Securing TCP/IP Chapter 6. Introduction to Transmission Control Protocol/Internet Protocol (TCP/IP) TCP/IP comprises a suite of four protocols The protocols.

Slides:



Advertisements
Similar presentations
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
Advertisements

CISCO NETWORKING ACADEMY Chabot College ELEC Transport Layer (4)
CCNA – Network Fundamentals
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 OSI Transport Layer Network Fundamentals – Chapter 4.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Chapter 2 Network Models.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 OSI Transport Layer Network Fundamentals – Chapter 4.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
Networking Theory (part 2). Internet Architecture The Internet is a worldwide collection of smaller networks that share a common suite of communication.
OSI Model.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
OIS Model TCP/IP Model.
Lecturer: Tamanna Haque Nipa
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Process-to-Process Delivery:
TRANSPORT LAYER T.Najah Al-Subaie Kingdom of Saudi Arabia Prince Norah bint Abdul Rahman University College of Computer Since and Information System NET331.
Presentation on Osi & TCP/IP MODEL
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
CSI315 Web Development Technologies Continued. Communication Layer information needs to get from one place to another –Computer- Computer –Software- Software.
Copyright 2003 CCNA 1 Chapter 9 TCP/IP Transport and Application Layers By Your Name.
Jaringan Komputer Dasar OSI Transport Layer Aurelio Rahmadian.
Huda AL_Omairl - Network 71 Protocols and Network Software.
Internet Addresses. Universal Identifiers Universal Communication Service - Communication system which allows any host to communicate with any other host.
Chapter 7 Low-Level Protocols
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
The OSI Model An ISO (International standard Organization) that covers all aspects of network communications is the Open System Interconnection (OSI) model.
TCP/IP PROTOCOL SUITE The TCPIIP protocol suite was developed prior to the OSI model. Therefore, the layers in the TCP/IP protocol suite do not exactly.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
Chap 9 TCP/IP Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
11 NETWORK LAYER PROTOCOLS Chapter 5 IP IPX NetBEUI AppleTalk.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
NET 221D:Computer Networks Fundamentals
The OSI Model.
University of the Western Cape Chapter 12: The Transport Layer.
TCP/IP Transport and Application (Topic 6)
Routers and Routing Basics CCNA 2 Chapter 10.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
Data Communications and Networks
Protocol Headers 0x0800 Internet Protocol, Version 4 (IPv4) 0x0806 Address Resolution Protocol (ARP) 0x8100 IEEE 802.1Q-tagged frame 0x86DD Internet Protocol,
BZUPAGES.COM Presentation on TCP/IP Presented to: Sir Taimoor Presented by: Jamila BB Roll no Nudrat Rehman Roll no
Networking Basics CCNA 1 Chapter 11.
Institute of Technology Sligo - Dept of Computing Chapter 12 The Transport Layer.
Chapter 2. Network Models
Network Protocols and Standards (Part 2). The OSI Model In 1984, the International Organization for Standardization (ISO) defined a standard, or set of.
S305 – Network Infrastructure Chapter 5 Network and Transport Layers.
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
1 Bus topology network. 2 Data is sent to all computers, but only the destination computer accepts 02608c
Linux Operations and Administration Chapter Eight Network Communications.
Chapter 2. Network Models
Page 12/9/2016 Chapter 10 Intermediate TCP : TCP and UDP segments, Transport Layer Ports CCNA2 Chapter 10.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
1 Computer Communication & Networks Lecture 23 & 24 Transport Layer: UDP and TCP Waleed Ejaz
TCP/IP Protocol Suite Suresh Kr Sharma 1 The OSI Model and the TCP/IP Protocol Suite Established in 1947, the International Standards Organization (ISO)
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
Cisco I Introduction to Networks Semester 1 Chapter 7 JEOPADY.
Chapter 5 Network and Transport Layers
Layered Architectures
Understand the OSI Model Part 2
Lec 5 Layers Computer Networks Al-Mustansiryah University
Chapter 3: Open Systems Interconnection (OSI) Model
Networking Theory (part 2)
Net 323 D: Networks Protocols
Transport Layer 9/22/2019.
Networking Theory (part 2)
Presentation transcript:

Securing TCP/IP Chapter 6

Introduction to Transmission Control Protocol/Internet Protocol (TCP/IP) TCP/IP comprises a suite of four protocols The protocols completely describe how devices communicate on TCP/IP networks The TCP/IP design is governed by the Open Systems Interconnection (OSI) reference model

Internet Protocol (IP) The Internet Protocol provides routing functions for datagrams traversing the network Each datagram has source and destination addresses IP determines if the datagram has reached its destination or if it must be forwarded –If it must be forwarded, IP determines the next hop IP does not provide a reliability guarantee –No assurance that a packet will reach its specified destination

Internet Protocol (continued) IP is also responsible for fragmentation of datagrams A datagram cannot exceed the maximum size for the network it is traveling on –This is not known at creation time Datagrams that are too large must be broken into fragments Each fragment must contain the information required to reassemble the original datagram –Labeled with a length and an offset

Datagram Fragmentation

Transmission Control Protocol (TCP) Has 3 important features –TCP is a reliable protocol (guarantees delivery of packets from source to destination) –TCP provides error-checking (using a checksum) –TCP is connection-oriented (provides session establishment and teardown handshaking protocols to create dedicated process-to-process communication) After a TCP packet is constructed, it is transformed into an IP datagram by adding information to the headers (encapsulation)

TCP Handshaking Protocol

User Datagram Protocol (UDP) Like TCP, UDP is a transport protocol Unlike TCP, UDP is connectionless and does not provide a reliability guarantee Used to deliver a packet from one process to another with very low overhead –Does not use handshaking to establish connections –Does not keep track of sequencing and acknowledge information Often used for application like streaming media that do not depend on guaranteed delivery of every packet

Internet Control Message Protocol (ICMP) Responsible for transmitting control messages between networked hosts Uses basic portions of IP header as routing infrastructure Types of control messages include –Network/host/port unreachable –Packet time to live expired –Source quench (overloaded gateway, pause traffic) –Redirect messages

TCP/IP Suite

Open Systems Interconnection Model (OSI) Developed in the late 1970s to describe basic functionality of networked data communications Has seven layers Uses encapsulation to sequentially process data through the layers until it is ready for transmission –Each layer performs some transformation of data such as adding a header or converting data into another form –At the sender, data is transformed from application to physical layer –At the recipient, data is transformed from physical to application layer

OSI Layers Application layer is the highest layer of OSI model –Contains software that interacts directly with computer users Web browsers, , office productivity suites, etc. –Majority of security vulnerabilities occur at this layer Malicious code objects such as viruses, worms, and Trojan horses Presentation layer –Responsible for converting data into formats for exchange between higher and lower layers –Responsible for allowing data in Application layer to be shared among applications

OSI Layers (continued) Presentation layer (continued) –Responsible for encryption and decryption of data Session layer –Responsible for network connections between processes –A security vulnerability at this layer is session hijacking Hijacker takes over a session after authentication has taken place Transport layer –Responsible for data flow between two systems Error recovery functionality, flow control mechanism –Common transport protocols are TCP and UDP

OSI Layers (continued) Transport layer (continued) –Many security vulnerabilities at this level –SYN Flood attack Attacks TCP’s three-way handshaking process –Buffer overflow attacks Network Layer –Home to Internet Protocol –Responsible for ensuring that datagrams are routed across the network –Responsible for addressing and fragmentation of datagrams

OSI Layers (continued) Network layer (continued) –Fragmentation attacks were common at this layer, modern operating systems are less vulnerable Two fragments overlap Two adjacent fragments do not meet Data Link Layer –Responsible for conversion between datagrams and binary –Two sublayers –Logical Link Control sublayer Error correction, flow control, frame synchronization

Network Layer Fragment Attacks

OSI Layers (continued) Data Link layer (continued) –MAC sublayer Physical addressing scheme for network devices Physical layer –Converts binary from Data Link layer to network impulses Type of impulse depends on media, electrical, or optic for example –Physical threats include the use of packet sniffers to monitor traffic

Anatomy of a Packet Packets have two main components –Packet header –Packet payload Packet sniffers are hardware or software that passively monitor traffic on a network –can be used maliciously to view unauthorized information –are also used by system administrators to understand and analyze traffic flow and possible attacks To use a packet sniffer, you must understand the components and structure of a packet

Anatomy of a Packet (continued) Packet headers are built sequentially with each layer potentially adding information –Encapsulation IP headers include –Total length and offset fields for fragmentation –Source Address and Destination Address (IP addresses) TCP headers include –Source Port and Destination Port –SYN and AWK flags –checksum

Anatomy of a Packet (continued) UDP headers are added when UDP is the transport protocol –Fields are Source Port, Destination Port, Length, and Checksum Packet payload is the actual data content that is to be transported –Anything that can be expressed in binary (images, words, etc.)

Internet Protocol Security (IPSec) TCP/IP is inherently insecure IPSEC is a security-enhanced version of IP –Security Associations (SAs) contain identification and key materials –Authentication Headers (AHs) provide integrity and authentication functionality –Encapsulating Security Payload (ESP) adds confidentiality guarantees Transport mode used when network may not support IPSec, headers are not encrypted Tunnel mode allows encryption of all data including headers

Web Security WWW comprises the second largest portion of traffic on the Internet ( is first) SSL and HTTP-S are technologies used to add security to Web communications Secure Socket Layers (SSL) –Usually used between Web browser clients and servers, known as HTTP over SSL (https) –Facilitates exchange of digital certificates Secure-HTTP (HTTP-S) –A connectionless protocol, found in only a few less common browsers

Summary TCP/IP is actually a suite of four main protocols –IP, TCP, UDP, ICMP IP provides routing functions and datagram fragmentation TCP provides reliability guarantees, establishes two- way communication channels between processes UDP is connectionless, it delivers packets between processes efficiently but without reliability guarantees ICMP provides for administrative control of packets traversing a network

Summary The Open Systems Interconnection (OSI) model is a reference model for networked data communications OSI describes 7 layers –Application, Presentation, Session, Transport, Network, Data Link, Physical –Data is processed sequentially from the user interfaces at the Application layer to the transmission of physical impulses at the Physical layer –Each layer has particular security vulnerabilities –Each layer transforms data in some way, either by adding information to packet headers or converting data into a new form

Summary Packets are the chunks of data that are sent across a network –Packet headers contain the information necessary to transmit the packet over the network –Packet payload is the actual data content being transmitted IPSec is a security-enhanced version of the Internet Protocol Web security technologies include –Secure Sockets Layer (SSL) –Secure-HTTP (HTTP-S)