Meri Leeworthy

Types of security attacks

We have broadly learned the different classifications of security attacks that can happen and how an attacker seeks to carry them out on a system and why they are challenging to address completely. In this lesson, we will further explore each of the security attack classifications and examine how some of the various attacks are carried out on a system and why they are classified as such.

Release of message contents

This is a passive attack wherein an attack is able to obtain information discreetly that is being shared between two parties involved in the communication. This attack generally exploits the medium for transmission in order to obtain information that may not be intended for anyone else except the receiver.

Traffic analysis

This is an even more subtle passive attack, as the attacker’s main goal is only to analyse the communication patterns that occur between the sender and the receiver. While it may not always be possible to determine the exact communication, an attacker can exploit this knowledge to infer the topic of discussion or predict the next possible communication time between the sender and receiver.

Masquerade – active attack

In this type of attack, the attacker’s goal is to pretend or ‘masquerade’ as someone else, thereby attempting to deceive other systems into believing that the attacker is either the sender or the receiver. While this is not always possible in real life, as computers communicate using other methods of identification, an attacker who wishes to masquerade as someone else only needs to obtain this identification metric. Generally, the approach adopted to obtain this metric is done via a passive attack.

Replay – active attack

This is another example of an active attack wherein an attacker passively captures and analyses network traffic between a sender and receiver. The attacker decides to deceive one party into believing it is the other by replaying a previously sent message, which can be then used to continue the conversation or even attempt to gain unauthorised access to resources on the system.

Modification of messages – active attack

As the name suggests, an attacker uses a passive attack to obtain information which is then modified and replayed back to the receiver. Generally, an attacker intercepts the communication causing some kind of transmission delay or other error wherein the receiver is then deceived into providing the attacker with some unauthorised access.

Denial of service – active attack

A more deadly example of an active attack. This attack requires the attacker to monopolise the resources of a given system to the point where that system no longer has the resources to handle legitimate requests from actual users as all its resources are being used to respond to the attacker. This causes normal users to not be able to use the service provided by that system. Given the resources available to most modern systems, attackers performing a denial of service attack can do so in a multitude of ways.

Impact of a security attack

Any attack on a computer system is not desirable. However, when considering security, it is important to understand that each attack can have a certain impact on the system and the organisation to whom the system belongs to. With this in mind, the impact of a security attack is generally classified as follows:

Threat consequences of security attacks

When a security attack is carried out, an adversary generally poses one or more of the following threats:

Unauthorised disclosure

This is a threat to confidentiality as the information is now known by an unintended recipient. Some possible attacks that could lead to this consequence include:

Deception

This is a threat to integrity as the information received by the recipient may be modified but the recipient is unaware of this. Some possible attacks that could lead to this consequence include:

Disruption

This is a threat to availability wherein an action is performed that compromises a system, making it unavailable to other users. Some possible attacks that could lead to this consequence include:

Usurpation

This is a threat to integrity wherein a system is compromised but still operational, however, users and other systems are unaware of this. Some possible attacks that could lead to this consequence include:

From this, we get a general idea of the various attacks and the threats they pose. In practice, most attacks tend to be a combination of some of these concepts to varying degrees.

Next: The OSI security architecture

I live and work on the land of the Wurundjeri people of the Kulin Nation. I pay respect to their elders past and present and acknowledge that sovereignty was never ceded. Always was, always will be Aboriginal land.

This site uses open source typefaces, including Sligoil by Ariel Martín Pérez, and Vercetti by Filippos Fragkogiannis