Presentation is loading. Please wait.

Presentation is loading. Please wait.

Fundamentals of Computer Security Geetika Sharma Fall 2008.

Similar presentations

Presentation on theme: "Fundamentals of Computer Security Geetika Sharma Fall 2008."— Presentation transcript:

1 Fundamentals of Computer Security Geetika Sharma Fall 2008

2 Outline Fundamentals of Computer Security Security Threats and Protection Methods Security Models and Mechanisms Security Issues in Distributed systems Latest Techniques Agent Based Approach Grid Specific Host Based Intrusion Detection System

3 Fundamentals of Computer Security[1] Computer Systems Can be represented by: Subjects  Active entities that access objects Objects  Passive entities that must be protected  Examples: data, hardware, software and communication links Access Control Policy Describes how objects are accessed by subjects Flow Control Policy Regulates the information flow between objects and subjects

4 Security Threats[1] Interruption (availability) Loss of data and denial of service Interception Related to secrecy Modification and Fabrication are violations of system integrity

5 Threats from Web/Network[4] Client Side What can the server do to the client? Fool it Install or run unauthorized software, inspect/alter files Server Side What can the client do to the server? Bring it down (denial of service) Gain access (break-in) Network Is anyone listening? (Sniffing) Is the information genuine? Are the parties genuine?

6 Security Mechanisms[1] Authentication Verification Authorization Extending permission Fault Tolerance Sustaining faults Encryption Prevents exposure of information and maintains privacy Auditing Passive form of protection

7 Discretionary Provides separation of users and data E.g. access control matrix Mandatory Requires access control of all subjects and orders under its control on a system wide basis E.g. multilevel security, all subjects and objects in the system are assigned a sensitivity label. The labels are used as the basis for mandatory access control decisions. Security Models[1]

8 Security Issues in Distributed Systems[1] Interoperability and Transparency Gives rise to security issues Approaches to Implementing New Services Add an additional layer of software that runs on top of the existing system to provide the new services Redesign the system so that the new services can be executed more efficiently in the kernel mode

9 Client/Server Security A client initiates an access to an object through the kernel Kernel authenticates the client and then invokes the object server Implemented via Interprocess Communication at transport layer Supported by secure host-to-host communications at the network layer and node to node communication at the link layer Secure distributed system consists of communicating security servers using trusted gateway. Security Issues in Distributed Systems[1]

10 Client processes Trusted Secure Kernel Other OS Servers Authentication Server Authorization Server Other Security Servers response request Client/Server Distributed Security Architecture

11 Latest Techniques Majority of information security incidents is perpetrated by insiders i.e. internal computer users constitute the largest threat to the computer systems security[2]. Traditional methods (such as identification and authentication, access restriction, etc.) do not solve this problem Drawbacks; among them are  low ability of internal malicious users detection,  inability to process large amounts of information,  low productivity

12 Agent Approach for Security in Distributed Systems[2] Intelligent Security System for Computers users’ activity monitoring Online and off-line monitoring allowing to detect anomalies and irregularities in user behavior. On-line monitoring is carried in real time, and is used to predict user actions (use neural networks) Off-line monitoring is done after the user has ended his work, and is based on the analysis of statistical information obtained during user's work.

13 Win 98 Linux Free BSD Win 2000 Dbase Controller Agent On-line User Agent On-line User Agent On-line User Agent On-line User Agent Off-line User Agent System Architecture for Agent Based Security in Distributed systems Agent Approach for Security in Distributed Systems[2]

14 GHIDS: Defending Computational Grids Against Misusing of Shared Resources [3] Grid Specific Host Based Intrusion Detection System Design Performance Impact Central Control Leverage Existing Software Configurability Effectiveness Approach/Services Uses Bottleneck Verification (Host)  Detects users that go from user to super user improperly Monitors process creation, modification and destruction (Host) Monitors accessing of critical resources (Host) Grid User ID and Host Level ID stores when Grid services used Architecture Host and Grid level deployment Virtual Kernel Device created Grid Middleware modified Data Analyzer User Interface

15 References 1. Randy Chow, Theodore Jognson. Distributed Operating Systems and Algorithms, Addison-Wesley 1997 2. Agent Approach for Providing Security in Distributed Systems; TCSET'2006, February 28-March 4, 2006, Lviv-Slavsko, Ukraine 3. GHIDS:Defending Computational Grids Against Misusing of Shared Resources”, Feng et all, IEEE 2006 4. lect22.ppt (2003)

16 Thanks!

Download ppt "Fundamentals of Computer Security Geetika Sharma Fall 2008."

Similar presentations

Ads by Google