Wednesday, August 4, 2010

Denial of Service (DOS)



Denial of Service Attack (DOS)

Denial of service attack is a type of network attack which is done with a motive to prevent the user from getting the particular resource or the services. It is an explicit attempt by attackers to prevent the valid users of a computer-related service from using that service. DOS attacks are mostly launched from different network from that of the victim’s network and the attacker can be anywhere in the network. The motive behind of the attack can be any it can be for fun or any other reason like economic aspects, getting the information of others etc.
 In such type of attack the service will be made temporarily unavailable and is done by sending multiple of packets to the server but those packets contain wrong address and it causes the server to fail and thus it could not perform its activities smoothly and can face different problems like system getting hang, reboot and sometimes even the system can crash depending upon the level of attack. DOS attacks are generally applied by forcing or making the targeted computer system to get reset or make difficulties in communicating by disturbing the communication media so that the user cannot communicate with the desired person properly.

The damage of the dos attack cannot effect one but it might have impact on others as well. An attack in one site can also affect the network resources which server multiple sites as well. The resources we share with the others may be consumed by the attack and the if the Internet service provider are being attacked the it effect will be on us and on different users as well, although we are not the targeted victim of the attacker but we might still face the problems thus the damage of DOS is hidden and is unpredictable

 With the increase in the technology and equipment DOS attack technique and technology is also increasing. In early stage simple tools were used to send such kind of attack but now there are various ways of sending DOS attack and its effect are also increasing. Before   packet was   sent from single source to single victim but now single source can attack multiple targets and multiple attacker can attack single target.



Let us consider host A and host B wants to communicate then the host A sends connection message to the host B and the host B acknowledge it and sends connection set message to A after A receives the message it will go to the connection state and thus connection is established. This is in normal connection between two systems.

But the scenario for the DOS is quite different. The host A sends connection message to the targeted host B but A will send multiple connection message and all the messages sent by the host A will contain the false return address. B will b in the connection stage and when it tries to send the connection set message it won’t find the host A as the address send is invalid and the B will be in the connection stage for some times and after it will tries to end this session but the A again sends the fake request and the process continues again and again. This is a simple kind of dos attack and the nature and the process of DOS attack in today’s scenario varies.

Different types of DOS attack that are the threat in today’s world are       

Teardrop attack:
When data are transmitted from one host to another then the data are broken into small IP packets and each packets contains its own identification number and sequence number and as the host receives the data it assembles the packets on the basis of those sequence number, but in teardrop attack false sequencing or offset information are being inserted and it also contains some bugs in it so when the recipient tries to reassemble the packet those empty or offset information can make the system unstable and in case of windows like 95 NT they can crash. The teardrop doesn’t has a significant damage, a single reboot of the system can be the solution of such attack in many condition. But it can be destructive if we couldn’t save the data while the attack takes place.
 Smurf attack:  
It is a type of denial of service attack in which the attacker sends a large number of ICMP ping request to the IP broadcast address but all of the packets contain the spoofed IP address . when the routing devices delivers all those traffics to all the hosts and if the host takes those request and replies to it then it the traffic can be multiplied  which can bring instability to the system due to large number of traffic. The attacker having low bandwidth can also bring instability to the victim having large bandwidth.

 SYN Flooding
It is a type of attack in which the attacker sends multiple number of TCP SYN message to the victim but it doesn’t receive the acknowledgement. SYN flooding is similar to the three way hand shaking process. In normal three way handshaking process the sender sends connection request (CR) to the another system for example host A sends CR to the host B. The host B then sends the acknowledgement and connection set message to the A.A then sends acknowledgment to B and the connection between the two system starts.
But in SYN flooding the attacker sends the multiple connection requests to the victim and the request contains the spoofed IP address.  The victim responds to it and sends the acknowledgement and it will in the connection stage waiting for the confirmation to start the connection but the confirmation request doesn’t arrive. The victim queues all the waiting replies the list of the replies will be increasing and it wont be able to respond to the request of genuine users as well and due to those queues the memory will be full and the system will be hang or even can crash.

Port flooding:
It is a  type of network attack,    where the attacker sends large number of continuous data   to the random port on the host computer. This attack can make the CPU usage to 100 percentages and bring sudden changes to the performance of the system. The attacker send large number of packets and the victim is forced to send the ICMP packets but the packets will be send to unreachable host because the attacker will spoof the IP address and sent so that it ICMP packets does not reach to him Some of the tools are Mutilate, Pepsi5, etc. These kind of attack not only attempts to make the ports unusable but also rise the CPU usage to 100% by having to process task on the particular port under attack. There are number of tools for this type of attacks.


Application Based DOS attack
It is a type of DOS attack which is launched with a main target of bringing down the application not the system. The attack is being done by the attacker by finding out the loop hole and the bugs in the certain application that is running in the host computer. After finding the bugs in the application the attacker sends multiple data to the application then the data it can handle as a result the application gets hang and also the system in most of the case.

Distributed Denial of Service Attack
With the increase of time and technology there is various changes made in the way denial of service attack is being launched. Various security devices made difficult to launch simple DOS attack so attackers took the DOS in distributed form. In distributed denial of service attack the attacker launch attack to the victim from multiple systems at a same time. The basic concept of DOS and DDOS is almost same.  In DDOS the attacker do not attack the system itself but it uses other many computers to attack the victim and the computers are called as zombie. The zombie will be unaware of the fact that someone is launching DOS through their system. The zombie can be any computer in the internet and using them attacker can launch multiple attacks to the victim still the attacker can be in safe state as they will be hiding and sending the attack and is difficult to trace them back. The attacker sends multiple requests to the victim at a single time and the victim cannot handle it as it will be beyond its limit and thus the victim hangs or its system crashes. Stopping DDOS is also difficult as the security devices like firewall, routers won’t be able to know whether the requested users are the real ones or the fake once. The attacker finds the weakness in the zombie and exploits it and sends malicious codes   and installs various programs which make them easy to launch DDOS. 



Comparison  between the DOS and DDOS
DDOS can be considered as the more advance form of the DOS. In today’s generation DOS might not work properly due to availability of high secure devices and DOS can be easily trace back so attacker don’t use this technique much now a days. In DDOS we can remove the traces of ours, attackers use zombies to attack to the victim and they have full control over the zombie so removing all their traces from the system is not that difficult task for them. To launch DOS less resources is required but in order to launch DDOS there is high requirement of resources and once should have more knowledge then DOS.
Launching of the DDOS attack
In distributed denial of service attack the attacker launch the attack using the zombie or the bot. the attackers breaks down into the system of the zombie   In the initial stage the attacker tries to find the weak point the system like the defects in the operating system, weakness in the network system etc. once they get access to the system they install the software of the DDOS and hide their traces of all their activity so that it is difficult to trace back to them. Similar process is done in all the zombies and commands are being entered to attack to the victim.
Let us take an example where a group of attacker has planned to launch DDOS in a computer network of a company called B. these attackers will try to gain control in the less security protected network. When they take control of such network and they can control all the entire network. Then they will install DDOS tools in those networks and attack the company all at once. They can use the entire computer of the network they have taken control and launch a attack at a single time. All the attacker will be working as a team and taking control of different computers and launching attacks through them to the same host.
The system of the company B will have hard time handling all those request from such a large number of computer, it can not handle all the request and as a result it will denial all kind of services that is being provide. The system could get hang or even crash or reboot depending upon the nature of attack. Finding the attacker is also difficult as they will be in different network and attack will be launched from different network.DDOS can be launched using various special tools which are designed mainly for this purpose only. Some of the tools that are mostly used  are: Trinoo, Tribe Flood Network (TFN), Shaft, Kaiten, Stacheldracht/StacheldrachtV4


Security measures to defend against DDOS.
Dos and DDOS are the major threat that we can find in the network today. In many condition these attacks don’t have much damage to the system but sometime the level of damage can be very high and the organization have to face severe problems. So it is always better to take some security measures before hand then to regret later. Some of the security measure we can take to prevent from those attacks are:
·         Use of firewall hardware or software and filtering of packets should be done.
·         Intrusion Detection System (IDS) devices should be installed for more security it can alert us if there is any suspicious attacks in the network.
·         Use of genuine antivirus and should be update in regular manner.
·         Proper training should be provided to the staffs of the organization for the proper use of the network.
·         Regular backup of the system.
·         Using genuine operating system and they also should be update in regular period.
·         Policies in the network should be made strong and we should use strong password like alpha numeric, special characters, symbols and should be change in certain period.
·         Regular monitor of the network traffics.

Monday, June 14, 2010

Well known TCP port numbers

A port is a nd endpoin to a logical connection and the way a client program specifies a specific services or server program on a computer in a network.
Well known SCTP, TCP and UDP ports, 0 through 999



The well known ports are assigned by IANA in the range of 0 to 1023.



0 Shirt Pocket netTunes.
Shirt Pocket launchTunes.
1 TCPMUX, TCP Port Service Multiplexer.
2 Management Utility.
3 Compression Process.
4
5 Remote Job Entry.
6
7 Echo.
8
9 Discard.
10
11 SYSTAT.
12
13 Daytime.
14
15 [was netstat].
16
17 Quote, Quote of the Day.
18 RWP, Remote Write Protocol.
Send, Message Send Protocol.
19 Chargen, Character Generator Protocol.
20 FTP, File Transfer Protocol, data.
21 FTP, File Transfer Protocol, control.
22 SSH.
23 Telnet.
24 Any private mail system.
25 SMTP, Simple Mail Transfer Protocol.
26
27 NSW User System FE.
28
29 MSG ICP.
30
31 MSG Authentication.
32
33 Display Support Protocol.
34
35 Any private printer server.
36
37 Time, Time Protocol.
38 RAP, Internet Route Access Protocol.
39 RLP, Resource Location Protocol.
40
41 Graphics.
42 Internet Name Server.
43 Whois.
44 MPM FLAGS Protocol.
45 Internet Message Protocol.
46 MPM [default send].
47 NI FTP.
48 Digital Audit Daemon.
49 TACACS.
TACACS+.
50 RMCP, Remote Mail Checking Protocol.
51 IMP Logical Address Maintenance.
52 XNS Time Protocol.
53 DNS, Domain Name System.
54 XNS Clearinghouse.
55 ISI Graphics Language.
56 XNS Authentication.
57 MTP, Mail Transfer Protocol.
58 XNS Mail.
59 NFILE.
60
61 NI MAIL.
62 ACA Services.
63 Whois++.
64 Communications Integrator (CI).
65 TACACS-Database Service.
66 Oracle SQL*NET.
67 BOOTP, Bootstrap Protocol, server.
68 BOOTP, Bootstrap Protocol, client.
69 TFTP, Trivial File Transfer Protocol.
70 Gopher.
71 Remote Job Service.
72 Remote Job Service.
73 Remote Job Service.
74 Remote Job Service.
75 Any private dial out service.
76 Distributed External Object Store.
77 Any private RJE service.
78 vettcp.
79 Finger.
80 HTTP, HyperText Transfer Protocol.
81 HOSTS2 Name Server.
82 XFER Utility.
83 MIT ML Device.
84 Common Trace Facility.
85 MIT ML Device.
86 Micro Focus Cobol.
87 Any private terminal link.
88 Kerberos.
89 SU/MIT Telnet Gateway.
90 Is being used unofficially by Pointcast.
90 DNSIX Securit Attribute Token Map.
91 MIT Dover Spooler.
92 Network Printing Protocol.
93 Device Control Protocol.
94 Tivoli Object Dispatcher.
95 SUPDUP.
96 DIXIE.
97 Swift Remote Virtual File Protocol.
98 TAC News.
99 Metagram Relay.


100 [unauthorized use]
101 HOSTNAME.
102 TP0 over TCP.
103 Genesis Point-to-Point Trans Net.
104 ACR-NEMA Digital Imag. & Comm. 300.
105 Ph.
105 Mailbox Name Nameserver.
106 3COM-TSMUX.
107 Remote Telnet Service.
108 SNA Gateway Access Server.
109 POP, Post Office Protocol, version 2.
110 POP, Post Office Protocol, version 3.
111 Portmapper.
112 McIDAS Data Transmission Protocol.
113 Identification Protocol.
114
115 SFTP, Simple File Transfer Protocol.
116 ANSA REX Notify.
117 UUCP, Unix To Unix Copy.
118 SQL Services.
119 NNTP, Network News Transfer Protocol.
120 CFDP, Coherent File Distribution Protocol.
121 Encore Expedited Remote Pro.Call.
122 SMAKYNET.
123 NTP, Network Time Protocol.
124 ANSA REX Trader.
125 Locus PC-Interface Net Map Serv.
126 Unisys Unitary Login.
127 Locus PC-Interface Conn Server.
128 GSS X License Verification.
129 PWDGEN, Password Generator Protocol.
130 cisco FNATIVE.
131 cisco TNATIVE.
132 cisco SYSMAINT.
133 STATSRV, Statistics Server.
134 INGRES-NET Service.
135 DCE endpoint resolution.
136 PROFILE Naming System.
137 NETBIOS Name Service.
138 NETBIOS Datagram Service.
139 NETBIOS Session Service.
140 EMFIS Data Service.
141 EMFIS Control Service.
142 Britton-Lee IDM.
143 IMAP, Interactive Mail Access Protocol.
144 Universal Management Architecture.
145 UAAC Protocol.
146 TP0 bridge between TCP and X.25.
147 ISO-IP.
148 Jargon.
149 AED 512 Emulation Service.
150 SQL-NET.
151 HEMS.
152 BFTP, Background File Transfer Program.
153 SGMP, Simple Gateway Monitoring Protocol.
154
155 NETSC.
156 SQL Service.
157 KNET/VM Command/Message Protocol.
158 DMSP, Distributed Mail Service Protocol.
159 NSS-Routing.
160 SGMP-TRAPS.
161 SNMP, Simple Network Management Protocol.
162 SNMP, Simple Network Management Protocol traps.
163 CMIP/TCP Manager.
164 CMIP/TCP Agent.
165 Xerox.
166 Sirius Systems.
167 NAMP.
168 RSVD.
169 SEND.
170 Network PostScript.
171 Network Innovations Multiplex.
172 Network Innovations CL/1.
173 Xyplex.
174 MAILQ.
175 VMNET.
176 GENRAD-MUX.
177 XDMCP, X Display Manager Control Protocol.
178 NextStep Window Server.
179 BGP, Border Gateway Protocol.
180 Intergraph.
181 Unify.
182 Unisys Audit SITP.
183 OCBinder.
184 OCServer.
185 Knowbot Information Service.
186 KIS Protocol.
187 Application Communication Interface.
188 Plus Five's MUMPS.
189 Queued File Transport.
190 Gateway Access Control Protocol.
191 Prospero Directory Service.
192 OSU Network Monitoring System.
193 Spider Remote Monitoring Protocol.
194 Internet Relay Chat Protocol.
195 DNSIX Network Level Module Audit.
196 DNSIX Session Mgt Module Audit Redir.
197 Directory Location Service.
198 Directory Location Service Monitor.
199 SMUX.


200 IBM System Resource Controller.
201 AppleTalk Routing Maintenance.
202 AppleTalk Name Binding.
203 AppleTalk Unused.
204 AppleTalk Echo.
205 AppleTalk Unused.
206 AppleTalk Zone Information.
207 AppleTalk Unused.
208 AppleTalk Unused.
209 The Quick Mail Transfer Protocol.
210 Z39.50.
211 Texas Instruments 914C/G Terminal.
212 ATEXSSTR.
213 IPX.
214 VM PWSCS.
215 Insignia Solutions.
216 Computer Associates Int'l License Server.
217 dBASE Unix.
218 MPP, Message Posting Protocol.
219 Unisys ARPs.
220 IMAP, Interactive Mail Access Protocol, version 3.
221 Berkeley rlogind with SPX auth.
222 Berkeley rshd with SPX auth.
223 Certificate Distribution Center.
242 Direct.
243 Survey Measurement.
244 Dayna.
245 LINK.
246 Display Systems Protocol.
247 SUBNTBCST_TFTP.
248 bhfhs.
249
-
255
256 RAP.
257 Secure Electronic Transaction.
258 Yak Winsock Personal Chat.
259 ESRO, Efficient Short Remote Operations.
260 Openport.
261 IIOP Name Service over TLS/SSL.
262 Arcisdms.
263 HDAP.
264 BGMP, Border Gateway Multicast Protocol.
265 X-Bone CTL.
266 SCSI on ST.
267 Tobit David Service Layer.
268 Tobit David Replica.
269
-
279
280 http-mgmt.
281 Personal Link.
282 Cable Port A/X.
283 rescap.
284 corerjd.
285
286 FXP-1.
287 K-BLOCK.
288
-
299


300
-
307
308 Novastor Backup.
309 EntrustTime.
310 bhmds.
311 AppleShare IP WebAdmin.
312 VSLMP.
313 Magenta Logic.
314 Opalis Robot.
315 DPSI.
316 decAuth.
317 Zannet.
318 TSP, Time Stamp Protocol.
319 PTP Event.
320 PTP General.
321 PIP.
322 RTSPS.
323 IMMP, Internet Message Mapping Protocol.
324
-
332
333 Texar Security Port.
334
-
343
344 Prospero Data Access Protocol.
345 Performance Analysis Workbench.
346 Zebra server.
347 Fatmen Server.
348 Cabletron Management Protocol.
349 mftp.
350 MATIP, Mapping of Airline Traffic over Internet Protocol, Type A.
351 MATIP, Mapping of Airline Traffic over Internet Protocol, Type B.
bhoetty.
352 DTAG.
353 NDSAUTH.
354 bh611.
355 DATEX-ASN.
356 Cloanto Net 1.
357 bhevent.
358 Shrinkwrap.
359 Tenebris Network Trace Service.
360 scoi2odialog.
361 Semantix.
362 SRS Send.
363 RSVP Tunnel.
364 Aurora CMGR.
365 DTK.
366 SMTP, Simple Mail Transfer Protocol. ODMR, On-Demand Mail Relay.
367 MortgageWare.
368 QbikGDP.
369 rpc2portmap.
370 codaauth2.
371 Clearcase.
372 ListProcessor.
373 Legent Corporation.
374 Legent Corporation.
375 Hassle.
376 Amiga Envoy Network Inquiry Proto.
377 NEC Corporation.
378 NEC Corporation.
379 TIA/EIA/IS-99 modem client.
380 TIA/EIA/IS-99 modem server.
381 HP performance data collector.
382 HP performance data managed node.
383 HP performance data alarm manager.
384 A Remote Network Server System.
385 IBM Application.
386 ASA Message Router Object Def.
387 AURP, AppleTalk Update-based Routing Protocol.
388 Unidata LDM Version 4.
389 LDAP, Lightweight Directory Access Protocol.
CLDAP, Connection-less Lightweight X.500 Directory Access Protocol.
390 UIS.
391 SynOptics SNMP Relay Port.
392 SynOptics Port Broker Port.
393 Data Interpretation System.
394 EMBL Nucleic Data Transfer.
395 NETscout Control Protocol.
396 Novell Netware over IP.
397 Multi Protocol Trans. Net.
398 Kryptolan.
399 TP2 encapsulation.
400 Oracle Secure Backup.
401 Uninterruptible Power Supply.
402 Genie Protocol.
403 decap.
404 nced.
405 ncld.
406 Interactive Mail Support Protocol.
407 Timbuktu.
408 Prospero Resource Manager System Manager.
409 Prospero Resource Manager Node Manager.
410 DEC Ladebug Remote Debug Protocol.
411 Remote MT Protocol.
412 Trap Convention Port.
413 SMSP.
414 InfoSeek.
415 BNet.
416 Silverplatter.
417 Onmux.
418 Hyper-G.
419 Ariel.
420 SMPTE.
421 Ariel.
422 Ariel.
423 IBM Operations Planning and Control Start.
424 IBM Operations Planning and Control Track.
425 ICAD.
426 smartsdp
427 SLP, Service Location Protocol.
428 OCS_CMU.
429 OCS_AMU
430 UTMPSD
431 UTMPCD
432 IASD
433 NNSP
434 Mobile IP agent.
435 Mobile IP MN.
436 DNA-CML
437 comscm
438 dsfgw
439 dasp
440 sgcp
441 decvms-sysmgt
442 cvc_hostd
443 HTTPS, HTTP over SSL/TLS.
444 SNPP, Simple Network Paging Protocol.
445 Microsoft-DS.
446 DDM-RDB
447 DDM-RFM
448 DDM-SSL
449 AS Server Mapper
450 TServer
451 Cray Network Semaphore server
452 Cray SFS config server
453 CreativeServer
454 ContentServer
455 CreativePartnr
456 macon-tcp
457 scohelp
458 apple quick time
459 ampr-rcmd
460 skronk
461 DataRampSrv
462 DataRampSrvSec
463 alpes
464 Kerberos change/set password.
465 (TCP) URL Rendesvous Directory for SSM.
(UDP) IGMP over UDP for SSM.
466 digital-vrc
467 mylex-mapd
468 Photuris.
469 Radio Control Protocol.
470 scx-proxy
471 Mondex.
472 ljk-login.
473 hybrid-pop.
474 (TCP) tn-tl-w1.
(UDP) tn-tl-w2.
475 tcpnethaspsrv.
476 tn-tl-fd1.
477 ss7ns.
478 spsc.
479 iafserver.
480 iafdbase.
481 Ph service.
482 bgs-nsi.
483 ulpnet.
484 Integra Software Management Environment.
485 Air Soft Power Burst.
486 Avian.
487 SAFT, Simple Asynchronous File Transfer.
488 gss-http.
489 nest-protocol.
490 micom-pfs.
491 go-login.
492 Transport Independent Convergence for FNA.
493 Transport Independent Convergence for FNA.
494 POV-Ray.
495 intecourier.
496 PIM-RP-DISC.
497 dantz.
498 siam.
499 ISO ILL Protocol.
500 ISAKMP.
IKE, Internet Key Exchange.
501 STMF.
502 asa-appl-proto.
503 Intrinsa.
504 citadel.
505 mailbox-lm.
506 ohimsrv.
507 crs.
508 xvttp.
509 snare.
510 FirstClass Protocol.
511 mynet-as.
512 rexec, remote process execution.
Used by mail system to notify users of new mail received.
513 Rlogin.
Maintains data bases for who's logged on a local net and the average load of the machine.
514 Syslog.
cmd like exec but automatic authentication is performed for login server.
515 LPR.
516 videotex.
517 Like tenex link but across machine - doesn't use link protocol. A rendezvous port establishes a tcp connection.
518 ntalk.
519 unixtime.
520 RIP, Routing Information Protocol.
Extended file name server.
521 RIPng.
522 ULP.
523 IBM-DB2.
524 NCP.
525 timeserver.
526 newdate.
527 Stock IXChange.
528 Customer IXChange.
529 IRC-SERV.
530 rpc.
531 chat.
532 readnews.
533 emergency broadcasts.
534 MegaMedia Admin.
535 iiop.
536 opalis-rdv.
537 Networked Media Streaming Protocol.
538 gdomap.
539 Apertus Technologies Load Determination.
540 uucpd.
541 uucp-rlogin.
542 commerce.
543 klogin.
544 krcmd.
545 appleqtcsrvr.
546 DHCPv6 client.
547 DHCPv6 server.
548 AFP over TCP.
549 IDFP.
550 new-who.
551 cybercash.
552 deviceshare.
553 pirp.
554 RTSP, Real Time Streaming Protocol.
555 dsf.
556 rfs server.
557 openvms-sysipc.
558 SDNSKMP.
559 TEEDTAP.
560 rmonitord.
561 monitor.
562 chcmd.
563 NNTP over TLS.
564 plan 9 file service.
565 whoami.
566 streettalk.
567 banyan-rpc.
568 microsoft shuttle.
569 microsoft rome.
570 demon.
571 udemon.
572 sonar.
573 banyan-vip.
574 FTP Software Agent System.
575 VEMMI, VErsatile MultiMedia Interface.
576 ipcd.
577 vnas.
578 ipdd.
579 decbsrv.
580 SNTP HEARTBEAT.
581 Bundle Discovery Protocol.
582 SCC Security.
583 Philips Video-Conferencing.
584 Key Server.
585
586 Password Change.
587 ESMTP, Extended Simple Mail Transfer Protocol.
588 CAL.
589 EyeLink.
590 TNS CML.
591 FileMaker Inc. - HTTP Alternate (see Port 80).
592 Eudora Set.
593 HTTP RPC Ep Map.
594 TPIP.
595 CAB Protocol.
596 SMSD.
597 PTC Name Service.
598 SCO Web Server Manager 3.
599 Aeolon Core Protocol.
600 Sun IPC server.
601 Syslog.
602 XML-RPC over BEEP.
603 IDXP, Intrusion Detection Exchange Protocol.
604 TUNNEL.
605 SOAP over BEEP.
606 Cray Unified Resource Manager.
607 nqs.
608 SIFT/UFT, Sender-Initiated/Unsolicited File Transfer.
609 npmp-trap.
610 npmp-local.
611 npmp-gui.
612 HMMP Indication.
613 HMMP Operation.
614 SSLshell.
615 Internet Configuration Manager.
616 SCO System Administration Server.
617 SCO Desktop Administration Server.
618 DEI-ICDA.
619 Digital EVM.
620 SCO WebServer Manager.
621 ESCP.
622 Collaborator.
623 DMTF out-of-band web services management protocol.
Aux Bus Shunt.
ASF Remote Management and Control Protocol.
624 Crypto Admin.
625 DEC DLM.
626 ASIA.
627 CKS & TIVIOLI.
628 QMQP.
629 3Com AMP3.
630 RDA.
631 IPP, Internet Printing Protocol.
632 bmpp.
633 Service Status update (Sterling Software).
634 ginad.
635 RLZ DBase.
636 ldap protocol over TLS/SSL (was sldap).
637 lanserver.
638 mcns-sec.
639 MSDP, Multicast Source Discovery Protocol.
640 entrust-sps.
641 repcmd.
642 EMSD over ESRO.
643 SANity.
644 dwr.
645 PSSC.
646 LDP, Label Distribution Protocol.
647 DHCP Failover Protocol.
648 RRP, Registry Registrar Protocol.
649 Aminet.
650 OBEX.
651 IEEE MMS.
652 DTCP, Dynamic Tunnel Configuration Protocol.
653 RepCmd.
654 AODV, Ad hoc On-Demand Distance Vector.
655 TINC.
656 SPMP.
657 RMC.
658 TenFold.
659 URL Rendezvous.
660 MacOS Server Admin.
661 HAP.
662 PFTP.
663 PureNoise.
664 DMTF out-of-band secure web services management protocol.
ASF Secure Remote Management and Control Protocol.
Secure Aux Bus.
665 Sun DR.
666 Doom, Id Software.
667 Campaign contribution campaign contribution disclosures - SDR Technologies.
668 MeComm.
669 MeRegister.
670 VACDSM-SWS.
671 VACDSM-APP.
672 VPPS-QUA.
673 CIMPLEX.
674 ACAP, Application Configuration Access Protocol.
675 DCTP.
676 VPPS Via.
677 Virtual Presence Protocol.
678 GNU Gereration Foundation NCP.
679 MRM.
680 entrust-aaas.
681 entrust-aaas.
682 XFR.
683 CORBA IIOP.
684 CORBA IIOP SSL.
685 MDC Port Mapper.
686 Hardware Control Protocol Wismar.
687 asipregistry.
688 REALM-RUSD.
689 NMAP.
690 VATP.
691 MS Exchange Routing.
692 Hyperwave-ISP.
693 connendp.
694 ha-cluster.
695 IEEE-MMS-SSL.
696 RUSHD.
697 UUIDGEN.
698 OLSR, Optimized Link State Routing.
699 Access Network.
700 EPP, Extensible Provisioning Protocol.
701 LMP, Link Management Protocol.
702 IRIS over BEEP.
703
704 errlog copy/server daemon.
705 AgentX.
706 SILC, Secure Internet Live Conferencing.
707 Borland DSJ.
708
709 Entrust Key Management Service Handler.
710 Entrust Administration Service Handler.
711 TDP, Tag Distribution Protocol.
712 TBRPF, Topology Broadcast based on Reverse-Path Forwarding.
713 IRIS over XPC.
714 IRIS over XPCS (RFC 4992).
715 IRIS-LWZ (RFC 4993).
716 PANA, Protocol for Carrying Authentication for Network Access.
717
-
719
720 DVMP, Distance Vectored Monitoring Protocol.
SMQP, Simple Message Queue Protocol.
721 XSRP, eXtensible Service Registration Protocol.
722
723 XSTP, eXtensible Service Transfer Protocol.
724
725 XSSP, eXtensible Service Subscription Protocol.
726
727 XSLP, eXtensible Service Location Protocol.
728
729 IBM NetView DM/6000 Server/Client.
730 IBM NetView DM/6000 send TCP.
731 IBM NetView DM/6000 receive TCP.
732
-
740
741 netGW.
742 Network based Rev. Cont. Sys.
743
744 Flexible License Manager.
745
746
747 Fujitsu Device Control.
748 Russell Info Sci Calendar Manager.
749 kerberos administration.
750 kerberos version iv.
751 pump.
752 qrh.
753 rrh.
754 send
755
756
757
758 nlogin.
759 con.
760 ns.
761 rxe.
762 quotad.
763 cycleserv.
764 omserv.
765 webster.
766
767 phone.
768
769 vid.
770 cadlock.
771 rtip.
772 cycleserv2.
773 submit.
774 rpasswd.
acmaint_dbd.
775 entomb.
acmaint_transd.
776 wpages.
777 Multiling HTTP.
778
779
780 wpgs.
781
-
799

Port Protocol
800 mdbs_daemon.
801 device.
802
-
809
810 FCP.
811
-
827
828 itm-mcell-s.
829 CMP, Certificate Management Protocols.
830 NETCONF over SSH.
831 NETCONF over BEEP.
832 NETCONF for SOAP over HTTP.
833 NETCONF for SOAP over BEEP.
834
-
846
847 dhcp-failover 2.
848 GDOI, Group Domain of Interpretation.
849
-
859
860 iSCSI.
861 OWAMP, One-way Active Measurement Protocol.
862 TWAMP, Two-Way Active Measurement Protocol.
863
-
872
873 rsync.
874
-
885
886 ICL coNETion locate server.
887 ICL coNETion server info.
888 AccessBuilder.
CD Database Protocol.

900 OMG Initial Refs.
901 SMPNAMERES.
902 IDEAFARM-CHAT.
903 IDEAFARM-CATCH.
909
910 KINK, Kerberized Internet Negotiation of Keys.
911 xact-backup.
912 APEX relay-relay service.
913 APEX endpoint-relay service.
989 FTP data over TLS/SSL.
990 FTP control over TLS/SSL.
991 NAS, Netnews Administration System.
992 telnet over TLS/SSL.
993 imap4 over TLS/SSL.
994 irc over TLS/SSL.
995 pop3 over TLS/SSL (was spop3).
996 vsinet.
997 maitrd.
998 busboy.
puparp.
999 Applix ac.
garcon.
puprouter.

Sunday, June 6, 2010

OSI Rerfence Model




OSI(Open System Interconnection ) is the most widely accepted moder for the network communication. It is being developed by ISO (International Standard Organisation) in 1977 to bring consistency in the network communication. OSI is not a protocol but it is a model for understanding and designing a netwotk architectue that is flexible, robust and open for communication with other system. It allows any two different systems to communicate regardles of the underlying atchitecture. Vendor specify protocol closes off communication between unrelated systems. The purpose of OSDI model is to open communication betweent different system without requiring changes to the logic of the underlying hardware and software.



Function of each layer

PHYSICAL LAYER
The physical layer, the lowest layer of the OSI model, is concerned with the transmission and reception of the unstructured raw bit stream over a physical medium. It describes the electrical/optical, mechanical, and functional interfaces to the physical medium, and carries the signals for all of the higher layers. It provides:
Data encoding: modifies the simple digital signal pattern (1s and 0s) used by the PC to better accommodate the characteristics of the physical medium, and to aid in bit and frame synchronization. It determines:
What signal state represents a binary 1
How the receiving station knows when a "bit-time" starts
How the receiving station delimits a frame
Physical medium attachment, accommodating various possibilities in the medium:
Will an external transceiver (MAU) be used to connect to the medium?
How many pins do the connectors have and what is each pin used for?
Transmission technique: determines whether the encoded bits will be transmitted by baseband (digital) or broadband (analog) signaling.
Physical medium transmission: transmits bits as electrical or optical signals appropriate for the physical medium, and determines:

DATA LINK LAYER

The data link layer provides error-free transfer of data frames from one node to another over the physical layer, allowing layers above it to assume virtually error-free transmission over the link. To do this, the data link layer provides:
Link establishment and termination: establishes and terminates the logical link between two nodes.
Frame traffic control: tells the transmitting node to "back-off" when no frame buffers are available.
Frame sequencing: transmits/receives frames sequentially.
Frame acknowledgment: provides/expects frame acknowledgments. Detects and recovers from errors that occur in the physical layer by retransmitting non-acknowledged frames and handling duplicate frame receipt.
Frame delimiting: creates and recognizes frame boundaries.
Frame error checking: checks received frames for integrity.
Media access management: determines when the node "has the right" to use the physical medium.

NETWORK LAYER
The network layer controls the operation of the subnet, deciding which physical path the data should take based on network conditions, priority of service, and other factors. It provides:
Routing: routes frames among networks.
Subnet traffic control: routers (network layer intermediate systems) can instruct a sending station to "throttle back" its frame transmission when the router's buffer fills up.
Frame fragmentation: if it determines that a downstream router's maximum transmission unit (MTU) size is less than the frame size, a router can fragment a frame for transmission and re-assembly at the destination station.
Logical-physical address mapping: translates logical addresses, or names, into physical addresses.
Subnet usage accounting: has accounting functions to keep track of frames forwarded by subnet intermediate systems, to produce billing information.
Communications Subnet
The network layer software must build headers so that the network layer software residing in the subnet intermediate systems can recognize them and use them to route data to the destination address.
This layer relieves the upper layers of the need to know anything about the data transmission and intermediate switching technologies used to connect systems. It establishes, maintains and terminates connections across the intervening communications facility (one or several intermediate systems in the communication subnet).
In the network layer and the layers below, peer protocols exist between a node and its immediate neighbor, but the neighbor may be a node through which data is routed, not the destination station. The source and destination stations may be separated by many intermediate systems.

TRANSPORT LAYER
The transport layer ensures that messages are delivered error-free, in sequence, and with no losses or duplications. It relieves the higher layer protocols from any concern with the transfer of data between them and their peers.
The size and complexity of a transport protocol depends on the type of service it can get from the network layer. For a reliable network layer with virtual circuit capability, a minimal transport layer is required. If the network layer is unreliable and/or only supports datagrams, the transport protocol should include extensive error detection and recovery.
The transport layer provides:
Message segmentation: accepts a message from the (session) layer above it, splits the message into smaller units (if not already small enough), and passes the smaller units down to the network layer. The transport layer at the destination station reassembles the message.
Message acknowledgment: provides reliable end-to-end message delivery with acknowledgments.
Message traffic control: tells the transmitting station to "back-off" when no message buffers are available.
Session multiplexing: multiplexes several message streams, or sessions onto one logical link and keeps track of which messages belong to which sessions (see session layer).
Typically, the transport layer can accept relatively large messages, but there are strict message size limits imposed by the network (or lower) layer. Consequently, the transport layer must break up the messages into smaller units, or frames, prepending a header to each frame.
The transport layer header information must then include control information, such as message start and message end flags, to enable the transport layer on the other end to recognize message boundaries. In addition, if the lower layers do not maintain sequence, the transport header must contain sequence information to enable the transport layer on the receiving end to get the pieces back together in the right order before handing the received message up to the layer above.
End-to-end layers
Unlike the lower "subnet" layers whose protocol is between immediately adjacent nodes, the transport layer and the layers above are true "source to destination" or end-to-end layers, and are not concerned with the details of the underlying communications facility. Transport layer software (and software above it) on the source station carries on a conversation with similar software on the destination station by using message headers and control messages.


SESSION LAYER
The session layer allows session establishment between processes running on different stations. It provides:
Session establishment, maintenance and termination: allows two application processes on different machines to establish, use and terminate a connection, called a session.
Session support: performs the functions that allow these processes to communicate over the network, performing security, name recognition, logging, and so on.

PRESENTATION LAYER
The presentation layer formats the data to be presented to the application layer. It can be viewed as the translator for the network. This layer may translate data from a format used by the application layer into a common format at the sending station, then translate the common format to a format known to the application layer at the receiving station.
The presentation layer provides:
Character code translation: for example, ASCII to EBCDIC.
Data conversion: bit order, CR-CR/LF, integer-floating point, and so on.
Data compression: reduces the number of bits that need to be transmitted on the network.
Data encryption: encrypt data for security purposes. For example, password encryption.


APPLICATION LAYER
The application layer serves as the window for users and application processes to access network services. This layer contains a variety of commonly needed functions:
Resource sharing and device redirection
Remote file access
Remote printer access
Inter-process communication
Network management
Directory services
Electronic messaging (such as mail)
Network virtual terminals


Introduction to network security

Networks are mostly the connection of various Lans and are complicated structure with many interrelated parts. Networks can be either public or private and it consist of various nodes and servers. In today's era network is necessary for all sort of activities and are used to conduct activities like transaction and communication among business group, governments and individual as well. The nature of networks and its communication depends upon the interest of the individual and the organization.

Network security involves all the activities that organisation takes to protect the value and the current usability of assets and the integrity and continuity of operations. An effective network security strategy requires identifying threats and then choosing the most effective set of tools to combat them.

Threats to network security include:
Viruses : Computer programs written by devious programmers and designed to replicate themselves and infect computers when triggered by a specific event
Trojan horse programs : Delivery vehicles for destructive code, which appear to be harmless or useful software programs such as games
Vandals : Software applications or applets that cause destruction
Attacks : Including reconnaissance attacks (information-gathering activities to collect data that is later used to compromise networks); access attacks (which exploit network vulnerabilities in order to gain entry to e-mail, databases, or the corporate network); and denial-of-service attacks (which prevent access to part or all of a computer system)
Data interception : Involves eavesdropping on communications or altering data packets being transmitted
Social engineering : Obtaining confidential network security information through nontechnical means, such as posing as a technical support person and asking for people's passwords