.
Naik, N., & Jenkins, P. (2016, July). Fuzzy reasoning based windows firewall for preventing denial of service attack. In Fuzzy Systems (FUZZ-IEEE), 2016 IEEE International Conference on (pp. 759-766). IEEE.
Patel, K., Han, H., Jain, A. K., & Ott, G. (2015, May). Live face video vs. spoof face video: Use of moiré patterns to detect replay video attacks. In Biometrics (ICB), 2015 International Conference on (pp. 98-105). IEEE.
Qi, L., Zhan, S., Xiao, Y., Jie, H., Xie, Y. G., Zhe, Q., & Juan, W. (2014, December). A Simulation-based Approach to Acquire Information Security Baseline of Network Device. In Information Engineering (Vol. 3, pp. 49-52). Science and Engineering Publishing Company.
Smith, D. F., Wiliem, A., & Lovell, B. C. (2015). Face recognition on consumer devices: Reflections on replay attacks. IEEE Transactions on Information Forensics and Security, 10(4), 736-745.
Yan, Q., & Yu, F. R. (2015). Distributed denial of service attacks in software-defined networking with cloud computing. IEEE Communications Magazine, 53(4), 52-59.
Yan, Z., & Wang, M. (2017). Protect pervasive social networking based on two-dimensional trust levels. IEEE Systems Journal, 11(1), 207-218.
Zhang, J., Lin, Y., & Qu, G. (2015). Reconfigurable binding against FPGA replay attacks. ACM Transactions on Design Automation of Electronic Systems (TODAES), 20(2), 33.
Zhu, M., & Martínez, S. (2014). On the performance analysis of resilient networked control systems under replay attacks. IEEE Transactions on Automatic Control, 59(3), 804-808.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download