NIS Winter
NIS Winter
NIS Winter
a. The sender calculates the hash of the original message using a cryptographic hash function (e.g., SHA-
256, SHA-3). This hash value serves as a digital fingerprint of the message.
2. Digital Signing:
a. The sender uses their private key to encrypt the hash value. This encrypted hash value is called the
digital signature. The digital signature along with the digital signature to the recipient.
3. Signature Verification:
Cover media is the file in which we will hide the hidden data, which
may also be encrypted using stego-key. The resultant file is stego
medium. Cover-media can be image or audio file. Stenography takes
cryptography a step further by hiding an encrypted message so that
no one suspects it exists. Ideally, anyone scanning your data will fail
to know it contains encrypted data. Stenography has a number of
drawbacks when compared to encryption. It requires a lot of overhead
to hide a relatively few bits of information. I.e. One can hide text,
data, image, sound, and video, behind image.
Applications :
1. Confidential communication and secret data storing
2. Protection of data alteration
3. Access control system for digital content distribution
4. Media Database systems
3. Attempt any THREE of the following : 12
(a) Describe :
(i) Piggybacking
(ii) Dumpster diving
Ans.Piggybacking: It is the simple process of following closely behind a
person who has just used their own access card or PIN to gain
physical access to a room or building. An attacker can thus gain
access to the facility without having to know the access code or
having to acquire an access card. i.e. Access of wireless internet
connection by bringing one's own computer within range of another
wireless connection & using that without explicit permission, it
means when an authorized person allows (intentionally or
unintentionally) others to pass through a secure door. Piggybacking
on Internet access is the practice of establishing a wireless Internet
connection by using another subscriber's wireless Internet access
service without the subscriber’s explicit permission or knowledge.
Piggybacking is sometimes referred to as "Wi-Fi squatting." The
usual purpose of piggybacking is simply to gain free network access
rather than any malicious intent, but it can slow down data transfer
for legitimate users of the network.
Dumpster Diving :There is a famous saying that most of you might have listened, “One man’s trash is another man’s
treasure”. That means what one person considers worthless might be of high value to the other. The concept of Dumpster
Diving relies upon the above stated idiom.
In the world of Information Security and Cyber threats, Dumpster diving is the process of searching trash to obtain useful
information about a person/business that can later be used for the hacking purpose. This attack mostly targets large
organizations or business to carry out phishing (mostly) by sending fake emails to the victims that appear to have come
from a legitimate source. The information obtained by compromising the confidentiality of the victim is used for Identity
frauds.
(b) Consider plain text “CERTIFICATE” and convert it into cipher text using Caesar Cipher with a shift of
position 4. Write steps for encryption.
Ans.
Number columns : 06
Encryption key : 632514
Ans.
(b) State the working principle of application gateways. Describe circuit gateway operation.
Ans.Working Principle of Application Gateways
1. Proxy Server Functionality:
a. Application gateways act as intermediaries between clients and servers. When a client wants to access a
service (e.g., a web server, email server), the request is sent to the application gateway rather than
directly to the server.
b. The application gateway forwards the client's request to the intended server and receives the server's
response, which it then sends back to the client. This process effectively hides the identity of the client
from the server and vice versa.
2. Protocol Inspection:
a. Application gateways are designed to understand specific application protocols (e.g., HTTP, FTP,
SMTP). They analyze the content of the traffic at a deeper level than traditional packet filters, which
only examine header information.
b. By inspecting the application data, the gateway can enforce security policies, such as preventing
malicious commands or filtering out harmful content.
3. Access Control:
a. Application gateways implement access control measures to ensure that only authorized users can
access specific services. This is done by checking user credentials and permissions before forwarding
requests to the server.
b. For example, a web proxy might require users to authenticate themselves before allowing them to
access certain websites.
4. Traffic Filtering:
a. Application gateways can filter traffic based on content, such as blocking specific URLs, keywords, or
file types. This is particularly useful for enforcing corporate policies regarding web usage or for
blocking access to malicious sites.
b. By filtering content, they help prevent the download of malware or other harmful files.
5. Logging and Monitoring:
a. Application gateways log all traffic that passes through them, which can be used for monitoring,
auditing, and troubleshooting purposes. Administrators can analyze these logs to detect suspicious
activities or compliance violations.
b. The logging feature also aids in forensic investigations following security incidents.
6. Translation and Encryption:
a. Application gateways can perform data translation, converting data formats or protocols as needed. For
instance, a gateway might convert FTP traffic into HTTP traffic to facilitate a secure transfer over the
web.
b. They can also provide encryption and decryption services for secure communication, ensuring that data
transmitted between clients and servers is protected against eavesdropping.
7. Session Management:
a. Application gateways manage sessions between clients and servers. They can maintain state
information about ongoing sessions, allowing for more efficient handling of requests and responses.
b. This feature is particularly useful for applications that require a persistent connection, such as online
gaming or video conferencing.
8. Load Balancing:
a. Some application gateways can also perform load balancing, distributing incoming requests among
multiple backend servers to ensure optimal resource utilization and minimize response times.
b. This improves the overall performance and reliability of the services being accessed.
Circuit Gateways
Circuit gateways are a type of network gateway that operates at the transport layer (Layer 4) of the OSI model. They are
designed to facilitate communication between different networks by establishing and managing circuits or connections for
the data being transmitted. Below is a detailed description of the operation of circuit gateways:
Circuit gateways, also known as circuit-level gateways, function as intermediaries that allow network packets to be
forwarded between different networks while ensuring that the communication adheres to the rules and protocols
established by both networks. They are particularly useful for enabling secure connections between clients and servers
across different networks, especially in scenarios where a direct connection is not possible.
Key Functions of Circuit Gateways
1. Connection Establishment:
a. Circuit gateways establish a connection (or circuit) between a client and a server. This process typically
involves negotiating parameters, such as protocol type and communication settings, before any data is
transmitted.
b. The gateway acts as a session manager, ensuring that both ends of the connection are properly
synchronized.
2. Packet Forwarding:
a. Once the connection is established, circuit gateways forward packets between the client and the server.
They do not inspect the packet content at a deep level; instead, they focus on the transport layer
information (like TCP/UDP headers) to make forwarding decisions.
b. The circuit gateway can keep track of the connection state and ensure that packets are delivered in the
correct order, which is critical for maintaining the integrity of the communication.
3. Protocol Translation:
a. Circuit gateways can perform protocol translation if the client and server use different communication
protocols. For example, if a client uses TCP and the server uses a different protocol, the circuit gateway
can translate the packets as they pass through.
b. This capability allows for greater interoperability between different networks or systems.
4. Security and Access Control:
a. Circuit gateways enhance security by acting as a barrier between the client and server networks. They
can enforce access control policies, only allowing authorized users or applications to establish
connections.
b. Security features may include authentication, encryption, and logging of traffic that passes through the
gateway.
5. Session Management:
a. Circuit gateways maintain the state of active connections, which helps ensure that packets are delivered
reliably and in order. This stateful management allows for better error handling and retransmission of
lost packets.
b. They can also manage multiple sessions simultaneously, efficiently allocating resources as needed.
Circuit Gateway Operation
The operation of a circuit gateway can be broken down into the following steps:
1. Connection Request:
a. The client initiates a connection request to the circuit gateway. This request typically includes
information about the destination server and the desired protocol.
2. Establishing the Circuit:
a. The circuit gateway evaluates the connection request, checking if the client is authorized to connect to
the specified server.
b. Once authorized, the gateway establishes a circuit by creating a session for the communication and
negotiating the necessary parameters with the client and server.
3. Data Transmission:
a. After establishing the circuit, data packets can be transmitted between the client and the server. The
circuit gateway forwards these packets, ensuring that they reach their intended destination without
inspection of the application data.
b. The gateway handles any necessary translation or adjustment of headers based on the protocols used by
the client and server.
4. Monitoring and Management:
a. The circuit gateway continuously monitors the active connection, ensuring that packets are delivered in
the correct sequence and that session state is maintained.
b. If any issues arise (e.g., packet loss or timeout), the gateway can take corrective actions, such as
retransmitting lost packets or terminating the connection.
5. Connection Termination:
a. When the client or server decides to end the session, a termination request is sent to the circuit gateway.
The gateway then cleans up resources, closes the circuit, and logs the session details for auditing
purposes.
Advantages of Circuit Gateways
Simplicity: Circuit gateways are relatively simple to configure and manage compared to more complex
application-layer gateways.
Performance: Since they primarily operate at the transport layer and do not perform deep packet inspection,
circuit gateways can offer lower latency and better performance for data transmission.
Transparency: They provide a level of transparency to the users, as the connection details are abstracted away,
and users can focus on the applications rather than the underlying network configurations.
Use Cases
Virtual Private Networks (VPNs): Circuit gateways are often used in VPN implementations, allowing secure
connections between remote users and corporate networks.
Interconnecting Different Networks: They enable communication between networks that use different
protocols, such as connecting a TCP/IP network to an older network protocol.
Examples:
1) Web servers
It‟s possible for web servers communicating with internal database
servers to be deployed in a DMZ. This makes internal databases more
secure, as these are the repositories responsible for storing sensitive
information. Web servers can connect with the internal database
server directly or through application firewalls, even though the DMZ
continues to provide protection.
2) DNS servers
A DNS server stores a database of public IP addresses and their
associated hostnames. It usually resolves or converts those names to
IP addresses when applicable. DNS servers use specialized software
and communicate with one another using dedicated protocols. Placing
a DNS server within the DMZ prevents external DNS requests from
gaining access to the internal network. Installing a second DNS
server on the internal network can also serve as additional security.
3)Proxy servers
A proxy server is often paired with a firewall. Other computers use it
to view Web pages. When another computer requests a Web page, the
proxy server retrieves it and delivers it to the appropriate requesting
machine. Proxy servers establish connections on behalf of clients,
shielding them from direct communication with a server. They also
isolate internal networks from external networks and save bandwidth
by caching web content.
(d) State the use of Digital Certificates. Describe the steps for digital certificate creation.
Ans.Uses of Digital Certificates
1. Authentication:
a. Digital certificates are used to authenticate the identity of an entity (e.g., a user, server, or device) in a
digital transaction.
b. For example, when accessing a secure website (HTTPS), the server presents a digital certificate to
prove its identity to the client (browser). This ensures that the client is connecting to the intended server
and not an imposter.
2. Data Encryption:
a. Digital certificates enable data encryption by providing the public key that can be used to encrypt
messages sent to the certificate owner.
b. This is commonly used in Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols to
secure communication between a client and server, ensuring that data transmitted over the network is
confidential and protected against eavesdropping.
3. Digital Signatures:
a. Digital certificates are used to create digital signatures, which verify the integrity and authenticity of a
message, document, or piece of code.
b. When a digital certificate is used to sign data, it confirms that the data has not been altered since it was
signed and that it originated from the certificate holder.
4. Secure Web Browsing (HTTPS):
a. Web servers use digital certificates to implement HTTPS (Hypertext Transfer Protocol Secure), which
ensures secure communication between the browser and the web server.
b. When a user visits a secure website, the web server presents its digital certificate to the browser, which
verifies its authenticity before establishing an encrypted connection.
5. Email Security:
a. Digital certificates can be used in Secure/Multipurpose Internet Mail Extensions (S/MIME) to sign and
encrypt email messages.
b. This ensures that the recipient of an email can verify the sender's identity and that the contents of the
email have not been tampered with during transmission.
6. Code Signing:
a. Digital certificates are used by software developers to sign their code or software applications.
b. This assures users that the software they are downloading or installing comes from a trusted source and
has not been modified since it was signed by the developer.
7. User and Device Authentication:
a. Digital certificates can be used to authenticate users and devices in a network. For example, they are
often used in VPNs (Virtual Private Networks) and WLANs (Wireless Local Area Networks) to
authenticate remote users and devices connecting to the network.
8. Secure Financial Transactions:
a. Digital certificates are used in securing financial transactions, such as those performed on banking
websites or payment gateways.
b. They help confirm the authenticity of the payment service provider and enable secure transmission of
sensitive financial data.
9. Single Sign-On (SSO):
a. In SSO systems, digital certificates can be used to authenticate users across multiple applications or
systems without requiring them to log in multiple times.
b. This provides a seamless user experience and enhances security by reducing the number of credentials
that need to be managed.
10. Establishing Trust in Public Key Infrastructure (PKI):
a. Digital certificates play a critical role in the functioning of PKI systems, where they serve as the
foundation of trust by binding public keys to the identities of their owners.
b. Certificate Authorities (CAs) issue digital certificates, and entities rely on these CAs to validate the
authenticity of the certificates.
(e) Considering DES, find the output of the initial permutation box when the input is given in hexadecimal as,
0×0000 0080 0000 0002
Ans.
(b) State the features of the following IDS : (i) Network based IDS (ii) Host based IDS (iii) Honey pots
Ans.A Network-based Intrusion Detection System (NIDS) is a security solution that monitors and analyzes network
traffic to detect malicious activities or policy violations. It operates at the network layer and captures network packets,
inspecting their contents for signs of intrusions, such as unusual traffic patterns, known attack signatures, or anomalous
behaviors. NIDS is typically deployed at critical points in a network, like at the perimeter or within subnets, to provide a
comprehensive view of network activity.
Features of Network-based IDS (NIDS)
1. Network Traffic Monitoring and Analysis:
a. NIDS continuously monitors network traffic in real-time and captures data packets for analysis.
b. It inspects various network protocols (e.g., TCP, UDP, ICMP) and payload data to identify suspicious
activities or patterns.
c. Monitoring can be done passively (no interference with network traffic) or actively (interacting with
traffic flow).
2. Signature-based Detection:
a. NIDS uses predefined attack signatures or patterns to detect known threats, similar to how antivirus
software detects malware.
b. When a packet or series of packets matches a signature, the NIDS triggers an alert.
c. Signature-based detection is effective for known attacks but may not detect new or unknown threats.
3. Anomaly-based Detection:
a. NIDS uses a baseline of normal network behavior and identifies deviations from this baseline as
potential threats.
b. It can detect new or unknown attacks by flagging unusual traffic patterns, excessive bandwidth usage,
or unauthorized protocol use.
c. Anomaly-based detection is more adaptable but may produce more false positives compared to
signature-based systems.
4. Protocol Analysis and Packet Decoding:
a. NIDS can analyze specific network protocols, such as HTTP, FTP, DNS, and SMTP, and ensure that
they adhere to expected standards.
b. It decodes packets to understand the structure and identify any protocol anomalies that may indicate an
attack or misconfiguration.
5. Real-time Alerts and Notifications:
a. NIDS generates real-time alerts and notifications when a suspicious activity or security incident is
detected.
b. Alerts can be sent via email, syslog, or integration with Security Information and Event Management
(SIEM) systems for centralized logging and analysis.
6. Network Forensics and Logging:
a. NIDS captures and logs detailed information about network activities, including packet headers,
payload data, and timestamps.
b. These logs can be used for forensic analysis, allowing security analysts to investigate security incidents
and reconstruct attack scenarios.
7. Integration with Other Security Systems:
a. NIDS can integrate with other security tools, such as firewalls, routers, and SIEM systems, to create a
unified security architecture.
b. Integration allows automated responses, such as blocking IP addresses or adjusting firewall rules in
response to detected threats.
8. Scalability and Placement:
a. NIDS can be deployed at various points within a network, such as at the network perimeter, within
subnets, or near critical servers, depending on the network architecture and security needs.
b. It can scale to monitor large, complex networks with high-speed traffic by using distributed or cluster-
based NIDS solutions.
9. Detecting Multi-stage Attacks:
a. Advanced NIDS solutions can correlate multiple suspicious events over time to identify multi-stage
attacks or complex intrusion techniques, such as Advanced Persistent Threats (APTs).
b. This feature helps identify sophisticated attacks that might not be detectable by single-packet
inspection.
10. Encrypted Traffic Analysis:
a. While NIDS typically analyzes unencrypted traffic, some systems have capabilities to handle encrypted
traffic using techniques such as SSL/TLS decryption, deep packet inspection, or integration with
decrypting proxies.
b. This feature is critical for identifying threats hidden within encrypted traffic, which is increasingly
common in modern networks.
11. Zero-day Threat Detection:
a. NIDS can utilize heuristic analysis, machine learning, or behavior analysis to detect previously
unknown threats or zero-day attacks.
b. These techniques analyze patterns and behaviors to identify potential threats that do not match any
known signature.
12. Policy Violation Detection:
a. NIDS can detect policy violations, such as the use of forbidden applications, unauthorized access
attempts, or the transmission of sensitive data over the network.
b. It helps enforce organizational security policies and compliance requirements.
13. Bandwidth and Network Usage Analysis:
a. NIDS provides insights into network bandwidth usage and can identify issues like network congestion,
abnormal traffic spikes, or potential Denial-of-Service (DoS) attacks.
b. This analysis helps network administrators maintain optimal network performance and security.
14. Bypass-resistant Features:
a. Some NIDS are designed to resist evasion techniques used by attackers, such as packet fragmentation,
traffic obfuscation, or IP spoofing.
b. They use advanced detection mechanisms to identify and analyze fragmented or reassembled packets
accurately.
Traffic collector:
This component collects activity or events from the IDS to examine.
On Host-based IDS, this can be log files, audit logs, or traffic coming
to or leaving a specific system
Analysis Engine:
This component examines the collected network traffic & compares it
to known patterns of suspicious or malicious activity stored in the
signature database. The analysis engine acts like a brain of the IDS.
ï‚· Signature database:
It is a collection of patterns & definitions of known suspicious or
malicious activity.
ï‚· User Interface & Reporting:
This is the component that interfaces with the human element,
providing alerts & giving the user a means to interact with & operate
the IDS.
Features of Host-based IDS (HIDS)
1. File Integrity Monitoring (FIM):
a. HIDS tracks changes to critical files and directories, such as system binaries, configuration files, and
registry keys.
b. It detects unauthorized modifications, deletions, or additions to these files, which may indicate a
security breach, malware infection, or policy violation.
c. This feature is crucial for identifying rootkit installations, configuration changes, and tampering with
critical system files.
2. System Log Analysis:
a. HIDS continuously monitors and analyzes log files generated by the operating system and applications,
such as event logs, syslogs, and application-specific logs.
b. It detects abnormal log entries, unauthorized login attempts, suspicious process activity, or
configuration changes that could signal an intrusion.
3. Process and Application Monitoring:
a. HIDS keeps track of running processes, application behavior, and system calls to identify suspicious or
unauthorized activities.
b. It can detect the execution of unauthorized programs, privilege escalation attempts, and malware
activity.
4. User Activity Monitoring:
a. HIDS monitors user behavior and actions, such as login attempts, file access patterns, and command
execution.
b. It can detect unauthorized access, privilege misuse, or abnormal user activities, which are indicative of
insider threats or account compromise.
5. Kernel and System Call Monitoring:
a. HIDS can inspect system-level activities, including kernel calls and system functions.
b. It provides deep visibility into operating system behavior to identify sophisticated threats, such as
kernel-level rootkits or privilege escalation exploits.
6. Policy Compliance Enforcement:
a. HIDS helps enforce security policies and compliance requirements by monitoring configurations and
system states.
b. It ensures that the host adheres to predefined security policies, such as permitted applications, user
permissions, and system configurations.
7. Rootkit and Malware Detection:
a. HIDS can detect rootkits and other forms of malware by analyzing hidden processes, files, or registry
keys that are not visible to traditional security tools.
b. It uses techniques like memory analysis, behavior analysis, and file integrity monitoring to identify and
remove stealthy threats.
8. Alerting and Reporting:
a. HIDS generates alerts and notifications for suspicious activities or security incidents.
b. Alerts can be integrated with other security solutions, such as Security Information and Event
Management (SIEM) systems, for centralized monitoring and correlation.
9. Behavioral Analysis and Anomaly Detection:
a. HIDS uses baselines of normal host behavior and identifies deviations that
Honey Pots
A relatively recent innovation in intrusion detection technology is the
honey pot. Honey pots are decoy systems that are designed to lure a
potential attacker away from critical systems. Honey pots are designed
to:
ï‚· divert an attacker from accessing critical systems
ï‚· collect information about the attacker's activity
It encourages the attacker to stay on the system long enough for
administrators to respond. These systems are filled with fabricated
information designed to appear valuable but that a legitimate user of
the system wouldn‟t access. Thus, any access to the honey pot is
suspect.
Features of Honeypots
1. Deception and Luring:
a. Honeypots are designed to appear as legitimate systems or devices, enticing attackers to interact with
them.
b. They often emulate real services, open ports, or network configurations to attract malicious actors.
2. Attack Detection:
a. Honeypots can detect and log various types of attacks, including reconnaissance, exploitation attempts,
and malware infections.
b. Since honeypots have no legitimate user activity, any interaction is likely to be suspicious, allowing for
precise detection of unauthorized access attempts.
3. Data Collection and Analysis:
a. Honeypots record detailed information about an attack, such as the attacker's IP address, tools used,
command inputs, and payloads.
b. This data can be analyzed to understand attacker behavior, techniques, and intentions.
4. Classification of Attacks:
a. Honeypots can help classify different types of attacks, such as Denial-of-Service (DoS), port scanning,
brute force attempts, and zero-day exploits.
b. They provide visibility into the types and frequency of attacks targeting an organization.
5. Decoy Services and Systems:
a. Honeypots can simulate various types of services and systems, such as web servers, databases, and
email servers, to observe how attackers interact with them.
b. They may also emulate vulnerabilities commonly exploited in real systems to attract attackers.
6. Early Warning System:
a. Honeypots act as an early warning system by detecting attacks that may not be visible to traditional
security mechanisms like firewalls or Intrusion Detection Systems (IDS).
b. By identifying malicious activities early, honeypots can help organizations mitigate potential risks
before they reach critical systems.
7. Minimal False Positives:
a. Since honeypots are designed to have no legitimate traffic or activity, any interaction with the honeypot
is almost always an indication of malicious intent.
b. This significantly reduces false positives compared to other security tools that monitor legitimate
network traffic.
8. Isolation and Containment:
a. Honeypots are isolated from production systems, ensuring that any attack or malicious activity within
the honeypot does not affect actual network resources.
b. They can be used to safely observe and contain malware or attack behavior without risking harm to real
systems.
9. Research and Intelligence Gathering:
a. Honeypots are valuable tools for gathering intelligence on emerging threats and new attack techniques.
b. Security researchers use honeypots to study malware, hacker behavior, and attack strategies, improving
overall knowledge of cybersecurity threats.
10. Decoy Network (Honeynet):
a. Honeypots can be deployed in a network of multiple interconnected honeypots, known as a honeynet,
to simulate an entire network environment.
b. Honeynets provide a broader perspective on how attackers navigate through network resources, making
them ideal for tracking lateral movements.
11. Types of Honeypots:
a. Low-interaction Honeypots: These simulate only a few aspects of a real system and provide limited
interaction. They are easier to deploy and less risky, but they can only collect basic information about
the attacker.
b. High-interaction Honeypots: These simulate entire systems with complete services, offering deeper
interaction. They provide more detailed information about attacker behavior but are more complex and
riskier to manage.
12. Countermeasure Analysis:
a. Honeypots can be used to test the effectiveness of security countermeasures, such as intrusion
prevention systems or firewall rules.
b. They allow security teams to observe whether attackers bypass these defenses and how they adapt to
them.
13. Post-Attack Analysis:
a. Honeypots enable detailed post-attack analysis by providing complete logs of the attack process,
command sequences, and changes made to the honeypot.
b. This helps in forensic investigations and understanding how an attack unfolded.
5. The TGS creates an encrypted key with a timestamp, and grants the
client a service ticket.
6. The client decrypts the ticket, tells the TGS it has done so, and then
sends its own encrypted key to the service.
7. The service decrypts the key, and makes sure the timestamp is still
valid. If it is, the service contacts the key distribution center to
receive a session that is returned to the client.
8. The client decrypts the ticket. If the keys are still valid,
communication is initiated between client and server.
(c) State and explain 3 types of firewall configurations with a neat diagram.
Ans.