Format-Transforming Encryption
|
|
|
- Kevin George Simmons
- 10 years ago
- Views:
Transcription
1 Protocol Misidentification Made Easy with Format-Transforming Encryption Kevin Dyer, Portland State University (did most of the hard work) Scott Coull, RedJack Thomas Ristenpart, University of Wisconsin-Madison Thomas Shrimpton, Portland State University
2 Current Estimates of Internet Censorship OpenNet Initiative (ONI), Reporters Without Borders (via wikipedia; updated Jan 6, 2014) Magenta-colored countries are internet black holes : have heavy censorship of political, social, and news sites, internet tools, etc.
3 Discriminatory policies enabled by packet filtering payload IP info TCP info HTTP: free+speech Nation-state level packet filter A packet can tell you: source address destination address/port application-level protocols keywords in payloads
4 Tools exist to obfuscate shallow information payload IP info TCP info HTTP: free+speech Use a proxy service, e.g. A packet can tell you: source address destination address/port application-level protocols keywords in payloads
5 Modern filters look deeper into the packet: Deep Packet Inspection (DPI) payload IP info TCP info HTTP: free+speech Making payload information unhelpful is the new challenge A packet can tell you: source address destination address/port application-level protocols keywords in payloads
6 Why not just use an encrypted tunnel? (TLS, SSH, VPNs, ) IP info TCP info TLS??? Hides the protocol inside the encrypted tunnel...???
7 Why not just use an encrypted tunnel? (TLS, SSH, VPNs, ) IP info TCP info TLS??? Hides the protocol inside the encrypted tunnel...??? But use of the encryption protocol is still visible.
8 Why not make the whole payload look random? (e.g. with a stream cipher) (e.g. Tor s obfs pluggable transport) IP info TCP info???
9 Why not make the whole payload look random? (e.g. with a stream cipher) (e.g. Tor s obfs pluggable transport) IP info TCP info??? I don t recognize this as any legitimate protocol. What happens if DPI allows only whitelisted protocols?
10 Recent efforts in DPI Circumvention Stegotorus [Weinberg et al., 2012], SkypeMorph [Moghaddam et al. 2012], FreeWave [Houmansadr et al., 2013], etc. These represent nice steps in the right direction, but 1. Poor performance: Kbps reported (best case) 2. Inflexible: not quickly adaptable to changes in DPI rules. e.g. what if you re using SkypeMorph, and Skype becomes blocked? (Ethiopia 2013) 3. Not empirically validated: do they work against real DPI?
11 Our goal: to cause real DPI systems to reliably misclassify our traffic for example: HTTP misclassified as FTP HTTP: free+speech crypto magic This is an benign FTP message. Let it pass. TCP/IP ciphertext (and in a way that is flexible and has good throughput/low latency )
12 Our goal: to cause real DPI systems to reliably misclassify our traffic as whatever protocol we want. HTTP: free+speech crypto magic TCP/IP ciphertext (and in a way that is flexible and has good throughput/low latency )
13 To this end, we: Introduce a new cryptographic tool, Format Transforming Encryption Characterize how real DPI systems make classification decisions Implement an FTE-powered proxy system Empirically evaluate FTE against real DPI in the lab Report on some live field tests
14 key plaintext crypto magic a ciphertext string that DPI will classify as protocol X 14
15 We took inspiration from Format-Preserving Encryption [Bellare et al., 2009] key plaintext { strings that DPI will classify as protocol X } crypto magic a ciphertext string that DPI will classify as protocol X The desired ciphertext format 15
16 Format-Transforming Encryption key plaintext { strings that DPI will classify as protocol X } FTE a ciphertext string that DPI will classify as protocol X Like traditional encryption, with the extra operational requirement that ciphertexts fall within the format. 16
17 Ciphertext flexibility is built into the FTE syntax key plaintext { strings that DPI will classify as protocol X } FTE a ciphertext string that DPI will classify as protocol X Conceptually, adapting to new DPI rules requires changing only the format 17
18 We wondered: How do real DPI devices determine to what protocol a message belongs? System Classification Tool This is an message. Price appid free l7-filter free YAF free bro free nprobe ~300 Euros DPI-X ~$10K Enterprise grade DPI, well-known company
19 This is an message. We wondered: How do real DPI devices determine to what protocol a message belongs? System Classification Tool Price appid Regular expressions free l7-filter Regular expressions free YAF Regular expressions (sometimes hierarchical) free bro Simple regular expression triage, then additional parsing and heuristics free nprobe Parsing and heuristics (many of them regular ) ~300 Euros DPI-X??? ~$10K Regular languages/expressions figure heavily in state-of-the-art DPI classification tools
20 Regular-expression-based FTE key plaintext regex R FTE a string in L(R) Whence the regex? If the DPI is open source (appid, l7-filter, YAF), extract them! Build them manually, using RFCs and (when possible) DPI source code. Learn them from traffic that was allowed by the DPI.
21 Realizing regex-based FTE key plaintext ciphertext in L(R) regex R How should we realize regex-based FTE? We want: Cryptographic protection for the plaintext Ciphertexts in L(R) 21
22 Realizing regex-based FTE key plaintext authenticated encryption ciphertext in L(R) regex R How should we realize regex-based FTE? We want: Cryptographic protection for the plaintext Ciphertexts in L(R) 22
23 Ranking a Regular Language [Goldberg, Sipser 85] [Bellare et al. 09] x i L(R) Let L(R) be lexicographically ordered x 0 < x 1 < < x i < < x L(R) i L(R) -1 Given a DFA for L(R), there are efficient algorithms
24 Ranking a Regular Language [Goldberg, Sipser 85] [Bellare et al. 09] x i L(R) rank(x i )=i Let L(R) be lexicographically ordered x 0 < x 1 < < x i < < x L(R) i L(R) -1 Given a DFA for L(R), there are efficient algorithms rank: L(R) {0,1,, L(R) -1}
25 Ranking a Regular Language [Goldberg, Sipser 85] [Bellare et al. 09] x i L(R) x 2 rank(x i )=i unrank(2)=x 2 Let L(R) be lexicographically ordered x 0 < x 1 < < x i < < x L(R) i L(R) -1 Given a DFA for L(R), there are efficient algorithms rank: L(R) {0,1,, L(R) -1} unrank: {0,1,, L(R) -1} L(R) such that rank( unrank(i) ) = i and unrank( rank(x i ) ) = x i With precomputed tables, rank, unrank are O(n)
26 Realizing regex-based FTE key plaintext authenticated encryption Intermediate ciphertext, interpreted as an integer n [integer] unrank outputs n th string in lexicographic ordering of L(R) ciphertext in L(R) regex R regex-to-dfa [DFA]
27 FTE engineering challenge: large plaintexts key plaintext authenticated encryption [integer] unrank ciphertext in L(R) regex R regex-to-dfa [DFA] L(R) bounds length of longest plaintext Using very large languages leads to: large tables naively, (#DFA states) x (length of longest plaintext) latency issues waiting for long plaintext to buffer Chunking, and using unrank(c 1 ), unrank(c 2 ), unrank(c 3 ), leads to: receiver-side parsing issues how to affect the commas?
28 Use case: Browsing the web through an FTE tunnel FTE wins if the DPI classifies the stream it sees as the target protocol Generating HTTP(S), DNS messages Rtarget HTTP, SSH, SMB Internet FTE proxy FTE client FTE ciphertexts Rtarget
29 Use case: Browsing the web through an FTE tunnel FTE wins if the DPI classifies the stream it sees as the target protocol Generating HTTP(S), DNS messages Rtarget Internet FTE proxy FTE client FTE ciphertexts Rtarget HTTP, SSH, SMB Using each target format, we visited each of the Alexa Top 50 websites five times. We recorded the fraction of times that FTE won, as well as performance data.
30 Misclassification rates with extracted regex DPI appid-http l7-http yaf-http1 yaf-http2 appid l7-filter YAF DPI-X regex appid-ssh l7-ssh yaf-ssh1 yaf-ssh2 appid-smb l7-smb yaf-smb1 yaf-smb2
31 Misclassification rates with extracted regex DPI appid l7-filter YAF DPI-X appid-http 0.0 l7-http regex yaf-http1 yaf-http appid-ssh 0.32 l7-ssh yaf-ssh1 yaf-ssh appid-smb l7-smb yaf-smb1 yaf-smb
32 Misclassification rates with extracted regex DPI appid l7-filter YAF DPI-X appid-http 0.0 l7-http regex yaf-http1 yaf-http appid-ssh 0.32 l7-ssh yaf-ssh1 yaf-ssh appid-smb l7-smb yaf-smb1 yaf-smb Since these all have on the diagonals, we made intersection regexs for HTTP, SSH, SMB, and got everywhere
33 Misclassification rates with extracted regex DPI appid l7-filter YAF DPI-X appid-http 0.0 l7-http regex yaf-http1 yaf-http appid-ssh 0.32 l7-ssh yaf-ssh1 yaf-ssh appid-smb l7-smb yaf-smb1 yaf-smb !
34 Misclassification rates with manual/learned regex Built manually, using RFCs and (when possible) DPI source code. DPI regex manual-http manual-ssh manual-smb learned-http learned-ssh learned-smb appid l7-filter YAF DPI-X bro nprobe Learned (via simple technique) from traffic that was allowed by the DPI.
35 Misclassification rates with manual/learned regex DPI regex appid l7-filter YAF DPI-X bro nprobe manual-http manual-ssh manual-smb learned-http learned-ssh 0.0 learned-smb (except this, which we explain in the paper)
36 Punchline: regex-based FTE can make real DPI say whatever we want it to. Help! input protocol stream Rtarget input protocol stream FTE client FTE proxy Rtarget
37 Web-browsing performance Punchline: FTE or SSH tunnel result in the same user web-browsing experience
38 A field test FTE client Internet FTE proxy
39 A field test Without FTE tunnel, we tried Facebook, YouTube, Tor website, banned search queries With FTE tunnel, we tried Facebook, YouTube, Tor website, banned search queries FTE client Internet FTE proxy
40 A field test Without FTE tunnel, we tried Facebook, YouTube, Tor website, banned search queries With FTE tunnel, we tried Facebook, YouTube, Tor website, banned search queries FTE client Internet Used FTE to download Tor bundle: Tor without FTE: active blacklisting attack on proxy Tor through FTE: no problems Ran various tests every 5 minutes for one month, no sign of detection in logs. (We shut it down after that.) FTE proxy
41 FTE is open source, runs on multiple platforms/os, and fully integrated with Tor. We even have a nice website: Get it, run it, help us make it better!
How the Great Firewall discovers hidden circumvention servers. Roya Ensafi David Fifield Philipp Winter Nick Weaver Nick Feamster Vern Paxson
How the Great Firewall discovers hidden circumvention servers Roya Ensafi David Fifield Philipp Winter Nick Weaver Nick Feamster Vern Paxson Much already known about GFW Numerous research papers and blog
Marionette: A Programmable Network Traffic Obfuscation System
Marionette: A Programmable Network Traffic Obfuscation System Kevin P. Dyer, Portland State University; Scott E. Coull, RedJack LLC.; Thomas Shrimpton, Portland State University https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/dyer
Solution of Exercise Sheet 5
Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????
Marionette: A Programmable Network-Traffic Obfuscation System
Marionette: A Programmable Network-Traffic Obfuscation System Kevin P. Dyer Portland State University [email protected] Scott E. Coull RedJack, LLC. [email protected] Thomas Shrimpton Portland State
Internet Privacy Options
2 Privacy Internet Privacy Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 19 June 2014 Common/Reports/internet-privacy-options.tex, r892 1 Privacy Acronyms
(SHREL) Open Source Multi-Hop Networks (SHREL) Tor
TOP SECRETHSPREL TO USAyVEY (C//REL) Types of TAT Advanced Open Source Multi-Hop (SHREL) Open Source Multi-Hop Networks (SHREL) Tor (SHREL) Very widely used worldwide (SHREL) Open Source (S/REL) Active
Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
Early Recognition of Encrypted Applications
Early Recognition of Encrypted Applications Laurent Bernaille with Renata Teixeira Laboratoire LIP6 CNRS Université Pierre et Marie Curie Paris 6 Can we find the application inside an SSL connection? Network
Firewalls, Tunnels, and Network Intrusion Detection. Firewalls
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)
Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Controlling SSL Decryption. Overview. SSL Variability. Tech Note
Controlling Decryption Tech Note Overview Decryption is a key feature of the PA-4000 Series firewall. With it, -encrypted traffic is decrypted for visibility, control, and granular security. App-ID and
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
CSCI 4250/6250 Fall 2015 Computer and Networks Security
CSCI 4250/6250 Fall 2015 Computer and Networks Security Network Security Goodrich, Chapter 5-6 Tunnels } The contents of TCP packets are not normally encrypted, so if someone is eavesdropping on a TCP
App-ID. PALO ALTO NETWORKS: App-ID Technology Brief
App-ID Application Protocol Detection / Decryption Application Protocol Decoding Application Signature Heuristics App-ID uses as many as four identification techniques to determine the exact identity of
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Virtual Private Networks
Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication
Examining How The Great Firewall Discovers Hidden Circumvention Servers
Examining How The Great Firewall Discovers Hidden Circumvention Servers Roya Ensafi, David Fifield, Philipp Winter, Nick Feamster, Nicholas Weaver, and Vern Paxson Oct 29, 2015 1 Circumventing Internet
Bypassing Firewall. @ PISA AGM Theme Seminar 2005. Presented by Ricky Lou Zecure Lab Limited
Bypassing Firewall @ PISA AGM Theme Seminar 2005 Presented by Ricky Lou Zecure Lab Limited Firewall Piercing (Inside-Out Attacks) Disclaimer We hereby disclaim all responsibility for the following hacks.
Networking for Caribbean Development
Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
Dust: A Blocking-Resistant Internet Transport Protocol
Dust: A Blocking-Resistant Internet Transport Protocol Brandon Wiley School of Information, University of Texas at Austin 1616 Guadalupe #5.202 Austin, TX 78701-1213 [email protected] Abstract.
TLS and SRTP for Skype Connect. Technical Datasheet
TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security
Fig. 4.2.1: Packet Filtering
4.2 Types of Firewalls /DKo98/ FIREWALL CHARACTERISTICS 1. All traffic from inside to outside, and vice versa, must pass through the firewall. This is achieved by physically blocking all access to the
REPORT & ENFORCE POLICY
App-ID KNOWN PROTOCOL DECODER Start Decryption (SSL or SSH) Decode Signatures Policy IP/Port Policy Application Signatures Policy IDENTIFIED TRAFFIC (NO DECODING) UNKNOWN PROTOCOL DECODER Apply Heuristics
Chapter 15. Firewalls, IDS and IPS
Chapter 15 Firewalls, IDS and IPS Basic Firewall Operation The firewall is a border firewall. It sits at the boundary between the corporate site and the external Internet. A firewall examines each packet
An apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
Network Security CS 192
Network Security CS 192 Firewall Rules Department of Computer Science George Washington University Jonathan Stanton 1 Client Web Auth paper Today s topics Firewall Rules Jonathan Stanton 2 Required: Additional
12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028
Review Final Exam 12/10/2015 Thursday 5:30~6:30pm Science S-3-028 IT443 Network Security Administration Instructor: Bo Sheng True/false Multiple choices Descriptive questions 1 2 Network Layers Application
EXPLORER. TFT Filter CONFIGURATION
EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content
ProxyCap Help. Table of contents. Configuring ProxyCap. 2015 Proxy Labs
ProxyCap Help 2015 Proxy Labs Table of contents Configuring ProxyCap The Ruleset panel Loading and saving rulesets Delegating ruleset management The Proxies panel The proxy list view Adding, removing and
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop R. David Idol Department of Computer Science University of North Carolina at Chapel Hill [email protected] http://www.cs.unc.edu/~mxrider
Intrusion Detection System
Intrusion Detection System Time Machine Dynamic Application Detection 1 NIDS: two generic problems Attack identified But what happened in the past??? Application identification Only by port number! Yet
12. Firewalls Content
Content 1 / 17 12.1 Definition 12.2 Packet Filtering & Proxy Servers 12.3 Architectures - Dual-Homed Host Firewall 12.4 Architectures - Screened Host Firewall 12.5 Architectures - Screened Subnet Firewall
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
Application Detection
The following topics describe Firepower System application detection : Overview:, page 1 Custom Application Detectors, page 7 Viewing or Downloading Detector Details, page 15 Sorting the Detector List,
Single Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications
Single Pass Load Balancing with Session Persistence in IPv6 Network C. J. (Charlie) Liu Network Operations Charter Communications Load Balancer Today o Load balancing is still in use today. It is now considered
Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
Internet Firewall CSIS 3230. Internet Firewall. Spring 2012 CSIS 4222. net13 1. Firewalls. Stateless Packet Filtering
Internet Firewall CSIS 3230 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 8.8: Packet filtering, firewalls, intrusion detection Ch
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Websense Web Security Gateway: What to do when a Web site does not load as expected
Websense Web Security Gateway: What to do when a Web site does not load as expected Websense Support Webinar November 2011 web security data security email security Support Webinars 2009 Websense, Inc.
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
Digital tools to empower civil society
Digital tools to empower civil society Tools to secure what you have and circumvent what they have. Grundtvig partnership meeting Linz 2013 Jonatan Walck [email protected] OpenPGP: CB5D DDA5 62AA
Understanding Slow Start
Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom
Fundamentals of the Internet 2009/10. 1. Explain meaning the following networking terminologies:
Fundamentals of Internet Tutorial Questions (2009) 1. Explain meaning the following networking terminologies: Client/server networking, Coax, twisted pair, protocol, Bit, Byte, Kbps, KBps, MB, KB, MBps,
Firewalls. configuring a sophisticated GNU/Linux firewall involves understanding
Firewalls slide 1 configuring a sophisticated GNU/Linux firewall involves understanding iptables iptables is a package which interfaces to the Linux kernel and configures various rules for allowing packets
Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006
Reverse Shells Enable Attackers To Operate From Your Network Richard Hammer August 2006 Reverse Shells? Why should you care about reverse shells? How do reverse shells work? How do reverse shells get installed
Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003
http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with
AccessEnforcer. HTTPS web filter overview
AccessEnforcer HTTPS web filter overview A web filter is essential to keeping hazards and distractions away from businesses. To stay safe, productive, and compliant, every organization must block certain
Covert Channels. Some instances of use: Hotels that block specific ports Countries that block some access
Covert Channels Covert Channels Tunnels that are used to bypass filters and intrusion detection systems Use traffic that is thought to be something else (i.e. DNS tunnels) Can also provide encryption (i.e.
Firewalls, IDS and IPS
Session 9 Firewalls, IDS and IPS Prepared By: Dr. Mohamed Abd-Eldayem Ref.: Corporate Computer and Network Security By: Raymond Panko Basic Firewall Operation 2. Internet Border Firewall 1. Internet (Not
What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?
What is a Firewall? Computer Security Firewalls fire wall 1 : a wall constructed to prevent the spread of fire 2 usually firewall : a computer or computer software that prevents unauthorized access to
RSA Security Anatomy of an Attack Lessons learned
RSA Security Anatomy of an Attack Lessons learned Malcolm Dundas Account Executive John Hurley Senior Technology Consultant 1 Agenda Advanced Enterprise/ Threats The RSA Breach A chronology of the attack
Introduction to Computer Security
Introduction to Computer Security Network Security Pavel Laskov Wilhelm Schickard Institute for Computer Science Circuit switching vs. packet switching OSI and TCP/IP layered models TCP/IP encapsulation
Networking Basics and Network Security
Why do we need networks? Networking Basics and Network Security Shared Data and Functions Availability Performance, Load Balancing What is needed for a network? ISO 7-Layer Model Physical Connection Wired:
The Challenges of Stopping Illegal Peer-to-Peer File Sharing
The Challenges of Stopping Illegal Peer-to-Peer File Sharing Kevin Bauer Dirk Grunwald Douglas Sicker Department of Computer Science University of Colorado Context: The Rise of Peer-to-Peer 1993-2000:
Why SSL is better than IPsec for Fully Transparent Mobile Network Access
Why SSL is better than IPsec for Fully Transparent Mobile Network Access SESSION ID: SP01-R03 Aidan Gogarty HOB Inc. [email protected] What are we all trying to achieve? Fully transparent network access
SOFTWARE ENGINEERING 4C03. Computer Networks & Computer Security. Network Firewall
SOFTWARE ENGINEERING 4C03 Computer Networks & Computer Security Network Firewall HAO WANG #0159386 Instructor: Dr. Kartik Krishnan Mar.29, 2004 Software Engineering Department of Computing and Software
User Guide. You will be presented with a login screen which will ask you for your username and password.
User Guide Overview SurfProtect is a real-time web-site filtering system designed to adapt to your particular needs. The main advantage with SurfProtect over many rivals is its unique architecture that
Scan Report Executive Summary. Part 2. Component Compliance Summary IP Address : 69.43.165.11
Scan Report Executive Summary Part 1. Scan Information Scan Customer Company: Date scan was completed: rsync.net ASV Company: Comodo CA Limited 06-02-2015 Scan expiration date: 08-31-2015 Part 2. Component
Next-Generation Firewalls: Critical to SMB Network Security
Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Transport Level Security
Transport Level Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Computer Networks. Secure Systems
Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to
EBOOK. The Network Comes of Age: Access and Monitoring at the Application Level
EBOOK The Network Comes of Age: Access and Monitoring at the Application Level www.ixiacom.com 915-6948-01 Rev. A, January 2014 2 Table of Contents How Flow Analysis Grows Into Total Application Intelligence...
Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN
Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts
Measurement of the Usage of Several Secure Internet Protocols from Internet Traces
Measurement of the Usage of Several Secure Internet Protocols from Internet Traces Yunfeng Fei, John Jones, Kyriakos Lakkas, Yuhong Zheng Abstract: In recent years many common applications have been modified
Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity
Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration
Network Security Essentials Chapter 5
Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got
CS 4803 Computer and Network Security
Network layers CS 4803 Computer and Network Security Application Transport Network Lower level Alexandra (Sasha) Boldyreva IPsec 1 2 Roughly Application layer: the communicating processes themselves and
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
21.4 Network Address Translation (NAT) 21.4.1 NAT concept
21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially
Traffic Analysis. Scott E. Coull RedJack, LLC. Silver Spring, MD USA. Side-channel attack, information theory, cryptanalysis, covert channel analysis
Traffic Analysis Scott E. Coull RedJack, LLC. Silver Spring, MD USA Related Concepts and Keywords Side-channel attack, information theory, cryptanalysis, covert channel analysis Definition Traffic analysis
Bypassing firewalls Another hole in the wall ;-) [email protected] Présentation pour «La nuit du hack» le 13 Juin 2009
Bypassing firewalls Another hole in the wall ;-) [email protected] Présentation pour «La nuit du hack» le 13 Juin 2009 Agenda 1. SSH, HTTP(S) proxy: old school and advanced 2. Tunnels and covert channels:
Information Leakage in Encrypted Network Traffic
Information Leakage in Encrypted Network Traffic Attacks and Countermeasures Scott Coull RedJack Joint work with: Charles Wright (MIT LL) Lucas Ballard (Google) Fabian Monrose (UNC) Gerald Masson (JHU)
Computer and Network Security Exercise no. 4
University of Haifa Winter Semester 11/1/12 Computer and Network Security Exercise no. 4 Submit in Pairs/Single to mailbox 19 by 25/1/12, 2:00 p.m. 1. Following the sensitivity of the information in its
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Chapter 32 Internet Security
Chapter 32 Internet Security Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 32: Outline 32.1 NETWORK-LAYER SECURITY 32.2 TRANSPORT-LAYER SECURITY 32.3
Introduction to Computer Security
Introduction to Computer Security Network Security Pavel Laskov Wilhelm Schickard Institute for Computer Science Circuit switching vs. packet switching OSI and TCP/IP layered models TCP/IP encapsulation
A Stateful Inspection of FireWall-1
A Stateful Inspection of FireWall-1 Thomas Lopatic, John McDonald TÜV data protect GmbH data protect [email protected], [email protected] Dug Song CITI at the University of Michigan [email protected]
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies
White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda
Getting More Information On Your Network Performance
Getting More Information On Your Network Performance Luca Deri Network Traffic is a Moving Target For years network administrators have identified traffic protocols and services using IP
Voice Over Internet Protocol (VOIP) SECURITY. Rick Kuhn Computer Security Division National Institute of Standards and Technology
Voice Over Internet Protocol (VOIP) SECURITY Rick Kuhn Computer Security Division National Institute of Standards and Technology What is VOIP? Voice Over Internet Protocol Voice Communications over data-style
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA Professor Yang Xiang Network Security and Computing Laboratory (NSCLab) School of Information Technology Deakin University, Melbourne, Australia http://anss.org.au/nsclab
Implementing Network Address Translation and Port Redirection in epipe
Implementing Network Address Translation and Port Redirection in epipe Contents 1 Introduction... 2 2 Network Address Translation... 2 2.1 What is NAT?... 2 2.2 NAT Redirection... 3 2.3 Bimap... 4 2.4
Content-ID. Content-ID URLS THREATS DATA
Content-ID DATA CC # SSN Files THREATS Vulnerability Exploits Viruses Spyware Content-ID URLS Web Filtering Content-ID combines a real-time threat prevention engine with a comprehensive URL database and
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
ATIS Open Web Alliance. Jim McEachern Senior Technology Consultant ATIS
Jim McEachern Senior Technology Consultant ATIS Objective This presentation provides an introduction to the, and the motivation behind its formation. 2 Overview SPDY was introduced by Google to reduce
Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part III-b Contents Part III-b Secure Applications and Security Protocols Practical Security Measures Internet Security IPSEC, IKE SSL/TLS Virtual Private Networks Firewall Kerberos SET Security Measures
