20.08.2013 Views

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

User Guide - Kaspersky Lab

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Protection against network attacks 163<br />

To ensure your computer’s security, you must know what kinds of network<br />

attacks you might encounter. Known network attacks can be divided into three<br />

major groups:<br />

• Port scan – this threat is not an attack in its own right, but usually<br />

precedes one, since it is one of the common ways of obtaining<br />

information about a remote computer. The UDP/TCP ports used by the<br />

network tools on the computer in question are scanned to find out what<br />

state they are in (closed or open).<br />

Port scans can tell a hacker what types of attacks will work on the system,<br />

and what types will not. In addition, the information obtained by the scan<br />

will let the hacker determine what operating system the remote computer<br />

uses. This in turn further restricts the number of potential attacks, and,<br />

correspondingly, the time spent running them. It also aids a hacker in<br />

attempting to use vulnerabilities particular to that operating system.<br />

• DoS (Denial of Service) attacks – these are attacks that render the<br />

attacked system unstable or entirely inoperable. These attacks can<br />

damage or corrupt the targeted information resources, and leave them<br />

unusable.<br />

There are two basic types of DoS attacks:<br />

• Sending the target computer specially created packets that the<br />

computer does not expect, which cause the system either to restart<br />

or to stop<br />

• Sending the target computer many packets within a timeframe that<br />

the computer cannot process, which exhaust system resources<br />

The following attacks are common examples of this type of attack:<br />

• Ping of death sends an ICMP packet greater than the maximum of<br />

64 KB. This attack can crash some operating systems.<br />

• Land sends a request to an open port on your computer to establish<br />

a connection with itself. This sends the computer into a cycle, which<br />

intensifies the load on the processor and can end with some<br />

operating systems crashing.<br />

• ICMP Flood sends a large number of ICMP packets to your<br />

computer. The attack leads to the computer being forced to reply to<br />

each inbound packet, which seriously weighs down the processor.<br />

• SYN Flood sends a large number of queries to your computer to<br />

establish a fake connection. The system reserves certain resources<br />

for each of those connections, which completely drains your system<br />

resources, and the computer stops reacting to other connection<br />

attempts.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!