The Transport Layer and Implica4ons for Network Monitoring. CS 410/510 Spring 2014
|
|
|
- Coleen Small
- 10 years ago
- Views:
Transcription
1 The Transport Layer and Implica4ons for Network Monitoring CS 410/510 Spring 2014
2 Review Preliminaries: Three Principles of Informa4on Security The Three A s
3 Review: Network Protocol Stacks
4 Review: Network Protocol Stacks ApplicaEon Layer: HTTP, SMTP,... - Send messages to people, send files, Transport Layer: TCP - Stream- oriented I/O Network Layer: IP - Sends messages across mul4ple hops Data/Link Layer: Ethernet, Wifi, GSM - Sends messages over a single hop Physical Layer: Copper, Fiber, Wireless - Transmits bits through space
5 Review: The Link Layer (Ethernet, WiFi) Shared broadcast medium Snooping awacks Spoofing awacks AWacks on TLF bridges (aka switches)
6 Review: IP (Network Layer) Forwarding based on des4na4on address Spoofing awacks
7 Outline for Today Security and the Transport Layer Network Monitoring and Intrusion Detec4on Ptacek and Newsham: Inser4on and Evasion AWacks
8 Outline for Today Security and the Transport Layer Network Monitoring and Intrusion Detec4on Ptacek and Newsham: Inser4on and Evasion AWacks
9 Transport Layer Role: Provides end- to- end messages UDP Thin wrapper around IP Connec4onless, unreliable TCP Connec4on- oriented Reliable data transfer
10 Transport Layer Role: Provides end- to- end messages UDP Thin wrapper around IP Connec4onless, unreliable TCP Connec4on- oriented Reliable data transfer
11 UDP: User Datagram Protocol Idea: Fire and forget Applica4ons Streaming media (video chat, voice over IP) Short, simple messages (TFTP, DNS) Diagram credit: Wikipedia
12 UDP: Injec4on AWack If we re not careful, protocols that use UDP can be vulnerable to malicious injec4on (loss of integrity) Alice Bob
13 Example: Voice over IP (VoIP) Let s image a really simple VoIP protocol Sending app records small snippets of audio (say 20ms), and sends each audio snippet in a UDP packet When the receiving app gets a packet, it immediately plays the sound No sequence numbers or checksums in the app Alice Bob
14 UDP Injec4on AWack What does the awacker need to do in order to spoof messages from Alice? Diagram credit: Wikipedia
15 UDP Injec4on AWack What does the awacker need to do in order to spoof messages from Alice to Bob? Alice s IP Address Diagram credit: Wikipedia
16 UDP Injec4on AWack What does the awacker need to do in order to spoof messages from Alice to Bob? Alice s IP Address Bob s IP Address Diagram credit: Wikipedia
17 UDP Injec4on AWack What does the awacker need to do in order to spoof messages from Alice to Bob? Alice s IP Address Bob s IP Address Alice s UDP Port Number Bob s UDP Port Number Diagram credit: Wikipedia
18 Example: Voice over IP (VoIP) Suppose the VoIP protocol only sends packets when the user is speaking Alice I love you Bob J
19 Example: Voice over IP (VoIP) Now our awacker can inject audio into the call Alice Bob L I hate you
20 Example: Voice over IP (VoIP) What if both transmit simultaneously? What does Bob actually hear? Alice I love you Bob I hate you
21 Example: Voice over IP (VoIP) What if both transmit simultaneously? What does Bob actually hear? Answer: Depends on Bob s applica4on code! Alice I love you Bob??? I hate you
22 Example: Voice over IP (VoIP) What if both transmit simultaneously? What does Bob actually hear? Answer: Depends on Bob s applica4on code! (Probably a garbled mess but it could be worse) Alice I love you Bob??? I hate you
23 Transport Layer Role: Provides end- to- end messages UDP Thin wrapper around IP Connec4onless, unreliable TCP Connec4on- oriented Reliable data transfer
24 TCP: Transmission Control Protocol Connec4on- oriented protocol Connec4on setup SYN, SYN/ACK, ACK Connec4on teardown FIN, ACK, FIN, ACK Reliable, in- order data transfer Sequence numbers Posi4ve, cumula4ve acknowledgements (ACK s) Retransmission on 4meout
25 TCP: Transmission Control Protocol TCP Segment Header
26 TCP: Injec4on AWacks Can the awacker s4ll inject arbitrary data? Alice From: Alice To: Bob Subject: Good News Bob Subject: Bad News
27 Textbook TCP: 3- way Handshake Flags: SYN Seq 0 Ack n/a Seq 0 Ack 0 Flags: SYN/ACK Seq 0 Ack 0
28 Textbook TCP: Data Transfer Seq 0 Ack 0 Data: Hi Bob!\r\n Seq 10 Ack 12 Seq 0 Ack 10 Data: Hi Alice!\r\n
29 Textbook TCP: Recovering from Loss Seq 1000 Seq 1100 Seq 1200 (Timeout, or 3x dup ACK) Seq 1100 Seq 905 Ack 1100 Seq 905 Ack 1300
30 TCP Injec4on AWacks Seq 0 Ack 0 Data: Hi Bob!\r\n Seq 0 Ack 10 Data: Go away loser! \r\n AWacker who can predict TCP sequence numbers can inject data into a vic4m s input stream Seq 0 Ack 10 Data: Hi Alice!\r\n
31 TCP Injec4on AWacks Seq 0 Ack 0 Data: Hi Bob!\r\n Ques4on: What does Alice see (in the applica4on) as a result of these transmissions? Seq 0 Ack 10 Data: Go away loser! \r\n Seq 0 Ack 10 Data: Hi Alice!\r\n AWacker who can predict TCP sequence numbers can inject data into a vic4m s input stream
32 TCP Injec4on AWacks Seq 0 Ack 0 Data: Hi Bob!\r\n AWacker who can predict TCP sequence numbers can inject data into a vic4m s input stream Seq 0 Ack 10 Data: Hi Alice!\r\n Now the packets are reversed. Does your answer change? Seq 0 Ack 10 Data: Go away loser! \r\n
33 Inside TCP What s really going on inside Alice s TCP? recv buffer
34 Inside TCP What s really going on inside Alice s TCP? recv window recv buffer
35 Inside TCP What s really going on inside Alice s TCP? recv window recv buffer Seq 900
36 Inside TCP What s really going on inside Alice s TCP? recv window recv buffer Seq 900
37 Inside TCP What s really going on inside Alice s TCP? recv window recv buffer Seq 900 Seq 1000
38 Inside TCP What s really going on inside Alice s TCP? recv window recv buffer Seq 900 Seq 1000 Seq 1100 Seq 1200
39 Inside TCP What s really going on inside Alice s TCP? recv window recv buffer Seq 900 Seq 1000 Seq 1100 Seq 1200 Packet loss leaves a gap
40 TCP Injec4on AWacks Seq 0 Ack 0 Data: Hi Bob!\r\n AWacker who can predict TCP sequence numbers can inject data into a vic4m s input stream Seq 0 Ack 10 Data: Hi Alice!\r\n Now the packets are reversed. Does your answer change? Seq 0 Ack 10 Data: Go away loser! \r\n
41 Inside TCP What s really going on inside Alice s TCP? recv window recv buffer Seq 0 Ack 10 When the awacker s packet arrives first, Bob s packet is bounced, because it s outside the receive window. Seq 0 Ack 10
42 Inside TCP What s really going on inside Alice s TCP? recv window recv buffer Seq 0 Ack 10 Similarly, when Bob s packet arrives first, the awacker s packet is bounced, because it s outside the receive window. Seq 0 Ack 10
43 Inside TCP What s really going on inside Alice s TCP? recv window recv buffer Seq 0 Ack 10 Similarly, when Bob s packet arrives first, the awacker s packet is bounced, because it s outside the receive window. Seq 0 Ack 10 BUT, the awacker s4ll wins whenever he can deliver his packet first.
44 Mi4ga4on: Randomize Ini4al Sequence Numbers Instead of star4ng at zero, generate a random number for each new connec4on First packet: seq = n Second packet: seq = n + sizeof(first packet)
45 TCP: Injec4on AWacks Sequence number guessing If the awacker can guess the random ISN, he can s4ll accomplish his awack How hard is this in prac4ce? Today (hopefully) it s quite hard But this was not always so For more info, see hwp://lcamtuf.coredump.cx/newtcp/ hwp://lcamtuf.coredump.cx/oldtcp/tcpseq.html
46 Visualizing ISN Randomness Linux 2.2 Not too bad
47 Visualizing ISN Randomness Windows NT 4 SP 6 A liwle worse
48 Visualizing ISN Randomness Windows 95 PreWy bad
49 Visualizing ISN Randomness Cisco IOS 12.0 Really bad
50 Visualizing ISN Randomness SGI IRIX 6.5 Horrible!
51 Outline for Today Security and the Transport Layer Network Monitoring and Intrusion DetecEon Ptacek and Newsham: Inser4on and Evasion AWacks
52 Network Monitoring Idea AWackers may penetrate our border defenses Let s watch the network to see if we can catch them Use a host separate from other network func4ons
53 Network Monitoring Intui4on Aper all, many link layers provide a shared broadcast medium. Data is easy to get. (Or is it?) If the awacker can use this against us, surely we can turn the same technique around on him!
54 Network Monitoring: Assump4ons AWacker starts outside the network, and must somehow break in to an internal host. Monitor box is off the cri4cal path, but s4ll in a good posi4on to see all packets in & out of the network
55 Outline for Today Security and the Transport Layer Network Monitoring and Intrusion Detec4on Ptacek and Newsham: InserEon and Evasion AQacks
56 Challenges in Network Monitoring Two key problems The monitor and the vic4ms sit at different loca4ons in the network The monitor and the vic4ms run different sopware, and thus interpret packets differently
57 Challenges in Network Monitoring Two key problems The monitor and the vicems sit at different locaeons in the network The monitor and the vic4ms run different sopware, and thus interpret packets differently
58 Inser4on AWacks AWacker can cause the monitor to sound a false alarm For this example, suppose the awacker is 17 hops away from the monitor, and 20 hops away from the vic4ms.
59 Inser4on AWacks AWacker can cause the monitor to sound a false alarm Src: AWacker Dst: Vic4m TTL: 18 Data: (**^&^#@ For this example, suppose the awacker is 17 hops away from the monitor, and 20 hops away from the vic4ms.
60 Inser4on AWacks AWacker can cause the monitor to sound a false alarm For this example, suppose the awacker is 17 hops away from the monitor, and 20 hops away from the vic4ms. Src: AWacker Dst: Vic4m TTL: 1 Data: (**^&^#@ Oh no! ALARM!!!
61 Inser4on AWacks AWacker can cause the monitor to sound a false alarm For this example, suppose the awacker is 17 hops away from the monitor, and 20 hops away from the vic4ms. Src: AWacker Dst: Vic4m TTL: 0 Data: (**^&^#@ TTL = 0, so drop the packet. Yawn
62 Challenges in Network Monitoring Two key problems The monitor and the vic4ms sit at different loca4ons in the network The monitor and the vicems run different sosware, and thus interpret packets differently
63 Evasion AWacks Simplest approach: Make the monitor discard the awack packets Bogus header fields Bogus combina4ons of fields All op4ons are fair game, as long as the vicem s4ll treats the packet as valid
64 Evasion AWacks More sophis4cated awack: Make the monitor and the vic4m see the same packets differently Examples TCP stream reassembly IP fragmenta4on
65 Textbook TCP: Recovering from Loss Seq 1000 Seq 1100 Seq 1200 (Timeout, or 3x dup ACK) Seq 1100 Seq 905 Ack 1100 Seq 905 Ack 1300
66 Inside TCP What s really going on inside Alice s TCP? recv window recv buffer Seq 900
67 Inside TCP What s really going on inside Alice s TCP? recv window recv buffer Seq 900
68 Inside TCP What s really going on inside Alice s TCP? recv window recv buffer Seq 900 Seq 1000
69 Inside TCP What s really going on inside Alice s TCP? recv window recv buffer Seq 900 Seq 1000 Seq 1100 Seq 1200
70 Inside TCP What s really going on inside Alice s TCP? recv window recv buffer Seq 900 Seq 1000 Seq 1200 When a packet is lost, Alice s TCP has a gap
71 Inside TCP What s really going on inside Alice s TCP? recv window recv buffer Seq 900 Seq 1000 Seq 1100 Seq 1200 Arrival of the missing packet fills the gap.
72 Problems What s really going on inside Alice s TCP? recv window recv buffer Seq 900 Seq 1000 Seq 1200 What happens when the missing packet overlaps with exis4ng data?
73 Problems What s really going on inside Alice s TCP? recv window recv buffer???? Seq 900 Seq 1000 Seq 1200 What happens when the missing packet overlaps with exis4ng data? Seq 1100
74 Problems What s really going on inside Alice s TCP? recv window recv buffer???? Seq 900 Seq 1000 Seq 1200 What happens when the missing packet overlaps with exis4ng data? Seq 1050
75 Problems What s really going on inside Alice s TCP? recv window recv buffer???? Seq 900 Seq 1000 Seq 1200 What happens when the missing packet overlaps with exis4ng data? Seq 1050
76 Problems Q: What happens when mul4ple TCP segments overlap? A: It depends on the host TCP implementa4on Example: Windows and Linux react very differently
77 Problems recv window recv buffer???? Seq 900 Seq 1000 Seq 1200 AWacker can use overlap to disguise the real contents of the TCP connec4on Seq 1050
78 Problems recv window recv buffer???? Seq 900 Seq 1000 Seq 1200 AWacker can use overlap to disguise the real contents of the TCP connec4on Seq 1050
79 An aside: Why bother? Overlapping TCP segments?!??!! WTF?! What kind of an idiot does that? Why not just drop the connec4on? Internet philosophy: Be liberal in what you accept and conserva:ve in what you send Other implementa4ons may do crazy things For best interoperability, just go with the flow This approach made the Internet possible
80 Same problem, but worse: IP Fragmenta4on Perhaps the bigger concern is IP fragmenta4on Remember, IP packets can be broken up in flight if they re too big for some hop Endpoints have no guarantee as to how the packets are sliced & diced in transit
81
82 Announcements Submit an SSH public key for Git access Use the Public Keys dropbox on D2L Do this by 10pm tomorrow, Wednesday Apr 9 th
83 Lab 01 Walk- through with Wireshark dpkt preliminaries
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
How do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
Overview of TCP/IP. TCP/IP and Internet
Overview of TCP/IP System Administrators and network administrators Why networking - communication Why TCP/IP Provides interoperable communications between all types of hardware and all kinds of operating
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
Protocols. Packets. What's in an IP packet
Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets
Defending Computer Networks Lecture 6: TCP and Scanning. Stuart Staniford Adjunct Professor of Computer Science
Defending Computer Networks Lecture 6: TCP and Scanning Stuart Staniford Adjunct Professor of Computer Science Logis;cs HW1 due tomorrow First quiz will be Tuesday September 23 rd. Half hour quiz at start
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
Protocol Rollback and Network Security
CSE 484 / CSE M 584 (Spring 2012) Protocol Rollback and Network Security Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee,
How To Understand The Internet From A Telephone To A Computer (For A Computer)
Basic Concepts In Computer Networking Antonio Carzaniga Faculty of Informatics University of Lugano September 19, 2014 Goal of this Lecture Understand what packet switching is Understand what circuit switching
FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others
FIREWALLS FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN flooding: attacker
Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg
Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona [email protected] Copyright
Session Hijacking Exploiting TCP, UDP and HTTP Sessions
Session Hijacking Exploiting TCP, UDP and HTTP Sessions Shray Kapoor [email protected] Preface With the emerging fields in e-commerce, financial and identity information are at a higher risk of being
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A
Phase 2: Scanning Detec0ng informa0on useful for break- in Live machines Network topology Firewall configura0on Applica0ons and OS types Vulnerabili0es
Phase 2: Scanning Detec0ng informa0on useful for break- in Live machines Network topology Firewall configura0on Applica0ons and OS types Vulnerabili0es Finding live hosts Ping sweep TCP SYN sweep Map network
Life of a Packet CS 640, 2015-01-22
Life of a Packet CS 640, 2015-01-22 Outline Recap: building blocks Application to application communication Process to process communication Host to host communication Announcements Syllabus Should have
Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
Computer Networks. Chapter 5 Transport Protocols
Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data
Networks: IP and TCP. Internet Protocol
Networks: IP and TCP 11/1/2010 Networks: IP and TCP 1 Internet Protocol Connectionless Each packet is transported independently from other packets Unreliable Delivery on a best effort basis No acknowledgments
Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding
Names & Addresses EE 122: IP Forwarding and Transport Protocols Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues at UC Berkeley)
Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
Transport Layer Services Mul9plexing/Demul9plexing. Transport Layer Services
Computer Networks Mul9plexing/Demul9plexing Transport services and protocols provide logical communica+on between app processes running on different hosts protocols run in end systems send side: breaks
Networking Attacks: Link-, IP-, and TCP-layer attacks. CS 161: Computer Security Prof. David Wagner
Networking Attacks: Link-, IP-, and TCP-layer attacks CS 161: Computer Security Prof. David Wagner February 28, 2013 General Communication Security Goals: CIA! Confidentiality: No one can read our data
Distributed Systems Interconnec=ng Them Fundamentals of Distributed Systems Alvaro A A Fernandes School of Computer Science University of Manchester
Distributed Systems Interconnec=ng Them Fundamentals of Distributed Systems lvaro Fernandes School of Computer Science University of Manchester Goals 1. To highlight the role of the interconnect in characterizing
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Technical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Chapter 8 Network Security
[Computer networking, 5 th ed., Kurose] Chapter 8 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 84Securing 8.4 e-mail 8.5 Securing TCP connections: SSL 8.6 Network
VLAN und MPLS, Firewall und NAT,
Internet-Technologien (CS262) VLAN und MPLS, Firewall und NAT, 15.4.2015 Christian Tschudin Departement Mathematik und Informatik, Universität Basel 6-1 Wiederholung Unterschied CSMA/CD und CSMA/CA? Was
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP
CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery
CYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
CS101 Lecture 19: Internetworking. What You ll Learn Today
CS101 Lecture 19: Internetworking Internet Protocol IP Addresses Routing Domain Name Services Aaron Stevens ([email protected]) 6 March 2013 What You ll Learn Today What is the Internet? What does Internet Protocol
LMS. OSI Layers and the Learning Management System. Over view
Over view A Learning is an applica7on located on a local network or the Internet, developed for the employment of electronic educa7onal technology by students across distances from a building with mul7ple
How To Understand The Internet Of S (Netware)
Summer Workshop on Cyber Security Computer s Security (Part 1) Dr. Hamed Mohsenian-Rad University of California at Riverside and Texas Tech University August 12-16, 2013 Supported by National Science Foundation
IPv6 and DDoS Protec0on: Securing Carrier Grade NAT Infrastructure
IPv6 and DDoS Protec0on: Securing Carrier Grade NAT Infrastructure Glen Turner Consul,ng Systems Engineer IPv6 Migra,on Technologies A10 Networks [email protected] DDoS A
Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)
Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets) The diagram below illustrates four routers on the Internet backbone along with two companies that have gateways for their internal
Unix System Administration
Unix System Administration Chris Schenk Lecture 08 Tuesday Feb 13 CSCI 4113, Spring 2007 ARP Review Host A 128.138.202.50 00:0B:DB:A6:76:18 Host B 128.138.202.53 00:11:43:70:45:81 Switch Host C 128.138.202.71
Solution of Exercise Sheet 5
Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????
Voice over IP. Demonstration 1: VoIP Protocols. Network Environment
Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed
Network Programming TDC 561
Network Programming TDC 561 Lecture # 1 Dr. Ehab S. Al-Shaer School of Computer Science & Telecommunication DePaul University Chicago, IL 1 Network Programming Goals of this Course: Studying, evaluating
OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS
OLD VULNERABILITIES IN NEW PROTOCOLS? HEADACHES ABOUT IPV6 FRAGMENTS Eric Vyncke (@evyncke) Cisco Session ID: ARCH W01 Session Classification: Advanced Agenda Status of WorldWide IPv6 Deployment IPv6 refresher:
LESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP
Understand TCP/IP Lesson Overview In this lesson, you will learn about: TCP/IP Tracert Telnet Netstat Reserved addresses Local loopback IP Ping Pathping Ipconfig Protocols Anticipatory Set Experiment with
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Computer Networks. Examples of network applica3ons. Applica3on Layer
Computer Networks Applica3on Layer 1 Examples of network applica3ons e- mail web instant messaging remote login P2P file sharing mul3- user network games streaming stored video clips social networks voice
Module 7 Internet And Internet Protocol Suite
Module 7 Internet And Internet Protocol Suite Lesson 21 Internet and IPv4 LESSON OBJECTIVE General The lesson will discuss a popular network layer protocol, i.e. the Internet Protocol Specific The focus
Kick starting science...
Computer ing (TDDD63): Part 1 Kick starting science... Niklas Carlsson, Associate Professor http://www.ida.liu.se/~nikca/ What do you have in the future? What do you have in the future? How does it keep
Network Security: Workshop. Dr. Anat Bremler-Barr. Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org
1.pcap - File download Network Security: Workshop Dr. Anat Bremler-Barr Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org Downloading a file is a pretty basic function when described
1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?
Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against
Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology
Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student
DHCP, ICMP, IPv6. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley DHCP. DHCP UDP IP Eth Phy
, ICMP, IPv6 UDP IP Eth Phy UDP IP Eth Phy Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley Some materials copyright 1996-2012 J.F Kurose and K.W. Ross, All Rights
Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)
s (March 4, 2015) Abdou Illia Spring 2015 Test your knowledge Which of the following is true about firewalls? a) A firewall is a hardware device b) A firewall is a software program c) s could be hardware
CSE 127: Computer Security. Network Security. Kirill Levchenko
CSE 127: Computer Security Network Security Kirill Levchenko December 4, 2014 Network Security Original TCP/IP design: Trusted network and hosts Hosts and networks administered by mutually trusted parties
CIT 380: Securing Computer Systems
CIT 380: Securing Computer Systems Scanning CIT 380: Securing Computer Systems Slide #1 Topics 1. Port Scanning 2. Stealth Scanning 3. Version Identification 4. OS Fingerprinting 5. Vulnerability Scanning
CSE 473 Introduction to Computer Networks. Exam 2 Solutions. Your name: 10/31/2013
CSE 473 Introduction to Computer Networks Jon Turner Exam Solutions Your name: 0/3/03. (0 points). Consider a circular DHT with 7 nodes numbered 0,,...,6, where the nodes cache key-values pairs for 60
Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
Network Intrusion Detection Systems. Beyond packet filtering
Network Intrusion Detection Systems Beyond packet filtering Goal of NIDS Detect attacks as they happen: Real-time monitoring of networks Provide information about attacks that have succeeded: Forensic
Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology
Port Scanning and Vulnerability Assessment ECE4893 Internetwork Security Georgia Institute of Technology Agenda Reconnaissance Scanning Network Mapping OS detection Vulnerability assessment Reconnaissance
COMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions)
COMP 3331/9331: Computer Networks and Applications Lab Exercise 3: TCP and UDP (Solutions) AIM To investigate the behaviour of TCP and UDP in greater detail. EXPERIMENT 1: Understanding TCP Basics Tools
Prefix AggregaNon. Company X and Company Y connect to the same ISP, and they are assigned the prefixes:
Data Transfer Consider transferring an enormous file of L bytes from Host A to B using a MSS of 1460 bytes and a 66 byte header. What is the maximum value of L such that TCP sequence numbers are not exhausted?
TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the
Transport Layer. Chapter 3.4. Think about
Chapter 3.4 La 4 Transport La 1 Think about 2 How do MAC addresses differ from that of the network la? What is flat and what is hierarchical addressing? Who defines the IP Address of a device? What is
Final exam review, Fall 2005 FSU (CIS-5357) Network Security
Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection
TCP Performance Management for Dummies
TCP Performance Management for Dummies Nalini Elkins Inside Products, Inc. Monday, August 8, 2011 Session Number 9285 Our SHARE Sessions Orlando 9285: TCP/IP Performance Management for Dummies Monday,
Lecture 2-ter. 2. A communication example Managing a HTTP v1.0 connection. G.Bianchi, G.Neglia, V.Mancuso
Lecture 2-ter. 2 A communication example Managing a HTTP v1.0 connection Managing a HTTP request User digits URL and press return (or clicks ). What happens (HTTP 1.0): 1. Browser opens a TCP transport
1 Introduction to mobile telecommunications
1 Introduction to mobile telecommunications Mobile phones were first introduced in the early 1980s. In the succeeding years, the underlying technology has gone through three phases, known as generations.
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
What is a DoS attack?
CprE 592-YG Computer and Network Forensics Log-based Signature Analysis Denial of Service Attacks - from analyst s point of view Yong Guan 3216 Coover Tel: (515) 294-8378 Email: [email protected] October
CSE 3461 / 5461: Computer Networking & Internet Technologies
Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2
CPS221 Lecture: Layered Network Architecture
CPS221 Lecture: Layered Network Architecture Objectives last revised 9/10/12 1. To discuss the OSI layered architecture model 2. To discuss the specific implementation of this model in TCP/IP Materials:
Post-Class Quiz: Telecommunication & Network Security Domain
1. What type of network is more likely to include Frame Relay, Switched Multi-megabit Data Services (SMDS), and X.25? A. Local area network (LAN) B. Wide area network (WAN) C. Intranet D. Internet 2. Which
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
INTRODUCTION TO FIREWALL SECURITY
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
An Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
Visualizations and Correlations in Troubleshooting
Visualizations and Correlations in Troubleshooting Kevin Burns Comcast [email protected] 1 Comcast Technology Groups Cable CMTS, Modem, Edge Services Backbone Transport, Routing Converged Regional
Access Control: Firewalls (1)
Access Control: Firewalls (1) World is divided in good and bad guys ---> access control (security checks) at a single point of entry/exit: in medieval castles: drawbridge in corporate buildings: security/reception
Migrating to Hosted Telephony. Your ultimate guide to migrating from on premise to hosted telephony. www.ucandc.com
Migrating to Hosted Telephony Your ultimate guide to migrating from on premise to hosted telephony Intro What is covered in this guide? A professional and reliable business telephone system is a central
Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.
Port Scanning Objectives 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap. Introduction: All machines connected to a LAN or connected to Internet via a modem
Attack Lab: Attacks on TCP/IP Protocols
Laboratory for Computer Security Education 1 Attack Lab: Attacks on TCP/IP Protocols Copyright c 2006-2010 Wenliang Du, Syracuse University. The development of this document is funded by the National Science
NAT & IP Masquerade. Internet NETWORK ADDRESS TRANSLATION INTRODUCTION. NAT & IP Masquerade Page 1 of 5. Internal PC 192.168.0.25
NAT & IP Masquerade Page 1 of 5 INTRODUCTION Pre-requisites TCP/IP IP Address Space NAT & IP Masquerade Protocol version 4 uses a 32 bit IP address. In theory, a 32 bit address space should provide addresses
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting Chapter 1 1. Introducing Penetration Testing 1.1 What is penetration testing 1.2 Different types of test 1.2.1 External Tests
Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett
Network Security Internet not originally designed with (much) security in mind original vision: a group of mutually trusting users attached to a transparent network Security considerations in all layers!
Digital Audio and Video Data
Multimedia Networking Reading: Sections 3.1.2, 3.3, 4.5, and 6.5 CS-375: Computer Networks Dr. Thomas C. Bressoud 1 Digital Audio and Video Data 2 Challenges for Media Streaming Large volume of data Each
Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik
Network Security Chapter 3 Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: October 21, 2015 IN2101, WS 15/16, Network Security 1 Security Policies and
Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas [email protected]
Lab 2 CS-335a Fall 2012 Computer Science Department Manolis Surligas [email protected] 1 Summary At this lab we will cover: Basics of Transport Layer (TCP, UDP) Broadcast ARP DNS More Wireshark filters
The OSI and TCP/IP Models. Lesson 2
The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP
Policy Based Forwarding
Policy Based Forwarding Tech Note PAN-OS 4.1 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Security... 3 Performance... 3 Symmetric Routing... 3 Service Versus
Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.
Load Balancing Un article de Le wiki des TPs RSM. PC Final Network Exam Sommaire 1 LSNAT 1.1 Deployement of LSNAT in a globally unique address space (LS-NAT) 1.2 Operation of LSNAT in conjunction with
TCP SYN Flood - Denial of Service Seung Jae Won University of Windsor [email protected]
TCP SYN Flood - Denial of Service Seung Jae Won University of Windsor [email protected] Abstract TCP SYN flooding attack is a kind of denial-of-service attack. This SYN flooding attack is using the weakness
Multipath TCP in Practice (Work in Progress) Mark Handley Damon Wischik Costin Raiciu Alan Ford
Multipath TCP in Practice (Work in Progress) Mark Handley Damon Wischik Costin Raiciu Alan Ford The difference between theory and practice is in theory somewhat smaller than in practice. In theory, this
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 roadmap 1 What is network security? 2 Principles of cryptography 3 Message integrity, authentication
Overview. Lecture 16: IP variations: IPv6, multicast, anycast. I think we have a problem. IPv6. IPv6 Key Features
Overview Lecture 16: IP variations: IPv6, multicast, anycast Next generation IP: IPv6 6lowpan and the Internet of Things IP multicast IP anycast Practical considerations throughout I think we have a problem
Ignoring the Great Firewall of China
An Overview of Ignoring the Great Firewall of China By: Matt Landau Original Paper: Ignoring the Great Firewall of China Richard Clayton, Steven J. Murdoch, and Robert N. M. Watson University of Cambridge,
Internet Control Protocols Reading: Chapter 3
Internet Control Protocols Reading: Chapter 3 ARP - RFC 826, STD 37 DHCP - RFC 2131 ICMP - RFC 0792, STD 05 1 Goals of Today s Lecture Bootstrapping an end host Learning its own configuration parameters
