Examining How The Great Firewall Discovers Hidden Circumvention Servers
|
|
|
- Liliana Shannon Atkins
- 9 years ago
- Views:
Transcription
1 Examining How The Great Firewall Discovers Hidden Circumvention Servers Roya Ensafi, David Fifield, Philipp Winter, Nick Feamster, Nicholas Weaver, and Vern Paxson Oct 29,
2 Circumventing Internet Censorship Using Proxies Web servers Internet 2
3 Circumventing Internet Censorship Using Proxies Not everyone can connect to all web servers Web servers Internet DPI 3
4 Circumventing Internet Censorship Using Proxies Not everyone can connect to all web servers Many use proxy servers to circumvent censorship Proxy server Web servers Internet DPI 4
5 Circumventing Internet Censorship Using Proxies Not everyone can connect to all web servers Many use proxy servers to circumvent censorship Governments are getting smarter at detecting proxy servers Proxy server Web servers Internet DPI 5
6 Circumventing Internet Censorship Using Proxies Not everyone can connect to all web servers Many use proxy servers to circumvent censorship Governments are getting smarter at detecting proxy servers How do governments find these proxies? Proxy server Web servers Internet DPI 6
7 How GFW Discovers Hidden Circumvention Servers We focus on the GFW and Tor GFW is a sophisticated censorship system Tor has a long history of being used for circumventing government censorship 7
8 Censorship Arms Race: GFW vs. Tor Time Use public Tor network to circumvent GFW 8
9 Censorship Arms Race: GFW vs. Tor Use public Tor network to circumvent GFW Time Download consensus and block relays 9
10 Censorship Arms Race: GFW vs. Tor Use public Tor network to circumvent GFW Time Download consensus and block relays Introduce private bridges, whose distribution is rate-limited 10
11 Censorship Arms Race: GFW vs. Tor Use public Tor network to circumvent GFW Time Download consensus and block relays Introduce private bridges, whose distribution is rate-limited Use DPI to detect Tor TLS handshake 11
12 Fingerprinting the Tor TLS Handshake TLS handshake is unencrypted and leaks information Tor s use of TLS has some peculiarities X.509 certificate life times Cipher suites Randomly generated server name indication (e.g., com) GFW looks (at least) for cipher suites in the TLS client hello 12
13 Censorship Arms Race: GFW vs. Tor Use public Tor network to circumvent GFW Time Download consensus and block relays Introduce private bridges, whose distribution is rate-limited Use DPI to detect Tor TLS handshake Introduce pluggable transports to hide the handshake such as obfs2, obfs3 13
14 Tor Pluggable Transport Pluggable transports are drop-in modules for traffic obfuscation Many modules have been written, but we focus on obfs2 (First deployed module) First 20 bytes can be used to detect Tor traffic with high confidence. obfs3 (obfs2 s successor) Makes Tor traffic look like a uniformly random byte stream 14
15 Censorship Arms Race: GFW vs. Tor Use public Tor network to Detection of pluggable transports is uncertain circumvent GFW Time Download consensus and block relays Implies false positives collateral damage Introduce private bridges, whose distribution is rate-limited Use DPI to detect Tor TLS handshake, then probe and block bridges Introduce pluggable transports to hide the handshake such as obfs2, obfs3 15
16 Censorship Arms Race: GFW vs. Tor Use public Tor network to Detection of pluggable transports is uncertain circumvent GFW Time Download consensus and block relays Implies false positives collateral damage Introduce private bridges, whose GFW added active probing distribution is rate-limited to complement the DPI fingerprinting Use DPI to detect Tor TLS handshake, then probe and block bridges Introduce pluggable transports to hide the handshake such as obfs2, obfs3 16
17 How does GFW Block Tor Hidden Circumvention Servers? 1. Network monitoring (e.g., switch mirror port) 2. DPI for suspicious traffic (e.g., cipher suite) 3. Actively probing server to verify suspicion 4. Blocking server 17
18 Censorship Arms Race: GFW vs. Tor Use public Tor network to circumvent GFW Time Download consensus and block relays Introduce private bridges, whose distribution is rate-limited Use DPI to detect Tor TLS handshake Introduce pluggable transports to hide the handshake such as obfs2, obfs3 Use DPI + Active probing 18
19 Many Questions about Active Probing are Unanswered! Only two blog posts and Winter s FOCI 12 paper We lack a comprehensive picture of more complicated questions We want to know: Implementation, i.e., how does it block? Architecture, i.e., how is a system added to China s backbone? Policy, i.e., what kind of protocols does it block? Effectiveness, i.e., what s the degree of success at discovering Tor bridges? 19
20 Overview of Our Datasets: Shadow Infrastructure EC2-Vanilla EC2-Obfs2 EC2-Obfs3 EC2-Vanilla EC2-Obfs2 EC2-Obfs3 Amazon AWS CERNET Network Unicom ISP Clients in China 20
21 Overview of Our Datasets: Sybil Infrastructure Shadow Infrastructure EC2-Vanilla EC2-Obfs2 EC2-Obfs3 EC2-Vanilla EC2-Obfs2 EC2-Obfs3 Amazon AWS.. CERNET Network Vanilla Tor Client in China Forwarding 600 ports to Tor port Unicom ISP Clients in China 21
22 Overview of Our Datasets: Sybil Infrastructure Shadow Infrastructure EC2-Vanilla EC2-Obfs2 EC2-Obfs3 EC2-Vanilla EC2-Obfs2 EC2-Obfs3 Amazon AWS.. CERNET Network Vanilla Tor Client in China Forwarding 600 ports to Tor port Unicom ISP Clients in China Server Log Analysis Application logs of a web server that also runs a Tor bridge since
23 Overview of Our Datasets: For the Shadow and the Sybil datasets: We had pcap files of both the clients and the bridges. For the Log dataset, we only had application logs. Dataset Time span Shadow Dec Feb 2015 (3 months) Sybil Jan 29, Jan 30, 2015 (20 hours) Log Jan Aug 2015 (5 years) 23
24 How to Distinguish Probers from Genuine Clients? 24
25 How to Distinguish Probers from Genuine Clients? Detecting probers in Sybil dataset is easy, all the probers: Visited our vanilla Tor bridge after our client established connections Originated from China 25
26 How to Distinguish Probers from Genuine Clients? Detecting probers in Sybil dataset is easy, all the probers: Visited our vanilla Tor bridge after our client established connections Originated from China For the other datasets, we adopt an algorithm: If the cipher suites is in the TLS client hello => Vanilla bridge probes If the first 20 bytes can reveal Obfs2 => Obfs2 bridges probers... 26
27 How Many Unique Probers did We Find? 27
28 How Many Unique Probers did We Find? Using Sybil, Shadow and Log dataset In total, we collected 16,083 unique prober IP addresses Shadow IP: GFW s famous Log (3 months) 20 14,802 1,090 (22 hours) (Over 5 years) 89 Sybil 28
29 Can We Fingerprint Active Probers? 29
30 Can We Fingerprint Active Probers? TCP layer TSval slope: timestamp clock rate TSval intercept: (rough) system uptime GFW likely operate a handful of physical probing systems Shadow exp. with 158 Prober IPs Sybil exp. with 1,182 Prober IPs Log dataset with 14,912 Prober IPs 30
31 Can We Fingerprint Active Probers? TCP layer Striking pattern in initial sequence numbers (derived from time) of 1,182 probes Shared pattern in TSval for all three datasets Initial sequence number 31
32 What do These Patterns Mean? Active probing connections leak shared state ISNs, TSval, source ports,... GFW likely operates only few physical systems Thousands of IP addresses are controlled by central source 32
33 How Quickly do Active Probes Show Up? 33
34 How Quickly do Active Probes Show Up? Sybil dataset shows that system now works in real time Median delay between Tor connection and subsequent probing connection is ~500ms 1,182 distinct probes showed up in 22 hours 34
35 Is Active Probing Successful? 35
36 Is Active Probing Successful? 36
37 Is Active Probing Successful? Tor clients succeed in connecting roughly every 25 hours Might reflect implementation artifact of GFW 37
38 Is Active Probing Successful? Tor clients succeed in connecting roughly every 25 hours Might reflect implementation artifact of GFW obfs2 and obfs3 (~98%) were almost always reachable for clients Surprising because GFW can probe and block obfs2 and obfs3 38
39 Takeaway messages Our results show that the active probing system Makes use of a large amount of IP addresses, clearly centrally controlled We can not just blacklist probers IP addresses Operates in real time Probes Vanilla, Obfs2, and Obfs3 Bridge Tor s pluggable transports led to GFW s pluggable censorship 39
40 Q&A Project page: Log and Sybil data sets are available online Contact: 40
41 What Is the Characteristic of the Probing System? Sensor responsible for triggering probes operates single-sidedly: SYN, followed by ACK, then Tor s TLS client hello) => trigger probe. The sensor does not seem to robustly reassemble TCP: The fragmented data did not trigger an active probe, which differs from the GFW Traceroute to the sensors suggested: Unicom s sensor appears to operate on the same link as the GFW CERNET sensor appears one hop closer to our server 41
How the Great Firewall discovers hidden circumvention servers. Roya Ensafi David Fifield Philipp Winter Nick Weaver Nick Feamster Vern Paxson
How the Great Firewall discovers hidden circumvention servers Roya Ensafi David Fifield Philipp Winter Nick Weaver Nick Feamster Vern Paxson Much already known about GFW Numerous research papers and blog
The Great Firewall of China
The Great Firewall of China How It Blocks Tor and Why It Is Hard to Pinpoint Philipp Winter and Jedidiah R. Crandall Philipp Winter is a PhD student in the PriSec group at Karlstad University in Sweden.
Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
(SHREL) Open Source Multi-Hop Networks (SHREL) Tor
TOP SECRETHSPREL TO USAyVEY (C//REL) Types of TAT Advanced Open Source Multi-Hop (SHREL) Open Source Multi-Hop Networks (SHREL) Tor (SHREL) Very widely used worldwide (SHREL) Open Source (S/REL) Active
Network Security TCP/IP Refresher
Network Security TCP/IP Refresher What you (at least) need to know about networking! Dr. David Barrera Network Security HS 2014 Outline Network Reference Models Local Area Networks Internet Protocol (IP)
Chapter 15. Firewalls, IDS and IPS
Chapter 15 Firewalls, IDS and IPS Basic Firewall Operation The firewall is a border firewall. It sits at the boundary between the corporate site and the external Internet. A firewall examines each packet
Time has something to tell us about Network Address Translation
Time has something to tell us about Network Address Translation Elie Bursztein Abstract In this paper we introduce a new technique to count the number of hosts behind a NAT. This technique based on TCP
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
SSL/TLS. What Layer? History. SSL vs. IPsec. SSL Architecture. SSL Architecture. IT443 Network Security Administration Instructor: Bo Sheng
What Layer? /TLS IT443 Network Security Administration Instructor: Bo Sheng Application TCP IPSec IP LAN layer Application TCP IP LAN layer 1 2 History v2 proposed and deployed in Netscape 1.1 (1995) PCT
Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
Bit Chat: A Peer-to-Peer Instant Messenger
Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare [email protected] https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one
Protocol Rollback and Network Security
CSE 484 / CSE M 584 (Spring 2012) Protocol Rollback and Network Security Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee,
Firewall Testing Methodology W H I T E P A P E R
Firewall ing W H I T E P A P E R Introduction With the deployment of application-aware firewalls, UTMs, and DPI engines, the network is becoming more intelligent at the application level With this awareness
TLS and SRTP for Skype Connect. Technical Datasheet
TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security
CIT 380: Securing Computer Systems
CIT 380: Securing Computer Systems Scanning CIT 380: Securing Computer Systems Slide #1 Topics 1. Port Scanning 2. Stealth Scanning 3. Version Identification 4. OS Fingerprinting 5. Vulnerability Scanning
ZMap. Fast Internet-Wide Scanning and its Security Applications. Zakir Durumeric Eric Wustrow J. Alex Halderman. University of Michigan
ZMap Fast Internet-Wide Scanning and its Security Applications Zakir Durumeric Eric Wustrow J. Alex Halderman University of Michigan Internet-Wide Network Studies Previous research has shown promise of
WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems
WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for
Overview of SSL. Outline. CSC/ECE 574 Computer and Network Security. Reminder: What Layer? Protocols. SSL Architecture
OS Appl. CSC/ECE 574 Computer and Network Security Outline I. Overview II. The Record Protocol III. The Handshake and Other Protocols Topic 8.3 /TLS 1 2 Reminder: What Layer? Overview of 3 4 Protocols
Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)
Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Signature based IDS systems use these fingerprints to verify that an attack is taking place. The problem with this method
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Solution of Exercise Sheet 5
Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????
Slitheen: Perfectly imitated decoy routing through traffic replacement
Slitheen: Perfectly imitated decoy routing through traffic replacement Cecylia Bocovich University of Waterloo [email protected] Ian Goldberg University of Waterloo [email protected] ABSTRACT As the
Remote Network Analysis
Remote Network Analysis Torsten Hoefler [email protected] (DMZ), mostly between two packet filters and application gateways. The different possibilities to connect DMZ-hosts are also shown in Figure
Firewalls, IDS and IPS
Session 9 Firewalls, IDS and IPS Prepared By: Dr. Mohamed Abd-Eldayem Ref.: Corporate Computer and Network Security By: Raymond Panko Basic Firewall Operation 2. Internet Border Firewall 1. Internet (Not
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
Communication Security for Applications
Communication Security for Applications Antonio Carzaniga Faculty of Informatics University of Lugano March 10, 2008 c 2008 Antonio Carzaniga 1 Intro to distributed computing: -server computing Transport-layer
Improving DNS performance using Stateless TCP in FreeBSD 9
Improving DNS performance using Stateless TCP in FreeBSD 9 David Hayes, Mattia Rossi, Grenville Armitage Centre for Advanced Internet Architectures, Technical Report 101022A Swinburne University of Technology
TCP Packet Tracing Part 1
TCP Packet Tracing Part 1 Robert L Boretti Jr ([email protected]) Marvin Knight ([email protected]) Advisory Software Engineers 24 May 2011 Agenda Main Focus - TCP Packet Tracing What is TCP - general description
Using SYN Flood Protection in SonicOS Enhanced
SonicOS Using SYN Flood Protection in SonicOS Enhanced Introduction This TechNote will describe SYN Flood protection can be activated on SonicWALL security appliance to protect internal networks. It will
How to launch and defend against a DDoS
How to launch and defend against a DDoS John Graham-Cumming October 9, 2013 The simplest way to a safer, faster and smarter website DDoSing web sites is... easy Motivated groups of non-technical individuals
Intrusion Detection Systems
Intrusion Detection Systems Advanced Computer Networks 2007 Reinhard Wallner [email protected] Outline Introduction Types of IDS How works an IDS Attacks to IDS Intrusion Prevention Systems
Course Title: Penetration Testing: Security Analysis
Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced
SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane
SE 4C03 Winter 2005 Firewall Design Principles By: Kirk Crane Firewall Design Principles By: Kirk Crane 9810533 Introduction Every network has a security policy that will specify what traffic is allowed
Final exam review, Fall 2005 FSU (CIS-5357) Network Security
Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection
Internet Infrastructure Measurement: Challenges and Tools
Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with
SSL DOES NOT MEAN SOL What if you don t have the server keys?
SSL DOES NOT MEAN SOL What if you don t have the server keys? J. Scott Haugdahl Architect, Blue Cross Blue Shield MN Robert Bullen Systems Engineer, Blue Cross Blue Shield MN Setting Expectations This
Covert Channels. Some instances of use: Hotels that block specific ports Countries that block some access
Covert Channels Covert Channels Tunnels that are used to bypass filters and intrusion detection systems Use traffic that is thought to be something else (i.e. DNS tunnels) Can also provide encryption (i.e.
The Internet of Unpatched Things
The Internet of Unpatched Things Sarthak Grover and Nick Feamster Princeton University PrivacyCon 16 Current State of Consumer Smart Devices Many different manufacturers, small startups, novice programmers
The Secure Sockets Layer (SSL)
Due to the fact that nearly all businesses have websites (as well as government agencies and individuals) a large enthusiasm exists for setting up facilities on the Web for electronic commerce. Of course
THE ROLE OF IDS & ADS IN NETWORK SECURITY
THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker
Security Technology White Paper
Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
Format-Transforming Encryption
Protocol Misidentification Made Easy with Format-Transforming Encryption Kevin Dyer, Portland State University (did most of the hard work) Scott Coull, RedJack Thomas Ristenpart, University of Wisconsin-Madison
Understanding and Circumventing The Great Firewall of China
Understanding and Circumventing The Great Firewall of China Lisa Fan Mentor: Ming Chow 12/12/15 Abstract The Great Firewall of China is nowadays almost as famous as the country s original Great Wall. However,
The Challenges of Stopping Illegal Peer-to-Peer File Sharing
The Challenges of Stopping Illegal Peer-to-Peer File Sharing Kevin Bauer Dirk Grunwald Douglas Sicker Department of Computer Science University of Colorado Context: The Rise of Peer-to-Peer 1993-2000:
Supporting Document Mandatory Technical Document. Evaluation Activities for Stateful Traffic Filter Firewalls cpp. February-2015. Version 1.
Supporting Document Mandatory Technical Document Evaluation Activities for Stateful Traffic Filter Firewalls cpp February-2015 Version 1.0 CCDB-2015-01-002 Foreword This is a supporting document, intended
12. Firewalls Content
Content 1 / 17 12.1 Definition 12.2 Packet Filtering & Proxy Servers 12.3 Architectures - Dual-Homed Host Firewall 12.4 Architectures - Screened Host Firewall 12.5 Architectures - Screened Subnet Firewall
CYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
Web Security Considerations
CEN 448 Security and Internet Protocols Chapter 17 Web Security Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
Spirent Abacus. SIP over TLS Test 编 号 版 本 修 改 时 间 说 明
Spirent Abacus SIP over TLS Test 编 号 版 本 修 改 时 间 说 明 1 1. TLS Interview (Transport Layer Security Protocol) (1) TLS Feature Introduction: 1. TLS is a successor of Secure Sockets Layer (SSL), a cryptographic
Honeyd Detection via Packet Fragmentation
Honeyd Detection via Packet Fragmentation Jon Oberheide and Manish Karir Networking Research and Development Merit Network Inc. 1000 Oakbrook Drive Ann Arbor, MI 48104 {jonojono,mkarir}@merit.edu Abstract
Sage ERP Accpac Online
Sage ERP Accpac Online Mac Resource Guide Thank you for choosing Sage ERP Accpac Online. This Resource Guide will provide important information and instructions on how you can get started using your Mac
Sage 300 ERP Online. Mac Resource Guide. (Formerly Sage ERP Accpac Online) Updated June 1, 2012. Page 1
Sage 300 ERP Online (Formerly Sage ERP Accpac Online) Mac Resource Guide Updated June 1, 2012 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Getting Started with Sage 300 ERP Online using a Mac....
Network Packet Monitoring Optimizations Powered By SDN
We're going to be able to ask our computers to monitor things for us, and when certain conditions happen, the computers will take certain actions and inform us after the fact. ~ Steve Jobs Network Packet
An apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
Traffic Analysis. CSF: Forensics Cyber-Security. Part II.B. Techniques and Tools: Network Forensics. Fall 2015 Nuno Santos
Traffic Analysis Part II.B. Techniques and Tools: Network Forensics CSF: Forensics Cyber-Security Fall 2015 Nuno Santos Summary } Packet and flow analysis } Network intrusion detection } NetFlow investigations
Project X Mass interception of encrypted connections
Project X Mass interception of encrypted connections What? SSL/TLS interception TOR interception ...a thorny path Common Issues Public Key Pinning avoids rogue CA to sign certs Common Issues Google and
Intrusion Detection System
Intrusion Detection System Time Machine Dynamic Application Detection 1 NIDS: two generic problems Attack identified But what happened in the past??? Application identification Only by port number! Yet
20. Switched Local Area Networks
20. Switched Local Area Networks n Addressing in LANs (ARP) n Spanning tree algorithm n Forwarding in switched Ethernet LANs n Virtual LANs n Layer 3 switching n Datacenter networks John DeHart Based on
The Internet. An Engineering Approach to Computer Networking
The Internet An Engineering Approach to Computer Networking My how you ve grown! The Internet has doubled in size every year since 1969 In 1996, 10 million computers joined the Internet By July 1997, 10
Internet Firewall CSIS 3230. Internet Firewall. Spring 2012 CSIS 4222. net13 1. Firewalls. Stateless Packet Filtering
Internet Firewall CSIS 3230 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 8.8: Packet filtering, firewalls, intrusion detection Ch
Detecting Forged TCP Reset Packets
Detecting Forged TCP Reset Packets Nicholas Weaver Robin Sommer Vern Paxson Acknowledgements Special thanks to those who ran our detector at their institutions: Angelos Keromytis and Gabriela Cretu at
Low-Level TLS Hacking
Low-Level TLS Hacking Presented by Richard J. Moore E: [email protected] Presentation Outline An introduction to SSL/TLS Using pytls to create and decode TLS messages Fingerprinting TLS servers Fingerprinting
Barracuda Intrusion Detection and Prevention System
Providing complete and comprehensive real-time network protection Today s networks are constantly under attack by an ever growing number of emerging exploits and attackers using advanced evasion techniques
Firewall Design Principles
Firewall Design Principles Software Engineering 4C03 Dr. Krishnan Stephen Woodall, April 6 th, 2004 Firewall Design Principles Stephen Woodall Introduction A network security domain is a contiguous region
We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall
Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,
Three attacks in SSL protocol and their solutions
Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland [email protected] Abstract Secure Socket Layer (SSL) and Transport Layer
3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Network Layer: IPSec Transport Layer: SSL/TLS Chapter 4: Security on the Application Layer Chapter 5: Security
Demystifying the Myth of Passive Network Discovery and Monitoring Systems
Demystifying the Myth of Passive Network Discovery and Monitoring Systems Ofir Arkin Chief Technology Officer Insightix Copyright 2012 - All Rights Reserved. This material is proprietary of Insightix.
Networks: IP and TCP. Internet Protocol
Networks: IP and TCP 11/1/2010 Networks: IP and TCP 1 Internet Protocol Connectionless Each packet is transported independently from other packets Unreliable Delivery on a best effort basis No acknowledgments
CS 3251: Computer Networking 1 Security Protocols I
Georgia Tech CS 3251: Computer Networking 1 Security Protocols I Brad Reaves, PhD Student 11/21/13 (slides from Prof. Patrick Traynor) CS 3251 - Computer Networks I Last Time Trying to prove who you are
Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application Layer Chapter 5: Security Concepts for Networks Firewalls Intrusion Detection
SSL EXPLAINED SSL EXPLAINED
1 Table of Contents Introduction... 3 What is SSL?... 4 How does SSL work?... 7 Google & SSL... 11 SSL/TLS... 13 Web Filtering SSL... 14 About Lightspeed Systems... 26 2 Introduction SSL is a challenge
Internet Management and Measurements Measurements
Internet Management and Measurements Measurements Ramin Sadre, Aiko Pras Design and Analysis of Communication Systems Group University of Twente, 2010 Measurements What is being measured? Why do you measure?
V-ISA Reputation Mechanism, Enabling Precise Defense against New DDoS Attacks
Enabling Precise Defense against New DDoS Attacks 1 Key Points: DDoS attacks are more prone to targeting the application layer. Traditional attack detection and defensive measures fail to defend against
Network Security and Penetration Testing
CORK INSTITUTE OF TECHNOLOGY INSTITIÚID TEICNEOLAÍOCHTA CHORCAÍ Semester 1 Examinations 2012/13 Module Title: Network Security and Penetration Testing Module Code: COMP9006 School: Science & Informatics
Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)
s (March 4, 2015) Abdou Illia Spring 2015 Test your knowledge Which of the following is true about firewalls? a) A firewall is a hardware device b) A firewall is a software program c) s could be hardware
CSC 774 -- Network Security
CSC 774 -- Network Security Topic 6: Transport Layer Security Dr. Peng Ning CSC 774 Network Security 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally developed to secure http Version
FIREWALL AND NAT Lecture 7a
FIREWALL AND NAT Lecture 7a COMPSCI 726 Network Defence and Countermeasures Muhammad Rizwan Asghar August 3, 2015 Source of most of slides: University of Twente FIREWALL An integrated collection of security
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
XPROBE. Building Efficient Network Discovery Tools. Fyodor Yarochkin
XPROBE Building Efficient Network Discovery Tools Fyodor Yarochkin Outline Introduction Some motivating stories: real-life attacks Efficient network mapping with Lazy Scan mode Layer 7 extensions Scripting
CSC 474 Information Systems Security
CSC 474 Information Systems Security Topic 4.5 Transport Layer Security CSC 474 Dr. Peng Ning 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally developed to secure http Version
architecture: what the pieces are and how they fit together names and addresses: what's your name and number?
Communications and networking history and background telephone system local area networks Internet architecture: what the pieces are and how they fit together names and addresses: what's your name and
TLS/SSL in distributed systems. Eugen Babinciuc
TLS/SSL in distributed systems Eugen Babinciuc Contents 1. Introduction to TLS/SSL 2. A quick review of cryptography 3. TLS/SSL in distributed systems 4. Conclusions Introduction to TLS/SSL TLS/SSL History
High Performance VPN Solutions Over Satellite Networks
High Performance VPN Solutions Over Satellite Networks Enhanced Packet Handling Both Accelerates And Encrypts High-Delay Satellite Circuits Characteristics of Satellite Networks? Satellite Networks have
Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik
Network Security Chapter 3 Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: October 21, 2015 IN2101, WS 15/16, Network Security 1 Security Policies and
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop R. David Idol Department of Computer Science University of North Carolina at Chapel Hill [email protected] http://www.cs.unc.edu/~mxrider
CSCI 4250/6250 Fall 2015 Computer and Networks Security
CSCI 4250/6250 Fall 2015 Computer and Networks Security Network Security Goodrich, Chapter 5-6 Tunnels } The contents of TCP packets are not normally encrypted, so if someone is eavesdropping on a TCP
Denial of Service Attacks
2 Denial of Service Attacks : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 13 August 2013 its335y13s2l06, Steve/Courses/2013/s2/its335/lectures/malicious.tex,
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features
UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)
