Posts

Showing posts from January, 2018

Wireshark(Network Protocol Analyzer)

Wireshark and components – what does it do and how? Wireshark is a network monitoring tool which also called as network protocol analyzer or sniffer. It is free and open source tool. It is used for network trouble shooting and analysis. Wireshark is a cross platform based, it runs on many operating systems like Linux, MacOS, BSD, Solaris, Microsoft Windows etc. There is also a terminal version of wireshark which is called as TShark. Wireshark uses pcap to capture packets form the network. It is used for examining the details of traffic in the network. The information of the packet which is captured can give its transmit time, source ip address, destination ip address, protocol type, header data etc. So this information can be use in security and troubleshooting issues. The wireshark will display the information in three types of panels which are Packet list panel, Packet details panel, Packet byte panel. The packet list panel are the colored lines which are displayed at the top.

Security threats and countermeasures of SDN(Software Defined Network)

Security for SDN (Software Defined Networks) SDN (Software Defined Networks) – SDN is a network architecture which deals with network dynamics through software enabled control. Security for SDN has become an important concern. We discuss about security threats and their effects with this we also discuss about SDN Security Controls. ·         Security Threats : Denial of service(Dos), Information Disclosure, Spoofing, Tampering, Repudiation, Elevation of Privilege. ·         Security Controls : Access Control, firewalls, IDS(Intrusion detection system), IPS(Intrusion prevention system), policy management and auditing. STRIDE(Spoofing, Tampering, Repudiation, Information Disclosure, Denial of service, Elevation of Privilege ) is a threat classification model developed by Microsoft for thinking about computer security threats. SDN security threats and countermeasures: We are going to use STRIDE threat model for analyzing the type of threats which are exposed to