Network Security DNS, DDOS and Firewalls
|
|
|
- Lorena Watts
- 9 years ago
- Views:
Transcription
1 Network Security DNS, DDOS and Firewalls pril 15, 2015 Lecture by Kevin Chen Slides credit: Vern Paxson, Dawn Song 1
2 DNS Background 2
3 Host Names vs. IP addresses Host names Examples: and Mnemonic name appreciated by humans Variable length, full alphabet of characters Provide little (if any) information about location IP addresses Examples: and Numerical address appreciated by routers Fixed length, binary number Hierarchical, related to host location 3
4 Mapping Names to ddresses Domain Name System (DNS) Hierarchical name space divided into zones Zones distributed over collection of DNS servers (lso separately maps addresses to names) Hierarchy of DNS servers Root (hardwired into other servers) Top-level domain (TLD) servers uthoritative DNS servers (e.g. for berkeley.edu) 4
5 Mapping Names to ddresses Domain Name System (DNS) Hierarchical name space divided into zones Zones distributed over collection of DNS servers (lso separately maps addresses to names) Hierarchy of DNS servers Root (hardwired into other servers) Top-level domain (TLD) servers uthoritative DNS servers (e.g. for berkeley.edu) Performing the translations Each computer configured to contact a resolver 5
6 Example root DNS server (. ) Host at xyz.poly.edu wants IP address for gaia.cs.umass.edu 2 3 TLD DNS server (.edu ) 4 local DNS server (resolver) 5 dns.poly.edu authoritative DNS server ( umass.edu, cs.umass.edu ) dns.cs.umass.edu requesting host xyz.poly.edu gaia.cs.umass.edu 6
7 DNS Protocol DNS protocol: query and reply messages, both with same message format (Mainly uses UDP transport rather than TCP) Message header: Identification: 16 bit # for query, reply to query uses same # 16 bits 16 bits Identification Flags # Questions # nswer RRs # uthority RRs # dditional RRs Replies can include uthority (name server responsible for answer) and dditional (info client is likely to look up soon anyway) uthority (variable # of resource records) Replies have a Time To Live (in seconds) for caching dditional information (variable # of resource records) 7 Questions (variable # of resource records) nswers (variable # of resource records)
8 dig eecs.mit.edu Use Unix utility to look up DNS address ( ) for hostname ; ; <<>> DiG PPLE-P2 <<>> eecs.mit.edu a ;; global options: +cmd ;; Got answer: ;; ->>HEDER<<- opcode: QUERY, status: NOERROR, id: ;; flags: qr rd ra; QUERY: 1, NSWER: 1, UTHORITY: 3, DDITIONL: 3 ;; QUESTION SECTION: ;eecs.mit.edu. ;; NSWER SECTION: eecs.mit.edu ;; UTHORITY SECTION: mit.edu. mit.edu. mit.edu NS NS NS BITSY.mit.edu. W20NS.mit.edu. STRWB.mit.edu. ;; DDITIONL SECTION: STRWB.mit.edu. BITSY.mit.edu. W20NS.mit.edu
9 dig eecs.mit.edu ; ; <<>> DiG PPLE-P2 <<>> eecs.mit.edu a ;; global options: +cmd ;; Got answer: ;; ->>HEDER<<- opcode: QUERY, status: NOERROR, id: ;; flags: qr rd ra; QUERY: 1, NSWER: 1, UTHORITY: 3, DDITIONL: 3 ;; QUESTION SECTION: ;eecs.mit.edu. just comments from These are itself with details of the request/response ;; NSWER SECTION: eecs.mit.edu ;; UTHORITY SECTION: mit.edu. mit.edu. mit.edu NS NS NS BITSY.mit.edu. W20NS.mit.edu. STRWB.mit.edu. ;; DDITIONL SECTION: STRWB.mit.edu. BITSY.mit.edu. W20NS.mit.edu
10 dig eecs.mit.edu ; ; <<>> DiG PPLE-P2 <<>> eecs.mit.edu a ;; global options: +cmd ;; Got answer: ;; ->>HEDER<<- opcode: QUERY, status: NOERROR, id: ;; flags: qr rd ra; QUERY: 1, NSWER: 1, UTHORITY: 3, DDITIONL: 3 ;; QUESTION SECTION: ;eecs.mit.edu. Transaction identifier ;; NSWER SECTION: eecs.mit.edu ;; UTHORITY SECTION: mit.edu. mit.edu. mit.edu NS NS NS BITSY.mit.edu. W20NS.mit.edu. STRWB.mit.edu. ;; DDITIONL SECTION: STRWB.mit.edu. BITSY.mit.edu. W20NS.mit.edu
11 dig eecs.mit.edu ; ; <<>> DiG PPLE-P2 <<>> eecs.mit.edu a ;; global options: +cmd ;; Got answer: ;; ->>HEDER<<- opcode: QUERY, status: NOERROR, id: ;; flags: qr rd ra; QUERY: 1, NSWER: 1, UTHORITY: 3, DDITIONL: 3 ;; QUESTION SECTION: ;eecs.mit.edu. ;; NSWER SECTION: eecs.mit.edu ;; UTHORITY SECTION: mit.edu. mit.edu. mit.edu NS NS NS BITSY.mit.edu. W20NS.mit.edu. STRWB.mit.edu. ;; DDITIONL SECTION: STRWB.mit.edu. BITSY.mit.edu. W20NS.mit.edu Here the server echoes back the question that it is answering 11
12 dig eecs.mit.edu ; ; <<>> DiG PPLE-P2 <<>> eecs.mit.edu a ;; global options: +cmd ;; Got answer: ;; ->>HEDER<<- opcode: QUERY, status: NOERROR, id: ;; flags: qr rd ra; QUERY: 1, NSWER: UTHORITY: 3, DDITIONL: 3 nswer tells us its1, address is and ;; QUESTION SECTION: ;eecs.mit.edu. we can cache the result for 21,600 seconds ;; NSWER SECTION: eecs.mit.edu ;; UTHORITY SECTION: mit.edu. mit.edu. mit.edu NS NS NS BITSY.mit.edu. W20NS.mit.edu. STRWB.mit.edu. ;; DDITIONL SECTION: STRWB.mit.edu. BITSY.mit.edu. W20NS.mit.edu
13 dig eecs.mit.edu ; ; <<>> DiG PPLE-P2 <<>> eecs.mit.edu a ;; global options: +cmd ;; Got answer: ;; ->>HEDER<<- opcode: QUERY, status: NOERROR, id: ;; flags: qr rd ra; QUERY: 1, NSWER: 1, UTHORITY: 3, DDITIONL: 3 ;; QUESTION SECTION: ;eecs.mit.edu. ;; NSWER SECTION: eecs.mit.edu. uthority tells us the name servers responsible for the answer. Each record gives the hostname of a different name server ( ) for names in We should cache each record for 11,088 seconds ;; UTHORITY SECTION: mit.edu. mit.edu. mit.edu NS NS NS BITSY.mit.edu. W20NS.mit.edu. STRWB.mit.edu. ;; DDITIONL SECTION: STRWB.mit.edu. BITSY.mit.edu. W20NS.mit.edu
14 dig eecs.mit.edu ; ; <<>> DiG PPLE-P2 <<>> eecs.mit.edu a ;; global options: +cmd ;; Got answer: ;; ->>HEDER<<- opcode: QUERY, status: NOERROR, id: ;; flags: qr rd ra; QUERY: 1, NSWER: 1, UTHORITY: 3, DDITIONL: 3 ;; QUESTION SECTION: dditional provides to save us from ;eecs.mit.edu. extra information making separate lookups for it, or helps with bootstrapping. ;; NSWER SECTION: Here, it tells us the IP addresses for the hostnames of the eecs.mit.edu name servers. We add these to our cache. ;; UTHORITY SECTION: mit.edu. mit.edu. mit.edu NS NS NS BITSY.mit.edu. W20NS.mit.edu. STRWB.mit.edu. ;; DDITIONL SECTION: STRWB.mit.edu. BITSY.mit.edu. W20NS.mit.edu
15 Non-Eavesdropping Threats: DNS DHCP attacks show brutal power of attacker who can eavesdrop Consider attackers who can t eavesdrop - but still aim to manipulate us via how protocols function s a DNS resolver Off-path DNS spoofing DNS: path-critical for just about everything we do Maps hostnames IP addresses Design only scales if we can minimize lookup traffic #1 way to do so: caching #2 way to do so: return not only answers to queries, but additional info that will likely be needed shortly Directly interacting w/ DNS: dig program on Unix llows querying of DNS system Dumps each field in DNS responses 15
16 dig eecs.mit.edu ; ; <<>> DiG PPLE-P2 <<>> eecs.mit.edu a ;; global options: +cmd ;; Got answer: ;; ->>HEDER<<- opcode: QUERY, status: NOERROR, id: ;; flags: qr rd ra; QUERY: 1, NSWER: 1, UTHORITY: 3, DDITIONL: 3 ;; QUESTION SECTION: ;eecs.mit.edu. What happens if the mit.edu server returns the following to us instead? ;; NSWER SECTION: eecs.mit.edu ;; UTHORITY SECTION: mit.edu. mit.edu. mit.edu NS NS NS BITSY.mit.edu. W20NS.mit.edu. eecs.berkeley.edu. ;; DDITIONL SECTION: eecs.berkeley.edu. BITSY.mit.edu. W20NS.mit.edu
17 dig eecs.mit.edu ; ; <<>> DiG PPLE-P2 <<>> eecs.mit.edu a ;; global options: +cmd ;; Got answer: ;; ->>HEDER<<- opcode: QUERY, status: NOERROR, id: ;; flags: qr rd ra; QUERY: 1, NSWER: 1, UTHORITY: 3, DDITIONL: 3 ;; QUESTION SECTION: ;eecs.mit.edu. ;; NSWER SECTION: eecs.mit.edu. NS NS NS BITSY.mit.edu. W20NS.mit.edu. eecs.berkeley.edu We dutifully store in our cache a mapping of to an IP address under MIT s control. (It could have been any IP address they wanted, not just one of theirs.) ;; UTHORITY SECTION: mit.edu. mit.edu. mit.edu ;; DDITIONL SECTION: eecs.berkeley.edu. BITSY.mit.edu. W20NS.mit.edu
18 dig eecs.mit.edu ; ; <<>> DiG PPLE-P2 <<>> eecs.mit.edu a ;; global options: +cmd ;; Got answer: ;; ->>HEDER<<- opcode: QUERY, status: NOERROR, id: ;; flags: qr rd ra; QUERY: 1, NSWER: 1, UTHORITY: 3, DDITIONL: 3 ;; QUESTION SECTION: ;eecs.mit.edu. ;; NSWER SECTION: eecs.mit.edu. In this case they chose to make the mapping disappear after 30 seconds. They could for have made it persist weeks, or disappear even quicker. ;; UTHORITY SECTION: mit.edu. mit.edu. mit.edu ;; DDITIONL SECTION: eecs.berkeley.edu. BITSY.mit.edu. W20NS.mit.edu NS NS NS BITSY.mit.edu. W20NS.mit.edu. eecs.berkeley.edu
19 dig eecs.mit.edu ; ; <<>> DiG PPLE-P2 <<>> eecs.mit.edu a ;; global options: +cmd ;; Got answer: ;; ->>HEDER<<- opcode: QUERY, status: NOERROR, id: ;; flags: qr rd ra; QUERY: 1, NSWER: 1, UTHORITY: 3, DDITIONL: 3 ;; QUESTION SECTION: ;eecs.mit.edu. ;; NSWER SECTION: eecs.mit.edu such cache How do we fix poisoning? ;; UTHORITY SECTION: mit.edu. mit.edu. mit.edu ;; DDITIONL SECTION: eecs.berkeley.edu. BITSY.mit.edu. W20NS.mit.edu NS NS NS BITSY.mit.edu. W20NS.mit.edu. eecs.berkeley.edu
20 dig eecs.mit.edu ; ; <<>> DiG PPLE-P2 <<>> eecs.mit.edu a ;; global options: +cmd Don t accept dditional records unless they ;; Got answer: re QUERY, for thestatus: domainnoerror, we re looking up ;; ->>HEDER<<- opcode: id: ;; flags: qr rd ra; QUERY:E.g., 1, looking NSWER:up1, UTHORITY: 3, DDITIONL: only accept 3 additional records from * ;; QUESTION SECTION: ;eecs.mit.edu ;; UTHORITY SECTION: mit.edu. mit.edu. mit.edu NS NS NS BITSY.mit.edu. W20NS.mit.edu. eecs.berkeley.edu. ;; DDITIONL SECTION: eecs.berkeley.edu. BITSY.mit.edu. W20NS.mit.edu ;; NSWER SECTION: eecs.mit.edu. No extra risk in accepting these since server could return them to us directly in an nswer anyway. = 20
21 DNS Threats, con t What about blind spoofing? 16 bits Say we look up ; how can an offpath attacker feed us a bogus answer before the legitimate server replies? How can such an attacker even know we are looking up? Identification 16 bits Flags # Questions # nswer RRs # uthority RRs # dditional RRs Questions (variable # of resource records) nswers (variable # of resource records) uthority (variable # of resource records) dditional information (variable # of resource records) 21
22 DNS Blind Spoofing, con t Fix? Once they know we re looking it up, they just have to guess the Identification field and reply before legit server. How hard is that? Originally, identification field incremented by 1 for each request. How does attacker guess it? 16 bits Identification 16 bits Flags # Questions # nswer RRs # uthority RRs # dditional RRs Questions (variable # of resource records) nswers (variable # of resource records) uthority (variable # of resource records) dditional information (variable # of resource records) They observe ID k here 22 So this will be k+1
23 DNS Blind Spoofing, con t Once we randomize the Identification, attacker has a 1/65536 chance of guessing it correctly. re we pretty much safe? ttacker can send lots of replies, not just one 16 bits Identification 16 bits Flags # Questions # nswer RRs # uthority RRs # dditional RRs Questions (variable # of resource records) nswers (variable # of resource records) uthority (variable # of resource records) dditional information (variable # of resource records) However: once reply from legit server arrives (with correct Unless attacker can send Identification), it s cached and 1000s of replies before legit no more opportunity to poison it. arrives, we re likely safe Victim is innoculated! 23 phew!?
24 DNS Blind Spoofing (Kaminsky 2008) Two key ideas: Spoof uses dditional field (rather than nswer) ttacker can get around caching of legit replies by generating a series of different name lookups: 24
25 Kaminsky Blind Spoofing, con t ;; QUESTION SECTION: ;randomk.google.com. For each lookup of, attacker returns a bunch of records like this, each with a different Identifier ;; NSWER SECTION: randomk.google.com ;; UTHORITY SECTION: google.com NS mail.google.com ;; DDITIONL SECTION: mail.google.com Once they win the race, not only have they poisoned but also the cached record for s name server - so any future X lookups go through the attacker s machine 25
26 Kaminsky Blind Spoofing, con t ;; QUESTION SECTION: ;randomk.google.com. For each lookup of, attacker returns a bunch of records like this, each with a different Identifier ;; NSWER SECTION: randomk.google.com ;; UTHORITY SECTION: google.com NS mail.google.com ;; DDITIONL SECTION: mail.google.com Once they win the race, not only have they poisoned but also the cached record for s name server - so any future X lookups go through the attacker s machine 26
27 Defending gainst Blind Spoofing Central problem: all that tells a client they should accept a response is that it matches the Identification field. 16 bits 16 bits Identification Flags # Questions # nswer RRs # uthority RRs # dditional RRs Questions (variable # of resource records) With only 16 bits, it lacks sufficient entropy: even if truly random, the search space an attacker must brute force is too small. nswers (variable # of resource records) uthority (variable # of resource records) dditional information (variable # of resource records) Where can we get more entropy? (Without requiring a protocol change.) 27
28 Defending gainst Blind Spoofing DNS (primarily) uses UDP for transport rather than TCP. UDP header has: UDP Header 16-bit Source & Destination ports (identify processes, like w/ TCP) 16-bit checksum, 16-bit length 16 bits 16 bits SRC port DST port checksum length Identification Flags # Questions # nswer RRs # uthority RRs # dditional RRs Questions (variable # of resource records) UDP Payload nswers (variable # of resource records) uthority (variable # of resource records) dditional information (variable # of resource records) 28
29 Defending gainst Blind Spoofing Total entropy: 16 bits DNS (primarily) uses UDP for transport rather than TCP. UDP header has: 16-bit Source & Destination ports (identify processes, like w/ TCP) 16-bit checksum, 16-bit length For requestor to receive DNS reply, needs both correct Identification and correct ports. On a request, DST port = 53. SRC port usually also 53 - but not fundamental, just convenient 16 bits 16 bits Src=53 Dest=53 checksum length Identification Flags # Questions # nswer RRs # uthority RRs # dditional RRs Questions (variable # of resource records) nswers (variable # of resource records) uthority (variable # of resource records) dditional information (variable # of resource records) 29
30 Defending gainst Blind Spoofing Fix : use random source port Total entropy:? bits 16 bits 16 bits Src=rnd Dest=53 checksum length Identification Flags # Questions # nswer RRs # uthority RRs # dditional RRs Questions (variable # of resource records) nswers (variable # of resource records) uthority (variable # of resource records) dditional information (variable # of resource records) 30
31 Defending gainst Blind Spoofing Fix : use random source port 32 bits of entropy makes it orders of magnitude harder for attacker to guess all the necessary fields and dupe victim into accepting spoof response. This is what primarily secures DNS today. (Note: not all resolvers have implemented random source ports!) Total entropy: 32 bits 16 bits 16 bits Src=rnd Dest=53 checksum length Identification Flags # Questions # nswer RRs # uthority RRs # dditional RRs Questions (variable # of resource records) nswers (variable # of resource records) uthority (variable # of resource records) dditional information (variable # of resource records) 31
32 32
33 Denial-of-Service (DoS) Preventing legitimate users from using a service We need to consider our threat model What might motivate a DoS attack?
34
35
36
37
38
39
40
41
42 42 Credit:
43
44 44 Credit: kamai, The State of the Internet Q4 2014
45 45 Credit:
46 Showing off / entertainment / ego Competitive advantage Maybe commercial, maybe just to win Vendetta / denial-of-money Extortion Political statements Impair defenses Espionage Warfare
47 Types of DoS Network-level DoS pplication-level DoS DDoS: Distributed Denial-of-Service mplification is key: Traffic volume amplification o E.g. third parties amplify traffic Computation resource amplification o E.g. memory consumption, CPU cycles 47
48 How could you DoS a target s Internet access? Flooding with lots of packets (brute-force) DDoS: flood with packets from many sources mplification: buse patsies who will amplify your traffic What resources does attacker need? t least as much sending capacity ( bandwidth ) as the bottleneck link of the target s Internet connection o ttacker sends maximum-sized packets Or: overwhelm the rate at which the bottleneck router can process packets o ttacker sends minimum-sized packets to maximize packet arrival rate
49 Suppose an attacker has high bandwidth (a big pipe ) It sends packets to the target at a high rate How can the target defend against onslaught? Install a network filter to discard any packets that arrive with attacker s IP address as their source o E.g., drop * :* -> *:* o Or it can leverage any other pattern in the flooding traffic that s not in benign traffic o ttacker s IP address = means of identifying misbehaving user
50 but DoS filters can be easily evaded Make traffic appear as though it s from many hosts Spoof the source address so it can t be used to filter o Just pick a random 32-bit number of each packet sent How does a defender filter this? o They don t! o Best they can hope for is that operators around the world implement anti-spoofing mechanisms (today about 75% do) Use many hosts to send traffic rather than just one Requires defender to install complex filters How many hosts is enough for the attacker? o Today they are very cheap to acquire :-(
51 symmetries allow attackers to consume victim resources with little comparable effort Makes DoS easier to launch Defense costs much more than attack Particularly dangerous form of asymmetry: amplification ttacker leverages third party resources to increase workload
52 mplification example: DNS lookups ttacker spoofs DNS request from open DNS servers, seemingly from the target Small attacker packets yield large flooding packets o Since the reply includes a copy of the query, plus the answer, etc Note #1: these examples involve blind spoofing So for network-layer flooding, generally only works for UDP-based protocols (can t establish TCP conn.) Note #2: victim doesn t see spoofed source addresses ddresses are those of actual intermediary systems
53 Recall TCP s 3-way connection establishment handshake Goal: agree on initial sequence numbers Server Client (initiator) SYN, Seq N um = x m = y, eqnu S, K C + SYN ttacker doesn t even need to send this ack CK, ck =y+1 ck = x + 1 Server creates state associated with connection here (buffers, timers, counters)
54 Recall TCP s 3-way connection establishment handshake Goal: agree on initial sequence numbers So a single SYN from an attacker suffices to force the server to spend some memory Server Client (initiator) SYN, Seq N um = x m = y, eqnu S, K C + SYN ttacker doesn t even need to send this ack CK, ck =y+1 ck = x + 1 Server creates state associated with connection here (buffers, timers, counters)
55 ttacker targets memory rather than network capacity Every (unique) SYN that the attacker sends burdens the target What should target do when it has no more memory for a new connection? No good answer Refuse new connection? o Legit new users can t access service Evict old connections to make room? o Legit old users get kicked off
56 How can the target defend itself? pproach #1: tons of memory How much is enough? Depends on resources attacker can bring to bear (threat model), which might be hard to know
57 pproach #2: identify bad actors & refuse connections Hard because identification is on IP address o We cannot require a password because doing so requires an established connection! For a public Internet service, who knows which addresses customers might come from? Plus: attacker can spoof addresses since they don t need to complete TCP 3-way handshake pproach #3: don t keep state! SYN cookies ; only works for spoofed SYN flooding
58 Server: when SYN arrives, rather than keeping state locally, send it to the client Client needs to return the state in order to established connection Server Client (initiator) Do not save state here; give to client SYN, Seq N um = x tate> 1, <S + x = k c, eqnum = y S+, S CK, ck = y + 1, < Server only saves state here State>
59 Server: when SYN arrives, rather than keeping state locally, send it to the client Problem: the world isn t so ideal! Client needs to return the state in order to established connection TCP doesn t include an easy way to add a new <State> field like this. Server Client (initiator) SYN, Seq N Is there any wayumto= xget the same functionality without having to State> <, 1 + x = y, ck change TCP =clients? m u N q e S S+, CK, ck = y + 1, < State> Do not save state here; give to client Server only saves state here
60 Server: when SYN arrives, encode connection state entirely within SYN-CK s sequence # y y = encoding of necessary state, using server secret When CK of SYN-CK arrives, server only creates state if value of y from it agrees w/ secret Client (initiator) Instead, encode it here Server Do not create state here SYN, Seq N um = x ck =, y = m u N CK, Seq d n a N Y S CK, ck =y+1 x+1 Server only creates state here
61 Illustrates general strategy: rather than holding state, encode it so that it is returned when needed For SYN cookies, attacker must complete 3-way handshake in order to burden server Can t use spoofed source addresses Note #1: strategy requires that you have enough bits to encode all the state (This is just barely the case for SYN cookies) Note #2: if it s expensive to generate or check the cookie, then it s not a win
62 Rather than exhausting network or memory resources, attacker can overwhelm a service s processing capacity There are many ways to do so, often at little expense to attacker compared to target (asymmetry)
63 The link sends a request to the web server that requires heavy processing by its backend database.
64
65 Rather than exhausting network or memory resources, attacker can overwhelm a service s processing capacity There are many ways to do so, often at little expense to attacker compared to target (asymmetry) Defenses against such attacks? pproach #1: Only let legit users issue expensive requests Relies on being able to identify/authenticate them Note: that this itself might be expensive! pproach #2: Force legit users to burn cash pproach #3: Over-provisioning ($$$)
66 Defending against program flaws requires: Careful design and coding/testing/review Consideration of behavior of defense mechanisms o E.g. buffer overflow detector that when triggered halts execution to prevent code injection denial-of-service Defending resources from exhaustion is hard. Requires: Isolation and scheduling mechanisms o Keep adversary s consumption from affecting others Reliable identification of different users
67 67
68 Harden set of systems against external attack More network services greater risk Larger attack surface Can turn off unnecessary services Requires knowledge of all services running Sometimes trusted users require access Scaling issues Hundreds/thousands of systems Many different operating systems, hardware, users
69 Possibly more scalable defense: Reduce risk by blocking in the network outsiders from having unwanted access your network services Interpose a firewall the traffic to/from the outside must traverse Chokepoint can cover thousands of hosts o Where in everyday experience do we see such chokepoints? Internet Internal Network
70 Firewall enforces an (access control) policy: Who is allowed to talk to whom, accessing what service? Distinguish between inbound & outbound connections Inbound: attempts by external users to connect to services on internal machines Outbound: internal users to external services Why? Because fits with a common threat model. There are thousands of internal users (and we ve vetted them). There are billions of outsiders. Conceptually simple access control policy: Permit inside users to connect to any service External users restricted: o Permit connections to services meant to be externally visible o Deny connections to services not meant for external access
71 Default allow Begin by permitting external access to services Turn off as problems recognized Default deny Begin by denying external access to services Turn on access on case-by-case basis Generally we use default deny Flexibility vs conservative design Flaws in default deny are noticed more quickly (less painfully)
72 Stateful packet filter is a router that checks each packet against security rules and decides to forward or drop it Firewall keeps track of all connections (inbound/outbound) Each rule specifies which connections are allowed/denied (access control policy) packet is forwarded if it is part of an allowed connection Internet Internal Network
73 Permits TCP connection that is Initiated by host Connecting to port 80 of host Permits any packet ( ) associated with connection Firewall keeps table of allowed active connections Checks traffic against table
74 Permits TCP connection that is Initiated by any internal host ( ) Connecting to port 80 of on external network Permits any packet ( ) associated with connection indicates network interface
75 Permits all outbound TCP connections Those initiated by internal hosts Permits inbound TCP connection to web server (port 80) at IP address
76 o Firewall should permit outbound TCP connections (i.e., those that are initiated by internal hosts) o Firewall should permit inbound TCP connection to our public webserver at IP address
77 Secure External ccess to Inside Machines Fileserver User Internet VPN server Company Yahoo Often need to provide secure remote access to a network protected by a firewall Remote access, telecommuting, branch offices, Create secure channel (Virtual Private Network, or VPN) to tunnel traffic from outside host/network to inside network Provides uthentication, Confidentiality, Integrity However, also raises perimeter issues (Try it yourself at
78 Firewall dvantages Central control easy administration and update Single point of control: update one config to change security policies Potentially allows rapid response Easy to deploy transparent to end users Easy incremental/total deployment to protect 1000 s ddresses an important problem Security vulnerabilities in network services are rampant Easier to use firewall than to directly secure code
79 Firewall Disadvantages Functionality loss less connectivity, less risk May reduce network s usefulness Some applications don t work with firewalls Two peer-to-peer users behind different firewalls The malicious insider problem ssume insiders are trusted Malicious insider (or anyone gaining control of internal machine) can wreak havoc Firewalls establish a security perimeter Like Eskimo Pies: hard crunchy exterior, soft creamy center Threat from travelers with laptops, cell phones,
Solution of Exercise Sheet 5
Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????
CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006
CSE331: Introduction to Networks and Security Lecture 12 Fall 2006 Announcements Midterm I will be held Friday, Oct. 6th. True/False Multiple Choice Calculation Short answer Short essay Project 2 is on
CSE 127: Computer Security. Network Security. Kirill Levchenko
CSE 127: Computer Security Network Security Kirill Levchenko December 4, 2014 Network Security Original TCP/IP design: Trusted network and hosts Hosts and networks administered by mutually trusted parties
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
FIREWALL AND NAT Lecture 7a
FIREWALL AND NAT Lecture 7a COMPSCI 726 Network Defence and Countermeasures Muhammad Rizwan Asghar August 3, 2015 Source of most of slides: University of Twente FIREWALL An integrated collection of security
Network Security in Practice
Network Security in Practice Practices of Network Security ccess control: firewalls ttacks and counter measures Security protocol case studies Kai Shen 12/8/2014 CSC 257/457 - Fall 2014 1 12/8/2014 CSC
A1.1.1.11.1.1.2 1.1.1.3S B
CS Computer 640: Network AdityaAkella Lecture Introduction Networks Security 25 to Security DoS Firewalls and The D-DoS Vulnerabilities Road Ahead Security Attacks Protocol IP ICMP Routing TCP Security
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
Network Security - ISA 656 Firewalls & NATs
Network Security - ISA 656 & NATs Angelos Stavrou Types of Schematic of a Conceptual Pieces Packet UDP Types of Packet Dynamic Packet Application Gateways Circuit Relays Personal /or Distributed Many firewalls
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
Networking Attacks: Link-, IP-, and TCP-layer attacks. CS 161: Computer Security Prof. David Wagner
Networking Attacks: Link-, IP-, and TCP-layer attacks CS 161: Computer Security Prof. David Wagner February 28, 2013 General Communication Security Goals: CIA! Confidentiality: No one can read our data
Firewalls, Tunnels, and Network Intrusion Detection. Firewalls
Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
INTRODUCTION TO FIREWALL SECURITY
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
TCP/IP Security Problems. History that still teaches
TCP/IP Security Problems History that still teaches 1 remote login without a password rsh and rcp were programs that allowed you to login from a remote site without a password The.rhosts file in your home
Domain Name System. DNS is an example of a large scale client-server application. Copyright 2014 Jim Martin
Domain Name System: DNS Objective: map names to IP addresses (i.e., high level names to low level names) Original namespace was flat, didn t scale.. Hierarchical naming permits decentralization by delegating
We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall
Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,
Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.
Firewalls 1 Firewalls Idea: separate local network from the Internet Trusted hosts and networks Firewall Intranet Router DMZ Demilitarized Zone: publicly accessible servers and networks 2 1 Castle and
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Internet-Praktikum I Lab 3: DNS
Kommunikationsnetze Internet-Praktikum I Lab 3: DNS Mark Schmidt, Andreas Stockmayer Sommersemester 2015 kn.inf.uni-tuebingen.de Motivation for the DNS Problem IP addresses hard to remember for humans
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Final exam review, Fall 2005 FSU (CIS-5357) Network Security
Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection
CSCI 4250/6250 Fall 2015 Computer and Networks Security
CSCI 4250/6250 Fall 2015 Computer and Networks Security Network Security Goodrich, Chapter 5-6 Tunnels } The contents of TCP packets are not normally encrypted, so if someone is eavesdropping on a TCP
Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik
Network Security Chapter 3 Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: October 21, 2015 IN2101, WS 15/16, Network Security 1 Security Policies and
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Vulnerability Analysis 1 Roadmap Why vulnerability analysis? Example: TCP/IP related vulnerabilities
Firewalls. Ahmad Almulhem March 10, 2012
Firewalls Ahmad Almulhem March 10, 2012 1 Outline Firewalls The Need for Firewalls Firewall Characteristics Types of Firewalls Firewall Basing Firewall Configurations Firewall Policies and Anomalies 2
DNS Basics. DNS Basics
DNS Basics 1 A quick introduction to the Domain Name System (DNS). Shows the basic purpose of DNS, hierarchy of domain names, and an example of how the DNS protocol is used. There are many details of DNS
Acquia Cloud Edge Protect Powered by CloudFlare
Acquia Cloud Edge Protect Powered by CloudFlare Denial-of-service (DoS) Attacks Are on the Rise and Have Evolved into Complex and Overwhelming Security Challenges TECHNICAL GUIDE TABLE OF CONTENTS Introduction....
Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1
SEED Labs Local DNS Attack Lab 1 Local DNS Attack Lab Copyright c 2006 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation s Course,
CloudFlare advanced DDoS protection
CloudFlare advanced DDoS protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE [email protected] www.cloudflare.com
Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)
s (March 4, 2015) Abdou Illia Spring 2015 Test your knowledge Which of the following is true about firewalls? a) A firewall is a hardware device b) A firewall is a software program c) s could be hardware
Secure Software Programming and Vulnerability Analysis
Secure Software Programming and Vulnerability Analysis Christopher Kruegel [email protected] http://www.auto.tuwien.ac.at/~chris Operations and Denial of Service Secure Software Programming 2 Overview
DNS. Spring 2016 CS 438 Staff 1
DNS Spring 2016 CS 438 Staff 1 Host Names vs. IP addresses Host names Mnemonic name appreciated by humans Variable length, full alphabet of characters Provide little (if any) information about physical
DNS Best Practices. Mike Jager Network Startup Resource Center [email protected]
DNS Best Practices Mike Jager Network Startup Resource Center [email protected] This document is a result of work by the Network Startup Resource Center (NSRC at http://www.nsrc.org). This document may be
Firewalls 1 / 43. Firewalls
What s a Firewall Why Use? Tradttional by Analogy Should We Fix the Network Protocols Instead? Firewall Advantages Schematic of a Firewall Conceptual Pieces The DMZ Positioning Why Administrative Domains?
Lecture 5: Network Attacks I. Course Admin
Lecture 5: Network Attacks I CS 336/536: Computer Network Security Fall 2013 Nitesh Saxena Adopted from previous lectures by Keith Ross Course Admin HW/Lab 1 Due Coming Monday 11am Lab sessions are active
Firewalls P+S Linux Router & Firewall 2013
Firewalls P+S Linux Router & Firewall 2013 Firewall Techniques What is a firewall? A firewall is a hardware or software device which is configured to permit, deny, or proxy data through a computer network
Firewalls. Chapter 3
Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall What is a Firewall? Non-computer industries: a wall that controls the spreading of a fire. Networks: a designed device that controls
Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1
Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls CS426 Fall 2010/Lecture 36 1 Announcements There will be a quiz on Wed There will be a guest lecture on Friday, by Prof. Chris Clifton
Stateful Firewalls. Hank and Foo
Stateful Firewalls Hank and Foo 1 Types of firewalls Packet filter (stateless) Proxy firewalls Stateful inspection Deep packet inspection 2 Packet filter (Access Control Lists) Treats each packet in isolation
Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)
Network Security ICMP, TCP, DNS, Scanning Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT) Agenda A couple of examples of network protocols that
Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA
Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
Overview. Firewall Security. Perimeter Security Devices. Routers
Overview Firewall Security Chapter 8 Perimeter Security Devices H/W vs. S/W Packet Filtering vs. Stateful Inspection Firewall Topologies Firewall Rulebases Lecturer: Pei-yih Ting 1 2 Perimeter Security
Session Hijacking Exploiting TCP, UDP and HTTP Sessions
Session Hijacking Exploiting TCP, UDP and HTTP Sessions Shray Kapoor [email protected] Preface With the emerging fields in e-commerce, financial and identity information are at a higher risk of being
Domain Name System (DNS)
Domain Name System (DNS) Instructor: Anirban Mahanti Office: ICT 745 Email: [email protected] Class Location: ICT 121 Lectures: MWF 12:00 12:50 Notes derived from Computer Networking: A Top Down
1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?
Page 1 of 5 1. Introduction The present document explains about common attack scenarios to computer networks and describes with some examples the following features of the MilsGates: Protection against
KAREL UCAP DNS AND DHCP CONCEPTS MANUAL MADE BY: KAREL ELEKTRONIK SANAYI ve TICARET A.S. Organize Sanayi Gazneliler Caddesi 10
KAREL UCAP DNS AND DHCP CONCEPTS MANUAL MADE BY: KAREL ELEKTRONIK SANAYI ve TICARET A.S. Organize Sanayi Gazneliler Caddesi 10 Sincan 06935 Ankara, Turkey Version Table Manual Version/Date AAA/22.03.2011
Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks
Threat Paper Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks Federal Computer Incident Response Center 7 th and D Streets S.W. Room 5060 Washington,
Domain Name System (DNS)
Chapter 18 CSC465 Computer Networks Spring 2004 Dr. J. Harrison These slides are based on the text TCP/IP Protocol Suite (2 nd Edition) Domain Name System (DNS) CONTENTS NAME SPACE DOMAIN NAME SPACE DISTRIBUTION
TDC s perspective on DDoS threats
TDC s perspective on DDoS threats DDoS Dagen Stockholm March 2013 Lars Højberg, Technical Security Manager, TDC TDC in Sweden TDC in the Nordics 9 300 employees (2012) Turnover: 26,1 billion DKK (2012)
NET0183 Networks and Communications
NET0183 Networks and Communications Lecture 25 DNS Domain Name System 8/25/2009 1 NET0183 Networks and Communications by Dr Andy Brooks DNS is a distributed database implemented in a hierarchy of many
VPN Lesson 2: VPN Implementation. Summary
VPN Lesson 2: VPN Implementation Summary 1 Notations VPN client (ok) Firewall Router VPN firewall VPN router VPN server VPN concentrator 2 Basic Questions 1. VPN implementation options for remote users
What is a DoS attack?
CprE 592-YG Computer and Network Forensics Log-based Signature Analysis Denial of Service Attacks - from analyst s point of view Yong Guan 3216 Coover Tel: (515) 294-8378 Email: [email protected] October
This Lecture. The Internet and Sockets. The Start 1969. If everyone just sends a small packet of data, they can all use the line at the same.
This Lecture The Internet and Sockets Computer Security Tom Chothia How the Internet works. Some History TCP/IP Some useful network tools: Nmap, WireShark Some common attacks: The attacker controls the
The Environment Surrounding DNS. 3.1 The Latest DNS Trends. 3. Technology Trends
3. The Environment Surrounding DNS DNS is used in many applications, serving as an important Internet service. Here we discuss name collision issues that have arisen with recent TLD additions, and examine
Chapter 7 Protecting Against Denial of Service Attacks
Chapter 7 Protecting Against Denial of Service Attacks In a Denial of Service (DoS) attack, a Routing Switch is flooded with useless packets, hindering normal operation. HP devices include measures for
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
Internet Security [1] VU 184.216. Engin Kirda [email protected]
Internet Security [1] VU 184.216 Engin Kirda [email protected] Christopher Kruegel [email protected] Administration Challenge 2 deadline is tomorrow 177 correct solutions Challenge 4 will
Implementing Secure Converged Wide Area Networks (ISCW)
Implementing Secure Converged Wide Area Networks (ISCW) 1 Mitigating Threats and Attacks with Access Lists Lesson 7 Module 5 Cisco Device Hardening 2 Module Introduction The open nature of the Internet
Lecture 23: Firewalls
Lecture 23: Firewalls Introduce several types of firewalls Discuss their advantages and disadvantages Compare their performances Demonstrate their applications C. Ding -- COMP581 -- L23 What is a Digital
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant What infrastructure security really means? Infrastructure Security is Making sure that your system services are always running
A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006
IBM TRAINING A43 Modern Hacking Techniques and IP Security By Shawn Mullen Las Vegas, NV 2005 CSI/FBI US Computer Crime and Computer Security Survey 9 out of 10 experienced computer security incident in
Security of IPv6 and DNSSEC for penetration testers
Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions
Denial of Service Attacks
(DoS) What Can be DoSed? First Internet DoS Attack The TCP State Diagram SYN Flooding Anti-Spoofing Better Data Structures Attacking Compact Data Structures Generic Solution SYN Cookies It s Not Perfect
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Internet Firewall CSIS 3230. Internet Firewall. Spring 2012 CSIS 4222. net13 1. Firewalls. Stateless Packet Filtering
Internet Firewall CSIS 3230 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 8.8: Packet filtering, firewalls, intrusion detection Ch
Names & Addresses. Names & Addresses. Hop-by-Hop Packet Forwarding. Longest-Prefix-Match Forwarding. Longest-Prefix-Match Forwarding
Names & Addresses EE 122: IP Forwarding and Transport Protocols Scott Shenker http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues at UC Berkeley)
Classification of Firewalls and Proxies
Classification of Firewalls and Proxies By Dhiraj Bhagchandka Advisor: Mohamed G. Gouda ([email protected]) Department of Computer Sciences The University of Texas at Austin Computer Science Research
Denial Of Service. Types of attacks
Denial Of Service The goal of a denial of service attack is to deny legitimate users access to a particular resource. An incident is considered an attack if a malicious user intentionally disrupts service
A Very Incomplete Diagram of Network Attacks
A Very Incomplete Diagram of Network Attacks TCP/IP Stack Reconnaissance Spoofing Tamper DoS Internet Transport Application HTTP SMTP DNS TCP UDP IP ICMP Network/Link 1) HTML/JS files 2)Banner Grabbing
Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org
Domain Name System (DNS) RFC 1034 RFC 1035 http://www.ietf.org TCP/IP Protocol Suite Application Layer DHCP DNS SNMP HTTP SMTP POP Transport Layer UDP TCP ICMP IGMP Network Layer IP Link Layer ARP ARP
How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)
Security principles Firewalls and NAT These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host vs Network
Surviving DNS DDoS Attacks. Introducing self-protecting servers
Introducing self-protecting servers Background The current DNS environment is subject to a variety of distributed denial of service (DDoS) attacks, including reflected floods, amplification attacks, TCP
Content Distribution Networks (CDN)
229 Content Distribution Networks (CDNs) A content distribution network can be viewed as a global web replication. main idea: each replica is located in a different geographic area, rather then in the
Forouzan: Chapter 17. Domain Name System (DNS)
Forouzan: Chapter 17 Domain Name System (DNS) Domain Name System (DNS) Need System to map name to an IP address and vice versa We have used a host file in our Linux laboratory. Not feasible for the entire
DoS/DDoS Attacks and Protection on VoIP/UC
DoS/DDoS Attacks and Protection on VoIP/UC Presented by: Sipera Systems Agenda What are DoS and DDoS Attacks? VoIP/UC is different Impact of DoS attacks on VoIP Protection techniques 2 UC Security Requirements
Reducing the impact of DoS attacks with MikroTik RouterOS
Reducing the impact of DoS attacks with MikroTik RouterOS Alfredo Giordano Matthew Ciantar WWW.TIKTRAIN.COM 1 About Us Alfredo Giordano MikroTik Certified Trainer and Consultant Support deployment of WISP
Domain Name System (or Service) (DNS) Computer Networks Term B10
Domain Name System (or Service) (DNS) Computer Networks Term B10 DNS Outline DNS Hierarchial Structure Root Name Servers Top-Level Domain Servers Authoritative Name Servers Local Name Server Caching and
DDoS Protection Technology White Paper
DDoS Protection Technology White Paper Keywords: DDoS attack, DDoS protection, traffic learning, threshold adjustment, detection and protection Abstract: This white paper describes the classification of
Network Security. Mobin Javed. October 5, 2011
Network Security Mobin Javed October 5, 2011 In this class, we mainly had discussion on threat models w.r.t the class reading, BGP security and defenses against TCP connection hijacking attacks. 1 Takeaways
DNS at NLnet Labs. Matthijs Mekking
DNS at NLnet Labs Matthijs Mekking Topics NLnet Labs DNS DNSSEC Recent events NLnet Internet Provider until 1997 The first internet backbone in Holland Funding research and software projects that aid the
ΕΠΛ 674: Εργαστήριο 5 Firewalls
ΕΠΛ 674: Εργαστήριο 5 Firewalls Παύλος Αντωνίου Εαρινό Εξάμηνο 2011 Department of Computer Science Firewalls A firewall is hardware, software, or a combination of both that is used to prevent unauthorized
What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services
Firewalls What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services only authorized traffic is allowed Auditing and
DNS Cache-Poisoning: New Vulnerabilities and Implications, or: DNSSEC, the time has come!
DNS Cache-Poisoning: New Vulnerabilities and Implications, or: DNSSEC, the time has come! Amir Herzberg and Haya Shulman Dept. of Computer Science Bar Ilan University 8/1/2013 About us Bar Ilan University
Firewalls Overview and Best Practices. White Paper
Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not
DNS, CDNs Weds March 17 2010 Lecture 13. What is the relationship between a domain name (e.g., youtube.com) and an IP address?
DNS, CDNs Weds March 17 2010 Lecture 13 DNS What is the relationship between a domain name (e.g., youtube.com) and an IP address? DNS is the system that determines this mapping. Basic idea: You contact
Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System
Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce 18/02/15 Networks: DNS attacks 1 Domain Name System The domain name system (DNS) is an applica>on- layer protocol
Attack Lab: Attacks on TCP/IP Protocols
Laboratory for Computer Security Education 1 Attack Lab: Attacks on TCP/IP Protocols Copyright c 2006-2010 Wenliang Du, Syracuse University. The development of this document is funded by the National Science
