Outline Network characteristics that affect security

Slides:



Advertisements
Similar presentations
 Natural consequence of the way Internet is organized o Best effort service means routers don’t do much processing per packet and store no state – they.
Advertisements

Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
Internet Protocol Security An Overview of IPSec. Outline:  What Security Problem?  Understanding TCP/IP.  Security at What Level?  IP Security. 
Firewalls and Intrusion Detection Systems
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
1 Chapter 13: Representing Identity What is identity Different contexts, environments Pseudonymity and anonymity.
K. Salah1 Security Protocols in the Internet IPSec.
Network Topologies.
Shared success Outline What is network security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures. How to secure.
FIREWALL Mạng máy tính nâng cao-V1.
Lecture 29 Page 1 Advanced Network Security Privacy in Networking Advanced Network Security Peter Reiher August, 2014.
Common Devices Used In Computer Networks
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
NETWORK COMPONENTS Assignment #3. Hub A hub is used in a wired network to connect Ethernet cables from a number of devices together. The hub allows each.
Lecture 27 Page 1 Advanced Network Security Routing Security Advanced Network Security Peter Reiher August, 2014.
Lecture 11 Page 1 Advanced Network Security Cryptography and Networks: IPSec and SSL/TLS Advanced Network Security Peter Reiher August, 2014.
Lecture 9 Page 1 CS 136, Fall 2014 Network Security Computer Security Peter Reiher November 4, 2014.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Lecture 6 Page 1 Advanced Network Security Review of Networking Basics Advanced Network Security Peter Reiher August, 2014.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 28 Omar Meqdadi Department of Computer Science and Software Engineering.
Lecture 20 Page 1 Advanced Network Security Basic Approaches to DDoS Defense Advanced Network Security Peter Reiher August, 2014.
Lecture 11 Page 1 CS 136, Spring 2009 Network Security CS 136 Computer Security Peter Reiher May 7, 2009.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Networking Components WILLIAM NELSON LTEC HUB  Device that operated on Layer 1 of the OSI stack.  All I/O flows out all other ports besides the.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Confidentiality using Conventional Encryption Chapter 5.
K. Salah1 Security Protocols in the Internet IPSec.
Lecture 12 Page 1 CS 136, Fall 2011 Network Security, Continued CS 136 Computer Security Peter Reiher November 1, 2011.
Lecture 9 Page 1 CS 136, Spring 2014 Network Security CS 136 Computer Security Peter Reiher May 6, 2014.
Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.
Lecture 18 Page 1 CS 236 Online Advanced Research Issues In Security: Securing Key Internet Technologies CS 236 On-Line MS Program Networks and Systems.
Lecture 9 Page 1 CS 136, Spring 2016 Network Security Computer Security Peter Reiher April 26, 2016.
Lecture 10 Page 1 CS 236 Online Encryption and Network Security Cryptography is widely used to protect networks Relies on encryption algorithms and protocols.
Lecture 9 Page 1 CS 236 Online Firewalls What is a firewall? A machine to protect a network from malicious external attacks Typically a machine that sits.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
IPSecurity.
Advanced Topics in Network Security: IP Spoofing and DDoS CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
DNS Security Advanced Network Security Peter Reiher August, 2014
Network Security Mechanisms
Some Important Network Characteristics for Security
Encryption and Network Security
Some Important Network Characteristics for Security
Chapter 18 IP Security  IP Security (IPSec)
Wireless Network Security
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Computer Data Security & Privacy
Outline Basics of network security Definitions Sample attacks
Virtual Private Networks
Firewalls.
CSE 4905 Network Security Overview
Network Security: IP Spoofing and Firewall
0x1A Great Papers in Computer Security
Outline Basics of network security Definitions Sample attacks
دیواره ی آتش.
Outline Using cryptography in networks IPSec SSL and TLS.
Introduction to Network Security
Advanced Topics in Network Security: IP Spoofing and DDoS CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Outline Basics of network security Definitions Sample attacks
Advanced Research Issues In Security: Securing Key Internet Technologies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Outline The spoofing problem Approaches to handle spoofing
Session 20 INST 346 Technologies, Infrastructure and Architecture
Outline Basics of network security Definitions Sample attacks
Outline The concept of perimeter defense and networks Firewalls.
Presentation transcript:

Security and Networks Advanced Network Security Peter Reiher August, 2014

Outline Network characteristics that affect security Threats to network security

Some Important Network Characteristics for Security Degree of locality Media used Protocols used

Degree of Locality Some networks are very local E.g., an Ethernet Benefits from: Physical locality Small number of users and machines Common goals and interests Other networks are very non-local E.g., the Internet backbone Many users/sites share bandwidth

Network Media Some networks are wires, cables, or over telephone lines Can be physically protected Other networks are satellite links or other radio links Physical protection possibilities more limited

Protocol Types TCP/IP is the most used But it only specifies some common intermediate levels Other protocols exist above and below it In places, other protocols replace TCP/IP And there are lots of supporting protocols Routing protocols, naming and directory protocols, network management protocols And security protocols (IPSec, ssh, ssl)

Implications of Protocol Type The protocol defines a set of rules that will always be followed But usually not quite complete And they assume everyone is at least trying to play by the rules What if they don’t? Specific attacks exist against specific protocols

Threats To Networks Wiretapping Impersonation Attacks on message Confidentiality Integrity Denial of service attacks

Wiretapping Passive wiretapping is listening in illicitly on conversations Active wiretapping is injecting traffic illicitly Packet sniffers can listen to all traffic on a broadcast medium Ethernet or 802.11, e.g.

Requirements for Wiretapping The wiretapper must get access to the network data Either by listening on one of the network links (or routers, switches, etc.) Or by rerouting the data through something he controls Wiretapping on wireless often just a matter of putting up an antenna If you are in the right physical place

Impersonation A packet comes in over the network With some source indicated in its header Often, the action to be taken with the packet depends on the source But attackers may be able to create packets with false sources

Levels of Impersonation Layered protocols imply multiple identities for a packet Its incoming link Its original source node The connection it is part of The user who sent it Different techniques used to authenticate each layer

Link Authentication Usually trivial Receiving machine gets reliable local information about what interface got it That interface is usually connected to one link Nearly impossible to fake Though wireless “links” are not very exclusive

Source Node Authentication IP packets contain source node identity In typical IP, it’s not authenticated Attacker can fill in any address he wants Commonly called IP spoofing The Internet doesn’t check No authentication information typically tied to an IP address

Connection Authentication Depends on protocol Typical TCP connections not formally authenticated Some weak authentication possible E.g., evidence that sender saw the last response packet Other protocols can be better (TLS) or worse (UDP)

User Authentication Authenticated the session/user/application layers Usually done cryptographically Most commonly leveraging PK But only for setup Proper use of ongoing symmetric crypto regarded as later authentication I.e., if I know the right symmetric key, I must have the right private key, too

Violations of Message Confidentiality Other problems can cause messages to be inappropriately divulged Misdelivery can send a message to the wrong place Clever attackers can make it happen Message can be read at an intermediate gateway or a router Sometimes an intruder can get useful information just by traffic analysis

Message Integrity Even if the attacker can’t create the packets he wants, sometimes he can alter proper packets To change the effect of what they will do Typically requires access to part of the path message takes

Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing tables Or flooding routers Or destroying key packets

How Do Denial of Service Attacks Occur? Basically, the attacker injects some form of traffic Most current networks aren’t built to throttle uncooperative parties very well All-inclusive nature of the Internet makes basic access trivial Universality of IP makes reaching most of the network easy

Basic Defensive Mechanisms Cryptography Filtering Rate limits Padding Routing control

Cryptography Obvious values in maintaining message confidentiality Also value for integrity and authentication Some limitations based on performance costs We’ll discuss this in more detail later

Filtering Selectively dropping some packets Either to get rid of stuff that is likely to cause problems Or to reduce the overall rate of traffic flowing through a point Basic approach – examine each packet and drop those with some characteristic

What Do We Filter On? Packet header information Like source or destination address Or protocol Packet content signatures Requires deep packet inspection Key issue with filtering is speed Fast filtering usually limited in sophistication

Where Do You Filter? Near edges of the network, typically E.g., firewalls Many practical limits on what can be done here Typically little or no filtering is done by core routers Packets being handled too fast Backbone providers don’t want to filter Damage great if you screw it up

Rate Limits Many routers can place limits on the traffic they send to a destination Ensuring that the destination isn’t overloaded Popular for denial of service defenses Limits can be defined somewhat flexibly Related approaches: Priority queuing Traffic shaping

Shortcomings of Rate Limits Rate limiting does not imply intelligence in what gets dropped At the speeds it’s working at, not really possible Rate limits based on IP addresses can be cheated on by spoofing

Padding Sometimes you don’t want intruders to know what your traffic characteristics are Padding adds extra traffic to hide the real stuff Fake traffic must look like real traffic Usually means encrypt it all Must be done carefully, or clever attackers can tell the good stuff from the noise

Routing Control Use ability to route messages to obtain security effects Route questionable messages to defensive sites Don’t route sensitive messages through “unsafe” parts of the network

Routing Control For Privacy Use ability to control message routing to conceal the traffic in the network Used in onion routing to hide who is sending traffic to whom For anonymization purposes Routing control also used in some network defense To hide real location of a machine E.g., SOS DDoS defense system