Chapter 9.3 Security Access Control

Slides:



Advertisements
Similar presentations
Denial of Service Attack History What is a Denial of Service Attack? Modes of Attack Performing a Denial of Service Attack Distributed Denial of Service.
Advertisements

Access Control 1. Given Credit Where It Is Due Most of the lecture notes are based on slides by Dr. Daniel M. Zimmerman at CALTECH Some slides are from.
Mobile Code Security Yurii Kuzmin. What is Mobile Code? Term used to describe general-purpose executables that run in remote locations. Web browsers come.
The Mobile Code Paradigm and Its Security Issues Anthony Chan and Michael Lyu September 27, 1999.
Mobile Code Security Aviel D. Rubin, Daniel E. Geer, Jr. MOBILE CODE SECURITY, IEEE Internet Computing, 1998 Minkyu Lee
8.2 Discretionary Access Control Models Weiling Li.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
—On War, Carl Von Clausewitz
Chapter 11 Firewalls.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
The Mobile Code Paradigm and Its Security Issues Anthony Chan September 13, 1999.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Distributed computer security 8.2 Discretionary Access Control Models -Ranjitha Shivarudraiah.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
CSC 382: Computer SecuritySlide #1 Firewalls. CSC 382: Computer SecuritySlide #2 Single Host Firewall Simplest type of firewall—one host acts as a gateway.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
CE Operating Systems Lecture 21 Operating Systems Protection with examples from Linux & Windows.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
Code Migration Russell T. Potee, III. Overview Why Code Migration? Code Migration Models Migration and Handling Resources Heterogeneous Systems Migration.
Mobile Agent Security Presented By Sayuri Yonekawa October 17, 2000.
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Security. Digital Signatures Digital Signatures Using MD.
Denial of Service Attacks Simulating Strategic Firewall Placement By James Box, J.A. Hamilton Jr., Adam Hathcock, Alan Hunt.
Information Systems Design and Development Security Precautions Computing Science.
Access control techniques Once an organization decides upon the access control model it will implement(DAC,MAC, or RBAC), then it needs to look at the.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Chapter 26: Network Security Dr. Wayne Summers Department of Computer Science Columbus State University
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
PROTECTION.
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Defending Against DDoS
Naming in Distributed Web-based Systems
CIT 480: Securing Computer Systems
Introduction to Networking
Firewalls.
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Chapter 14: Protection.
Chapter 14: Protection.
Defending Against DDoS
Chapter 26: Network Security
Chapter 14: Protection.
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
CE Operating Systems Lecture 21
Internet Worms, SYN DOS attack
Chapter 14: Protection.
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Chapter 14: Protection.
Security.
Identifying Slow HTTP DoS/DDoS Attacks against Web Servers DEPARTMENT ANDDepartment of Computer Science & Information SPECIALIZATIONTechnology, University.
An Introduction to Internetworking
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Chapter 14: Protection.
Chapter 14: Protection.
Operating System Concepts
Chapter 14: Protection.
Access Control Dr. X Parenthesis: before we dive deeper into crypto, we will explore and old but still valid security principle, access controls.
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Access Control and Site Security
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Presentation transcript:

Chapter 9.3 Security Access Control Saeid Motevali Alamoti Georgia State University Computer Science Department Fall 2017

Agenda: Introduction General Issues in Access Control Firewalls Access Control Matrix Protection Domains Firewalls Secure Mobile Code Protecting an Agent Protecting the Target Denial of Service Protection Against DDoS Conclusion

Introduction What is Access Control? Verifying access rights. What is Authentication? Granting Access rights Access control and Authentication- strongly related to each other

General Issues in Access Control: Subject- Issues a request to access an object Reference monitor- Records which subject may do what, and decides whether a subject is allowed to have a specific operation carried out Object- Encapsulates its own state and implementing the operations on that state

Access Control Matrix: Column- Object Row- Subject ⋯ ⋮ ⋱ ⋮ ⋯

Access Control List (ACL) Figure 9-26. Comparison between ACLs and capabilities for protecting objects. (a) Using an ACL.

Access Control Capability: Figure 9-26. Comparison between ACLs and capabilities for protecting objects. (b) Using capabilities.

Protection Domains Figure 9-27. The hierarchical organization of protection domains as groups of users.

Figure 9-28. A common implementation of a firewall. Firewalls Figure 9-28. A common implementation of a firewall.

Secure Mobile Code Protecting an Agent Protecting the Target

Protecting an Agent Ajanta* provides three mechanisms that allow an agent's owner to detect that the agent has been tampered with Read-only state Append-only logs Selective revealing of state to certain servers (array of data item) *KARNIK, N. and TRIPATHI, A.: "Security in the Ajanta Mobile Agent System." Software - Practice & Experience, (31)4:301-329, Apr. 2001.

Figure 9-29. The organization of a Java sandbox. Protecting the Target Figure 9-29. The organization of a Java sandbox.

Protecting the Target Cont. Figure 9-30. (a) A sandbox. (b) A playground.

Protecting the Target Cont (Java-Capabilities) Figure 9-31. The principle of using Java object references as capabilities.

Protecting the Target Cont (Java-Extended) Figure 9-32. The principle of stack introspection.

Denial of Service DoS- Attempts to prevent from accessing the resources DDoS- A huge collection of processes jointly attempt to bring down a networked service Bandwidth depletion Resource depletion Bandwidth depletion can be accomplished by simply sending many messages to a single machine. The effect is that normal messages will hardly be able to reach the receiver. Resource depletion attacks concentrate on letting the receiver use up resources on otherwise useless messages. A well-known resource-depletionattack is TCP SYN-flooding.

Protection Against DDoS No single method Attackers make use of innocent victims by secretly installing software on their machines have machines continuously monitor their state by checking files for pollution!! Continuously monitor network traffic Concentrate on ingress routers too late as the network will probably already be unreachable for regular traffic

Conclusion Access control for distributed systems still have loopholes that needed to be addressed New attacks continue to emerge on Distributed systems Cloud Environment has a great demand for secure access control system* *Li, Hongjiao, et al. "A Survey of Extended Role-Based Access Control in Cloud Computing." Proceedings of the 4th International Conference on Computer Engineering and Networks. Springer International Publishing, 2015.

Referances Andrew, Tanenbaum S., and Maarten van Steen. "Distributed systems-principles and paradigms. Tanenbaum, Andrew S., et al. "Experiences with the Amoeba distributed operating system." Communications of the ACM 33.12 (1990): 46-63. Saltzer, Jerome H., and Michael D. Schroeder. "The protection of information in computer systems." Proceedings of the IEEE 63.9 (1975): 1278-1308. Sandhu, Ravi S., et al. "Role-based access control models." Computer 2 (1996): 38-47. Gamma, Erich, et al. Design patterns: elements of reusable object-oriented software. Pearson Education, 1994. KARNIK, N. and TRIPATHI, A.: "Security in the Ajanta Mobile Agent System." Software - Practice & Experience, (31)4:301-329, Apr. 2001. Cheswick, William R., Steven M. Bellovin, and Aviel D. Rubin. Firewalls and Internet security: repelling the wily hacker. Addison- Wesley Longman Publishing Co., Inc., 2003. Zwicky, Elizabeth D., Simon Cooper, and D. Brent Chapman. Building internet firewalls. " O'Reilly Media, Inc.", 2000. Farmer, William M., Joshua D. Guttman, and Vipin Swarup. "Security for mobile agents: Issues and requirements." Proceedings of the 19th national information systems security conference. Vol. 2. 1996. Wahbe, Robert, et al. "Efficient software-based fault isolation." ACM SIGOPS Operating Systems Review. Vol. 27. No. 5. ACM, 1994. Macgragor, Robert, et al. Java network security. Prentice-Hall, Inc., 1998. Malkhi, Dahlia, and Michael K. Reiter. "Secure execution of Java applets using a remote playground." Software Engineering, IEEE Transactions on 26.12 (2000): 1197-1209