Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg



Similar documents
Networks: IP and TCP. Internet Protocol

How do I get to

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Chapter 8 Security Pt 2

Ethernet. Ethernet. Network Devices

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Technical Support Information Belkin internal use only

Transport and Network Layer

Internet Protocol: IP packet headers. vendredi 18 octobre 13

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Internet Control Protocols Reading: Chapter 3

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Post-Class Quiz: Telecommunication & Network Security Domain

CSCE 465 Computer & Network Security

CS5008: Internet Computing

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

TCP/IP Security Problems. History that still teaches

CS 356 Lecture 16 Denial of Service. Spring 2013

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

CSE 127: Computer Security. Network Security. Kirill Levchenko

VLAN und MPLS, Firewall und NAT,

Network Security TCP/IP Refresher

Overview of TCP/IP. TCP/IP and Internet

8.2 The Internet Protocol

Attack Lab: Attacks on TCP/IP Protocols

Networking Test 4 Study Guide

Network layer: Overview. Network layer functions IP Routing and forwarding

Networking Technology Online Course Outline

A S B

IP - The Internet Protocol

IP address format: Dotted decimal notation:

co Characterizing and Tracing Packet Floods Using Cisco R

Security vulnerabilities in the Internet and possible solutions

Gary Hecht Computer Networking (IP Addressing, Subnet Masks, and Packets)

Chapter 9. IP Secure

Computer Networks/DV2 Lab

TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline

Networking Basics and Network Security

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Denial of Service Attacks

Instructor Notes for Lab 3

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Content Distribution Networks (CDN)

EECS 489 Winter 2010 Midterm Exam

IP addressing and forwarding Network layer

Lecture Computer Networks

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Chapter 8 Network Security

Network Concepts. IT 4823 Information Security Concepts and Administration. The Network Environment. Resilience. Network Topology. Transmission Media

Transport Layer Protocols

DHCP, ICMP, IPv6. Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley DHCP. DHCP UDP IP Eth Phy

Network layer" 1DT066! Distributed Information Systems!! Chapter 4" Network Layer!! goals: "

The Internet. Internet Technologies and Applications

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

RARP: Reverse Address Resolution Protocol

Protecting and controlling Virtual LANs by Linux router-firewall

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

Firewall Firewall August, 2003

Компјутерски Мрежи NAT & ICMP

Linux Network Security

Safeguards Against Denial of Service Attacks for IP Phones

Lecture 6: Network Attacks II. Course Admin

UPPER LAYER SWITCHING

Secure Network Access System (SNAS) Indigenous Next Generation Network Security Solutions

Network Simulation Traffic, Paths and Impairment

Introduction to TCP/IP

A Very Incomplete Diagram of Network Attacks

Internet Protocols. Background CHAPTER

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Security Technology White Paper

Based on Computer Networking, 4 th Edition by Kurose and Ross

Computer Networks. Lecture 3: IP Protocol. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

What is a DoS attack?

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

CMPT 471 Networking II

CS335 Sample Questions for Exam #2

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

CompTIA Network+ (Exam N10-005)

Introduction to IP networking

Troubleshooting Tools

Internetworking. Problem: There is more than one network (heterogeneity & scale)

1. Firewall Configuration

20. Switched Local Area Networks

04 Internet Protocol (IP)

Chapter 3: Review of Important Networking Concepts. Magda El Zarki Dept. of CS UC Irvine

Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004

NETWORK LAYER/INTERNET PROTOCOLS

BASIC ANALYSIS OF TCP/IP NETWORKS

Protocols. Packets. What's in an IP packet

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Middleboxes. Firewalls. Internet Ideal: Simple Network Model. Internet Reality. Middleboxes. Firewalls. Globally unique idenpfiers

CS 457 Lecture 19 Global Internet - BGP. Fall 2011

Transcription:

Outline Network Topology CSc 466/566 Computer Security 18 : Network Security Introduction Version: 2012/05/03 13:59:29 Department of Computer Science University of Arizona collberg@gmail.com Copyright c 2012 Christian Collberg Christian Collberg 1/81 1 Introduction Internet Protocol Layers Packets Network Security Issues 2 The Link Layer Hubs and Switches Ethernet Frames ARP Spoofing 3 The Network Layer ICPM IP Spoofing 4 The Transport Layer TCP Session Hijacking 5 Denial-of-Service ICPM Attacks SYN Flood Attacks 6 Summary Introduction 2/81 Network Topology LAN Switch Gateway router Autonomous system Computers are host nodes they send and receive messages. Routers are communication nodes they pass on messages. Local Area Network (LAN) private network of physically close computers. Wide Area Network (WAN) many physically separated machines/groups of machines. Autonomous Systems (AS) clusters of routers. Introduction 4/81

Autonomous Systems Internet Protocol Layers Physical Layer Controlled by a single organizational entity. Consist of clusters of routers. Routing within an AS is done by shortest route. Routing between ASs is by contractual agreements. Describes how bitstreams are transferred from one node to another over a physical medium. Abstraction: 1 Source/Destination: networking hardware 2 Data: raw bits 3 Link: copper, coaxial, optical fiber, WiFi... Introduction 5/81 Introduction 6/81 Internet Protocol Layers Link Layer Internet Protocol Layers Network (Internet) Layer Describes how collections of bits (frames) are transferred (on top of the physical layer) in a LAN. Abstraction: 1 Source/Destination: LAN nodes 2 Data: frames 3 Link: Ethernet, Wireless 4 Addressing: Media Access Control Addresses (MAC). Detects errors occurring in the physical layer. Finds a good routing path in the network. Describes how to move packets between any two hosts on the Internet. Abstraction: 1 Source/Destination: Internet nodes 2 Data: IP packets 3 Addressing: Internet Protocol (IP) addresses. IPv4 32-bit addresses, IPv6 128-bit addresses. Best effort delivery no guarantees a packet will be delivered. Introduction 7/81 Introduction 8/81

Internet Protocol Layers Transport Layer Internet Protocol Layers Application Layer Describes how to communicate between two applications (services) running on hosts on the Internet. Abstraction: 1 Source/Destination: Ports connected to processes 2 Data: TCP/UDP packets 3 Addressing: IP address + port number Transmission Control Protocol (TCP) connection-based protocol; guaranteed and ordered delivery of packets. User Datagram Protocol (UDP) connection-less protocol; quick delivery without guarantees. Uses the transport layer to provide protocols that support useful functions on the Internet Examples: 1 HTTP web browsing over TCP 2 DNS domain name lookup over UDP 3 SMTP/IMAP email over TCP 4 SSL encrypted connections over TCP 5 VoIP Internet telephony over UDP. Introduction 9/81 Introduction 10/81 Network Packets Packet Encapsulation A packet consists of: 1 A header (metadata) 2 Payload (actual data) 3 A footer (metadata, sometimes) Metadata routing and control information. The payload of each packet encapsulates the packet of a higher layer: 1 A frame packet encapsulates an IP packet. 2 An IP packet encapsulates a TCP/UDP packet. 3 A TCP packet encapsulates application data. Introduction 11/81 Introduction 12/81

Application Data Application Layer Packet Encapsulation HTTP TCP Header TCP Data Application Data Transport Layer Frame Header IP Header IP Header TCP Header TCP Header Frame Data IP Data Application Data IP Data TCP Data TCP Data Application Data Frame Footer Network Layer Link Layer When Web browsing: 1 An HTTP packet would be contained in a TCP packet. 2 The TCP packet would be contained IP packet. 3 The IP packet would be contained in (for example) an Ethernet frame. Introduction 14/81 Networking Examples Network Security Issues Confidentiality OSI model animation: http://www.youtube.com/watch?v=fimswfo45dq Animation - Networking Tutorial: http://www.youtube.com/watch?v=xv-qq0ahs1o Packet data is not kept confidential. Two solutions: 1 Encrypt data at the application level (https); 2 Revise lower level protocol to include encryption (IPsec). Introduction 15/81 Introduction 16/81

Network Security Issues Integrity Network Security Issues Availability Packet header/footers include simple checksums: can detect a few communication bit errors; not cryptographically strong. Two solutions: 1 MACs at the application level; 2 Revise lower level protocol. Denial of Service attacks: could be just Christmas rush on amazon.com! concerted attacks. Two solutions: 1 Applications need to scale with communication requests; 2 Block illegitimate requests. Introduction 17/81 Introduction 18/81 Network Security Issues Assurance Network Security Issues Authenticity Assurance is the way in which trust is provided and managed in a system. Packets can travel between any two nodes in a network. Solution: 1 If we want to control packet flow, permissions have to be added on top of the network. Example: Firewalls allows us to block flows of packets we don t trust from entering our system. Packets have no space for digital signatures! IP has no concept of identity. Two solutions: 1 Add signatures at application layer; 2 Revise lower level layers. Introduction 19/81 Introduction 20/81

Network Security Issues Anonymity No concept of identity on the Internet anonymous by default! Good for human rights worker. Not good when we can t identify a malicious user. Solutions: 1 Achieve higher level of anonymity by replicating processes in many places on the network. Introduction 21/81 Outline 1 Introduction Internet Protocol Layers Packets Network Security Issues 2 The Link Layer Hubs and Switches Ethernet Frames ARP Spoofing 3 The Network Layer ICPM IP Spoofing 4 The Transport Layer TCP Session Hijacking 5 Denial-of-Service ICPM Attacks SYN Flood Attacks 6 Summary The Link Layer 22/81 The Link Layer Ethernet Collision The Link Layer sits on top of the physical layer. Ethernet IEEE 802.3. Ethernet cables connect computers on a LAN. Collision: Two computers on the same network segment send a packet at the same time. History of Ethernet: http://www.youtube.com/watch?v=g5mezxmcrmk. Collision algorithm: LAN wait 5 wait 23 1 Each computer waits a random length of time; 2 Retransmit! 3 Another collision? Repeat from 1! The Link Layer 23/81 The Link Layer 24/81

Hubs and Switches to:a Hub A Hubs and Switches connect devices on a LAN. Ethernet Hub: Forward all frames to all attached devices. Lots of extra traffic: all frames are duplicated! All devices are on the same network segment, and must do collision avoidance. Ethernet Switch: Initially works like a hub. Over time, learns the addresses of attached devices. Eventually, only forwards a frame to the destination device. Fewer collisions. to:a Switch to:b to:a B A B The Link Layer 25/81 MAC Addresses Ethernet Frame Format MAC address: 48 bits assigned to network interface. MAC structure: locally assigned (1 bit) manufacturer (23 bits) unique number (24 bits) Software (Unix: ifconfig) can change a device s MAC: locally assigned=1. Preamble (7 bytes) Start-of-Frame delimiter (1 byte) MAC destination (6 bytes) MAC source (6 bytes) Ethertype/length (2 bytes) Payload (45-1500 bytes) CRC-32 Checksum (4 bytes) Interframe Gap (12 bytes) The Link Layer 27/81 The Link Layer 28/81

Ethernet Frame Format... Address Resolution Protocol The CRC-32 checksum can catch simple transmission errors. Switches learn the location of network devices from the MAC addresses. Address Resolution Protocol (ARP): Find the MAC address given the IP address. Algorithm (Bob wants to know the MAC address of IP address A): 1 Broadcast to all network interfaces: Who has IP address A?. 2 Wait for a response A is at MAC address M! from the devices with IP address A. 3 Store A M in the ARP cache. Problem: no authentication. The Link Layer 29/81 The Link Layer 30/81 ARP Spoofing ARP Spoofing Bob s IP Eve s MAC Any computer on the network could claim to have a particular IP address. Machines will update their ARP cache whenever they see an ARP reply even if there was no corresponding ARP request! Attack: 1 Eve sends ARP reply(bob s IP Eve s MAC) to Alice. 2 Alice puts Bob s IP Eve s MAC in her ARP cache. 3 Eve sends ARP reply(alice s IP Eve s MAC) to Bob. 4 Bob puts Alice s IP Eve s MAC in his ARP cache. Eve ARP reply(bob s IP Eve s MAC) ARP reply(alice s IP Eve s MAC) Alice Bob Alice s IP Eve s MAC The Link Layer 31/81

ARP Spoofing... ARP Spoofing Countermeasures After the ARP cache poisoning all traffic between Alice and Bob is routed through Eve: 1 MITM attack; 2 Denial of Service attack. 1 Restrict LAN access to trusted users. 2 Check for multiple occurrences of the same MAC address on the LAN. 3 Static ARP tables: the system adminstrator manually sets up the routers ARP caches. 4 Inspect all ARP packets, detecting attempted spoofing. The Link Layer 33/81 The Link Layer 34/81 Outline The Network (Internet) Layer 1 Introduction Internet Protocol Layers Packets Network Security Issues 2 The Link Layer Hubs and Switches Ethernet Frames ARP Spoofing 3 The Network Layer ICPM IP Spoofing 4 The Transport Layer TCP Session Hijacking 5 Denial-of-Service ICPM Attacks SYN Flood Attacks 6 Summary The Network Layer 35/81 Best effort routing of packets between any two hosts on the Internet. Abstraction: 1 Source/Destination: Internet nodes 2 Data: IP packets 3 Addressing: Internet Protocol (IP) addresses. IPv4 32-bit addresses, IPv6 128-bit addresses. No guarantees a packet will be delivered. The Network Layer 36/81

Routing Algorithm From a Host Node Routing Algorithm From a Router Sending a packet P from a host node N: 1 If P s destination is on this LAN: Use the ARP protocol to find the MAC address, deliver directly. 2 Otherwise: use the ARP protocol to find the MAC address of the gateway, forward. Router gateways and other network nodes that handle routing of packages on the Internet. A router typically connects two or more LANs. Routing tables describe the next router to which a packet should be forwarded. The Network Layer 37/81 The Network Layer 38/81 Router Operations Routing Table Protocols For each packet, the router decides whether to 1 Drop expired packets (TTL=0) are dropped. 2 Deliver if the packet is going to a machine on this LAN, deliver it. 3 Forward otherwise, send to neighboring router. TTL (time to live): a field in the IP header, decremented by each router, used to prevent packets from living forever. Open Shortest Path First (OSPF) how should packets be routed within an autonomous system? packets should travel along shortest paths. Border Gateway Protocol (BGP) how should packets be routed between autonomous systems? packets are routed based on contractual agreements. Routing animation: http://www.youtube.com/watch?v=rby8hb6abbg The Network Layer 39/81 The Network Layer 40/81

Routing vs. Switch IPv4 Packet Format Switch: forwards packets on a single LAN. learns routes over time. Router: can belong to multiple LANs. uses routing tables to forward packets. Version (4 bits) Header length (4 bits) Service type (8 bits) Total length (16 bits) Identification (16 bits) Flags (3 bits) Fragment offset (13 bits) Time-to-Live (8 bits) Protocol (8 bits) Header Checksum (16 bits) Source Address (32 bits) Destination Address (32 bits) Payload The Network Layer 41/81 The Network Layer 42/81 IP Address Format IP Address Classes IPv4 address: 32 bits. IPv4 address structure: network portion host portion Network portion: IP prefix for all machines on a network. Host portion: identifies a particular device Peter Packet & Subnetting: http://www.youtube.com/watch?v=x-qc6l9khqy&feature=related Class A Reserved for government organizations, telcos. Class B Reserved for ISPs, large businesses. Class C Reserved for smaller organizations. Class Leading bits Size of network number bit field Size rest field of bit Number of networks A 0 8 24 2 7 2 24 B 10 16 16 2 14 2 16 C 110 24 8 2 21 2 8 Class Start address End address A 0.0.0.0 127.255.255.255 B 128.0.0.0 191.255.255.255 C 192.0.0.0 223.255.255.255 Addresses per network The Network Layer 43/81 The Network Layer 44/81

Internet Control Message Protocol Ping Protocol Internet Control Message Protocol (ICMP) used for network diagnostics. ICMP messages: 1 Echo request: please acknowledge receipt of packet. 2 Echo response: packet receipt is acknowledged. 3 Time exceeded: notify that packet has expired (TTL=0). 4 Destination unreachable: notify that packet could not be delivered. ECHO request() ECHO response() Diagnostic tool too see if a host is working. The Network Layer 45/81 The Network Layer 46/81 Traceroute Protocol... Traceroute Protocol ECHO request(ttl=1) How do we find the path a packet takes to a node N? Algorithm: 1 Send ECHO request(ttl=1) to N. 2 A router that receives ECHO request(ttl=1) responds with TIME exceeded(). 3 Send ECHO request(ttl=2) to N. 4 Repeat, increasing TTL each time, until N is reached, responding with ECHO response(). TIME exceeded() ECHO request(ttl=2) TIME exceeded() ECHO request(ttl=3) TIME exceeded() ECHO request(ttl=4) ECHO response() The Network Layer 47/81

IP Spoofing Countermeasures to IP Spoofing The source address in an IP packet is never checked: overwrite it! The sender will never get a response! So, why? Denial of service attack. Bob s LAN Border router Source: Bob s Lan HEADER Source//////////// Address Destination Address Payload Border router can block packets whose source address appears to be from inside the subnetwork, although they come from outside the subnetwork. The Network Layer 49/81 The Network Layer 50/81 Countermeasures to IP Spoofing... Countermeasures to IP Spoofing... Alice Bob s LAN Border router Source: Alice LAN Bob s LAN Source: Eve Block Alice! Block Alice! Block Alice! Border router can block outgoing packets whose source address appears to be from outside the subnetwork. Maybe a node has been compromised by malware? The Network Layer 51/81 IP Traceback determining the origin of a packet, without using the source field. Once we know the actual source address, we can ask 1 the ASs to block packets from this location. 2 the ISP controlling the source address to block suspicious machines. The Network Layer 52/81

IP Traceback Techniques... IP Traceback Techniques Node Sampling Packet marking routers add information to packets, so that their path can be reconstructed. Naive approach: each router adds its address to the end of the packet: HEADER Source//////////// Address Destination Address Payload Router 1 Router 2 Router 3 Router 4 Advantages: Easy to reconstruct path. Disadvantages: Router overhead, how to know if there s space in the packet?, packet fragmentation. The Network Layer 53/81 Node sampling: Only one router address can be stored in the packet. A router writes its address with probability p. HEADER Source//////////// Address Destination Address Payload Router address Given enough packets, the path can be reconstructed. The Network Layer 54/81 IP Traceback Technique Node Sampling... IP Traceback Technique Other Techniques Alice Bob s LAN Source: Eve Router: B D C B A Many other techniques have been proposed. Most not implemented require cooperation from Internet routers. Probability the packet will be marked by C: p Probability the packet will be marked by B: p (1 p) Probability the packet will be marked by A: p (1 p) (1 p) The Network Layer 55/81 The Network Layer 56/81

Outline The Transport Layer 1 Introduction Internet Protocol Layers Packets Network Security Issues 2 The Link Layer Hubs and Switches Ethernet Frames ARP Spoofing 3 The Network Layer ICPM IP Spoofing 4 The Transport Layer TCP Session Hijacking 5 Denial-of-Service ICPM Attacks SYN Flood Attacks 6 Summary The Transport Layer 57/81 Communication between processes connected to ports. Abstraction: 1 Source/Destination: Ports connected to processes 2 Data: TCP/UDP packets 3 Addressing: IP address + port number Transmission Control Protocol (TCP) connection-based protocol; guaranteed and ordered delivery of packets. User Datagram Protocol (UDP) connection-less protocol; quick delivery without guarantees. The Transport Layer 58/81 TCP Packet Format TCP Sequence Number Source Port (16 bits) Destination Port (16 bits) Sequence Number (32 bits) Acknowledgement Number (32 bits) Offset (4 bits) Reserved (4 bits) Flags (8 bits) Window size (16 bits) Checksum (16 bits) Urgent Pointer (16 bits) Payload The Transport Layer 59/81 seq=10 seq=9 seq=11 seq=10 seq=13 seq=11 Incremented for every packet by payload length. Allows us to determine when packets arrive out of order. Allows us to determine when packets don t arrive. The Transport Layer 60/81

TCP Acknowledgement Number TCP Connections seq=10 seq=11 seq=13 ack=12 seq=12 seq=9 seq=10 seq=11 seq=11 seq=12 Receiver sends an acknowledgement package with the sequence number of the next payload byte it wants to receive. The Transport Layer 61/81 SYN(seq=42) SYN-ACK(seq=99,ack=42+1) ACK(seq=42+1,ack=99+1) TCP uses a 3-way handshake to set up a connection. The protocol includes a random initialization of the sequence number. The Transport Layer 62/81 TCP Session Hijacking TCP Sequence Prediction Attack TCP Session Hijacking an attacker 1 hijacks another user s TCP connection; 2 alters another user s TCP connection. Session spoofing The attacker is able to create a TCP session with a server, who thinks it is talking to another client. Early TCP implementations had easily guessable sequence numbers. Attack: 1 Eve launches a denial-of-service attack against Alice so she can t interfere with the attack. 2 Eve sends a SYN(src=Alice) to Bob. 3 Bob responds with a SYN-ACK to Alice, who cannot respond since she s under attack. 4 Eve guesses N, Bob s next sequence number. 5 Eve sends a ACK(seq=N) to Bob. 6 Eve talks to Bob as if she is Alice. Blind injection attack: Eve won t receive replies from Bob. The Transport Layer 63/81 The Transport Layer 64/81

Alice SYN-ACK Bob TCP Session Spoofing ACK Storms DOS attack SYN(src=Alice) ACK(seq=?) Alice ACK(seq=?) ACK(seq=?) Bob Eve Eve Eve establishes a TCP connection with Bob, who thinks he s talking to Alice. Eve needs to guess the next sequence number Bob will use. Blind injection attacks can cause an ACK Storm, when the client and server try to resynchronize their sequence numbers. A firewall can, eventually, detect the ACK Storm. The Transport Layer 66/81 Complete Session Hijacking Complete Session Hijacking... Alice SYN,SYN-ACK,ACK Bob Eve is on the same network segment as Alice and Bob, and packet sniffs on them as they establish their TCP connection. Eve guesses the next sequence number and sends a spoofed attack command to Bob, appearing to be Alice. Sniff seq=? Eve "attack",seq=?,src=alice The Transport Layer 67/81 The Transport Layer 68/81

Countermeasures Outline Don t use predictable sequence numbers. Encrypt at the network layer (IPsec). Encrypt at the application layer (https). The Transport Layer 69/81 1 Introduction Internet Protocol Layers Packets Network Security Issues 2 The Link Layer Hubs and Switches Ethernet Frames ARP Spoofing 3 The Network Layer ICPM IP Spoofing 4 The Transport Layer TCP Session Hijacking 5 Denial-of-Service ICPM Attacks SYN Flood Attacks 6 Summary Denial-of-Service 70/81 Denial-of-Service Attacks Internet Control Message Protocol Web servers have limited bandwidth. Once the server has used up bandwidth/cpu, it starts dropping requests. Denial-of-Service Attacks: Any attack that targets a machine/software s availability. Source addresses are spoofed to hide the attacker s identity. The Internet Control Message Protocol is used for network diagnostics. ICMP messages: 1 Echo request: please acknowledge reciept of packet. 2 Echo response: packet receipt is acknowledged. 3 Time exceeded: notify that packet has expired (TTL=0). 4 Destination unreachable: notify that packet could not be delivered. Denial-of-Service 71/81 Denial-of-Service 72/81

Ping Flood Attack Smurf Attack ECHO request(src="bob") request(src="eve") request(src="sam") request(src="joe") request(src="pat") A powerful machine can attack a less powerful one by sending it a large number of ECHO requests. A broadcast address sends to all IP addresses on the network. In a smurf attack, we get an amplification effect by creating an ECHO request with a spoofed source address (of the target) and broadcasting this to all nodes on the network. Attack: 1 Broadcast the packet ECHO request(src="target",dest="everybody") to the nodes on the network. 2 Each node N will respond with ECHO response(src=n,dest="target"). Denial-of-Service 73/81 Denial-of-Service 74/81 Smurf Attack... Smurf Attack... ECHO req(dest=all,src="bob") ECHO req(dest=all,src="bob") ECHO req(dest=all,src="bob") ECHO res(dest="bob",src="eve") ECHO res(dest="bob",src="sam") ECHO res(dest="bob",src="joe") Bob Countermeasures: 1 Make hosts and routers ignore broadcasts. 2 Make servers ignore all PINGs. Denial-of-Service 75/81 Denial-of-Service 76/81

SYN Flood Attacks SYN Flood Attacks... Idea: Start lots of connections to a server, but never finish the SYN/SYN-ACK/ACK sequence, causing the server s memory to fill up. Attack: 1 Eve sends a SYN(src="joe") packet to Alice s server. 2 Server responds with SYN-ACK, sent to joe. 3 Eve repeats from 1. SYN(src="sam") SYN(src="joe") SYN(src="pat") SYN-ACK SYN-ACK SYN-ACK Denial-of-Service 77/81 Denial-of-Service 78/81 SYN Flood Attacks Countermeasures Outline SYN Cookies (see the book). Microsoft Windows: A special queue for half-open connections. Don t allocate resources for the TCP connection until the ACK has been received. Denial-of-Service 79/81 1 Introduction Internet Protocol Layers Packets Network Security Issues 2 The Link Layer Hubs and Switches Ethernet Frames ARP Spoofing 3 The Network Layer ICPM IP Spoofing 4 The Transport Layer TCP Session Hijacking 5 Denial-of-Service ICPM Attacks SYN Flood Attacks 6 Summary Summary 80/81

Readings and References Chapter 5 in Introduction to Computer Security, by Goodrich and Tamassia. Summary 81/81