Lecture Notes: Network Attacks and
Defense Strategies
1. Essential Terminologies Related to Network Security
Understanding network security requires familiarity with some key terminologies:
Term Definition
Any attempt to compromise the confidentiality, integrity, or
Network Attack
availability of a network resource.
A potential cause of an unwanted incident, which may result in
Threat
harm to a system or organization.
Vulnerability Weakness in a system or network that can be exploited by threats.
Exploit Technique or method used to take advantage of a vulnerability.
Malicious software designed to damage, disrupt, or gain
Malware
unauthorized access to systems (e.g., viruses, worms, ransomware).
Security device/software that monitors and controls
Firewall
incoming/outgoing network traffic.
Intrusion Detection Monitors network/system activities for malicious activities or
System (IDS) policy violations.
Intrusion Prevention Detects and prevents malicious activities by blocking them
System (IPS) automatically.
2. Attacker Hacking Methodologies and Frameworks
Attackers follow structured methodologies to compromise networks. Understanding these
helps in designing defense strategies.
2.1 Phases of Hacking
1. Reconnaissance (Footprinting & Scanning)
o Collecting information about the target network.
o Tools: Nmap, Whois, Shodan.
2. Gaining Access
o Exploiting vulnerabilities to enter the system.
o Tools: Metasploit, SQLMap.
3. Maintaining Access
o Installing backdoors or rootkits to stay undetected.
o Tools: Netcat, Meterpreter.
4. Clearing Tracks
o Erasing logs to avoid detection.
o Tools: Log cleaners, anti-forensics scripts.
2.2 Attacker Frameworks
Framework Description
Model describing the stages of a cyber attack: Reconnaissance →
Cyber Kill
Weaponization → Delivery → Exploitation → Installation → Command &
Chain
Control → Actions on Objective.
MITRE Knowledge base of adversary tactics and techniques based on real-world
ATT&CK observations.
Threat modeling framework focusing on Spoofing, Tampering, Repudiation,
STRIDE
Information Disclosure, Denial of Service, Elevation of Privilege.
3. Fundamental Goals, Benefits, and Challenges in
Network Defense
3.1 Goals of Network Defense
1. Confidentiality: Protect sensitive data from unauthorized access.
2. Integrity: Ensure data is accurate and unaltered.
3. Availability: Ensure network services are accessible when needed.
4. Authentication & Authorization: Verify users and control access.
3.2 Benefits
Protects critical business and personal data.
Reduces risk of financial loss and legal liabilities.
Maintains user trust and system reliability.
Ensures regulatory compliance.
3.3 Challenges
Rapidly evolving threats and malware.
Insider threats and social engineering.
Complexity in securing multi-layered networks.
Balancing security with system usability.
4. Continual/Adaptive Security Strategy
Adaptive security is a proactive approach that continuously monitors and adapts to new
threats.
Key Components:
1. Predict: Identify potential threats using threat intelligence.
2. Prevent: Implement preventive controls (firewalls, antivirus, patching).
3. Detect: Monitor network and systems for anomalies.
4. Respond: Take immediate action to mitigate attacks.
5. Recover: Restore services and update defense measures.
Flowchart: Adaptive Security Cycle
[Predict] → [Prevent] → [Detect] → [Respond] → [Recover] → [Predict]
(Loop continues for continuous protection)
5. Defense-in-Depth Security Strategy
Defense-in-depth implements multiple layers of security to protect networks.
Layers of Defense:
1. Perimeter Security: Firewalls, gateways, VPNs.
2. Network Security: IDS/IPS, VLANs, segmentation.
3. Endpoint Security: Antivirus, host-based firewalls.
4. Application Security: Web app firewalls, secure coding.
5. Data Security: Encryption, DLP (Data Loss Prevention).
6. Physical Security: Locked server rooms, access controls.
Diagram: Defense-in-Depth
+-------------------+
| Physical Layer |
+-------------------+
| Data Security |
+-------------------+
| Application Layer |
+-------------------+
| Endpoint Layer |
+-------------------+
| Network Layer |
+-------------------+
| Perimeter Layer |
+-------------------+
6. Security Controls
Security controls are measures implemented to protect networks from attacks. They are
classified into three main types:
6.1 Administrative Controls
Policies, procedures, and regulations.
Examples:
o Security awareness training.
o Incident response plan.
o User access policies.
6.2 Technical Controls
Hardware/software mechanisms.
Examples:
o Firewalls, IDS/IPS.
o Antivirus/antimalware.
o Encryption and authentication protocols.
6.3 Physical Controls
Protect the physical environment of network assets.
Examples:
o Locked doors and cabinets.
o Surveillance cameras.
o Biometric access systems.
Diagram: Security Controls Classification
Security Controls
|
---------------------------------------
| | |
Administrative Technical Physical
7. Summary Diagram: Network Attack & Defense
Strategy
[Attacker]
|
-----------------------------
| | |
Reconnaissance Attack Exploitation
|
-----------------
| |
Defense Strategies Adaptive Security
|
------------------------------
| | |
Administrative Technical Physical
Controls Controls Controls
References:
1. William Stallings, Network Security Essentials, 7th Edition.
2. Eric Cole, Network Security Bible, 2nd Edition.
3. NIST SP 800-53, Security and Privacy Controls for Information Systems and
Organizations.
4. MITRE ATT&CK Framework, https://attack.mitre.org.