IP crime has been around as long as the internet because the
IP, or Internet Protocol, is the tool by which the internet is allowed to work.
We should also distinguish IP crime - Internet protocol crime is where criminal
misuse of Internet Protocol is used in the commission of a crime whereas,
Intellectual Property Crime (also confusingly known as "IP Crime"),
refers to the criminal misuse of intellectual property such as illegal duplication
of compact or digital video disks.
To understand IP Crime, we need to understand what an IP
address is and how the internet and the machines and hardware which go to form
the infrastructure make use of them.
Every machine connected to the internet; computers, laptops,
cell phones, routers, printers and many more, all have an assigned IP address.
You may have already seen an IP address and they typically look like this: 255.12.36.99
Four sets of numbers separated by three dots - the dots have
no significance and are there to let humans read the numbers more easily. The
computer does not use these numbers as we see them but uses their
"binary" equivalent - without going into detail; this is simply a
numbering system which uses only two digits, 0 and 1. Whenever machines are
talking to each other or simply passing on information as part of the network
which allows the internet to operate, they do this by using IP addresses.
The issue is that IP addresses can very easily be replicated
or "spoofed" - this means that a machine used by a criminal, can tell
another machine, such as your laptop, that it has an IP address which the
target knows is "friendly". It therefore is happy to communicate and
share some, and we stress only some information but this opens a chink in the security
of the target. By allowing a criminal a small degree of access to a target
machine, they can, if security is not tight enough or if the criminal's
technical expertise is up to the task, which allows greater exploitation.
This ability to "spoof" an IP address makes use of
the weak authentication inherent in the IP system. This means that your
computer or network security must be imposed at a higher level than the IP
address, and typically this involves cryptographic techniques which are
embedded into applications which you use.
By sending spoof IP information, the criminal may be able to
get the target machine or network to perform some action which allows further
entry or stops other security protections from operating. Some applications
still rely on IP address information and they are susceptible to coming under
the control of an attacker with that information. Examples include where login
information is processed at the IP address level and where the hacker is given
access to the system or an application simply because they possess the IP
address which unlocks their security.
IP Session Hacking is another form of IP crime which
requires a greater degree of sophistication than IP spoofing. Nevertheless, it
is a very dangerous form of attack because the user is unaware that they have
now had control of their machine taken away from them. An example is where a
user is writing an email, in the middle of the email the session is hijacked by
the criminal but what the user sees is they have been logged off or lost a
connection. This happens, so they simply log back on again and continue,
blissfully unaware that everything they do on the machine can now be done by
the hijacker, such as accessing online banking or opening sensitive documents.
Comments
Post a Comment