Lecture 22 Network Security CPE 401 / 601 Computer Network Systems.

Slides:



Advertisements
Similar presentations
Chapter 1  Introduction 1 Introduction Chapter 1  Introduction 2 The Cast of Characters  Alice and Bob are the good guys  Trudy is the bad guy 
Advertisements

Chapter 1  Introduction 1 Chapter 1: Introduction.
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
NS-H /11041 Attacks. NS-H /11042 The Definition Security is a state of well-being of information and infrastructures in which the possibility.
Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 5 Omar Meqdadi Department of Computer Science and Software Engineering University of.
1 Reading Log Files. 2 Segment Format
Suneeta Chawla Web Security Presentation Topic : IP Spoofing Date : 03/24/04.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Network Attacks Mark Shtern.
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Firewalls and Intrusion Detection Systems
Introduction to Security Computer Networks Computer Networks Term B10.
6/9/2015Madhumita. Chatterjee1 Overview of Computer Security.
Modified from Silberschatz, Galvin and Gagne Lecture 22 Chapter 15: Security.
1 Network Security Derived from original slides by Henric Johnson Blekinge Institute of Technology, Sweden From the book by William Stallings.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Analysis of Attack By Matt Kennedy. Different Type of Attacks o Access Attacks o Modification and Repudiation Attacks o DoS Attacks o DDoS Attacks o Attacks.
Applied Cryptography for Network Security
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Lecture 1: Overview modified from slides of Lawrie Brown.
Topics in Information Security Prof. JoAnne Holliday Santa Clara University.
Introduction 1 Lecture 4 Networking Concepts (cont) slides are modified from J. Kurose & K. Ross University of Nevada – Reno Computer Science & Engineering.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
IIT Indore © Neminath Hubballi
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Cryptography, Authentication and Digital Signatures
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
Dimensions of E – Commerce Security
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
1 Introduction to Information Security Spring 2012.
Chapter 1  Introduction 1 Chapter 1: Introduction.
Lecture 20 Hacking. Over the Internet Over LAN Locally Offline Theft Deception Modes of Hacker Attack.
Network Security Introduction Light stuff – examples with Alice, Bob and Trudy Serious stuff - Security attacks, mechanisms and services.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Welcome to Introduction to Computer Security. Why Computer Security The past decade has seen an explosion in the concern for the security of information.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
CHAPTER 9 Sniffing.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 28 Omar Meqdadi Department of Computer Science and Software Engineering.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Network Security slides are modified from Dave Hollinger.
Polytechnic University Introduction1 CS 393/682: Network Security Professor Keith W. Ross.
Intro to Computer Security For COP3502, Intro to Computer Science Lecture 1 1.
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
Web Security Introduction (Some of the slides were adapted from Oppliger’s online slides at
Network Security Introduction
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
An Introduction To ARP Spoofing & Other Attacks
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Outline Basics of network security Definitions Sample attacks
Outline Basics of network security Definitions Sample attacks
Presentation transcript:

Lecture 22 Network Security CPE 401 / 601 Computer Network Systems

Network Security 2 by Peter Steiner, New York, July 5, 1993

Early Hacking – Phreaking In1957, a blind seven-year old, Joe Engressia Joybubbles, discovered a whistling tone that resets trunk lines – Blow into receiver – free phone calls Network Security 3 Cap’n Crunch cereal prize Giveaway whistle produces 2600 MHz tone

The Seventies John Draper – a.k.a. Captain Crunch – “If I do what I do, it is only to explore a system” In 1971, built Bluebox – with Steve Jobs and Steve Wozniak Network Security 4

The Eighties Robert Morris worm – Developed to measure the size of the Internet However, a computer could be infected multiple times – Brought down a large fraction of the Internet ~ 6K computers – Academic interest in network security Network Security 5

The Nineties Kevin Mitnick – First hacker on FBI’s Most Wanted list – Hacked into many networks including FBI – Stole intellectual property including 20K credit card numbers – In 1995, caught 2 nd time served five years in prison Network Security 6

Code-Red Worm On July 19, 2001, more than 359,000 computers connected to the Internet were infected in less than 14 hours Spread Network Security 7

Sapphire Worm was the fastest computer worm in history – doubled in size every 8.5 seconds – infected more than 90 percent of vulnerable hosts within 10 minutes. Network Security 8

DoS attack on SCO On Dec 11, 2003 – Attack on web and FTP servers of SCO a software company focusing on UNIX systems – SYN flood of 50K packet-per-second – SCO responded to more than 700 million attack packets over 32 hours Network Security 9

Witty Worm 25 March 2004 – reached its peak activity after approximately 45 minutes – at which point the majority of vulnerable hosts had been infected World USA Network Security 10

Nyxem Virus  Jan 15, 2006: infected about 1M computers within two weeks – At least 45K of the infected computers were also compromised by other forms of spyware or botware Spread Network Security 11

Security Trends Network Security 12 (Computer Emergency Readiness Team)

Concern for Security Explosive growth of desktops started in ‘80s – No emphasis on security Who wants military security, I just want to run my spreadsheet! Internet was originally designed for a group of mutually trusting users – By definition, no need for security – Users can send a packet to any other user – Identity (source IP address) taken by default to be true Explosive growth of Internet in mid ’90s – Security was not a priority until recently Only a research network, who will attack it? Network Security 13

The Cast of Characters Alice and Bob are the good guys Trudy is the bad guy Trudy is our generic “intruder” Who might Alice, Bob be? – … well, real-life Alices and Bobs – Web browser/server for electronic transactions – on-line banking client/server – DNS servers – routers exchanging routing table updates Network Security 14

Alice’s Online Bank Alice opens Alice’s Online Bank (AOB) What are Alice’s security concerns? If Bob is a customer of AOB, what are his security concerns? How are Alice and Bob concerns similar? How are they different? How does Trudy view the situation? Network Security 15

Alice’s Online Bank AOB must prevent Trudy from learning Bob’s balance – Confidentiality (prevent unauthorized reading of information) Trudy must not be able to change Bob’s balance Bob must not be able to improperly change his own account balance – Integrity (prevent unauthorized writing of information) AOB’s info must be available when needed – Availability (data is available in a timely manner when needed Network Security 16

Alice’s Online Bank How does Bob’s computer know that “Bob” is really Bob and not Trudy? When Bob logs into AOB, how does AOB know that “Bob” is really Bob? – Authentication (assurance that other party is the claimed one) Bob can’t view someone else’s account info Bob can’t install new software, etc. – Authorization (allowing access only to permitted resources) Network Security 17

Think Like Trudy Good guys must think like bad guys! A police detective – Must study and understand criminals In network security – We must try to think like Trudy – We must study Trudy’s methods – We can admire Trudy’s cleverness – Often, we can’t help but laugh at Alice and Bob’s carelessness – But, we cannot act like Trudy Network Security 18

Aspects of Security Security Services – Enhance the security of data processing systems and information transfers of an organization. – Counter security attacks. Security Attack – Action that compromises the security of information owned by an organization. Security Mechanisms – Designed to prevent, detect or recover from a security attack. Network Security 19

Security Services Enhance security of data processing systems and information transfers Authentication – Assurance that the communicating entity is the one claimed Authorization – Prevention of the unauthorized use of a resource Availability – Data is available in a timely manner when needed Network Security 20

Security Services Confidentiality – Protection of data from unauthorized disclosure Integrity – Assurance that data received is as sent by an authorized entity Non-Repudiation – Protection against denial by one of the parties in a communication Network Security 21

Security Attacks Network Security 22 Information source Information destination Normal Flow

Security Attacks Network Security 23 Information source Information destination Interruption Attack on availability (ability to use desired information or resources)

Denial of Service Network Security 24 Internet Perpetrator Victim ICMP echo (spoofed source address of victim) Sent to IP broadcast address ICMP echo reply ICMP = Internet Control Message Protocol Innocent reflector sites Smurf Attack 1 SYN 10,000 SYN/ACKs – Victim is dead

Security Attacks Network Security 25 Information source Information destination Interception Attack on confidentiality (concealment of information)

Packet Sniffing Network Security 26 Packet Sniffer Client Server Network Interface Card allows only packets for this MAC address Every network interface card has a unique 48-bit Media Access Control (MAC) address, e.g. 00:0D:84:F6:3A:10 24 bits assigned by IEEE; 24 by card vendor Packet sniffer sets his card to promiscuous mode to allow all packets

Security Attacks Network Security 27 Information source Information destination Fabrication Attack on authenticity (identification and assurance of origin of information)

IP Address Spoofing IP addresses are filled in by the originating host Using source address for authentication – r-utilities (rlogin, rsh, rhosts etc..) Network Security 28 Can A claim it is B to the server S? ARP Spoofing Can C claim it is B to the server S? Source Routing Internet C A B S

Security Attacks Network Security 29 Information source Information destination Modification Attack on integrity (prevention of unauthorized changes)

TCP Session Hijack When is a TCP packet valid? – Address / Port / Sequence Number in window How to get sequence number? – Sniff traffic – Guess it Many earlier systems had predictable Initial Sequence Number Inject arbitrary data to the connection Network Security 30

Security Attacks Network Security 31 Message interception Traffic analysis eavesdropping, monitoring transmissions Passive attacks MasqueradeDenial of service some modification of the data stream Active attacks ReplayModification of message contents

Model for Network Security Network Security 32

Security Mechanism Feature designed to – Prevent attackers from violating security policy – Detect attackers’ violation of security policy – Recover, continue to function correctly even if attack succeeds. No single mechanism that will support all services – Authentication, authorization, availability, confidentiality, integrity, non-repudiation Network Security 33

What is network security about ? It is about secure communication – Everything is connected by the Internet There are eavesdroppers that can listen on the communication channels Information is forwarded through packet switches which can be reprogrammed to listen to or modify data in transit Tradeoff between security and performance Network Security 34