- AWS Certified Advanced Networking:Specialty Exam Guide
- Marko Sluga
- 352字
- 2021-06-24 14:14:52
Application layer attacks
Application layer attacks come in the highest variety and severity, and include but are not limited to the following:
- Brute-force attacks: An attacker tries to gain access by trying to breach an application entry point (remote desktop, SSH, web login) with a dictionary attack or similar
- Session hijacking: The attacker intercepts credentials or tokens and pretends to be an active user to gain access
- Injection attacks: An attacker exploits poor application security to inject information into the application for DoS or to gain access
- Account hijacking: Accounts are hijacked through phishing or inadvertent disclosure of credentials for DoS or to gain access
We can easily detect brute-force attacks with a monitoring solution such as CloudWatch, which can provide an alert when a certain user has reached a certain threshold of invalid logins over a certain period of time.
To protect from session hijacking, we could use encryption. Since the traffic is encrypted, it will make it very difficult for an attacker to perform a session hijack. We can also implement mechanisms that allow you to check network packets on several layers. This helps our application determine whether the packet has been altered, thus indicating an interception and a possible attempt to hijack the session.
AWS WAF can be used to prevent injection attacks, but the wisest way to protect your application is to secure it at the application layer.
Possibly the most difficult attack to detect and protect from the network layer would be account hijacking. Phishing or inadvertent credential disclosures can lead to an attack that is hard to detect. An attacker can easily fool any automated system and pretend to be a legitimate user while trying to gain deeper access or transferring confidential data from our application. The recommended way to protect from account hijacking is to use multi-factor authentication (MFA). AWS has built-in MFA for AWS accounts and IAM users. We should always make sure that any developers building any type of publicly accessible application understand the need for MFA. Building MFA capability into the application level will raise the security of any application accounts dramatically.
- Excel 2007函數與公式自學寶典
- Security Automation with Ansible 2
- Hands-On Machine Learning with TensorFlow.js
- 可編程控制器技術應用(西門子S7系列)
- 大數據平臺異常檢測分析系統的若干關鍵技術研究
- Maya極速引擎:材質篇
- 人工智能趣味入門:光環板程序設計
- PVCBOT機器人控制技術入門
- Python:Data Analytics and Visualization
- 統計挖掘與機器學習:大數據預測建模和分析技術(原書第3版)
- Working with Linux:Quick Hacks for the Command Line
- PLC與變頻技術應用
- PowerMill 2020五軸數控加工編程應用實例
- Natural Language Processing and Computational Linguistics
- Spark Streaming實時流式大數據處理實戰