Information Technology Reference
In-Depth Information
Address for each connection attempt. Such an attack would pass
unnoticed to the applications for the analysis of network activities, such
as NetFlow, which indicates the upper-level network or large amounts of
traffic from a single source address.
Bypassing the access control lists : These lists are used as the basic
form of access control on WLANs, administrators typically have the
ability to configure the access point to only allow registered MAC
addresses to communicate on the network. An attacker could get around
this form of access control passively monitoring the network and
compiling a list of MAC addresses that are allowed to communicate.
With the list of authorized MAC addresses, an attacker is free to declare
your MAC Address with an authorized address, excluding the security
mechanisms.
Impersonation of an authorized user : Certain security authentication
devices of WLAN hardware rely on authentication credentials to the
MAC Address of the client source. After a user has been authenticated,
the Security Gateway allows only traffic based on a dynamic list of
allowed MAC addresses. An attacker who wishes to avoid the security of
the system only needs to check the activities of the network to obtain an
authorized MAC Address, and then alter its own MAC Address to take
the identity of the user authenticated earlier.
6.7 Attacks on Smart Cards
Being able to conquer the secrets stored in a Smart Card is not simple. Indeed
its nature makes it one of the safest ways to protect users. Attacks on Smart
Cards can be categorized into two distinct families: invasive attacks and non-
invasive attacks.
Invasive attacks require hours in specialized laboratories, with very
expensive machines. A Microprobing action gives access to the chip surface
and integrated circuits are directly altered [14]. A type of attack of this kind is
irreversible, i.e. hardware is definitely compromised. In addition, the owner
of the card will easily notice the attack and can immediately revoke the keys.
In contrast the non-invasive attacks are very difficult to identify. They can
be divided into three types:
Software : the attacks are more common and certainly the least
expensive. They exploit the vulnerability of protocols, cryptographic
algorithms, etc.
Eavesdropping : The attack is aimed at analysing all the connections and
CPU electromagnetic radiation.
Fault generation : the goal is to induce a malfunction in the processor.
Search WWH ::




Custom Search