PA160: Net-Centric Computing II. Network Security
|
|
|
- Bryan Fitzgerald
- 10 years ago
- Views:
Transcription
1 PA160: Net-Centric Computing II. Network Security Luděk Matyska Slides by: Tomáš Rebok Faculty of Informatics Masaryk University Spring 2015 Luděk Matyska (FI MU) 1. Network Security Spring / 125
2 Course Introduction Course Introduction PA160 Course Introduction Luděk Matyska (FI MU) 1. Network Security Spring / 125
3 Course Introduction Course Organization attending the lectures is optional the knowledge acquired during PB156 & PA159 courses is assumed course materials will be published on the course webpage (more or less in time ;-) ) assessment methodology: final exam (written form) course literature: slides, RFCs,... literature being announced in relevant course parts Luděk Matyska (FI MU) 1. Network Security Spring / 125
4 Course Introduction Course Overview the course goal: to provide an advanced insight into the area of computer networks and their applications discussed topics: network security network management and monitoring parallel and distributed applications, grids service-oriented architectures specification and verification of communication protocols network simulators and emulators etc. Luděk Matyska (FI MU) 1. Network Security Spring / 125
5 1. Network Security 1. Network Security 1. Network Security Luděk Matyska (FI MU) 1. Network Security Spring / 125
6 Lecture overview Lecture overview 1 Introduction Motivation Network Security Elements 2 Cryptography Introduction Symmetric Cryptography Asymmetric Cryptography 3 Network Security Mechanisms Entity Authentication Message Confidentiality (Security) Message Integrity Message Authentication Digital Signature Key Management and Distribution 4 Example Protocols Ensuring Network Security in the Internet Application-layer Security Transport-layer Security Network-layer Security Link-layer Security 5 Network & Data Protection Maintaining the Availability Firewalls Intrusion Detection Systems Denial of Service (DoS) & Distributed Denial of Service (DDoS) attacks Virusses & Worms Network & Data Protection Concluding Remarks 6 Conclusion Luděk Matyska (FI MU) 1. Network Security Spring / 125
7 Introduction Lecture overview 1 Introduction Motivation Network Security Elements 2 Cryptography Introduction Symmetric Cryptography Asymmetric Cryptography 3 Network Security Mechanisms Entity Authentication Message Confidentiality (Security) Message Integrity Message Authentication Digital Signature Key Management and Distribution 4 Example Protocols Ensuring Network Security in the Internet Application-layer Security Transport-layer Security Network-layer Security Link-layer Security 5 Network & Data Protection Maintaining the Availability Firewalls Intrusion Detection Systems Denial of Service (DoS) & Distributed Denial of Service (DDoS) attacks Virusses & Worms Network & Data Protection Concluding Remarks 6 Conclusion Luděk Matyska (FI MU) 1. Network Security Spring / 125
8 Introduction Security most of computer science is concerned with achieving desired behavior in some sense, security is concerned with preventing undesired behavior different way of thinking! an enemy/opponent/hacker/adversary may be actively and maliciously trying to circumvent any protective measures one put in place computer vs. network security computer security focuses on security aspects of systems in isolation viruses, secure data storage, OS security, etc. network security focuses on security of data as it is transmitted between networked systems authentication protocols, encryption of transmitted data, firewalls, etc. not always a clear-cut dividing line... Luděk Matyska (FI MU) 1. Network Security Spring / 125
9 Introduction Motivation What can go wrong? when your computer y receives or is waiting for a message m? Luděk Matyska (FI MU) 1. Network Security Spring / 125
10 Introduction Motivation What can go wrong? Message loss adversary A can discard m in its transit Luděk Matyska (FI MU) 1. Network Security Spring / 125
11 Introduction Motivation What can go wrong? Message interception adversary A can get a copy of m when m passes by Luděk Matyska (FI MU) 1. Network Security Spring / 125
12 Introduction Motivation What can go wrong? Message modification adversary A can arbitrarily modify the content of m to become m Luděk Matyska (FI MU) 1. Network Security Spring / 125
13 Introduction Motivation What can go wrong? Message insertion adversary A can arbitrarily fabricate a message m, pretending that m was sent by x Luděk Matyska (FI MU) 1. Network Security Spring / 125
14 Introduction Motivation What can go wrong? Message replay adversary A can replay a message m that has been sent earlier by x and received by y Luděk Matyska (FI MU) 1. Network Security Spring / 125
15 Introduction Motivation What can go wrong? Denial-of-Service attack adversary A can send huge amount of messages to y to block m from arriving at y in the case of botnet attack, the adversary instructs many bots to send messages to y simultaneously Luděk Matyska (FI MU) 1. Network Security Spring / 125
16 Introduction Motivation What is needed? Reliable transmission y wants to receive all messages sent by x to her both x and y want to make sure the message is not tampered with eventually they both want the message not to be overheard by any third party Luděk Matyska (FI MU) 1. Network Security Spring / 125
17 Introduction Motivation What is needed? Sender verification y wants to be able to verify that the message m has been really sent by x Luděk Matyska (FI MU) 1. Network Security Spring / 125
18 Introduction Motivation What is needed? Message non-repudiation x wants to be able to prove to third party z that y has received a message m from x y wants to be able to prove to third party z that x has sent a message m to y Luděk Matyska (FI MU) 1. Network Security Spring / 125
19 Introduction Motivation Network Security Network Security is great... protects messages from interception in their transit provides desired level of privacy for users or data detects and discards messages that had been modified, inserted, or replayed disallows unauthorized access to local system resources and sensitive data... but hard to achieve many layers in network architecture many different media of network connection adversary s location hard to determine new attacks keep emerging cryptographic overhead Luděk Matyska (FI MU) 1. Network Security Spring / 125
20 Introduction Network Security Elements Network Security Basic Elements A secure communication network should provide the following mechanisms/services: AAA Authentication Authorization Accounting + secured communication Confidentiality Integrity Non-repudiation + Availability Luděk Matyska (FI MU) 1. Network Security Spring / 125
21 Introduction Network Security Elements Network Security Basic Elements Authentication Authentication in Czech: autentizace NOT autentikace, autentifikace,... several perspectives: a process verifying that someone is who they claim they are (= entity authentication) a process assuring the recipient that the message is from the source that it claims to be from (= message authentication) requires a determination of the entity s identity several methods for identity determination exist: based on what a user knows a proper pair of username and password/pin based on what a user has a tool which a user owns (USB dongle, smart card, private key, etc.) based on what a user is a user has characteristics, which can be verified (fingerprint, retinal images, etc.) based on what a user can a user is able to answer particular verifying questions Luděk Matyska (FI MU) 1. Network Security Spring / 125
22 Introduction Network Security Elements Network Security Basic Elements Authorization and Accounting Authorization process of granting the user access to specific system resources based on user s profile and the local/global policy controlling the resource access follows the authentication process ensured by access control lists (ACLs) define permissions to perform particular operation or to access particular resources Accounting monitoring the users usage of network services the information can be used for management, planning, billing, or any other purposes Luděk Matyska (FI MU) 1. Network Security Spring / 125
23 Introduction Network Security Elements Network Security Basic Elements Confidentiality, Integrity, and Non-repudiation Confidentiality protects data and information from unauthorized disclosure (sniffers) data during transmission cannot be read by any unauthorized user just the sender and receiver understand the content of the transferred message ensured by message encryption Integrity protects data from unauthorized modification data during transmission cannot be modified or fabricated by any unauthorized user usually based on encryption and hashing algorithms Non-repudiation sender nonrepudiation and receiver nonrepudiation serves the receiver/sender for the purposes of proving origin/delivery of the message neither the sender of a message can deny the transmission of the message nor the receiver of a message is able to deny the reception of the message ensured by digital signatures Luděk Matyska (FI MU) 1. Network Security Spring / 125
24 Introduction Network Security Elements Network Security Basic Elements Availability Availability property of a system, network, or a resource being accessible and usable any time upon demand by an authorized system entity i.e., a system is available if it provides services according to the system design whenever users require them has to be associated with various security services such as services protecting from denial of service (DoS) attacks Luděk Matyska (FI MU) 1. Network Security Spring / 125
25 Cryptography Introduction Lecture overview 1 Introduction Motivation Network Security Elements 2 Cryptography Introduction Symmetric Cryptography Asymmetric Cryptography 3 Network Security Mechanisms Entity Authentication Message Confidentiality (Security) Message Integrity Message Authentication Digital Signature Key Management and Distribution 4 Example Protocols Ensuring Network Security in the Internet Application-layer Security Transport-layer Security Network-layer Security Link-layer Security 5 Network & Data Protection Maintaining the Availability Firewalls Intrusion Detection Systems Denial of Service (DoS) & Distributed Denial of Service (DDoS) attacks Virusses & Worms Network & Data Protection Concluding Remarks 6 Conclusion Luděk Matyska (FI MU) 1. Network Security Spring / 125
26 Cryptography Introduction Cryptography Introduction network security is mostly achieved through the use of Cryptography Cryptography: the science and art of transforming messages to make them secure and immune to attacks basic cryptography mechanisms: symmetric (secret-key) cryptography asymmetric (public-key) cryptography Luděk Matyska (FI MU) 1. Network Security Spring / 125
27 Cryptography Introduction Symmetric Cryptography Symmetric Cryptography the same key is used by both parties for both encryption and decryption advantages: low computational demands suitable for encryption of large messages drawbacks: a necessity to share the secret key ( a mechanism for key distribution is required) can lead to many keys required to be maintained (e.g., many-to-one communication in distributed environment) e.g., DES, 3DES, IDEA, Blowfish, Rivest Cipher 4 (RC4), AES, etc. Luděk Matyska (FI MU) 1. Network Security Spring / 125
28 Cryptography Introduction Symmetric Cryptography Symmetric Cryptography Simple Symmetric Ciphers Character-oriented operate on characters of an alphabet substitution ciphers substitutes one symbol with another monoalphabetic a character/symbol in the plaintext is always changed to the same character/symbol in the ciphertext (e.g., Caesar cipher) polyalphabetic each occurrence of a character can have a different substitute transposition ciphers reorders (permutes) symbols in a block of symbols instead of substitutions, locations of characters change Bit-oriented operate on blocks of bits e.g., XOR cipher, rotation cipher, etc. Luděk Matyska (FI MU) 1. Network Security Spring / 125
29 Cryptography Introduction Symmetric Cryptography Symmetric Cryptography DES (Data Encryption Standard) DES (Data Encryption Standard) designed by IBM and adopted by the U.S. government as the standard encryption method for nonmilitary and nonclassified use the algorithm encrypts a 64-bit plaintext blocks using a 64-bit key in fact, the key is just 56-bits long (every eighth bit is used for parity checking and is ignored) DES has two transposition blocks (so-called P-boxes) and 16 complex round ciphers although the 16 iteration round ciphers are conceptually the same, each uses a different key derived from the original key not considered to be secure any more because of the key length (too short) see details in the animation: research/projects/lemsys/des/despage.jsp Luděk Matyska (FI MU) 1. Network Security Spring / 125
30 Cryptography Introduction Symmetric Cryptography Symmetric Cryptography DES (Data Encryption Standard) Algorithm outline I. Luděk Matyska (FI MU) 1. Network Security Spring / 125
31 Cryptography Introduction Symmetric Cryptography Symmetric Cryptography DES (Data Encryption Standard) Algorithm outline II. (single round) Luděk Matyska (FI MU) 1. Network Security Spring / 125
32 Cryptography Introduction Symmetric Cryptography Symmetric Cryptography Triple DES (3DES) Triple DES (3DES) has been proposed and implemented to lengthen the DES key uses three DES blocks encryption: DES encryption-decryption-encryption decryption: DES decryption-encryption-decryption different variants: 3DES with three keys the size of the key is increased to 168 bits 3DES with two keys (Key 1 = Key 3 ) the size of the key is 112 bits if (Key 1 = Key 2 = Key 3 ) standard DES Luděk Matyska (FI MU) 1. Network Security Spring / 125
33 Cryptography Introduction Symmetric Cryptography Symmetric Cryptography Triple DES (3DES) Luděk Matyska (FI MU) 1. Network Security Spring / 125
34 Cryptography Introduction Symmetric Cryptography Symmetric Cryptography AES (Advanced Encryption Standard) AES (Advanced Encryption Standard) proposed as a reaction to competition for selecting a successor to DES (1997) originally called Rijndael standardized in 2001 three variants: AES-128, AES-192 and AES-256 the number indicates the key length the keysize has no theoretical maximum operates on a 4 4 array of bytes (= 128 bits) AES performs a number of repetitions of transformation rounds that convert the input plaintext into the final output of ciphertext each round consists of several processing steps, including one that depends on the encryption key can be effectively implemented in HW see details in the animation: Luděk Matyska (FI MU) 1. Network Security Spring / 125
35 Cryptography Introduction Symmetric Cryptography Symmetric Cryptography AES (Advanced Encryption Standard) Algorithm outline I. Luděk Matyska (FI MU) 1. Network Security Spring / 125
36 Cryptography Introduction Symmetric Cryptography Symmetric Cryptography AES (Advanced Encryption Standard) Algorithm outline II. (single round) Luděk Matyska (FI MU) 1. Network Security Spring / 125
37 Cryptography Introduction Asymmetric Cryptography Asymmetric Cryptography also known as Public-key Cryptography uses different keys for encryption and decryption both keys are denoted as keypair the public key is used for encryption, while the private key is used for decryption the message encrypted by a public key can be decrypted only by the appropriate private key advantages: no secret key is passed between two communicating parties lowers the risk of its disclosure the public key can be published drawbacks: the speed asymmetric ciphers are suitable for small messages for example, for a symmetric key exchange suffer from the man-in-the-middle attack the public keys have to be provided by a trusted party e.g., RSA, Diffie-Hellman (key exchange), etc. Luděk Matyska (FI MU) 1. Network Security Spring / 125
38 Cryptography Introduction Asymmetric Cryptography Asymmetric Cryptography Illustration Luděk Matyska (FI MU) 1. Network Security Spring / 125
39 Cryptography Introduction Asymmetric Cryptography Asymmetric Cryptography RSA (Rivest, Shamir, and Adleman algorithm) I. RSA (Rivest, Shamir, and Adleman algorithm) the most common and popular public key algorithm RSA gets its security from the difficulty of factoring large numbers uses two (large) numbers, e and d, as the encryption and decryption keys public/private keys generation: choose two random large prime numbers, p and q (ideally of equal length, e.g., 200 digits) compute the product N = p q then randomly choose the encryption key, e (between 1 and N 1), such that e and (p 1)(q 1) are relatively prime then compute the decryption key, d: d = e 1 mod ((p 1)(q 1)) i.e., d e = 1 mod ((p 1)(q 1)) p and q are no longer needed public key: (e, N) private key: (d, N) Luděk Matyska (FI MU) 1. Network Security Spring / 125
40 Cryptography Introduction Asymmetric Cryptography Asymmetric Cryptography RSA (Rivest, Shamir, and Adleman algorithm) II. RSA (Rivest, Shamir, and Adleman algorithm) cont d message encryption to encrypt a message m, it has to be divided into numerical blocks smaller than N each block is then individually encrypted: c = m e mod N message decryption decrypt every block by: m = c d mod N see all the details in the RSA animation: Luděk Matyska (FI MU) 1. Network Security Spring / 125
41 Network Security Mechanisms Lecture overview 1 Introduction Motivation Network Security Elements 2 Cryptography Introduction Symmetric Cryptography Asymmetric Cryptography 3 Network Security Mechanisms Entity Authentication Message Confidentiality (Security) Message Integrity Message Authentication Digital Signature Key Management and Distribution 4 Example Protocols Ensuring Network Security in the Internet Application-layer Security Transport-layer Security Network-layer Security Link-layer Security 5 Network & Data Protection Maintaining the Availability Firewalls Intrusion Detection Systems Denial of Service (DoS) & Distributed Denial of Service (DDoS) attacks Virusses & Worms Network & Data Protection Concluding Remarks 6 Conclusion Luděk Matyska (FI MU) 1. Network Security Spring / 125
42 Network Security Mechanisms Entity Authentication Entity Authentication Passwords Password authentication: the simplest and the oldest method Alice authenticates to Bob by sending a password fixed passwords subjects to several attacks: eavesdropping, stealing a password, accessing a file with passwords, guessing (dictionary attacks), etc. can be (partially) solved by: hashing the passwords hashing salted passwords e.g., PAP (Password Authentication Protocol) transmits unencrypted ASCII passwords (assumes out-of-band control channel) one-time passwords passwords valid just for only one login session new password generated based on previous password new password generated based on a challenge specialized electronic tokens, out-of-band channels (SMS), etc. Luděk Matyska (FI MU) 1. Network Security Spring / 125
43 Network Security Mechanisms Entity Authentication Entity Authentication Challenge-Response Authentication in password authentication, the claimant proves her identity by demonstrating that she knows a secret (the password) however, since the claimant reveals this secret, the secret is susceptible to interception by the adversary in challenge-response authentication, the claimant proves that she knows a secret without revealing it the challenge is a time-varying value (a random number or a timestamp) sent by the verifier the claimant applies a function to the challenge and sends the result (response) to the verifier the response shows that the claimant knows the secret Luděk Matyska (FI MU) 1. Network Security Spring / 125
44 Network Security Mechanisms Entity Authentication Entity Authentication Challenge-Response Authentication Symmetric keys using a nonce Alice asks Bob for sending a nonce (a random number, timestamp, etc.) Alice encrypts the nonce by shared secret key (the password) and sends it back to Bob Luděk Matyska (FI MU) 1. Network Security Spring / 125
45 Network Security Mechanisms Entity Authentication Entity Authentication Challenge-Response Authentication Symmetric keys using a nonce (mutual auth.) same as the previous one, but with the mutual authentication Luděk Matyska (FI MU) 1. Network Security Spring / 125
46 Network Security Mechanisms Entity Authentication Entity Authentication Challenge-Response Authentication Hash functions usage instead of encryption/decryption, one can also use a hash function for entity authentication hash function a one-way function generating a message digest details on hash functions see Message Integrity part e.g., MS CHAP (Challenge-Handshake Authentication Protocol) Luděk Matyska (FI MU) 1. Network Security Spring / 125
47 Network Security Mechanisms Entity Authentication Entity Authentication Asymmetric keys Public key usage instead of symmetric-key ciphers, asymmetric-key ciphers can be also used for entity authentication the secret is the private key of the claimant she must show that she owns the private key related to the public key the nonce can be encrypted either by the claimant s public key Luděk Matyska (FI MU) 1. Network Security Spring / 125
48 Network Security Mechanisms Entity Authentication Entity Authentication Asymmetric keys Private key usage or by her private key (= digital signatures, see later) Luděk Matyska (FI MU) 1. Network Security Spring / 125
49 Network Security Mechanisms Message Confidentiality (Security) Message Confidentiality/Security Data Encryption the transmitted data are usually (especially for the long messages) encrypted using a symmetric cryptography algorithm because of their speed the shared secret key necessary for the encryption can be (prior to the transmission) obtained using: asymmetric cryptography the chosen shared key is encrypted using the public key of the communicating partner and delivered to her Diffie-Hellman algorithm shared key computation Luděk Matyska (FI MU) 1. Network Security Spring / 125
50 Network Security Mechanisms Message Confidentiality (Security) Message Confidentiality/Security Data Encryption Symmetric Cryptography Luděk Matyska (FI MU) 1. Network Security Spring / 125
51 Network Security Mechanisms Message Confidentiality (Security) Message Confidentiality/Security Data Encryption Diffie-Hellman algorithm for session key generation I. G and N are prime numbers, which both parties have to agree on can be freely transmitted through the network the x and y are (private) large numbers chosen by the parties independently on each other the computed K becomes the shared key used for the following symmetric encryption employed principle: (G x mod N) y mod N = (G y mod N) x mod N = G xy mod N Luděk Matyska (FI MU) 1. Network Security Spring / 125
52 Network Security Mechanisms Message Confidentiality (Security) Message Confidentiality/Security Data Encryption Diffie-Hellman algorithm for session key generation II. a weakness suffers from a man-in-the-middle attack can be avoided if Bob and Alice first authenticate each other Luděk Matyska (FI MU) 1. Network Security Spring / 125
53 Network Security Mechanisms Message Integrity Message Integrity Hash functions encryption provides confidentiality, but not integrity sometimes, the message does not need to be hidden (encrypted) the only need is to keep it safe from any tampering to preserve the integrity of a message, the message is passed through a hash function an algorithm that creates a compressed image (fingerprint) of the message so-called a message digest or a modification detection code (MDC) the digest needs to be kept secret Luděk Matyska (FI MU) 1. Network Security Spring / 125
54 Network Security Mechanisms Message Integrity Message Integrity Hash function criteria to be eligible for a hash, a function needs to meet the four criteria: one-wayness a message digest is created by a one-way hashing function it must be impossible to recreate the message from the digest resistance to weak collision ensures that a message cannot easily be forged one cannot easily modify the original message so that the new message hashes exactly to the same digest resistance to strong collision ensures that we cannot find two messages that hash to the same digest called strong because the probability of a collision is higher than in the previous case computation ease it must be easy to compute the hash value for any given message hash function examples: MD5 (broken not secure), SHA-1, SHA-256, SHA-512, etc. Luděk Matyska (FI MU) 1. Network Security Spring / 125
55 Network Security Mechanisms Message Integrity Message Integrity Message integrity check Luděk Matyska (FI MU) 1. Network Security Spring / 125
56 Network Security Mechanisms Message Authentication Message Authentication Message Authentication a process assuring the recipient that the message is from the source that it claims to be from can be provided by: symmetric cryptography keyed hash functions, HMAC asymmetric cryptography digital signature Luděk Matyska (FI MU) 1. Network Security Spring / 125
57 Network Security Mechanisms Message Authentication Message Authentication Symmetric cryptography keyed hash functions are used when creating the digest, such a function includes the symmetric key between the sender and receiver into the computation so-called Message Authentication Code (MAC) is computed besides the message authentication, the message integrity is obviously ensured as well Luděk Matyska (FI MU) 1. Network Security Spring / 125
58 Network Security Mechanisms Message Authentication Message Authentication Symmetric cryptography HMAC instead of keyed hash functions, a keyless hash function can also be used for message authentication = hashed MAC (HMAC) creates a MAC by applying a keyless hash function to the concatenation of the message and a symmetric key i.e., a copy of the symmetric key is prepended to the message and this combination is hashed using a keyless hash function (e.g., SHA-1, SHA-256, etc.) Luděk Matyska (FI MU) 1. Network Security Spring / 125
59 Network Security Mechanisms Digital Signature Digital Signature MAC s/hmac s main drawback: they require a symmetric key to be established between the sender and the receiver Digital Signatures employ asymmetric cryptography to provide message authentication and integrity besides, the message nonrepudiation is also provided Digital Signature a message is signed (= encrypted) using the sender s private key and verified (= decrypted) using the sender s public key can be achieved in two ways: signing the whole document easier, but less efficient (for long messages) signing a digest of the document most commonly used instead of signing the whole document, just the message s digest is signed Luděk Matyska (FI MU) 1. Network Security Spring / 125
60 Network Security Mechanisms Digital Signature Digital Signature Sender s side Luděk Matyska (FI MU) 1. Network Security Spring / 125
61 Network Security Mechanisms Digital Signature Digital Signature Receiver s side Luděk Matyska (FI MU) 1. Network Security Spring / 125
62 Network Security Mechanisms Digital Signature Digital Signature Summary Remember In a cryptosystem (to provide message confidentiality), we use the private and public keys of the receiver; in digital signatures (to provide message authentication/integrity/nonrepudiation), we use the private and public keys of the sender. to combine both, the message is signed at first and later both the message and the signature are encrypted Luděk Matyska (FI MU) 1. Network Security Spring / 125
63 Network Security Mechanisms Key Management and Distribution Key Management and Distribution How secret keys in symmetric-key cryptography and how public keys in asymmetric-key cryptography are distributed and maintained? Symmetric-key Distribution the symmetric key needs to be shared between every two communicating parties if Alice needs to exchange confidential messages with N people she needs to maintain N different keys if N people need to communicate with one another a total of N (N 1)/2 keys is needed (each person needs to maintain N 1 keys; since the keys are shared, we need only N (N 1)/2 keys) moreover, the keys distribution is another problem a trusted party Key Distribution Center (KDC) is needed to reduce the number of keys Luděk Matyska (FI MU) 1. Network Security Spring / 125
64 Network Security Mechanisms Key Management and Distribution Symmetric-key Management and Distribution Key Distribution Center (KDC) I. Key Distribution Center (KDC) each person/entity establishes a shared secret key with the KDC Luděk Matyska (FI MU) 1. Network Security Spring / 125
65 Network Security Mechanisms Key Management and Distribution Symmetric-key Management and Distribution Key Distribution Center (KDC) II. Key Distribution Center (KDC) cont d. the process of sending a confidential message from Alice to Bob may proceed as follows: 1 Alice sends a request to KDC, stating that she needs a session (temporary) secret key between herself and Bob 2 KDC informs Bob of Alice s request 3 If Bob agrees, a session key is created between the two once the communication is terminated, the session key is no longer valid several approaches of creating the session key based on the previous ideas have been proposed e.g., basic approach, Needham-Schroeder protocol, Otway-Rees protocol, etc. for the following three slides, the following holds: K A (K B )... a symmetric key known only to A and S (resp. B and S) R, R A, R B, R 1, R 2... nonces K AB... the symmetric session key example real implementation Kerberos Luděk Matyska (FI MU) 1. Network Security Spring / 125
66 Network Security Mechanisms Key Management and Distribution Symmetric-key Management and Distribution Key Distribution Center (KDC) III. Basic Approach Luděk Matyska (FI MU) 1. Network Security Spring / 125
67 Network Security Mechanisms Key Management and Distribution Symmetric-key Management and Distribution Key Distribution Center (KDC) III. Needham-Schroeder protocol Luděk Matyska (FI MU) 1. Network Security Spring / 125
68 Network Security Mechanisms Key Management and Distribution Symmetric-key Management and Distribution Key Distribution Center (KDC) III. Otway-Rees protocol Luděk Matyska (FI MU) 1. Network Security Spring / 125
69 Network Security Mechanisms Key Management and Distribution Public-key Management and Distribution Public-key Distribution in public-key cryptography, everyone shields a private key and advertises a public key the public-key is freely available Why a public-key distribution mechanism is needed, when the public-keys can be freely announced? to protect the keys from forgery the mechanism: the use of a trusted center Certification Authority Luděk Matyska (FI MU) 1. Network Security Spring / 125
70 Network Security Mechanisms Key Management and Distribution Public-key Management and Distribution Certification Authority (CA) Certification Authority (CA) issues so-called public-key certificates bind an entity (human, server, etc.) with its public key to prevent the certificate itself from being forged, the CA signs the certificate with its private key such a certificate can be freely published and distributed anyone who wants to extract the public key from the certificate uses the CA s public key to extract it when compromised, the previously issued certificates can be revoked example: X.509 certificates supports hierarchical structure to allow the use in the wide Internet (= hierarchical trust model) called Public Key Infrastructure (PKI) Luděk Matyska (FI MU) 1. Network Security Spring / 125
71 Network Security Mechanisms Key Management and Distribution Public-key Management and Distribution X.509 Certificates Luděk Matyska (FI MU) 1. Network Security Spring / 125
72 Network Security Mechanisms Key Management and Distribution One of many definitions: a set of hardware, software, people, policies, and procedures needed to create, manage, store, distribute, and revoke certificates based on public key cryptography each certificate is issued (and signed) only by a single party (= CA) each CA certifies only its children the CA s certificate itself may be signed by a different CA (all the way up to a self-signed root certificate) root certificates must be available to those who use a lower level CA certificate (root certificates are typically widely distributed) Luděk Matyska (FI MU) 1. Network Security Spring / 125 Public-key Management and Distribution Public Key Infrastructure (PKI)
73 Example Protocols Ensuring Network Security in the Internet Lecture overview 1 Introduction Motivation Network Security Elements 2 Cryptography Introduction Symmetric Cryptography Asymmetric Cryptography 3 Network Security Mechanisms Entity Authentication Message Confidentiality (Security) Message Integrity Message Authentication Digital Signature Key Management and Distribution 4 Example Protocols Ensuring Network Security in the Internet Application-layer Security Transport-layer Security Network-layer Security Link-layer Security 5 Network & Data Protection Maintaining the Availability Firewalls Intrusion Detection Systems Denial of Service (DoS) & Distributed Denial of Service (DDoS) attacks Virusses & Worms Network & Data Protection Concluding Remarks 6 Conclusion Luděk Matyska (FI MU) 1. Network Security Spring / 125
74 Example Protocols Ensuring Network Security in the Internet Example Protocols Ensuring Network Security in the Internet all the presented concepts can be realized on: application layer security mechanisms provided by applications (application protocols) themselves e.g., PGP, SET, S/MIME, S-HTTP, etc. transport layer SSL and TLS network layer IPv6 & IPSec (IPv4) link layer e.g., PPP Luděk Matyska (FI MU) 1. Network Security Spring / 125
75 Example Protocols Ensuring Network Security in the Internet Application-layer Security Application-layer Security Pretty Good Privacy (PGP) Pretty Good Privacy (PGP) a de-facto standard proposed by Phil Zimmermann (1991) the mechanism providing secure communication channels originally uses an alternative approach to PKI for distributing user s public keys Web of Trust decentralized trust model identity certificates are digitally signed by other users who, by that act, endorse the association of that public key with the person/entity listed in the certificate leaves the trust decisions in the hands of individual users there are several levels of confidence which can be included in such signatures later versions are able to use PKI as well involves all the basic security mechanisms: confidentiality (using a symmetric one-time key because of performance 3DES, IDEA, etc.) integrity (hash functions MD5, SHA) authentication (asymmetric cryptography RSA) non-repudiation (through the use of PKI) Digital Signatures Luděk Matyska (FI MU) 1. Network Security Spring / 125
76 Example Protocols Ensuring Network Security in the Internet Application-layer Security Figure : The mechanism of signing and encrypting the sending message (sender s side). Luděk Matyska (FI MU) 1. Network Security Spring / 125 Application-layer Security PGP Sender s side
77 Example Protocols Ensuring Network Security in the Internet Application-layer Security Application-layer Security PGP Receiver s side Figure : The mechanism of decrypting and verifying the received message (receiver s side). Luděk Matyska (FI MU) 1. Network Security Spring / 125
78 Example Protocols Ensuring Network Security in the Internet Application-layer Security Application-layer Security Secure Electronic Transactions (SET) I. Secure Electronic Transactions (SET) a specialized cryptographic protocol developed by a group of companies (Visa, Microsoft, IBM, MasterCard, etc.) designed for securing credit card transactions over insecure networks NOT for a general encryption design goals: confidentiality of payment and ordering information integrity of all transmitted data authentication of all card holders ensuring that a merchant can accept card transactions based on buyer s relationship with her financial institution the merchant does not need to know the buyer s identity creating protocols that neither depend on transport security mechanism nor prevent their use Luděk Matyska (FI MU) 1. Network Security Spring / 125
79 Example Protocols Ensuring Network Security in the Internet Application-layer Security Application-layer Security Secure Electronic Transactions (SET) II. Figure : The SET transactions outline. Luděk Matyska (FI MU) 1. Network Security Spring / 125
80 Example Protocols Ensuring Network Security in the Internet Application-layer Security Application-layer Security S/MIME and S-HTTP Secure/Multipurpose Internet Mail Extension (S/MIME) a standard for public key encryption and signing of MIME data MIME Internet standard that extends the format of to support, e.g., text in character sets other than ASCII, non-text attachments (pictures, video, audio, etc.), message bodies with multiple parts, etc. provides authentication, message integrity and non-repudiation of origin (using digital signatures) and privacy and data security (using encryption) Secure-HTTP (S-HTTP) extends the Hypertext Transfer Protocol (HTTP) to support encryptions and digital signatures extends the negotiation between the client browser and the server to include the negotiation for security matters uses additional headers for message encryption, digital certificates, and authentication in the HTTP format the HTTP headers are encapsulated into the S-HTTP headers has been bundled away by the HTTPs (HTTP over SSL/TLS) Luděk Matyska (FI MU) 1. Network Security Spring / 125
81 Example Protocols Ensuring Network Security in the Internet Transport-layer Security Transport-layer Security SSL/TLS I. Secure Sockets Layer (SSL) / Transport Layer Security (TLS) the protocols for ensuring secure communication channels on the transport layer (SSL precedes the TLS) SSL 3.0 TLS 1.0 SSL/TLS provide secure and authenticated data paths between servers and clients: data encryption protect data in transport between the client and the server from interception (making them readable only by the intended recipient) server and client authentication the SSL uses standard public key encryption to authenticate the communicating parties to each other message integrity achieved through the use of session keys so that data cannot be intentionally/unintentionally tampered main drawback: the necessity to adapt the applications (applications protocols) HTTP HTTPS (HTTP Secure) FTP FTPS (FTP Secure) etc. Luděk Matyska (FI MU) 1. Network Security Spring / 125
82 Example Protocols Ensuring Network Security in the Internet Transport-layer Security Transport-layer Security SSL/TLS II. Figure : The SSL protocol stack. Luděk Matyska (FI MU) 1. Network Security Spring / 125
83 Example Protocols Ensuring Network Security in the Internet Transport-layer Security Figure : The SSL handshake (steps 5 and 6 verify the integrity of the handshake; the communication is encrypted using a symmetric (session) key). Luděk Matyska (FI MU) 1. Network Security Spring / 125 Transport-layer Security SSL/TLS III. Before any SSL connection can be established, there must be a handshake performed:
84 Example Protocols Ensuring Network Security in the Internet Network-layer Security Network-layer Security IPv6 & IPSec (IPv4) I. IP Security IPv6 & IPSec (IPv4) a set of protocols providing secured communication channels on the network layer Authentication Header (AH) protocol designed for ensuring sender s and receiver s authentication and communication integrity (NOT for communication confidentiality) Encapsulating Security Payload (ESP) protocol designed for providing sender s authentication, communication integrity and confidentiality can be used independently or in combination establishes logical channels (called Security Associations, SAs) always one-way channels (two channels are needed for duplex communication) identified by: protocol identifier (AH or ESP), source IP address, and channel identification (so-called Security Parameter Index, SPI) operates in 2 modes: Transport mode IPSec header is inserted between IP header and message body Tunnel mode IPSec header is inserted in front of the original IP header; subsequently, a new IP header is created Luděk Matyska (FI MU) 1. Network Security Spring / 125
85 Example Protocols Ensuring Network Security in the Internet Network-layer Security Network-layer Security IPv6 & IPSec (IPv4) II. IP Security IPv6 & IPSec (IPv4) cont d. key distribution: Internet Key Exchange (IKE) used to set up an SA (RFC 4306 for v2) uses X.509 certificates for authentication and Diffie Hellman key exchange to set up a shared session secret Internet Security Association and Key management Protocol (ISAKMP) a framework for authentication and key exchange (RFC 2408) designed to be key exchange independent (IKE or other protocols can be used to provide authenticated keying material) advantages: secures all the data flows between two communicating parties; it is not necessary to adapt applications (application protocols) drawbacks: there are no automated mechanisms for cryptographic keys management further information: see IPv6 section in PA159 see the animation (ongoing BP Thesis will be available in a month): Luděk Matyska (FI MU) 1. Network Security Spring / 125
86 Example Protocols Ensuring Network Security in the Internet Network-layer Security Network-layer Security IPv6 & IPSec (IPv4) III. Transport vs. Tunnel mode Figure : Transport mode. Figure : Tunnel mode. Luděk Matyska (FI MU) 1. Network Security Spring / 125
87 Example Protocols Ensuring Network Security in the Internet Network-layer Security Network-layer Security IPv6 & IPSec (IPv4) IV. Virtual Private Networks (VPNs) I. Virtual Private Network (VPN) a computer network that uses a public telecommunication infrastructure (such as the Internet) to provide remote offices or individual users with secure access to their organization s network using a secure cryptographic method, it encapsulates data transfers between two or more networked devices which are not on the same private network in order to keep the transferred data private the VPN technology provides the following activities: IP encapsulation involves enclosing TCP/IP data packets within another packet with an IP-address of either a firewall or a server that acts as a VPN endpoint various tunneling mechanisms: IPSec ESP tunnel, Point-to-Point Tunneling protocol (PPTP), Layer 2 Tunneling Protocol (L2TP), PPP over SSL and PPP over SSH, etc. Encryption used to obfuscate the contents of the encapsulated data Authentication used to determine whether or not the endpoint can participate in the encrypted tunnel may also be used to exchange the secret or public key used for payload encryption Luděk Matyska (FI MU) 1. Network Security Spring / 125
88 Example Protocols Ensuring Network Security in the Internet Network-layer Security Network-layer Security IPv6 & IPSec (IPv4) IV. Virtual Private Networks (VPNs) II. Luděk Matyska (FI MU) 1. Network Security Spring / 125
89 Example Protocols Ensuring Network Security in the Internet Link-layer Security Link-layer Security Point-to-Point Protocol (PPP) Point-to-Point Protocol (PPP) a data link protocol commonly used in establishing a direct connection between two networking nodes limited to a single data link provides connection authentication, transmission encryption (confidentiality), and compression several authentication protocols can be used (PAP, CHAP, EAP, etc.) transmission encryption DES or 3DES most commonly used forms: Point-to-Point Protocol over ATM (PPPoA) Point-to-Point Protocol over Ethernet (PPPoE) both serve to establish a DSL line connection with an ISP Luděk Matyska (FI MU) 1. Network Security Spring / 125
90 Network & Data Protection Maintaining the Availability Lecture overview 1 Introduction Motivation Network Security Elements 2 Cryptography Introduction Symmetric Cryptography Asymmetric Cryptography 3 Network Security Mechanisms Entity Authentication Message Confidentiality (Security) Message Integrity Message Authentication Digital Signature Key Management and Distribution 4 Example Protocols Ensuring Network Security in the Internet Application-layer Security Transport-layer Security Network-layer Security Link-layer Security 5 Network & Data Protection Maintaining the Availability Firewalls Intrusion Detection Systems Denial of Service (DoS) & Distributed Denial of Service (DDoS) attacks Virusses & Worms Network & Data Protection Concluding Remarks 6 Conclusion Luděk Matyska (FI MU) 1. Network Security Spring / 125
91 Network & Data Protection Maintaining the Availability Network&Data Protection Maintaining the Availability I. all the previous security mechanisms cannot prevent Eve from sending a harmful message to a system network & data protection a complicated problem without a simple solution authentication and encryption mechanisms are just technical fundamentals organizational and social aspects are needed humans (users) are usually the weakest elements social engineering possible threats: accessing private data modification of private or public data including their removal (e.g., web pages) undesired interferences to the network traffic/operation including services denial (so-called Denial of Service attacks) Luděk Matyska (FI MU) 1. Network Security Spring / 125
92 Network & Data Protection Maintaining the Availability Network&Data Protection Maintaining the Availability I. A bit of History Luděk Matyska (FI MU) 1. Network Security Spring / 125
93 Network & Data Protection Maintaining the Availability Network&Data Protection Maintaining the Availability II. Attack/Intrusion a deliberate unauthorized attempt, successful or not, to break into, access, manipulate, or misuse some valuable property and where the misuse may result into or render the property unreliable or unusable The attack/intrusion process consists of few stages: Reconnaissance the process of gathering information about the target system and the details of its workings and weak points a scanning program sends network traffic to all/selected computers and expects receiving return traffic that will indicate whether those computers have known vulnerabilities Physical Intrusion to acquire/modify private information, and/or Denial of Service to crash a service (or a machine), overload network links or machines CPU, fill up a disk, etc. Luděk Matyska (FI MU) 1. Network Security Spring / 125
94 Network & Data Protection Maintaining the Availability Network&Data Protection Maintaining the Availability III. The protection from exploits has to be implemented on: physical level access protection software level authentication encryption traffic monitoring and instant reaction to incidents juridical level a definition of desired and undesired behaviour The basic security mechanisms for network protection: Firewalls Intrusion Detection Systems Antiviruses Luděk Matyska (FI MU) 1. Network Security Spring / 125
95 Network & Data Protection Maintaining the Availability Firewalls Firewalls I. Firewall a primary mean of securing a private network against penetration firewall = a hardware, software, or a combination of both that monitors and filters traffic packets that attempt to either enter or leave a protected private network i.e., interconnects networks with different trust creates a perimeter defense designed to protect information resources of an organization Luděk Matyska (FI MU) 1. Network Security Spring / 125
96 Network & Data Protection Maintaining the Availability Firewalls Firewalls II. What a firewall can do... implement security policies ( network access protection) at a single point only authorized traffic is allowed to access the network/services (or leave the network) monitor security-related events (audit, log) alarms for abnormal behavior can be implemented Luděk Matyska (FI MU) 1. Network Security Spring / 125
97 Network & Data Protection Maintaining the Availability Firewalls Firewalls III. and what a firewall cannot do... protect against attacks that bypass the firewall e.g., dial-out from internal host to an ISP protect against internal threats disgruntled employee an insider cooperates with an external attacker protect against the transfer of virus-infected programs or files not including application gateways, which may be able to do so Luděk Matyska (FI MU) 1. Network Security Spring / 125
98 Network & Data Protection Maintaining the Availability Firewalls Firewalls IV. Firewalls Classification Basic firewalls classification: Packet filtering firewalls operate on network layer Circuit level gateways operate on session/transport layer Application gateways (or proxy servers) operate on application layer Dynamic packet filtering firewalls (or Session filtering firewalls) a combination of the three above these technologies operate at different levels of detail, providing varying degrees of network access protection Luděk Matyska (FI MU) 1. Network Security Spring / 125
99 Network & Data Protection Maintaining the Availability Firewalls Firewalls V. Packet Filtering firewalls Packet Filtering firewalls decisions are made on per-packet basis no state information is maintained applies packet filters based on access rules defined by the following parameters: source address destination address application or protocol/next header (TCP, UDP, etc.) source port number destination port number advantages: simple, low cost, fast, transparent to users disadvantages: cannot prevent attacks that employ application-specific vulnerabilities or functions because they do not examine upper-layer data Luděk Matyska (FI MU) 1. Network Security Spring / 125
100 Network & Data Protection Maintaining the Availability Firewalls Firewalls V. Dynamic Packet Filtering (Session Filtering) firewalls I. Dynamic Packet Filtering (Session Filtering) firewalls traditional packet filters do not examine higher layer context i.e., matching the incoming (returned) packets with an outgoing flow dynamic packet filtering examines and maintains a context of each packet they keep track of client-server connection a connection table (so-called State table) is maintained packet decision is made in the context of a connection if a packet establishes a new connection, it is checked against a policy if a packet is a part of an existing connection, it is matched up in the state table advantages: transparent to users low CPU overheads for all the packets (except the first one) belonging to the same connection, no policy database lookups are performed Luděk Matyska (FI MU) 1. Network Security Spring / 125
101 Network & Data Protection Maintaining the Availability Firewalls Firewalls V. Dynamic Packet Filtering (Session Filtering) firewalls II. Luděk Matyska (FI MU) 1. Network Security Spring / 125
102 Network & Data Protection Maintaining the Availability Firewalls Firewalls V. Circuit Level Gateways I. Circuit Level Gateways work at the session layer of the ISO/OSI model (TCP layer of the TCP/IP model) monitor TCP handshaking between packets to determine whether a requested session is legitimate do not permit an end-to-end TCP connection rather, the gateway sets up two TCP connections one between itself and a TCP user on an inner host, and one between itself and a TCP user on an outside host once the two connections are established, the gateway typically relays TCP segments from one to the other without examining the contents usage example: hiding information about internal/protected networks non-requested data from outside the firewall is not allowed in all ports are closed until the firewall opens them e.g., requests from protected network pass through the gateway, which intercept and record them once the answer reaches the gateway, it is compared to the original request to see if the IP address and the port match up Luděk Matyska (FI MU) 1. Network Security Spring / 125
103 Network & Data Protection Maintaining the Availability Firewalls Firewalls V. Circuit Level Gateways II. Circuit Level Gateways cont d. a combination of circuit-level gateway with Internet sharing = Network Address Translation (NAT) originally a reaction to IPv4 address exhaustion but the NAT is not a firewall on itself! Luděk Matyska (FI MU) 1. Network Security Spring / 125
104 Network & Data Protection Maintaining the Availability Firewalls Firewalls V. Circuit Level Gateways III. Luděk Matyska (FI MU) 1. Network Security Spring / 125
105 Network & Data Protection Maintaining the Availability Firewalls Firewalls V. Application Gateways I. Application Gateways similar to circuit-level gateways except that they are application specific i.e., tailored to a specific application program every connection between two networks is made via an application program called a proxy proxies are application/protocol specific they investigate the content of the passing flows connection state is maintained and updated only protocols that have specific proxies configured are allowed through the firewall (all other traffic is rejected) e.g., a gateway that is configured to be a web proxy will not allow any FTP, telnet or other traffic through Luděk Matyska (FI MU) 1. Network Security Spring / 125
106 Network & Data Protection Maintaining the Availability Firewalls Firewalls V. Application Gateways II. Application Gateways cont d. usage example: HTTP proxies (URL blocking), SMTP proxies (virus scanning, spam identification), DNS proxies, etc. advantages: more secure than packet filtering firewalls can investigate the content of the flows can protect against protocol errors it is easy to log and audit all incoming/outgoing traffic disadvantages: very CPU intensive lower performance require high performance host computer more vulnerable to DoS attacks (see later) problematic for encrypted data (including IPSec) Luděk Matyska (FI MU) 1. Network Security Spring / 125
107 Network & Data Protection Maintaining the Availability Firewalls Firewalls VI. Concluding Remarks firewalls cannot serve as a panacea to network security threats many security attacks led from within the internal (not protected) network increase the risk of rapid infection spread false safety feeling the internal network is not usually sufficiently protected users become lazy usually cause a slowdown on high-speed networks their functionality is very useful for interrupting the ongoing attack application proxies: risk of faults (e.g., false virus detection) the importance of privacy protection Luděk Matyska (FI MU) 1. Network Security Spring / 125
108 Network & Data Protection Maintaining the Availability Intrusion Detection Systems Intrusion Detection Systems (IDS) I. network perimeter security technologies (i.e., firewalls) and anti-malicious software technologies (i.e., antiviruses, see later) cannot stop attackers if they obtain authenticated access to target computers and log on to them as if they are legitimate users (i.e., they had obtained login information of a legitimate user) it is desirable (and often necessary) to detect intrusion activities by monitoring ingress packets that have passed through firewalls and analyze how users use their computers Intrusion Detection Systems (IDS) and Honeypots Intrusion Detection Systems (IDS) a system used to detect unauthorized intrusions into computer systems and networks based on an assumption that the behavior of the intruder differs from that of a legitimate user they collect information from a variety of system and network sources and look for attack signatures = specific patterns that usually indicate malicious or suspicious intent Luděk Matyska (FI MU) 1. Network Security Spring / 125
109 Network & Data Protection Maintaining the Availability Intrusion Detection Systems Intrusion Detection Systems (IDS) II. Classification IDS classification: different ways of classifying an IDS IDSs based on detection model: anomaly detection signature based misuse (misuse detection) hybrid IDSs based on scope: host-based multihost-based network-based IDSs based on operation: offline inspect system logs at set intervals online monitor the system continuously Luděk Matyska (FI MU) 1. Network Security Spring / 125
110 Network & Data Protection Maintaining the Availability Intrusion Detection Systems Intrusion Detection Systems (IDS) III. Anomaly Detection Anomaly Detection IDSs: model the normal usage of the network as a noise characterization anything distinct from the noise (atypical behavior) is assumed to be an intrusion activity e.g., flooding a host with lots of packet the primary strength is its ability to recognize novel attacks drawbacks: assume, that intrusions will be accompanied by manifestations that are sufficiently unusual generate many false alarms compromise the effectiveness of the IDS Luděk Matyska (FI MU) 1. Network Security Spring / 125
111 Network & Data Protection Maintaining the Availability Intrusion Detection Systems Intrusion Detection Systems (IDS) III. Misuse Detection Misuse Detection IDSs: recognize known attacks based on signatures a set of attack signatures has to be defined (and updated) if an action matching a signature is detected, it is considered to be an attack drawbacks: unable to detect novel attacks suffer from false alarms have to be programmed again for every new pattern to be detected Luděk Matyska (FI MU) 1. Network Security Spring / 125
112 Network & Data Protection Maintaining the Availability Intrusion Detection Systems Intrusion Detection Systems (IDS) III. Host-based & Multihost-based IDSs I. Host-based IDSs: host operating system (or an application) logs in the audit information e.g., use of identification and authentication mechanisms (logins, etc.), file opens and program executions, admin activities, etc. the audit is then analyzed to detect trails of intrusion Multihost-based IDSs: audit information is analyzed from multiple hosts analysis architecture: centralized all data shipped to a central location for analysis hierarchical data is analyzed as it passed up through the layers distributed distributed analysis of the data Luděk Matyska (FI MU) 1. Network Security Spring / 125
113 Network & Data Protection Maintaining the Availability Intrusion Detection Systems Intrusion Detection Systems (IDS) III. Host-based & Multihost-based IDSs II. Host-based & Multihost-based IDSs: cont d. advantages: can detect data that are encrypted during transmissions do not need special hardware devices check system logs and so can analyze system behavior more accurately disadvantages: are installed in the target systems, and so they require extra system managing may consume extra computing resources on the systems might become affected by attacks that affect the host computers/servers they are installed in Luděk Matyska (FI MU) 1. Network Security Spring / 125
114 Network & Data Protection Maintaining the Availability Intrusion Detection Systems Intrusion Detection Systems (IDS) III. Network-based IDSs Network-based IDSs: look for attack signatures in network traffic via a promiscuous interface a filter is usually applied to determine which traffic will be discarded or passed on to an attack recognition module to filter out known un-malicious traffic advantages: low cost usually small number of selected points to monitor the entire network no interference packets are monitored passively (it does not interfere normal network traffic) intrusion resistent usually a small system, which can be easily made to resist an intrusion disadvantages: may not be able to analyze encrypted packets may not be able to handle large volume of network traffics in time some intrusion activities (e.g., fragmentation-attack) are hard to identify hard to determine, whether the intrusion activity has been successfully carried out Luděk Matyska (FI MU) 1. Network Security Spring / 125
115 Network & Data Protection Maintaining the Availability Intrusion Detection Systems Intrusion Detection Systems (IDS) IV. Concluding Remarks Intrusion Detection Systems are only one piece of the whole security puzzle they must be supplemented by other security and protection mechanisms they are a very important part of security architecture but do not solve all the potencial problems Luděk Matyska (FI MU) 1. Network Security Spring / 125
116 Network & Data Protection Maintaining the Availability Intrusion Detection Systems Honeypots Honeypot a system designed to teach how intruders probe for and exploit a system by learning their tools and methods, one can better protect her network and systems usually used for: diverting an attacker from accessing critical systems collecting information about the attacker s activity encouraging the attacker to stay on the system long enough for administrators to respond based on virtual or real systems Luděk Matyska (FI MU) 1. Network Security Spring / 125
117 Network & Data Protection Maintaining the Availability Intrusion Detection Systems Honeypots Tracking Their Moves I. Tracking Their Moves do not log information on the honeypot itself the fewer modification you make to the honeypot, the better the more changes you make, the better the chance an intruder will discover something is up you can easily lose the information track in layers, do not depend on a single source of information first layer of tracking is the firewall logs second layer is the system logs third layer of tracking is to use a sniffer it picks up all keystrokes and screen captures run, e.g., the Tripwire on the honeypot to discover what binaries have been altered on a compromised system Luděk Matyska (FI MU) 1. Network Security Spring / 125
118 Network & Data Protection Maintaining the Availability Intrusion Detection Systems Honeypots Tracking Their Moves II. Tracking Their Moves cont d. do not mindlessly reinstall the compromised system!!! otherwise you ll lose the information about the security hole the intruder had exploited if possible, do not reboot the compromised system running malicious programs may not automatically start after the reboot if possible, do not disconnect the compromised system from the network the system, once being disconnected from the network, may close all the active network connections better way is to cut off the system on the closest firewall or disconnect it behind first network element (switch, router, etc.) Luděk Matyska (FI MU) 1. Network Security Spring / 125
119 Network & Data Protection Maintaining the Availability Denial of Service (DoS) & Distributed Denial of Service (DDoS) attacks Denial of Service (DoS) & Distributed DoS (DDoS) I. Denial of Service (DoS) attack: an attack that causes a loss of a service to users typically the loss of network connectivity and services by consuming the bandwidth of the victim s network or overloading the computational resources of the victim s system the flood of incoming messages essentially forces the target system to shut down (thus denying the service) attack lead from a single source not too dangerous can be stopped in the closest active network element attack lead from many sources = Distributed Denial of Service (DDoS) attack a synchronized attack from many sources (e.g., Botnets) hard to discover all the requests appear to be sent by legitimate users much more dangerous stopping requires a cooperation in the network stopping in active networks consecutive cut of flows against their direction Luděk Matyska (FI MU) 1. Network Security Spring / 125
120 Network & Data Protection Maintaining the Availability Denial of Service (DoS) & Distributed Denial of Service (DDoS) attacks Denial of Service (DoS) & Distributed DoS (DDoS) II. Luděk Matyska (FI MU) 1. Network Security Spring / 125
121 Network & Data Protection Maintaining the Availability Virusses & Worms Virusses & Worms I. Computer virus a self-propagating computer program designed to alter or destroy a computer system resource Worm a self-replicating program, similar to a computer virus a virus attaches itself to, and becomes part of, another executable program; however, a worm is self-contained and does not need to be part of another program to propagate itself (through security holes of a networked system) Virus/Worm attacks: some sort of trigger will activate the attack phase, and the virus will then do something trigger = a specific date, or the number of times the virus has been replicated, or anything similar do something = anything from printing a silly message on the screen to erasing all of your data Luděk Matyska (FI MU) 1. Network Security Spring / 125
122 Network & Data Protection Maintaining the Availability Virusses & Worms Virusses & Worms II. Protection from virus/worm attacks: run a secure operating system with access rights security features keep viruses away run virus protection software in end-nodes and/or application gateways avoid programs from unknown sources educating the users is a must = computer hygiene Luděk Matyska (FI MU) 1. Network Security Spring / 125
123 Network & Data Protection Maintaining the Availability Network & Data Protection Concluding Remarks Network & Data Protection Concluding Remarks attacks/intrusions an effort to acquire an access to a network or its services reasons range from boyish fun ( testing neighbor s pears ) to military/terroristic actions usage: private data access/modification source platform for subsequent activity (e.g., DDoS) protection: access control on all possible levels regular maintanance (patches, upgrades, etc.) network traffic monitoring monitoring of processes running on the servers/end-nodes users education Luděk Matyska (FI MU) 1. Network Security Spring / 125
124 Conclusion Lecture overview 1 Introduction Motivation Network Security Elements 2 Cryptography Introduction Symmetric Cryptography Asymmetric Cryptography 3 Network Security Mechanisms Entity Authentication Message Confidentiality (Security) Message Integrity Message Authentication Digital Signature Key Management and Distribution 4 Example Protocols Ensuring Network Security in the Internet Application-layer Security Transport-layer Security Network-layer Security Link-layer Security 5 Network & Data Protection Maintaining the Availability Firewalls Intrusion Detection Systems Denial of Service (DoS) & Distributed Denial of Service (DDoS) attacks Virusses & Worms Network & Data Protection Concluding Remarks 6 Conclusion Luděk Matyska (FI MU) 1. Network Security Spring / 125
125 Conclusion Recapitulation Network Security AAA mechanisms + secured communication mechanisms + data/services protection/availability features of a secured communication network: Confidentiality Integrity Non-repudiation symmetric (shared key) and asymmetric (key pair private and public) cryptography secured communication mechanisms can be provided on various ISO/OSI layers (application, transport, network, data link) further information: PV017: Information Technology Security (doc. Staudek) PV079: Applied Cryptography (prof. Matyáš et al.) PV080: Protection of Data and Information Privacy (prof. Matyáš) PV157: Authentication and Access Control (prof. Matyáš and dr. Říha) PV210: Security analysis of network traffic (RNDr. Vykopal) etc. Luděk Matyska (FI MU) 1. Network Security Spring / 125
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Chapter 8. Network Security
Chapter 8 Network Security Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic Principles Need for Security Some people who
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
Chapter 32 Internet Security
Chapter 32 Internet Security Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 32: Outline 32.1 NETWORK-LAYER SECURITY 32.2 TRANSPORT-LAYER SECURITY 32.3
Network Security Fundamentals
APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer [email protected] Specialties: Network Security IPv6
APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)
APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist [email protected] Specialties: Routing &
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols
Network Security Chapter 8 Cryptography Symmetric-Key Algorithms Public-Key Algorithms Digital Signatures Management of Public Keys Communication Security Authentication Protocols Email Security Web Security
Lecture 9 - Network Security TDTS41-2006 (ht1)
Lecture 9 - Network Security TDTS41-2006 (ht1) Prof. Dr. Christoph Schuba Linköpings University/IDA [email protected] Reading: Office hours: [Hal05] 10.1-10.2.3; 10.2.5-10.7.1; 10.8.1 9-10am on Oct. 4+5,
APNIC elearning: IPSec Basics. Contact: [email protected]. esec03_v1.0
APNIC elearning: IPSec Basics Contact: [email protected] esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations
INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)
Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic
Network Security. Lecture 3
Network Security Lecture 3 Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Security protocols application transport network datalink physical Contents IPSec overview
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key
Friends and Enemies Security Outline Encryption lgorithms Protocols Message Integrity Protocols Key Distribution Firewalls Figure 7.1 goes here ob, lice want to communicate securely Trudy, the intruder
CPS 590.5 Computer Security Lecture 9: Introduction to Network Security. Xiaowei Yang [email protected]
CPS 590.5 Computer Security Lecture 9: Introduction to Network Security Xiaowei Yang [email protected] Previous lectures Worm Fast worm design Today Network security Cryptography building blocks Existing
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities
TÜBİTAK Ulusal Elektronik ve Kriptoloji Araştırma Enstitüsü Introduction to Network Security (Revisit an Historical 12 year old Presentation) Prof. Dr. Halûk Gümüşkaya Why Security? Three primary reasons
INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli 4-25-2002
INTERNET SECURITY: FIREWALLS AND BEYOND Mehernosh H. Amroli 4-25-2002 Preview History of Internet Firewall Technology Internet Layer Security Transport Layer Security Application Layer Security Before
EXAM questions for the course TTM4135 - Information Security May 2013. Part 1
EXAM questions for the course TTM4135 - Information Security May 2013 Part 1 This part consists of 5 questions all from one common topic. The number of maximal points for every correctly answered question
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
IP Security. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49
IP Security Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security
CSCI 454/554 Computer and Network Security. Final Exam Review
CSCI 454/554 Computer and Network Security Final Exam Review Topics covered by Final Topic before Midterm 20% Topic after Midterm 80% Date: 05/13/2015 9:00am noon Place: the same classroom Open book/notes
What is network security?
Network security Network Security Srinidhi Varadarajan Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application
: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT
Subject Code Department Semester : Network Security : XCS593 : MSc SE : Nineth Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT Part A (2 marks) 1. What are the various layers of an OSI reference
Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security
UNIT 4 SECURITY PRACTICE Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security Slides Courtesy of William Stallings, Cryptography & Network Security,
VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls
Overview VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls Computer Net Lab/Praktikum Datenverarbeitung 2 1 VPN - Definition VPNs (Virtual Private Networks) allow secure data transmission
VPN SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
VPN SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part III-b Contents Part III-b Secure Applications and Security Protocols Practical Security Measures Internet Security IPSEC, IKE SSL/TLS Virtual Private Networks Firewall Kerberos SET Security Measures
Network Security Part II: Standards
Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview
2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries
Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
Overview. Protocols. VPN and Firewalls
Computer Network Lab 2015 Fachgebiet Technische h Informatik, Joachim Zumbrägel Overview VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls VPN-Definition VPNs (Virtual Private Networks)
Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)
Network Security Securing communications (SSL/TLS and IPSec) Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT) Network communication Who are you
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Network Security. Outline of the Tutorial
Network Security Dr. Indranil Sen Gupta Head, School of Information Technology Professor, Computer Science & Engg. Indian Institute of Technology Kharagpur 1 Outline of the Tutorial Security attacks and
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Virtual Private Networks
Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
Module 7 Security CS655! 7-1!
Module 7 Security CS655! 7-1! Issues Separation of! Security policies! Precise definition of which entities in the system can take what actions! Security mechanism! Means of enforcing that policy! Distributed
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 9: Authentication protocols, digital signatures Ion Petre Department of IT, Åbo Akademi University 1 Overview of
Network Security. Omer Rana
Network Security Omer Rana CM0255 Material from: Cryptography Components Sender Receiver Plaintext Encryption Ciphertext Decryption Plaintext Encryption algorithm: Plaintext Ciphertext Cipher: encryption
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Chapter 11 Security Protocols. Network Security Threats Security and Cryptography Network Security Protocols Cryptographic Algorithms
Chapter 11 Security Protocols Network Security Threats Security and Cryptography Network Security Protocols Cryptographic Algorithms Chapter 11 Security Protocols Network Security Threats Network Security
Site to Site Virtual Private Networks (VPNs):
Site to Site Virtual Private Networks Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0002.01 Prog. Director Mark Ferrar Owner Tim Davis Version 1.0
Network Security #10. Overview. Encryption Authentication Message integrity Key distribution & Certificates Secure Socket Layer (SSL) IPsec
Network Security #10 Parts modified from Computer Networking: A Top Down Approach Featuring the Internet, 2nd edition. Jim Kurose, Keith Ross, Addison-Wesley, 2002. 1 Overview Encryption Authentication
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
NETWORK ADMINISTRATION AND SECURITY
NETWORK ADMINISTRATION AND SECURITY Unit I (NAS) (W- 10) Q. 1) What is Security Attack? Explain general categories of attack with examples. 7 Q. 2) List and define the five security services. 5 Q. 3) Define
NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia
NETWORK SECURITY Farooq Ashraf Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia O u t l i n e o f t h e P r e s e n t a t i o n What is Security
WEB Security & SET. Outline. Web Security Considerations. Web Security Considerations. Secure Socket Layer (SSL) and Transport Layer Security (TLS)
Outline WEB Security & SET (Chapter 19 & Stalling Chapter 7) Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction (SET) Web Security Considerations
CS 348: Computer Networks. - Security; 30 th - 31 st Oct 2012. Instructor: Sridhar Iyer IIT Bombay
CS 348: Computer Networks - Security; 30 th - 31 st Oct 2012 Instructor: Sridhar Iyer IIT Bombay Network security Security Plan (RFC 2196) Identify assets Determine threats Perform risk analysis Implement
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts
Outline INF3510 Information Security Lecture 10: Communications Security Network security concepts Communication security Perimeter security Protocol architecture and security services Example security
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
Properties of Secure Network Communication
Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able to understand the contents of the transmitted message. Because eavesdroppers may intercept the message,
Transport Layer Security Protocols
SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known
Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer
Other VPNs TLS/SSL, PPTP, L2TP Advanced Computer Networks SS2005 Jürgen Häuselhofer Overview Introduction to VPNs Why using VPNs What are VPNs VPN technologies... TLS/SSL Layer 2 VPNs (PPTP, L2TP, L2TP/IPSec)
Chapter 7: Network security
Chapter 7: Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer: secure e-mail transport
12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028
Review Final Exam 12/10/2015 Thursday 5:30~6:30pm Science S-3-028 IT443 Network Security Administration Instructor: Bo Sheng True/false Multiple choices Descriptive questions 1 2 Network Layers Application
Lecture 10: Communications Security
INF3510 Information Security Lecture 10: Communications Security Audun Jøsang University of Oslo Spring 2015 Outline Network security concepts Communication security Perimeter security Protocol architecture
E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
As enterprises conduct more and more
Efficiently handling SSL transactions is one cornerstone of your IT security infrastructure. Do you know how the protocol actually works? Wesley Chou Inside SSL: The Secure Sockets Layer Protocol Inside
7.1. Remote Access Connection
7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to
Final exam review, Fall 2005 FSU (CIS-5357) Network Security
Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection
An Introduction to Cryptography as Applied to the Smart Grid
An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric
Application Layer (1)
Application Layer (1) Functionality: providing applications (e-mail, www, USENET etc) providing support protocols to allow the real applications to function properly security comprising a large number
159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
Network Security Essentials Chapter 5
Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got
Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity
Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration
E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications
Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html
ELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
Network Security (2) CPSC 441 Department of Computer Science University of Calgary
Network Security (2) CPSC 441 Department of Computer Science University of Calgary 1 Friends and enemies: Alice, Bob, Trudy well-known in network security world Bob, Alice (lovers!) want to communicate
ICTTEN8195B Evaluate and apply network security
ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated
Network Security and Firewall 1
Department/program: Networking Course Code: CPT 224 Contact Hours: 96 Subject/Course WEB Access & Network Security: Theoretical: 2 Hours/week Year Two Semester: Two Prerequisite: NET304 Practical: 4 Hours/week
Standards and Products. Computer Security. Kerberos. Kerberos
3 4 Standards and Products Computer Security Standards and Products Public Key Infrastructure (PKI) IPsec SSL/TLS Electronic Mail Security: PEM, S/MIME, and PGP March 24, 2004 2004, Bryan J. Higgs 1 2
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
Network Security Protocols
Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination
Chapter 10. Cloud Security Mechanisms
Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based
Transport Level Security
Transport Level Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
Network Security. HIT Shimrit Tzur-David
Network Security HIT Shimrit Tzur-David 1 Goals: 2 Network Security Understand principles of network security: cryptography and its many uses beyond confidentiality authentication message integrity key
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Common Remote Service Platform (crsp) Security Concept
Siemens Remote Support Services Common Remote Service Platform (crsp) Security Concept White Paper April 2013 1 Contents Siemens AG, Sector Industry, Industry Automation, Automation Systems This entry
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt 1 Lecture 11: Network Security Reference: Chapter 8 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice
