Denial of Service Prevention in Satellite Networks
|
|
|
- Loraine Marsha Whitehead
- 10 years ago
- Views:
Transcription
1 Denial of Service Prevention in Satellite Networks Melek Önen, Refik Molva Institut Eurécom Sophia-ntipolis - France {Melek.Onen,Refik.Molva}@eurecom.fr bstract Networks integrating satellite shared access, such as DV-S/RCS, are particularly exposed to Denial of Service (DoS) attacks through which a satellite terminal can maliciously use the Network Control Center (NCC) resources by submitting a high number of bogus requests. nti-clogging techniques used in terrestrial mesh networks to thwart DoS attacks fall short of solving DoS problems in the case of satellite networks due to the inherent broadcast capability of the communication medium. We suggest a generic mechanism to prevent DoS attacks in control plane protocols. The principle behind this mechanism is an efficient identification technique that allows the satellite servers to quickly discard bogus requests. Thanks to this technique, intruders controlling the total bandwidth of the up-link can only consume a very small fraction of the NCC s resources. I. INTRODUCTION The shared access capabilities provided by satellite systems such as DV-S/RCS [1] or UDLR [2] raise serious security concerns. n important issue is the ease at which unauthorized users can get access to satellite services. straightforward countermeasure consists of access control based on user authentication. Unfortunately, while solving the access control problem, strong authentication brings up a new vulnerability that is denial of service (DoS). iming at preventing legitimate users from accessing the service provided by the satellite system, a simple solution using access control based on strong authentication procedures embedded in the satellite access control system would still allow intruders to perpetrate DoS attacks by submitting a large number of bogus requests messages. Since the authentication of each request involves CPU intensive cryptographic operations and allocation of memory space required to store protocol state information, the screening of a large number of bogus requests thus results in high CPU utilization and occupation of large memory segments at the expense of potential legitimate requests that are delayed or simply discarded by the server. There exist some authentication protocols proposed for meshed terrestrial networks including the protection against DoS attacks based on the anti-clogging technique [3]. This technique introduces a weak authentication phase prior to the actual authentication in order to screen out authentication requests sent by an intruder with a bogus source address. During this weak authentication phase, the server replies to the claimed source address of each request providing some information that would allow the recipient to further proceed with the actual authentication phase. Since requests resulting This work is partially supported by lcatel Space Industries, Toulouse, France. from a DoS attack bear a bogus source address, the corresponding weak authentication replies sent by the server will not reach the intruder preventing the latter from being able to further consume server resources with the actual authentication phase. Such DoS prevention technique is not suitable to the satellite network environment because the screening of bogus requests by the weak authentication mechanism will not be effective due to the inherent broadcast capability of the satellite segment. Due to the broadcast medium, intruders can receive all traffic including the weak authentication replies destined to bogus addresses from DoS attacks, thus eliminating the benefit of the anti-clogging technique. Therefore, we propose an efficient identification protocol that allows the satellite servers to quickly discard bogus requests without even sending replies to the claimed address of each request to get the assurance of the legitimacy of the request. Our mechanism is based on the use of strong authentication techniques for each message where the consumption of the server s resources during the verification phase is optimized. We first present existing DoS prevention techniques designed for terrestrial networks and show their shortcomings in the satellite environment. We then describe a first basic identification protocol requiring a strong synchronization mechanism between the satellite terminals and the Network Control Center (NCC). We further enhance this protocol in an improved version that only requires loose clock synchronization between the NCC and the terminals. We then evaluate the effectiveness of our DoS prevention mechanism using a simulation of DoS attacks in various settings in terms of NCC CPU power. The results of the simulations show that even a powerful attacker that controls the total up-link bandwidth can only consume a minor fraction of NCC resources. II. PROLEM TEMENT. Definition of Denial of Service ttacks Denial of Service attacks aim at preventing legitimate users from accessing a service they are authorized to access in normal circumstances. CERT classifies three kind of DoS attacks in [4] : Consumption of scarce, limited, or non renewable resources; Destruction or alteration of configuration information; Physical destruction or alteration for network components.
2 Destroying or altering a configuration information is only possible when the network or the computer is not properly configured. In these cases, an intruder may prevent the legitimate user from using the network or its computer. We suppose that the satellite system and its components are properly configured and protected physically against the unauthorized access. Consequently, the last two kinds of attacks will not be under the scope of this paper and we focus on the first type of attacks where the target of an attacker is the victim s principle resources which are : the memory and the disk space, the network bandwidth and the CPU time. In a typical attack, the intruder may be able to consume a significant portion of the memory and the disk space at the target by sending some special packets based on the mandatory memory allocation caused by the processing of each packet. The SYN flood attack described in [5], [6] is a typical example of a memory consumption attack. This kind of attacks may also affect CPU usage if the verification of packets involves computationally intensive operations. Moreover, the intruder may also consume the available bandwidth entirely by generating a large number of faked packets. Since the rate of requests originating from a legitimate entity lays below a limit that is acceptable for the server, in order to justify an increased rate, DoS attacks persistently emulate several sources by either setting bogus source addresses in requests generated by a single intruder, by having recourse to several sources as distributed intruders, or both. The first approach used by DoS prevention methods therefore consists of screening requests with bogus source identification. Even though a perfect measure to that effect, a straightforward implementation of data origin authentication techniques unfortunately does not solve the DoS problem. s a computing intensive operation based on cryptographic algorithms, like digital signature or encryption, the authentication of the requests becomes the new target for the DoS attacks.. Denial of Service Prevention in Terrestrial Networks IPSec [7], has defined a framework for key exchange and negotiation of security associations (S), called ISKMP [8]. This protocol allows peer entities to select and negotiate the S with the incorporation of a mechanism to counter DoS attacks. ISKMP is based on the anti-clogging technique [3] where an exchange of weak authentication information called cookie occurs at the beginning of each client-server connection before initiating any resource-intensive verification. cookie is generated by each communicating entity and has some special characteristics [3] fostering a fast and efficient exchange : It is generated based on a local secret known only by its generator; It depends on the addresses of the communicating entities; It is verifiable by the generator; Its generation and verification are efficient in CPU and memory consumption. Initiator Fig. 1. IP address = local secret k,, cookie = H(,, t,k ),, cookie = H(,, t,k ), cookie,, cookie,cookie,requisiteness Responder IP address = local secret k no verification small overhead (H) no ressource allocation if matches cookie process request The principle of the anti-clogging technique nti-clogging is carried by the cookie exchange protocol as depicted in figure 1. This exchange allows the verification of the client s presence at the claimed IP address. The client initially sends a request to the server with its cookie. Upon the receipt of this request, the server sends without any verification, another cookie based on the claimed IP address of the client retrieved from the request. ecause the server s reply including server s cookie is sent to the claimed client address, an intruder using a bogus IP address cannot get the server s cookie. Consequently, in case of a request with a bogus source address, the server will not receive any third message including the client s and the server s cookies, hence the DoS attack intended by the bogus request will not succeed. Only requests originating from legitimate parties will thus reach the server. Moreover, the computation of the cookie by the server is based on a simple hash function requiring low CPU usage in comparison with CPU-intensive strong authentication and key generation operations and no resource reservation takes place before the completion of the successful cookie exchange [9]. Each ISKMP message contains the pair of cookies generated by the initiator and the responder based on the anti-clogging technique. C. Requirements of the Satellite Network The previously depicted anti-clogging technique is ineffective in the satellite environment for two reasons : the broadcast nature of communications and the end-to-end latency. Due to the inherent broadcast nature of satellite communications, each terminal can receive all traffic from the servers. In this context, the anti-clogging technique based on the cookie exchange would be ineffective because the cookies generated by the server and intended for sources impersonated by the intruder would still be received by the intruder who will then be able to reply with the expected weak authentication messages successfully masquerading as several different sources. The screening of bogus source addresses that is perfectly suitable to mesh networks would thus be totally ineffective in case of broadcast media like the satellite segment. Moreover, satellite networks inherently experience long delays (end-to-end latency between two satellite terminals is approximatively 300 ms [10]). The additional delay that then
3 MC(K,Seq h(m)) Id Seq h(m) i i Fig. 3. Header Payload The structure of a message sent by i at time T j M : return channel : broadcast channel : Centralised control and management plane Fig. 2. Satellite System rchitecture NCC/Hub would be caused by including an anti-clogging phase with three additional messages in the satellite protocols would thus be a significant drawback that is unacceptable for many applications. n authentication protocol protecting a satellite network from DoS attacks should not only be secure against masquerade, but also be efficient in terms of resource consumption and number of flows. III. THE SIC PROTOCOL In order to introduce our DoS prevention solution for satellite networks, we first briefly sketch a satellite system architecture. The solution is then presented as a protocol run by the components of this architecture.. Environment In a typical satellite system architecture, network control and management are centralized and under the control of the Network Control Center (NCC) which is usually colocated with the Hub-Station responsible for the data-plane and some management functions such as satellite system address management. satellite terminal (), sends control messages such as connection requests to the NCC. These messages can be transmitted via satellite using DV-RCS or data transfer protocols such as UDLR.. Description of the asic Protocol For the basic protocol, we assume that there is a tight clock synchronization between the NCC and the terminals. This requirement will be released with the improved version of the protocol described in section 5. In both versions of the protocol, each satellite terminal is assigned with a unique identity, such as the Media ccess Control (MC) address of the terminal. Initially, every terminal shares a secret key with the NCC which is precomputed by the NCC. Moreover, the NCC divides the time in fixed intervals T j during which it reliably broadcasts a different nonce N j for the purpose of replay detection. Unlike DoS prevention protocols designed for terrestrial mesh networks, the proposed identification protocol requires only one message flow from the satellite terminal to the NCC. The figure 3 depicts the structure of a request message based on the following notation : Id i denotes the identity of the satellite terminal i which is unique for each ; Seq denotes the sequence number of the message sent by a, which is initially equal to the nonce N j of the current interval T j ; h denotes a cryptographic hash function such as MD5 [11] or SH1 [12] and MC denotes a cryptographic keyed hash function such as HMC [13]; K i denotes the secret key shared between i and the NCC defined as K i = MC(K NCC,Idi) where K NCC denotes a secret key known only by the NCC; a b denotes the concatenation of a and b; Finally, M denotes the payload of the request message sent by a. Upon receipt of a request sent by a satellite terminal i during the interval T j, the NCC first verifies that the sequence number Seq is equal to the actual nonce N j. It then computes the secret shared key K i, using the identity Id i retrieved from the header of the request message. In order to verify the authenticity of the request, the NCC computes the value MC(K i,seq h(m)) using the h(m) value retrieved from the header. If this computed value and the one retrieved from the header match, the NCC needs to further verify the integrity of the message by evaluating the hash value of the payload and comparing the result with the corresponding value received with the message. This two-step verification process allows for fast discarding of control messages with obvious inconsistencies. Once both verification steps of a request sent by a end with success, the NCC processes the request and allocate necessary resources for it. However, in this protocol, we supposed that an intruder could not send replayed messages eavesdropped within the same interval. In section 5, an improved protocol will be defined by taking into consideration this type of replay attacks. IV. SECURITY NLYSIS OF THE PROTOCOL ased on the secrecy of K i shared by the corresponding i and the NCC, an intruder cannot generate a valid request. We then turn to the analysis of successful replays by an intruder. First, we consider the replay of legitimate requests from an interval in subsequent intervals by the intruder. This type of replays will be easily detected by the NCC based on the difference between the current nonce value and the value included in the header of the replayed request. Furthermore, attacks aiming at substituting or tampering with the payload of a legitimate request cannot succeed since the modification or
4 substitution of the payload will be detected during the second phase of the verification. We now discuss the case where the generation and replay of a request are done within the same interval. For a satellite network, it is practically impossible to intercept any message from the up-link. Therefore, an intruder can intercept a legitimate terminal s request only from the down-link, that is, after an end-to-end latency for a GEO-satellite system which is approximatively equal to 300ms [10]. Thus, if the interval is set to a value less than the end-to-end latency and a different nonce is used in each interval, the intruder cannot successfully perpetrate this type of replay. V. IMPROVEMENT OF THE PROTOCOL In this section, we propose to improve the basic protocol by introducing a stateful verification mechanism that allows to relax the synchronization requirement. The improvement is based on the following idea : by relaxing the synchronization between the NCC and the terminals, some replays occurring under race conditions would go undetected; in order to detect those replays the NCC will keep some state information about successful authentication attempts occurring in each interval. For each interval T j : Preliminaries : Define and reliably broadcast N j Define an initially empty table which arguments for each authenticated i are : the identity of the i, Id i its shared key K i and, the last received sequence number Seq i The verification of a request received during interval T j: Request = { Id i, Seq, h(m), MC(K i,seq h(m)), M } if Request.Id i / table if Request.Seq N j compute K i = MC(K NCC,Id i) compute MC(K i,seq h(m)) if MC(K i,seq h(m)) Request.MC(K i,seq h(m)) compute h(m) if h(m) Request.h(M) add { Id i, K i, Seq } to the table CCEPT if Request.Idi table if the value Seq i Request.Seq compute MC(K i,seq h(m)) if MC(K i,seq h(m)) Request.MC(K i,seq h(m)) compute h(m) h(m) Request.h(M) replace Seq i = Request.Seq CCEPT Fig. 4. Verification process of a request with the improved protocol t the beginning of a verification interval with a new defined nonce N j, when the NCC receives and successfully verifies the authenticity of the first request sent from a legitimate, it keeps some information about this request in a table reset at the beginning of each interval. The arguments of the table for each different satellite terminal authenticated within interval T j are : the s identity, Id i, its secret key, K i, and the sequence number of the message which has to be initially equal to the actual nonce N j. The difference between our previous basic protocol and this improved one, is that the will increment the sequence number Seq initially equal to the nonce of the period for every new request within the valid interval. Thus, when the NCC will receive another request from a terminal which previously has been added to the table, it will also verify that the sequence number sent by the is greater than the one in the table, and replace the value with the new one if the message is authenticated. Since an intruder cannot generate a valid request, it therefore will not be able to make a replay attack within a same interval where requests have been eavesdropped, because the sequence number changes for each message. The new version also optimizes the CPU consumption because the NCC won t need to compute the shared key K i if this value is already present in the table defined below. We assume also that the NCC can allocate necessary resources for the dynamic table re-initialized at the beginning of each interval and that searching if a key is already existing in the table is much more efficient than computing its value using MC algorithms. This protocol presents also all the secure properties offered by its old version. Thus, if the NCC allows an extension of the duration of one interval, with the implementation of the improved protocol, generation and replay attacks within a same interval would not be possible. VI. EVLUTION OF THE PROTOCOL In order to evaluate the possibility of DoS attacks with our protocol, we consider the cost memory and CPU usage due to an attack performed by an intruder taking advantage of all available bandwidth. Since the NCC only keeps track of authenticated terminals in an array that is reset at each interval, the resulting usage is optimal and cannot be exploited by an intruder. s to the evaluation of the CPU usage, we first compare the cost of computing the MC over the entire message and the MC over the hash value of the message in order to validate the necessity of the first step of the verification of the proposed protocol. The table I shows the number of messages verified in one second and compares the evaluation of the two MC values. CPU consumption has been evaluated with OPEN-SSL [14], where the HMC and MD5 cryptographic functions are respectively used for MC and hash functions. We consider that the message is 500 bytes long. With these assumptions, we see that for a Pentium 4 2,4 GHZ with 1G of RM, packets are verified in one second in the case of the verification of h(m) as opposed to packets in the case where the input of the MC function is the message M itself. Thus, the first step of verification increases the number of verified packets by 58%. Moreover, we consider a scenario whereby the NCC is under a DoS attack by an intruder that uses the total amount of the bandwidth set up to 10 Mbps. Such an intruder can send at
5 TLE I CPU USGE OF THE NCC PER SECOND FOR THE COMPUTE OF HMC OVER M ND h(m) Workstation Properties Number of verified packets per second MC(h(M)) MC(M) sparc v9 300Mhz RM = 256M sparc v9 440Mhz RM = 640M Pentium 3 1Ghz RM = 896M Pentium 4 2,4Ghz RM = 1G most 2621 packets per second based on these assumptions. Table II shows the percentage of CPU usage by the NCC as required for message authentication. One can note that the CPU usage due to the computation of a MC over a hash value is approximately 50% more efficient then the one over the message itself. TLE II CPU USGE PER SECOND OF THE NCC FOR THE VERIFICTION IN CSE OF DOS TTCK Workstation Properties CPU usage per second for verification MC(M) MC(h(M)) sparc v9 300 Mhz RM = 256M 10,07% 5,26% sparc v9 440 Mhz RM = 640M 7,93% 4,53% Pentium 3 1Ghz RM = 896M 2,54% 1,85% Pentium 4 2,4GHz RM = 1G 1,27% 0,80% VII. CONCLUSION Denial of Service is becoming an important concern for networks. The approach taken for mesh terrestrial networks has been to use the anti-clogging technique based on an exchange of cookies in order to screen out requests with bogus source addresses by sending replies including a cookie to the claimed address. This technique however turns out to be inefficient to thwart DoS attacks in satellite networks because of the inherent broadcast capability of the satellite system and thus continue to send bogus messages with correct cookies, the terrestrial solutions are not suitable to satellite networks. We proposed two versions of an efficient identification protocol protecting against DoS attacks for centralized control plane protocols in satellite networks. Since the basic protocol requires a tight clock synchronization between the satellite terminals and the NCC, we proposed an improved protocol to relax the synchronization assuming that the NCC keeps some state information about successful authentication attempts in each interval. Using this improved technique, we showed that intruders controlling the total bandwidth of the satellite link can only use a very small percentage of the NCC s CPU without requiring a strong synchronization mechanism. However, our protocol does not prevent attacks whereby a satellite terminal can monopolize the common signaling channel for a very long period and thus no other terminal can communicate with the NCC. Such attacks can be avoided only by identifying the intruder and preventing its physical access. Future work should focus on the analysis of weaknesses of the DV-RCS standard authentication protocols and the evaluation of the effectiveness of our protocol in this context. CKNOWLEDGMENT The authors would like to thank Sébastien Josset for the valuable insights he gave on satellite networks and their security requirements. REFERENCES [1] ETSI EN 3 790, Digital Video roadcasting (DV), Interaction Channel for Satellite Distribution Systems,. [2] E. Duros, W. Dabbous, H. Izumiyama, N. Fujii, and Y. Zhang, linklayer tunneling mechanism for unidirectional links, RFC 3077, March 20. [3] P. Karn and W. Simpson, Photuris : Session-key management protocol, RFC 2522, march [4] CERT Coordination Center, Denial of Service attacks, February 1999, tips/denial of service.html. [5] CERT Coordination Center, CERT dvisory ca TCP SYN Flooding and IP Spoofing attacks, November 2000, [6] C. Meadows, formal framework and evaluation method for network denial of servic e, in PCSFW : Proceedings of the 12th Computer Security Foundations Wor kshop. 1999, IEEE Computer Society Press. [7] R. tkinson, Security rchitecture for the Internet Protocol, RFC 1825, ugust [8] D. Maughan, M. Schertler, M. Schneider, and J. Turner, Internet Security ssociation and Key Management Protocol ( ISKMP), RFC 2408, November [9] R. Molva, Internet Security rchitecture, Computer Networks : The International Journal of Computer and Tele communications Networking, vol. 31, no. 9, pp , [10] T. Henderson, Networking over Next-Generation Satellite Systems, Ph.D. thesis, University of California at erkeley, [11] R.L. Rivest, The MD5 message-digest algorithm, pril [12] National Institute of Standards and Technology, Secure hash standard, [13] H. Krawczyk, M. ellare, and R. Canetti, HMC : Keyed Hashing for Message uthentication, RFC 2104, February [14] The OpenSSL Project,
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Ting Ma,Yee Hui Lee and Maode Ma
Ting Ma,Yee Hui Lee and Maode Ma School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore Abstract: Security is an important concern in satellite multicast communications.
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Internet Security Architecture
accepted for publication in Computer Networks and ISDN Systems Journal Internet Security Architecture Refik Molva Institut Eurécom 2229, route des Crêtes F-06904 Sophia-Antipolis [email protected] Abstract
Secure SCTP against DoS Attacks in Wireless Internet
Secure SCTP against DoS Attacks in Wireless Internet Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea [email protected] Abstract. The Stream Control Transport Protocol
APNIC elearning: IPSec Basics. Contact: [email protected]. esec03_v1.0
APNIC elearning: IPSec Basics Contact: [email protected] esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
IP Security. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49
IP Security Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Analysis on Some Defences against SYN-Flood Based Denial-of-Service Attacks
Analysis on Some Defences against SYN-Flood Based Denial-of-Service Attacks Sau Fan LEE (ID: 3484135) Computer Science Department, University of Auckland Email: [email protected] Abstract A denial-of-service
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
Dr. Arjan Durresi. Baton Rouge, LA 70810 [email protected] These slides are available at: http://www.csc.lsu.edu/~durresi/csc4601_07/
Set of Problems 2 Dr. Arjan Durresi Louisiana State University Baton Rouge, LA 70810 [email protected] These slides are available at: http://www.csc.lsu.edu/~durresi/csc4601_07/ Louisiana State University
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Securing VoIP Networks using graded Protection Levels
Securing VoIP Networks using graded Protection Levels Andreas C. Schmidt Bundesamt für Sicherheit in der Informationstechnik, Godesberger Allee 185-189, D-53175 Bonn [email protected] Abstract
Chap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
544 Computer and Network Security
544 Computer and Network Security Section 1: Introduction Dr. E.C. Kulasekere Sri Lanka Institute of Information Technology - 2005 Background Information Security requirements have changed in recent times
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
Abstract. Introduction. Section I. What is Denial of Service Attack?
Abstract In this report, I am describing the main types of DoS attacks and their effect on computer and network environment. This report will form the basis of my forthcoming report which will discuss
Securing IP Networks with Implementation of IPv6
Securing IP Networks with Implementation of IPv6 R.M.Agarwal DDG(SA), TEC Security Threats in IP Networks Packet sniffing IP Spoofing Connection Hijacking Denial of Service (DoS) Attacks Man in the Middle
Preventing Resource Exhaustion Attacks in Ad Hoc Networks
Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen, and David Culler Department of Electrical Engineering & Computer Sciences, University of California
Notes on Network Security - Introduction
Notes on Network Security - Introduction Security comes in all shapes and sizes, ranging from problems with software on a computer, to the integrity of messages and emails being sent on the Internet. Network
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
Comparing Two Models of Distributed Denial of Service (DDoS) Defences
Comparing Two Models of Distributed Denial of Service (DDoS) Defences Siriwat Karndacharuk Computer Science Department The University of Auckland Email: [email protected] Abstract A Controller-Agent
Frequent Denial of Service Attacks
Frequent Denial of Service Attacks Aditya Vutukuri Science Department University of Auckland E-mail:[email protected] Abstract Denial of Service is a well known term in network security world as
Chapter 8 Security. IC322 Fall 2014. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012
Chapter 8 Security IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross, All
Vulnerability Analysis of Hash Tables to Sophisticated DDoS Attacks
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 12 (2014), pp. 1167-1173 International Research Publications House http://www. irphouse.com Vulnerability
Unregister Attacks in SIP
Unregister Attacks in SIP Anat Bremler-Barr Ronit Halachmi-Bekel Interdisciplinary Center Herzliya Email: {bremler,halachmi.ronit}@idc.ac.il Jussi Kangasharju Darmstadt University of Technology [email protected]
Chapter 9 Key Management 9.1 Distribution of Public Keys 9.1.1 Public Announcement of Public Keys 9.1.2 Publicly Available Directory
There are actually two distinct aspects to the use of public-key encryption in this regard: The distribution of public keys. The use of public-key encryption to distribute secret keys. 9.1 Distribution
How To Write A Transport Layer Protocol For Wireless Networks
Chapter 9: Transport Layer and Security Protocols for Ad Hoc Wireless Networks Introduction Issues Design Goals Classifications TCP Over Ad Hoc Wireless Networks Other Transport Layer Protocols Security
IPsec Details 1 / 43. IPsec Details
Header (AH) AH Layout Other AH Fields Mutable Parts of the IP Header What is an SPI? What s an SA? Encapsulating Security Payload (ESP) ESP Layout Padding Using ESP IPsec and Firewalls IPsec and the DNS
Tema 5.- Seguridad. Problemas Soluciones
Tema 5.- Seguridad Problemas Soluciones Wireless medium is easy to snoop on Routing security vulnerabilities Due to ad hoc connectivity and mobility, it is hard to guarantee access to any particular node
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication
Anat Bremler-Barr Ronit Halachmi-Bekel Jussi Kangasharju Interdisciplinary center Herzliya Darmstadt University of Technology
Unregister Attack in SIP Anat Bremler-Barr Ronit Halachmi-Bekel Jussi Kangasharju Interdisciplinary center Herzliya Darmstadt University of Technology Unregister Attack We present a new VoIP Denial Of
CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec
CSCI 454/554 Computer and Network Security Topic 8.1 IPsec Outline IPsec Objectives IPsec architecture & concepts IPsec authentication header IPsec encapsulating security payload 2 IPsec Objectives Why
SCTP-Sec: A secure Transmission Control Protocol
SCTP-Sec: A secure Transmission Control Protocol Rahul Choudhari Indian Institute of Information Technology & Management, Gwalior, INDIA Email: [email protected] { Somanath Tripathy Indian Institute
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution. 1 Opening quote. 2 The topics of cryptographic key management
Cryptography and Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Shinu Mathew John http://shinu.info/ Chapter 1 Introduction http://shinu.info/ 2 Background Information Security requirements
Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks
Ariadne A Secure On-Demand Routing Protocol for Ad-Hoc Networks Authors: Yih-Chun Hu, Adrian Perrig, David B Johnson Presenter: Sameer Korrapati Date: 4/21/2003 Overview of presentation Introduction :
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,[email protected]
DoS/DDoS Attacks and Protection on VoIP/UC
DoS/DDoS Attacks and Protection on VoIP/UC Presented by: Sipera Systems Agenda What are DoS and DDoS Attacks? VoIP/UC is different Impact of DoS attacks on VoIP Protection techniques 2 UC Security Requirements
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software
CEN 448 Security and Internet Protocols Chapter 19 Malicious Software Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
Session Hijacking Exploiting TCP, UDP and HTTP Sessions
Session Hijacking Exploiting TCP, UDP and HTTP Sessions Shray Kapoor [email protected] Preface With the emerging fields in e-commerce, financial and identity information are at a higher risk of being
Secured VPN Models for LTE Backhaul Networks
Secured VPN Models for LTE Backhaul Networks Madhusanka Liyanage, Andrei Gurtov Centre for Wireless Communications University of Oulu, P.O. Box 45, FI-914 Oulu, Finland Email: [madhusanka, gurtov]@ee.oulu.fi
ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED
HERN WAN ENCRYPTION SOLUTIONS COMPARED KEY WORDS AND TERMS MACsec, WAN security, WAN data protection, MACsec encryption, network data protection, network data security, high-speed encryption, Senetas,
Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech
Advanced Topics in Distributed Systems Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Security Introduction Based on Ch1, Cryptography and Network Security 4 th Ed Security Dr. Ayman Abdel-Hamid,
Authentication Application
Authentication Application KERBEROS In an open distributed environment servers to be able to restrict access to authorized users to be able to authenticate requests for service a workstation cannot be
Safeguards Against Denial of Service Attacks for IP Phones
W H I T E P A P E R Denial of Service (DoS) attacks on computers and infrastructure communications systems have been reported for a number of years, but the accelerated deployment of Voice over IP (VoIP)
Name: 1. CSE331: Introduction to Networks and Security Fall 2003 Dec. 12, 2003 1 /14 2 /16 3 /16 4 /10 5 /14 6 /5 7 /5 8 /20 9 /35.
Name: 1 CSE331: Introduction to Networks and Security Final Fall 2003 Dec. 12, 2003 1 /14 2 /16 3 /16 4 /10 5 /14 6 /5 7 /5 8 /20 9 /35 Total /135 Do not begin the exam until you are told to do so. You
Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski
Denial of Service attacks: analysis and countermeasures Marek Ostaszewski DoS - Introduction Denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
IY2760/CS3760: Part 6. IY2760: Part 6
IY2760/CS3760: Part 6 In this part of the course we give a general introduction to network security. We introduce widely used security-specific concepts and terminology. This discussion is based primarily
IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
Chapter 7: Network security
Chapter 7: Network security Foundations: what is security? cryptography authentication message integrity key distribution and certification Security in practice: application layer: secure e-mail transport
Taxonomic Modeling of Security Threats in Software Defined Networking
Taxonomic Modeling of Security Threats in Software Defined Networking Recent advances in software defined networking (SDN) provide an opportunity to create flexible and secure next-generation networks.
Internet Protocol Security IPSec
Internet Protocol Security IPSec Summer Semester 2011 Integrated Communication Systems Group Ilmenau University of Technology Outline Introduction Authentication Header (AH) Encapsulating Security Payload
Transport Layer Security Protocols
SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known
A Call Conference Room Interception Attack and its Detection
A Call Conference Room Interception Attack and its Detection Nikos Vrakas 1, Dimitris Geneiatakis 2 and Costas Lambrinoudakis 1 1 Department of Digital Systems, University of Piraeus 150 Androutsou St,
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Security Engineering Part III Network Security. Security Protocols (II): IPsec
Security Engineering Part III Network Security Security Protocols (II): IPsec Juan E. Tapiador [email protected] Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer Science,
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
Security Authentication System for In-Vehicle Network
UTOMOTIVE Security uthentication System for In-Vehicle Network Hiroshi UED*, Ryo URCHI*, Hiroaki TD, Tomohiro MIZUTNI, Masayuki INOUE and Satoshi HORIHT ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Final exam review, Fall 2005 FSU (CIS-5357) Network Security
Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection
Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
A Proposed Firewall Security Method against Different Types of Attacks
Different Types of Attacks Prof. Dr. Alaa AL-Hamami* Soukaena Hassan Hashem** Received on: 17 / 7 / 2004 Accepted on: 30 / 12 / 2004 Abstract There are measures that can be taken to protect users from
VoIP Security Threats and Vulnerabilities
Abstract VoIP Security Threats and Vulnerabilities S.M.A.Rizvi and P.S.Dowland Network Research Group, University of Plymouth, Plymouth, UK e-mail: [email protected] This paper presents the
Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation
Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation 1 Doddapaneni.krishna Chaitanya, 2 Ghosh.Arindam Middlesex University Abstract Evaluation of Wireless Sensor Networks
A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS
ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of
CS 494/594 Computer and Network Security
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Exercise: Chapters 13, 15-18 18 1. [Kaufman] 13.1
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Multidomain Network Based on Programmable Networks: Security Architecture
Multidomain Network Based on Programmable Networks: Security Architecture Bernardo Alarco, Marifeli Sedano, and Maria Calderon This paper proposes a generic security architecture designed for a multidomain
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015
Network Security Dr. Ihsan Ullah Department of Computer Science & IT University of Balochistan, Quetta Pakistan April 23, 2015 1 / 24 Secure networks Before the advent of modern telecommunication network,
Wireless Security: Secure and Public Networks Kory Kirk
Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science [email protected] www.korykirk.com/ Abstract Due to the increasing amount of wireless access points that
Simple Network Management Protocol
CHAPTER 32 Simple Network Management Protocol Background Simple Network Management Protocol (SNMP) is an application-layer protocol designed to facilitate the exchange of management information between
Chapter 16: Authentication in Distributed System
Chapter 16: Authentication in Distributed System Ajay Kshemkalyani and Mukesh Singhal Distributed Computing: Principles, Algorithms, and Systems Cambridge University Press A. Kshemkalyani and M. Singhal
CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module
CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1
Web Security (SSL) Tecniche di Sicurezza dei Sistemi 1 How the Web Works - HTTP Hypertext transfer protocol (http). Clients request documents (or scripts) through URL. Server response with documents. Documents
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
Information System Security
Information System Security Chapter 1:Introduction Dr. Lo ai Tawalbeh Faculty of Information system and Technology, The Arab Academy for Banking and Financial Sciences. Jordan Chapter 1 Introduction The
TDM services over IP networks
Keyur Parikh Junius Kim TDM services over IP networks 1. ABSTRACT Time Division Multiplexing (TDM) circuits have been the backbone of communications over the past several decades. These circuits which
A Cryptographic Protocol to Protect MPLS Labels
A Cryptographic Protocol to Protect MPLS Labels David A. Barlow, Member, IEEE, Vasos Vassiliou, Member, IEEE, and Henry L. Owen, Member, IEEE Abstract -- We have designed a cryptographic protocol to protect
Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security
UNIT 4 SECURITY PRACTICE Authentication applications Kerberos X.509 Authentication services E mail security IP security Web security Slides Courtesy of William Stallings, Cryptography & Network Security,
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Bluetooth
Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Bluetooth Henrich C. Poehls Master s Thesis M.Sc. in Information Security Information Security Group Royal Holloway,
Packet Level Authentication Overview
Packet Level Authentication Overview Dmitrij Lagutin, [email protected] Helsinki Institute for Information Technology HIIT Aalto University School of Science and Technology Contents Introduction
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.
Wireless LAN Attacks and Protection Tools (Section 3 contd.) WLAN Attacks Passive Attack unauthorised party gains access to a network and does not modify any resources on the network Active Attack unauthorised
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags Sarah Abughazalah, Konstantinos Markantonakis, and Keith Mayes Smart Card Centre-Information Security Group (SCC-ISG) Royal Holloway,
