Vulnerabilities in Network Communication
The report speaks about the vulnerabilities present in the network communication. There are various models and levels of the network and the affecting of any one of the layer may lead to the affecting of the whole network. The use of devices such as the USB drives serve as the major source for the entry of the network of the user. The wireless access point is the other source of the attack on the network. The wireless access point allows the hacker to get the direct access to the network of the user. The report presents the methods that can be used for the protection of the risks on the network connection as a whole and the risks that is present on the various layers individually. The seven layer of the OSI model have different tasks assigned to each of the individual network. All the layers as a whole form the process of communication. The combination of all the layers together contribute in the proper communication of the information from the transmitter to the receiver. The report in each of the section after defining the functions of each of the layer of the OSI model, presents the solution to each of the vulnerabilities present in the particular network layer.
The layer one of the OSI layer or namely the physical layer is responsible for the sending of the bits through the analog and the digital system. This may be done through the different processes of communication. There are a number of protocols that are found in this layer namely the Ethernet, PPP, Frame relay and many other such protocols.
The physical layer have the threat of being attacked from the outside third parties. These parties are unauthorized and look to attack the systems of the organization. The most probable way to protect the threat is the usage of a control system that will prevent the third party from accessing to the system. The control system will be responsible for sending of an alarm or warning signal in case any of the people wants to get into the network. A surveillance system may be put for the detection of any error in any part of the network. The arrangement of the barrier system helps in the prevention of the attacks. The barrier system may be the use of the firewall mechanism.
The protection or the security of the layer 2 depends on the security of a particular location. Some of the common designs that is involved in the protection of the OSI layer 2 are:
Protection for Physical and Network Layers
Layer 2 control protocols: These are the protocols or the rules that have to be followed for the protection of the layer 2 of the OSI model. The rules are already defined in the control protocols as a result of which the implementation of these protocols will help in the protection of the layer 2. The 802.1q is one such protocol, which can be used in order to detect the vulnerabilities present in the Ethernet or the issue reading the MAC address.
Spanning tree protocol: The use of the spanning tree protocol (STP) helps in the dealing with the issues in the layer 2 of the OSI model. The working mechanism of the STP is if any of the hackers tries to enter the network of the user then the STP blocks the user within thirty to forty five seconds.
Dynamic Trunking protocol: The use of DTP enables the system to keep a check on all the switches. There is communication among the switches that is done by the help of DTP. The use of DTP helps in the detection of the issues that us arising in any of the switches. The DTP automatically breaks the control of the switch such that the rest of the circuit does not get affected.
The Layer 3 of the OSI model or the network layer is responsible for the transfer of the information or the various IP to the layer 4 or the transport layer. There may be vulnerabilities present in the network layer due to the existence of the routing protocol as the use of the routing protocols may cause the inclusion of the false routers and this may lead to the major security issues.
In order to protect the vulnerabilities that is present in the network layer, the understanding of the vulnerabilities is necessary in the first place. The general and most simple mechanism that can be used for the protection of the network layer mat be the encryption of the network packets. The other ways may be the protection of the connection by the exchanging of the session key. The other methods may be:
IPSec implementation: This technology helps in the protection of the IP protocol features by the use of the various suite of protocols. The usage of these protocols together contribute in the providing of the security to the network layer. The IPSec is mainly used in the virtual private networks.
Data Encryption and Firewall Activation
Data encryption mechanism: The use of the data encryption contributes in the prevention of a number of forms of attack. These major attack also involve IP spoofing process, that contribute in the hiding of the identity of a person. In the IP spoofing process, the hacker sends a message from a particular address but shows that the message is being sent from another IP. The data encryption process helps in doing away with this issue.
Firewall activation: The installation of a firewall does not allow the any of the unknown network packet to enter the internal of the network. This helps in the protection of the network packets that have come from outside but claim to be a part of the network. The usage of the firewall contributes in the separation of an internal from the external network. The firewall puts forward a warning message when any form of attack is made on the network.
The layer 4 of the network helps in the protection of the communication of the protocols such as SSL, TLS or the SSH. The layer 4 enables the data to be protected by the usage of the encryption method. The usage of this mechanism is required when the layer 4 contributes in the setting up of the devices while connections are made for the management of the remote devices. In the layer 4-7, all the terminals have to be protected as the communication of data from the all the terminal of these four layers. The use of the intrusion detection system helps in the detection of all the errors that may occur in any of the network layers 4-7. In the layers 4-7, the control pane has to be protected as the attack on the control pane. The use of the networks without the control pane is the safest form of network as this eliminates the chances of the control pane being attacked. The protection of the perimeter approach involves the reduction of the chances of the operating network from being attacked by the use of the virtual private networks. The usage of the network firewalls contribute in the authentication of the users who are trying to access the network.
The network communication is responsible for the communication of large amount of information. Thus in order to protect the vulnerabilities and chances of the attack on the network various methods have been presented in the report. In order to better the process of protection the usage of the most advanced technologies may be used for the protection of the vulnerabilities of the different layers of the network. Each layer may be installed with a firewall. It is often thought that the protection of the top layer can prevent the attacks occurring in the lower layers. However, the attack may take place on any of the network layer. The usage of artificial intelligence or internet of thing may contribute in the better protection of the layers of the network thus communicating the message more efficiently. The use of these technologies will help in the communication of any of the issue to the system of the user. Internet of things can communicate the issue that has occurred and at the same time present the solution that can be implemented to solve the issue. Similarly, the use of artificial intelligence may also contribute in the elimination of the vulnerabilities that may be present in the various network layers. Artificial intelligence will also contribute in the breaking of the circuitry from the region of the attack, which will otherwise the rest of the network.
Protection of Network Communication
Conclusion:
From the report, it may be concluded that the protection of the different layers of the network is important from the point of view of the proper communication of the information through the network. The affecting of one of the layer of the network can affect the whole communication. The report presents the methods for the protection of the vulnerabilities that are present in the network. The message gets transferred from the first to the seventh layer only if all the layers are functioning in a proper manner. The various risk that may arise are from the connection of the random USBs, which may contain the files that may affect the network. The other sources of attack on the network are the use of the wireless access points. The wireless access points allows the hacker to get the access of the system of the user. The report mentions the ways in which each of the layers can be protected. The most common form of network protection can be the installation of the firewalls, which contribute in the separation of the internal and the external of the network.
Wang, B., Zheng, Y., Lou, W. and Hou, Y.T., 2015. DDoS attack protection in the era of cloud computing and software-defined networking. Computer Networks, 81, pp.308-319.
Santos, M.G.M. and Marcillo, P.A.A., 2018. Security in the data link layer of the OSI model on LANs wired Cisco. Journal of Science and Research: Revista Ciencia e Investigación, 3(CITT2017), pp.106-112.
Karagiannis, V., Chatzimisios, P., Vazquez-Gallego, F. and Alonso-Zarate, J., 2015. A survey on application layer protocols for the internet of things. Transaction on IoT and Cloud Computing, 3(1), pp.11-17.
Alimi, R., Yang, Y. and Penno, R., 2014. Application-layer traffic optimization (ALTO) protocol.
Campillo, R. and Oh, T.T., 2015, June. A Layer 2 Protocol to Protect the IP Communication in a Wired Ethernet Network. In 10th Annual Symposium on Information Assurance (ASIA’15)(p. 60).
Yuan, S., Liu, P. and Zhao, E., 2016, November. Research on Security Protection of the Communication Network for Space TT&C Based on TCP/IP Protocol Vulnerabilities. In Conference of Spacecraft TT&C Technology in China (pp. 557-566). Springer, Singapore.
Sinha, P., Jha, V.K., Rai, A.K. and Bhushan, B., 2017, July. Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey. In Signal Processing and Communication (ICSPC), 2017 International Conference on (pp. 288-293). IEEE.
Sinha, P., Jha, V.K., Rai, A.K. and Bhushan, B., 2017, July. Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey. In Signal Processing and Communication (ICSPC), 2017 International Conference on (pp. 288-293). IEEE.
Carthern, C., Wilson, W., Bedwell, R. and Rivera, N., 2015. Data Link Layer. In Cisco Networks (pp. 35-48). Apress, Berkeley, CA.