Background
Due to the emergence of various advanced technologies, many businesses have benefited from it. The adoption of these technologies brings a drastic change that not only helps the industries to have the traditional way of handling business operations to an automated one. As the industry grows various other aspects such as networking aspects, infrastructure aspects, and many more have also been grown along with them. Nowadays the organization has completely shifted towards the advancement of the digital era where things are done digitally (Kraus et al. 2018). They are collecting information from different sources so that their business operations and the decision related to them can be improved. As the organization has been shifted so the need for the knowledge and understanding of different safety techniques and important protocols become necessary to have. Network which is referred to as the backbone of any IT company has sometimes compromised due to the lack of proper consideration of internet protocol and safety techniques (Reymen et al. 2017). In this research report, the two most important aspects which are now become the main concern for any industry those who deal with the data digitally through the internet have been addressed. As these aspects are mainly largely considerable in the e-commerce businesses so the report will elaborate on all the possibilities of providing detailed knowledge on those aspects. Apart from this, the report will also focus on the current issues that those two aspects are facing and what possible recommendations could be beneficial for the prevention. Lastly, a practical demonstration will be shown on the second topic selected.
In this section, the topics on which the entire research has been based which are Internet Protocol Layer and Denial-of-Service Attacks have been discussed. There are mainly two topics that have been chosen from the requirement provided by the tutor. The reason for choosing such topics is that it will help to grow the knowledge in this field and these are the main concern for any IT company that deals with lots of transactions and exchange of data over the internet. The report will start by gathering the basic knowledge on both the topics and after that depth knowledge on these will be shown so that their contribution or impact on the IT industries can be addressed. Then lastly, the report will provide some of the current issues that are arising on those topics and what possible prevention can be made to avoid them.
In this section, the internet protocol layer and all of its aspects which as an employee are important to know have been discussed.
An internet protocol is a suit that is used as the communication protocol utilized in order to interconnect with the network devices on the internet. It is also used as the communications protocol in the private computer network. According to my opinion, the internet protocol is basically the set of two key protocols that are commonly known as the IP and TCP (Deering and Hinden 2017). The functions of the IP protocol suite are basically an abstraction of different layers between the internet applications as well as the switching and routing fabric.
Discussion on Internet Protocol Layer
The internet protocol determines how the information and data can be exchanged with the help of the internet by providing end-to-end communications to the end-users. It also helps to identify how the end-to-end communication can be broken into various packets, transmitted, received, routed and addressed at the destination (Tschofenig and Baccelli 2019). The internet protocol needs central management which is designed to create a reliable network with the capability of recovering automatically from any failure of any connected devices on the network.
The internet protocol utilizes the client-server model of communication where the user or the machine is provided by the service such as sending an entire webpage by the computer or server in the network (Bandung and Putra 2017). Collectively the suite of the internet protocol is also classified as stateless which means every client (user or machine) request is always considered the new one because it is not related to the earlier request. Being stateless allows the internet protocol to free up network paths so that they can be utilized continuously (Majeed, Habeeb and Al-Azzawi 2021). The transport layer of the IP however, itself is stateful so it transmits a specific message at a time and the connection remains static unless all the message packets have been reassembled and received at the destination.
After studying different secondary resources, the idea which has been gathered about the importance of internet protocol is that the suite of IP can be easily modified and it is compatible with all types of OSec which stands for operating systems. In this way, a belief has been developed, that it can be able to communicate with the other system as well (Packer and Reuschel 2018). The suite of IP is also perfectly compatible with all the existing types of networks and computer hardware. The internet protocol is highly scalable as well as has a routable protocol that determines the most efficient and appropriate way through the network to which they are connected. It is mostly used in the architecture of the network (Thamthawornsakul and Sittichivapak 2017).
The internet protocols have different types of layers in which each of which has its importance and use. They are:
The application layer generally provides the applications with the exchange of standardized data. The protocol of this layer is FTP, HTTP, Simple Network Management, Simple Mail Transfer Protocol, and Post Office Protocol 3. At this layer, all the payload is the data of the actual application.
The network layer is mainly responsible for the maintenance of end-to-end communication over the network. Here, the TCP mainly manages the entire communications which occurred between the two hosts and even provides the flow reliability, multiplexing, and control (Nebbione and Calzarossa 2020). This layer has protocol such as User Datagram Protocol and TCP that is often utilized instead of the TCP for some special purposes.
The network layer which is also called the data link layer or network interface layer consists of the type of protocols that operate only on the particular link. The components of the network interconnect with the hosts or the nodes in the network (Neudecker and Hartenstein 2018). The lowest layer protocol includes the Address Resolution Protocol and Ethernet for the local area networks.
Workability of Internet Protocol
As per the general research, it has been found that there are a few issues that are currently arising in the internet protocols. Below all of them have been addressed and provided a short description in order to understand it.
This is the most common and mostly occurred issue which has been found. This thing occurs when two different devices are trying to share the same internet protocol. As a result, the user is not able to have the access to the network anymore (Al-Ani et al. 2020).
If the user has introduced a new device or the server to the network that has its own DHCP then the user needs to first disable the device’s DHCP server in order to restore the sanity of the network.
In order to troubleshoot this problem first use the ipconfig command so if the workstation has the assigned IP address that starts with the 169.x.x.x then it means that no IP addresses are available from the server of DHCP (Ren et al. 2019).
The fix to this is to purchase a router that is standalone or a Wi-Fi access point that has an integrated router. This will help to create the local pool of internet addresses that will guarantee the user won’t run out of IP addresses.
In this section, some recommendation that will be the preventive measures for the upper two issues has been addressed. They are:
- For the duplication of the IP addresses, the most simple and easiest step is to completely avoid the conflicts between the IPs by modifying the configuration of the network. This will be done by assigning the DHCP addresses close to the top end of the subnet which will leave the lower address totally available for the devices that need the static IPs.
- For the exhaustion of the IP address, it is essential that any of the internets must be connected to the network and have an operational local router with the DHCP and NAT where both will responsible for the safety reason and to stop the exhaustion of the IP address. Here, the router requires to be the one single device that will be connected to the modem including all the other devices that are connected to the router.
In this section, the most usual and known attack that is Denial-of-Service attack has been discussed. Nowadays this attack become the most used attack by hackers in order to have unauthorized access to the network. This section will present my research on the attack and how it gets conducted. Apart from this, the impacts of this attack and its types have also been presented.
A denial-of-service is the type of attack which is usually meant order to shut down the entire network or the machine of the target. With the help of this attack, the users are no longer able to use the network or the machine anymore. The Denial-of-Service or DoS attack is mainly accomplished by flooding the targeted user with lots of traffic or by sending them the information that generally triggers the crash (Kaur, Kumar and Bhandari 2017). In both cases, the attack deprives the legitimate users of the resource or service they expected.
The victims of the DoS attacks sometimes target the web servers which have high-profile organizations like the media components, commerce, and banking, or the trade organization and government. Though this attack typically does not result in the loss or the theft of essential information or some other important assets it can cost the target a great deal of money and time to handle (Jamal et al. 2018).
Most organizations are already aware that a little downtime can impact their overall business which will cost more expense and down the customer confidence and bottom line of the company. According to the author (Kaur Chahal, Bhandari, and Behal 2019), it has also been found that the customer’s confidence and trust erosion is the single most impacting consequence of the DoS attack on today’s business. The information technology professional has been ranked the decrease in the customer confidence and trust as the worst effect of the DDoS attack by 42%, having the data theft of around 26%, possible revenue theft of around 13%, and the theft of intellectual property of around 10%.
Importance of Internet Protocol
The web services and the network availability are critical to guaranteeing the satisfaction of the customer and help to maintain the customer’s sustainability of their confidence and trust in a brand. These types of indicators are important for both the acquisition and retention of the customer in the highly competitive market (Bhatia, Behal and Ahmed 2018). Whenever the end-user is not allowed to access the application those are based on internet-facing or the outages of the network degrade the experience of the customer. As a result, it directly impacts the brand of the business.
There are effects of DoS attack which I have researched and addressed below:
- Legitimate users are not able to access the network resources as a result they are unable to carry out the information or the actions which they are needed.
- The businesses may not be able to carry out the time-critical action.
- The businesses suffer reputational damage.
- The customers may choose to use the competitor’s service or product.
In this section two mostly used and preferrable DoS Attack has been mentioned which are performed depending on the purpose of the attack. They are:
According to the author (Yihunie, Abdelfattah, and Odeh 2018), the ping of death is basically the type of attack which is used to test the availability of the resource of a network. This attack is performed by sending a data packet to the resource of a network. By doing so the ping of death attack take the advantage and send the data packets above the highest limit such as 65356 bytes which the TCP/IP permits. The fragmentation of TCP/IP breaks the packets into very small pieces that are then sent to the server (Abdollahi and Fathi 2020). Therefore, the packets of data which has been sent are larger than the packets that the server usually handles. As a result, the entire server gets frozen or crashed.
According to the author (Wankhede 2019), the Smurf attack is the type of attack that utilizes a huge amount of ICMP which stands for the Internet Control Message Protocol basically ping the traffic which is targeted at an IBA (Internet Broadcast Address). The IP address sent a reply which is then spoofed to that of the targeted user. Then all the replies are sent to the target instead of those IPs which are used for the pings. Therefore, the IBA only supports a maximum of around 255 hosts but the Smurf attack amplifies every ping by 255 (Bouyeddou et al. 2021). As a result, the entire network gets down to the point where for the user it becomes impossible to use that network.
Below some of the tools are addressed which are used for performing the DoS Attack. Later by using this tool the Ping of Death attack will be going to perform.
- Nemesy àThe tool Nemesy is used to generate a huge number of random packets which works on the Windows platform only. This tool can be downloaded by using the link provided https://packetstormsecurity.com/files/25599/nemesy13.zip.html
In order to perform this attack, two computers have been used that are connected to the same network. Below all the steps and screenshots will be provided one by one after the completion of each step.
Step 1: A command prompt has been opened in the targeted computer and by entering the command “ipconfig” the broadband details have been displayed as shown in the below picture,
Step 2: The command prompt has been opened in the main computer that is used for performing the attack. By using the computer, later 65500 data packets will be sent to the victim’s computer. This will be done by entering the following command and then hitting enter,
Layers of Internet Protocol
Important Notes:
- The keyword “ping” has sent the packets of data to the target’s computer
- The IP address of the target is “10.128.131.108”
- Keyword “-t” states that the packets of data will be sent continuously until the program gets stopped
- The symbol “-|” states that a load of data has to be sent to the target’s computer
Here, the data packets have been sent to the target’s computer from only one computer which is not very effective. So, to make it more effective different computers are used to send data packets to one computer (victim).
So, in order to check the how much the above-performed attack affects the victim’s computer, the task manager has been open to check the activities of the network as shown below,
Step 3: The tool Nemesy has been installed and configured into the attacker’s computer so that the victim’s computer can be flooded with the data packets.
- Download the tool from the link provided in the previous section above.
- Unzip the downloaded file and then execute the Nemesy.exe file.
Below the picture is the interface that has appeared will open launching the .exe file.
[Here, I have labeled everything so that it will be easier to understand]
Step 4: Click on the button named “Send”
When the button gets clicked a progress indicator will be appeared at the top as shown in the below picture, and 65000 data packets will be sent at a time interval of 100 milliseconds to the target’s computer.
Note: To stop the program click the button named “halt”
Conclusion
The network now becomes the most important and mandatory resource for any business in order to run properly or accomplish their operation efficiently. In this research report, several different aspects have been discussed which not only helped to improve understanding and knowledge in those fields but also provided the information with the help of which this assignment has been completed. In this report, the main focus is on the two topics which are already mentioned initially which are Internet Protocol Layer and Denial-of-Service Attack. By gathering different information and researching several areas, this report has presented detailed descriptive information about the important aspects of those two topics. As both of them are different because the first part focus on the network protocol and the second part is the attack that occurs on the networks. So, I conclude that all the above information is true and would be beneficial for further research or improvement.
Abdollahi, A. and Fathi, M., 2020. An intrusion detection system on ping of death attacks in IoT networks. Wireless Personal Communications, 112(4), pp.2057-2070.
Al-Ani, A.K., Anbar, M., Al-Ani, A. and Ibrahim, D.R., 2020. Match-prevention technique against denial-of-service attack on address resolution and duplicate address detection processes in IPv6 link-local network. IEEE Access, 8, pp.27122-27138.
Bandung, Y. and Putra, A.P., 2017. Development of key exchange protocol to enhance security of voice over internet protocol on mobile phone. International Journal on Electrical Engineering and Informatics, 9(1), p.173.
Bhatia, S., Behal, S. and Ahmed, I., 2018. Distributed denial of service attacks and defense mechanisms: current landscape and future directions. In Versatile Cybersecurity (pp. 55-97). Springer, Cham.
Bouyeddou, B., Harrou, F., Kadri, B. and Sun, Y., 2021. Detecting network cyber-attacks using an integrated statistical approach. Cluster Computing, 24(2), pp.1435-1453.
Deering, S. and Hinden, R., 2017. Internet protocol, version 6 (IPv6) specification (No. rfc8200).
Jamal, T., Haider, Z., Butt, S.A. and Chohan, A., 2018. Denial of Service Attack in Cooperative Networks. arXiv preprint arXiv:1810.11070.
Kaur, P., Kumar, M. and Bhandari, A., 2017. A review of detection approaches for distributed denial of service attacks. Systems Science & Control Engineering, 5(1), pp.301-320.
Kraus, S., Palmer, C., Kailer, N., Kallinger, F.L. and Spitzer, J., 2018. Digital entrepreneurship: A research agenda on new business models for the twenty-first century. International Journal of Entrepreneurial Behavior & Research.
Majeed, J.H., Habeeb, N.A. and Al-Azzawi, W.K., 2021. Performance investigations of internet protocol versions for mobile Ad-hoc network based on quaint simulator. Indonesian Journal of Electrical Engineering and Computer Science, 21(1), pp.497-504.
Nebbione, G. and Calzarossa, M.C., 2020. Security of IoT application layer protocols: Challenges and findings. Future Internet, 12(3), p.55.
Neudecker, T. and Hartenstein, H., 2018. Network layer aspects of permissionless blockchains. IEEE Communications Surveys & Tutorials, 21(1), pp.838-857.
Packer, J. and Reuschel, W., 2018. VoIP accessibility: a usability study of voice over internet protocol (VoIP) systems and a survey of VoIP users with vision loss. Journal of Visual Impairment & Blindness, 112(1), pp.47-60.
Ren, S., Yu, D., Li, G., Hu, S., Tian, Y., Gong, X. and Moskowitz, R., 2019, August. Routing and addressing with length variable ip address. In Proceedings of the ACM SIGCOMM 2019 Workshop on Networking for Emerging Applications and Technologies (pp. 43-48).
Reymen, I., Berends, H., Oudehand, R. and Stultiëns, R., 2017. Decision making for business model development: a process study of effectuation and causation in new technology?based ventures. R&D Management, 47(4), pp.595-606.
Thamthawornsakul, P. and Sittichivapak, S., 2017, June. An implementation of internet protocol options for self-authentication. In 2017 14th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON) (pp. 465-468). IEEE.
Tschofenig, H. and Baccelli, E., 2019. Cyberphysical security for the masses: A survey of the internet protocol suite for internet of things security. IEEE Security & Privacy, 17(5), pp.47-57.
Wankhede, S.B., 2019. Study of network-based DoS attacks. In Nanoelectronics, circuits and communication systems (pp. 611-616). Springer, Singapore.
Yihunie, F., Abdelfattah, E. and Odeh, A., 2018, May. Analysis of ping of death DoS and DDoS attacks. In 2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT) (pp. 1-4). IEEE.