Presentation is loading. Please wait.

Presentation is loading. Please wait.

Methods for Detecting & Handling unsolicited Data Transfers By: Brandon Wright.

Similar presentations


Presentation on theme: "Methods for Detecting & Handling unsolicited Data Transfers By: Brandon Wright."— Presentation transcript:

1 Methods for Detecting & Handling unsolicited Data Transfers By: Brandon Wright

2 Overview Background Fundamental network types Purpose of OSI model Common TCP Protocols used in data transfers Types of data transfer software and uses Types of unsolicited transfers Prevention methods for unwanted transfers Conclusion

3 Background Before networks, sneakernet was main method for data transfer First remote data sharing done using Xmodem (1977) Early 1980s, ISO began development on standardizing specifications for massive computer communication File Transfer Protocol (FTP) standardized (1985)

4 Fundamental Network Types Peer-to-Peer: Every computer communicates directly with other computers on network Simple configuration/cheap Not flexible, or very secure Client/server: Sever acts as central computer facilitating communication to client computers. Much more expensive but scalable Provides much more surveillance/security

5 Purpose of OSI Model Seven Layers enable you to send and receive data Efficiency increased proportionally to security decreasing

6 Common TCP Protocols used in Data Transfers TCP/IP contains several security flaws TCP is a connection oriented protocol; SYN-ACK File Transfer Protocol (FTP) port 20 & 21 Hypertext Transfer Protocol (HTTP) port 80 Simple Mail transfer Protocol (SMTP) port 25

7 Examples of Data Transfer Software Napster KaZaA BitTorrent protocal

8 Napster Shawn Fanning Released June 1999 Legal Issues Shutdown then reopened

9 KaZaA Introduced in 2001 Used FastTrack protocol Known for bundling malware

10 BitTorrent Protocol Most common P2P file sharing protocol Bram Cohen released in April 2001 Approx. 27-55% of all internet traffic (Feb 2009) Seeds & Peers

11 Unsolicited File Transfer Examples Accidental copyright infringement Pop-ups Malware Denial-of-Service attacks Packet-sniffers Koobface, the MySpace and Facebook Worms

12 Prevention Methods IP-blocker/blocklist Packet-filtering firewall Statefull/stateless firewall Content-filters Intrusion detection & prevention systems Trap and Trace Systems

13 IP-Blocker Examples: PeerGuardian, PeerProtector, MoBlock Use customizable IP block lists Compiled lists as Iblocklist.com Can block ports Is as safe as you make it

14 Packet-Filtering Firewall Hardware or software Operates at data link & transport layers Examines packet headers Block logical ports

15 Stateful/Stateless Firewall Differences Cost Performance Security

16 Content-Filters Also called “reverse firewalls” Blocks designated traffic Parental controls

17 Golden Shield Project China protesters lead to Internet censorship 30,000 Internet police Great Firewall of China DNS cache poisoning

18 Golden Shield Project http://www.youtube.com/watch?v=iyXtT5oWwIY&feature=relatedhttp://www.youtube.com/watch?v=iyXtT5oWwIY&feature=relate

19 Intrusion Detection & Prevention Systems Alert Evasion False negative/False positive Confidence value

20 Trap and Trace Systems Detect and Trace Use of honey pots with an alarm Back Hacking

21 Conclusion Ethical boundaries in file transfers Censorship Child abuse Copyright infringement

22 References Dean, Tamara. Network+ Guide to Networks. 5th. Boston, MA: Course Technology Ptr, 2009. Print. Whitman, Michael, and Herbert Mattord. Principles of Information Security. #rd. Boston, MA: Course Technology Ptr, 2009. Print.


Download ppt "Methods for Detecting & Handling unsolicited Data Transfers By: Brandon Wright."

Similar presentations


Ads by Google