12.07.2015 Views

HVAC Control in the New Millennium.pdf - HVAC.Amickracing

HVAC Control in the New Millennium.pdf - HVAC.Amickracing

HVAC Control in the New Millennium.pdf - HVAC.Amickracing

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>routed to <strong>the</strong> attacker before <strong>the</strong>y are transmitted to <strong>the</strong>ir f<strong>in</strong>al dest<strong>in</strong>ation.This allows <strong>the</strong> attacker to monitor all network traffic and becomea middle man.A middle-man attack can come from someone who is work<strong>in</strong>g for<strong>the</strong> Internet service provider (ISP). This person could ga<strong>in</strong> access to <strong>the</strong>network packets transferred between <strong>the</strong> network and any o<strong>the</strong>r networkus<strong>in</strong>g packet sniffers and rout<strong>in</strong>g or transport protocol software.These attacks could result <strong>in</strong> <strong>the</strong> <strong>the</strong>ft of <strong>in</strong>formation, hijack<strong>in</strong>g of<strong>in</strong>ternal network resources, denial of services, corruption of transmitteddata, <strong>in</strong>troduction of new or false <strong>in</strong>formation <strong>in</strong>to network sessions,<strong>in</strong>terruption of control and <strong>the</strong> degradation of network performance.IP Spoof<strong>in</strong>gAn IP-spoof<strong>in</strong>g attack can occur when an attacker outside <strong>the</strong> networkpretends to be a trusted computer on <strong>the</strong> system by us<strong>in</strong>g an IPaddress that is with<strong>in</strong> <strong>the</strong> range of IP addresses for <strong>the</strong> network. Theattacker may also use an authorized external IP address to provide accessto specific resources on <strong>the</strong> network.IP-spoof<strong>in</strong>g attacks are limited to <strong>the</strong> <strong>in</strong>jection of data or commands<strong>in</strong>to an exist<strong>in</strong>g stream of data passed between a client andserver application or a peer-to-peer network connection. For bidirectionalcommunication to exist, <strong>the</strong> attacker must change all rout<strong>in</strong>gtables to po<strong>in</strong>t to <strong>the</strong> spoofed IP address.An attacker can also emulate one of <strong>the</strong> <strong>in</strong>ternal users <strong>in</strong> <strong>the</strong> organization.This could <strong>in</strong>clude e-mail messages that appear to be official.These attacks are easier when an attacker has a user account and password.But, <strong>the</strong>y are still possible by comb<strong>in</strong><strong>in</strong>g spoof<strong>in</strong>g with a knowledgeof messag<strong>in</strong>g protocols.Denial-of-service AttacksDenial-of-service attacks concentrate on mak<strong>in</strong>g a service unavailable.This can be done exhaust<strong>in</strong>g or slamm<strong>in</strong>g a server on <strong>the</strong> network.Denial-of-service attacks can use Internet protocols, such as TCP and <strong>the</strong>Internet <strong>Control</strong> Message Protocol (ICMP).These attacks probe a weakness <strong>in</strong> <strong>the</strong> system. Flood<strong>in</strong>g <strong>the</strong> net-©2001 by The Fairmont Press, Inc. All rights reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!