Toward More Resilient Cyber Infrastructure: A Practical ApproachBiljana Tanceska (Ministry of Defense, Macedonia), Mitko Bogdanoski (Military Academy “General Mihailo Apostolski”, Macedonia) and Aleksandar Risteski (University Ss. Cyril and Methodius, Macedonia)
Copyright © 2016.
47 pages.
OnDemand Chapter PDF Download
Download link provided immediately after order completion
| $30.00
List Price: $37.50 | | |
Available.
Instant access upon order completion.
DOI: 10.4018/978-1-4666-8793-6.ch015| Cite Chapter
MLA
Tanceska, Biljana, Mitko Bogdanoski and Aleksandar Risteski. "Toward More Resilient Cyber Infrastructure: A Practical Approach." Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare. IGI Global, 2016. 305-351. Web. 4 Nov. 2015. doi:10.4018/978-1-4666-8793-6.ch015
APA
Tanceska, B., Bogdanoski, M., & Risteski, A. (2016). Toward More Resilient Cyber Infrastructure: A Practical Approach. In M. Hadji-Janev, & M. Bogdanoski (Eds.) Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare (pp. 305-351). Hershey, PA: Information Science Reference. doi:10.4018/978-1-4666-8793-6.ch015
Chicago
Tanceska, Biljana, Mitko Bogdanoski and Aleksandar Risteski. "Toward More Resilient Cyber Infrastructure: A Practical Approach." In Handbook of Research on Civil Society and National Security in the Era of Cyber Warfare, ed. Metodi Hadji-Janev and Mitko Bogdanoski, 305-351 (2016), accessed November 04, 2015. doi:10.4018/978-1-4666-8793-6.ch015
Export Reference
| | TopAbstractIn this chapter, an analysis of security attacks on network elements along with the appropriate countermeasures is presented. The main goal of this chapter is to present the practical execution of various security attacks and their mitigation techniques due to more resilient cyber infrastructure. The network topology that has been attacked is designed in GNS3 software tool installed on Windows operating system, while the attacks are performed in Kali Linux operating system. Three groups of security attacks (Denial of Service, Man in the Middle, and Control Plane attacks) are observed in simulation scenarios with a detailed analysis on each of them, followed by a presentation of practical performance and ways of prevention (protection) against the attacks. TopIntroductionIn less than a generation, the electronic neighborhood called the Internet has established itself as the connection mechanisms bringing individuals, governments, corporations, colleges/universities, and other entities into a truly global system. This mechanism has affected political, economic, social, and educational interactions in a way that has produced significant benefits. However, when it comes to knowing how to cost - effectively protect the cyber infrastructure and the information that flows through it, we are all in uncharted territory (Kreitner, 2009). Malicious users are constantly looking for weaknesses and ways to disrupt the normal functioning of a given network, thereby causing damage by stealing or modifying the information or by making a service unavailable to its legitimate users. This is why internet security is an essential feature for managers and administrators of all networks. After experiencing considerable financial and technological damage in recent years and after knowing that even extremely powerful companies such as Google, Microsoft, Facebook, Yahoo, has suffered of various complex security violations, the main question of every company is: How can we protect ourselves from a security violation? The main aim of this chapter is to give some realistic and effective answers to these questions so we can effectively protect the network topology and its network elements from a security violation by analyzing some of the attacks that individuals or corporations are dealing with on a daily basis, or in resume to find an effective way toward more resilient cyber infrastructure. The purpose of this chapter is concluded (completed) using a theoretical and practical analysis of some of the before mentioned security attacks, followed by their appropriate countermeasures. To better understand the consequences and likelihood of such security disruptions, we put ourselves in the attacker’s role. In this way the awareness of the vulnerabilities of the network infrastructure increases. And if the vulnerabilities are well-know, the effective way of mitigation is very easy to find and implement. Before performing a theoretical and practical analysis of the security attacks, in the first section the purpose of implementing various internet security mechanisms and internet security policing will be explained. Then the term security attack will be defined presenting the division of the entire set of attacks on three groups that perfectly suit the chapter’s goal. Knowing that the main goal of every malicious user (attacker) is to either perform a denial of service to the victim, or to steal information from the legitimate users, the entire set of security attacks in this chapter will be divided as follows: From the first group of security attacks given above, a theoretical and practical analysis of a DHCP (Dynamic Host Configuration Protocol) Starvation attack will be presented. ARP (Address Resolution Protocol) Poisoning and DHCP Starvation with Rogue server are the security attacks that are chosen to be analyzed from the second group of security attacks - Man-in-the-middle attack. And finally, from the third group of security attack - Control plane attacks, the CDP (Cisco Discovery Protocol) Flooding attack will be theoretically and practically analyzed. The first section will be concluded with a detailed theoretical analysis of the previously mentioned three groups of security attacks, and ways to prevent from their malicious influence. In order to provide more realistic analysis of the security attacks GNS3 - based network topology will be implemented. The GNS3 simulation tool is chosen because is an open source software that simulate complex networks while being as close as possible to the way the real networks perform. All of this without having a dedicated network hardware such as routers and switches. In short GNS3 is an excellent alternative tool to real labs for network engineer administrators and people studying for certifications. This network topology along with its network elements and their configuration techniques will be presented in the second section of the chapter. In the third section, a detailed theoretical analysis of the following security attacks will be presented: - 1.
Theoretical analysis of DHCP Starvation with Rogue server attack. - 2.
Theoretical analysis of ARP Poisoning attack. - 3.
Theoretical analysis of CDP Flooding attack.
TopComplete Chapter List
Search this Book:
Reset
Preface
Metodi Hadji-Janev, Mitko Bogdanoski | |
Chapter 1 Jai Galliott
Cyber attacks pose fresh challenges for high-level military strategy and the ethics of war. In this chapter I consider the interplay between cyber...
Sample PDF
Cyber Warfare, Asymmetry, and Responsibility: Considerations for Defence Theorem
| $30.00 List Price: $37.50 |
Chapter 2 Olivera Injac, Ramo Šendelj
This chapter gives explanation on theoretical framework of the national security policy and strategy. Moreover, it analyzes selected countries...
Sample PDF
National Security Policy and Strategy and Cyber Security Risks
| $30.00 List Price: $37.50 |
Chapter 3 Mohammed S. Gadelrab, Ali A. Ghorbani
New computing and networking technologies have not only changed the way traditional crimes are committed but also introduced completely brand new...
Sample PDF
Cyber Criminal Profiling
| $30.00 List Price: $37.50 |
Chapter 4 Katerina Zlatanovska
The distribution of information technology is a step forward in accelerating rapidity and efficiency of transferring information. As each system...
Sample PDF
Hacking and Hacktivism as an Information Communication System Threat
| $30.00 List Price: $37.50 |
Chapter 5 Flavia Zappa Leccisotti, Raoul Chiesa, Niccolo De Scalzi, Leopoldo Gudas, Daniele De Nicolo
The ICT technology is even more central in modern society. Every relevant sectors of Western economies depend on ICT technology, from Energy...
Sample PDF
Attack Scenarios Perpetrated by Terrorist Organizations Through the Use of IT and ICT: On the Basis of What Is Already Available Today
| $30.00 List Price: $37.50 |
Chapter 6 Marina Shorer-Zeltser, Galit M. Ben-Israel
The current research is dedicated to put forward the ways the Internet surfers are mobilized for the aims of illegal and harmful actions and even...
Sample PDF
Analysis of Success of Mobilization to Terror using Tools of Neuro-Linguistic Programming (NLP)
| $30.00 List Price: $37.50 |
Chapter 7 Kimberly Lukin
This article analyzes the similarities and differences between the EU's and Russia's cyber preparedness, management structures, governmental...
Sample PDF
Russian Cyberwarfare Taxonomy and Cybersecurity Contradictions between Russia and EU: An Analysis of Management, Strategies, Standards, and Legal Aspects
| $30.00 List Price: $37.50 |
Chapter 8 Stojan Slaveski, Biljana Popovska
Certain information and personal data, held by the government, needs to be kept secret because its disclosure to the general public could jeopardize...
Sample PDF
Access to Information in the Republic of Macedonia: Between Transparency and Secrecy
| $30.00 List Price: $37.50 |
Chapter 9 Flavia Zappa Leccisotti, Raoul Chiesa, Daniele De Nicolo
At a global level, various risks have increased due to the intensification of globalization, and in this scenario Cybercrime is becoming a more...
Sample PDF
Analysis of Possible Future Global Scenarios in the Field of Cyber Warfare: National Cyber Defense and Cyber Attack Capabilities
| $30.00 List Price: $37.50 |
Chapter 10 Predrag Pale
Information security is gaining attention of managers, leaders and public as attacks extend from “pure” IT systems into critical infrastructure...
Sample PDF
Information Security as a Part of Curricula in Every Professional Domain, Not Just ICT's
| $30.00 List Price: $37.50 |
Chapter 11 Dimitar Stevo Bogatinov, Mitko Bogdanoski, Slavko Angelevski
The growing network attacks and intrusions have put the government organizations at a great risk. In cyberspace, humans have great limitations in...
Sample PDF
AI-Based Cyber Defense for More Secure Cyberspace
| $30.00 List Price: $37.50 |
Chapter 12 Ashok Vaseashta, Sherri B. Vaseashta, Eric W. Braman
Advances in S&T coupled with universal access to cyberspace have motivated both state and non-state sponsored actors to new levels in the...
Sample PDF
Mitigating Unconventional Cyber-Warfare: Scenario of Cyber 9/11
| $30.00 List Price: $37.50 |
Chapter 13 Metodi Hadji-Janev
Many incidents in cyberspace and the response to those incidents by victim states prove that the cyber conflict is a reality. This new conflict is...
Sample PDF
Changing the Approach to Deterrence in Cyberspace while Protecting Civilians from Cyber Conflict
| $30.00 List Price: $37.50 |
Chapter 14 Denis Čaleta
The globalisation of the world, and thus indirectly of security, poses serious dilemmas for the modern society about how to continue basing its...
Sample PDF
Cyber Threats to Critical Infrastructure Protection: Public Private Aspects of Resilience
| $30.00 List Price: $37.50 |
Chapter 15 Biljana Tanceska, Mitko Bogdanoski, Aleksandar Risteski
In this chapter, an analysis of security attacks on network elements along with the appropriate countermeasures is presented. The main goal of this...
Sample PDF
Toward More Resilient Cyber Infrastructure: A Practical Approach
| $30.00 List Price: $37.50 |
Chapter 16 Mitko Bogdanoski, Marjan Stoilkovski, Aleksandar Risteski
There are many freeware and commercial tools which can be used to provide forensics information based on dead and live forensics acquisition. The...
Sample PDF
Novel First Responder Digital Forensics Tool as a Support to Law Enforcement
| $30.00 List Price: $37.50 |
Chapter 17 Zlatogor Borisov Minchev
The chapter describes the problem of building cyber threats resilience for the human factor as the technological growth is constantly changing the...
Sample PDF
Human Factor Role for Cyber Threats Resilience
| $30.00 List Price: $37.50 |
Chapter 18 Nancy Houston
Perhaps the greatest challenge to cyber security is that people are inherently behind each cyber problem as well as its solution. The reality is...
Sample PDF
The Impact of Human Behavior on Cyber Security
| $30.00 List Price: $37.50 |
Chapter 19 Metodi Hadji-Janev
The post-Cold War reality has brought many changes that challenge political leaders, planners and operators. Using cyberspace to accomplish their...
Sample PDF
International Legal Aspects of Protecting Civilians and Their Property in the Future Cyber Conflict
| $30.00 List Price: $37.50 |
Chapter 20 Vesna Poposka
Referring to the cyber space as the new dimension of warfare opens many legal challenges. Those challenges can be settled in two main clusters...
Sample PDF
Right to Life and Cyber Warfare: Applicability of Legal Regimes during Counterterrorist Operations (International Humanitarian Law)
| $30.00 List Price: $37.50 |
Chapter 21 Lior Tabansky
Cyberspace opened a Pandora's Box: it enabled a direct strike on national infrastructure while circumventing traditional defence systems....
Sample PDF
Israel's Cyber Security Policy: Local Response to the Global Cybersecurity Risk
| $30.00 List Price: $37.50 |
TopKey Terms in this ChapterAttack: Attempt to destroy, expose, disable, steal or gain unauthorized access and sensitive information. Kali Linux OS: Operating system that allows performing a security attack. GNS3 Software Tool: Open source program that allows emulating a complex network while being as close as possible to the way real networks perform. Wireshark: Free and open-source packet analyzer. Yersinia: A network tool designed to take advantage of some weaknesses on different network protocols. It pretends to be a solid framework for analyzing and testing the deploy networks and systems. Botnet: Large number of compromised computers that are used to generate spam, relay viruses or flood a network or Web server with excessive requests to cause it to fail. Mitigation Technique: Effective way to defend the network topology from a certain attack. |
| |