Network Security Concepts: Review



Similar documents
Security in Computer Networks

Network Security. Raj Jain. The Ohio State University. Columbus, OH Raj Jain 31-1

Chapter 31 Network Security

Chapter 7: Network security

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Virtual Private Networks

SECURITY IN NETWORKS

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Content Teaching Academy at James Madison University

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Lukasz Pater CMMS Administrator and Developer

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Public Key Cryptography Overview

What is network security?

Security vulnerabilities in the Internet and possible solutions

Network Security. HIT Shimrit Tzur-David

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

CSCE 465 Computer & Network Security

CS5008: Internet Computing

Chapter 10. Network Security

Seminar Computer Security

Transport Level Security

Client Server Registration Protocol

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Network Security Part II: Standards

Network Attacks and Defenses

Midterm. Name: Andrew user id:

Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology

Chapter 8 Network Security

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

Chapter 8 Security Pt 2

Digital Signature. Raj Jain. Washington University in St. Louis

Network Security Concepts

Security: Focus of Control. Authentication

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Principles of Network Security

Name: 1. CSE331: Introduction to Networks and Security Fall 2003 Dec. 12, /14 2 /16 3 /16 4 /10 5 /14 6 /5 7 /5 8 /20 9 /35.

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028

Overview. SSL Cryptography Overview CHAPTER 1

Denial of Service. Tom Chen SMU

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Public Key Cryptography and RSA. Review: Number Theory Basics

Firewalls and Intrusion Detection

Network Security Fundamentals

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

ISM/ISC Middleware Module

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Network Security Technology Network Management

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information

VoIP Security regarding the Open Source Software Asterisk

CRYPTOGRAPHY IN NETWORK SECURITY

Cryptography and Network Security

TELE 301 Network Management. Lecture 18: Network Security

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Network Security #10. Overview. Encryption Authentication Message integrity Key distribution & Certificates Secure Socket Layer (SSL) IPsec

Bendigo and Adelaide Bank Ltd Security Incident Response Procedure

Information Security

Overview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security

PROFESSIONAL SECURITY SYSTEMS

CEH Version8 Course Outline

How To Protect Your Data From Attack

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

Chapter 37. Secure Networks

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Mobile IP Part I: IPv4

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

Security of IPv6 and DNSSEC for penetration testers

Description: Objective: Attending students will learn:

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

Chapter 8. Network Security

How To Use A College Computer System Safely

Network Concepts. IT 4823 Information Security Concepts and Administration. The Network Environment. Resilience. Network Topology. Transmission Media

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Transcription:

Network Security Concepts: Review Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/ 11-1

Overview Types of security attacks and solutions Secret Key and Public Key Encryption Hash Functions Message Authentication Code (MAC) Digital Signature and Digital Certificates RSA Public Key Encryption 11-2

Types of Security Attacks Denial of Service (DoS) DoS by Flooding: Lots of packets from one node to victim. DoS on DNS or root name servers. ARP flooding, ping broadcasts, TCP SYN flooding. DoS by Forging: Send incorrect routing message Distributed DoS (DDoS): Lots of packets from multiple nodes to victim Attacker Victim 11-3

Security Attacks (Cont) Sniffing: Listen to unencrypted traffic Replay: Record and reuse messages later Traffic Redirection: Poison ARP tables in routers. Reaction: Send spurious packets; monitor the response. Challenge-response authentication. Jamming: RF interference. Rogue AP: Man-in-the-middle attacks. Easily deployed in public areas. Fake SSID Fraud: Criminal deception. E.g., identity theft DNS query and responses are in clear. Can be spoofed by a man-in-the-middle. DNS cache poisoning. BGP routing messages can be spoofed.. 11-4

Security Attacks (Cont) Trojan Horse: Programs with hidden functionality. Could be triggered when a specific time or condition. Trap Doors: Backdoor. Code segment to circumvent access control. Virus: A program that reproduces by introducing a copy of itself in other programs. Jump to Viral code and return to beginning. Worms: Creates copies of itself on other machines. Unlike virus, worms do not require user action. Morris worm spread by finding IP addresses on the machine. Slammer worm sent UDP packets to cause buffer overflow. Buffer Overflow: Overwrite code segments and execute code in data space. Many programming languages do enforce bound checking. 11-5

Security Attacks (Cont) Covert Communications Channel: Hidden channel. Capture electromagnetic radiations from keyboards, screens, and processors. Pizza deliveries to White House Steganography or Information Hiding: Lower bits of pictures or music files. Reverse Engineering: dismantling and inspecting to infer internal function and structure. Code dumping and decompiling Scavenging: Acquisition of data from residue. Searching through rubbish bins. Buffer space in memory, deleted files on disks, bad blocks on disks Cryptanalysis: Find encryption key, encryption method, or clear text. Get plain-text and cipher text pairs. 11-6

Security Solutions Audits: May including testing by a red team. Keep good system logs. Formal methods: Used to verify no human errors in the code and protocols. Attack Graphs: Show paths that an attacker can take to get access Security Automata: Security policies expressed as finite state machines. Encryption: Secret key and public key Steganography: Digital water marking. Information hidden in images, sound, or video can be used to find the origin of data. 11-7

Security Solutions (Cont) Obfuscation: Make a concept confusing and difficult to understand. Common in politics. Write programs so that they can not be reverse engineered. Virus Scanners Proof Carrying Code: Mobile code contains a proof that it is safe. Sandboxing: Limiting access Firewalls: Scan and filter network traffic. Red/black separation: Handle sensitive and insensitive data on different machines. Secure Hardware: Temperproof. Physical security. 11-8

Security Requirements Integrity: Received = sent? Availability: Legal users should be able to use. Ping continuously No useful work gets done. Confidentiality and Privacy: No snooping or wiretapping Authentication: You are who you say you are. A student at Dartmouth posing as a professor canceled the exam. Authorization = Access Control Only authorized users get to the data No repudiation: Neither sender nor receiver can deny the existence of a message 11-9

Secret Key Encryption Also known as symmetric encryption Encrypted_Message = Encrypt(Key, Message) Message = Decrypt(Key, Encrypted_Message) Example: Encrypt = division 433 = 48 R 1 (using divisor of 9) 11-10

Public Key Encryption Invented in 1975 by Diffie and Hellman Encrypted_Message = Encrypt(Key1, Message) Message = Decrypt(Key2, Encrypted_Message) Key1 Text Ciphertext Key2 Ciphertext Text 11-11

Public Key Encryption RSA: Encrypted_Message = m 3 mod 187 Message = Encrypted_Message 107 mod 187 Key1 = <3,187>, Key2 = <107,187> Message = 5 Encrypted Message = 5 3 = 125 Message = 125 107 mod 187 = 5 = 125 (64+32+8+2+1) mod 187 = {(125 64 mod 187)(125 32 mod 187)... (125 2 mod 187)(125 mod 187)} mod 187 11-12

Modular Arithmetic xy mod m = (x mod m) (y mod m) mod m x 4 mod m = (x 2 mod m)(x 2 mod m) mod m x ij mod m = (x i mod m) j mod m 125 mod 187 = 125 125 2 mod 187 = 15625 mod 187 = 104 125 4 mod 187 = (125 2 mod 187) 2 mod 187 = 104 2 mod 187 = 10816 mod 187 = 157 125 8 mod 187 = 157 2 mod 187 = 152 125 16 mod 187 = 152 2 mod 187 = 103 125 32 mod 187 = 103 2 mod 187 = 137 125 64 mod 187 = 137 2 mod 187 = 69 125 64+32+8+2+1 mod 187 = 69 137 152 104 125 mod 187 = 18679128000 mod 187 = 5 11-13

Public Key (Cont) One key is private and the other is public Message = Decrypt(Public_Key, Encrypt(Private_Key, Message)) Message = Decrypt(Private_Key, Encrypt(Public_Key, Message)) Msg Alice s Public Key Alice s Private Key Msg Msg Bob s Public Key Bob s Private Key Msg 11-14

Hash Functions 12345678901234567 Hash Example: CRC can be used as a hash (not recommended for security applications) Requirements: 1. Applicable to any size message 2. Fixed length output 3. Easy to compute 4. Difficult to Invert Can t find x given H(x) One-way 5. Difficult to find y, such that H(x) = H(y) Can t change msg 6. Difficult to find any pair (x, y) such that H(x) = H(y) Strong hash 12345678901234767 Hash 11-15

Digital Signature Message Digest = Hash(Message) Signature = Encrypt(Private_Key, Hash) Hash(Message) = Decrypt(Public_Key, Signature) Authentic Also known as Message authentication code (MAC) Text Hash Signature Private Key Digest Public Key Signature Digest Hash Text 11-16

Message Authentication Code (MAC) Authentic Message = Contents unchanged + Source Verified May also want to ensure that the time of the message is correct Encrypt({Message, CRC, Time Stamp}, Source s secret key) Message + Encrypt(Hash, Source s secret key) Message + Encrypt(Hash, Source s private key) Message MAC 11-17

Digital Certificates Like driver license or passport Digitally signed by Certificate authority (CA) - a trusted organization Public keys are distributed with certificates CA uses its private key to sign the certificate Hierarchy of trusted authorities X.509 Certificate includes: Name, organization, effective date, expiration date, public key, issuer s CA name, Issuer s CA signature User ID Public Key hash Encrypt CA private key 11-18 User ID Public Key

1. Application requests connection 2. Security service asks KDC for session Key 3. KDC distributes session key to both hosts 4. Buffered packet transmitted Key Distribution Key Distribution Center KDC shares a secret key with each Host. 11-19

Confidentiality User 1 to User 2: Encrypted_Message = Encrypt(Public_Key2, Encrypt(Private_Key1, Message)) Message = Decrypt(Public_Key1, Decrypt(Private_Key2, Encrypted_Message) Authentic and Private Your Public Key My Private Key Message 11-20

RSA Public Key Encryption Ron Rivest, Adi Shamir, and Len Adleman at MIT 1978 Both plain text M and cipher text C are integers between 0 and n-1. Key 1 = {e, n}, Key 2 = {d, n} C = M e mod n M = C d mod n How to construct keys: Select two large primes: p, q, p q n = p q Calculate Φ = (p-1)(q-1) Select e, such that lcd(φ, e) = 1; 0 < e < s Calculate d such that de mod Φ = 1 11-21

RSA Algorithm: Example Select two large primes: p, q, p q p = 17, q = 11 n = p q = 17 11 = 187 Calculate Φ = (p-1)(q-1) = 16x10 = 160 Select e, such that lcd(φ, e) = 1; 0 < e < Φ say, e = 7 Calculate d such that de mod Φ = 1 160k+1 = 161, 321, 481, 641 Check which of these is divisible by 7 161 is divisible by 7 giving d = 161/7 = 23 Key 1 = {7, 187}, Key 2 = {23, 187} 11-22

Firewall: Bastion Host Intranet R1 Bastion Host R2 Internet Bastions overlook critical areas of defense, usually having stronger walls Inside users log on the Bastion Host and use outside services. Later they pull the results inside. One point of entry. Easier to manage security. 11-23

Wireless Firewall Wireless Access point allows access to inside resources from outside Wireless hosts should be behind a wireless firewall Wireless Firewall R1 Firewall R2 Internet 11-24

Summary Types of attacks: DoS, DDoS, Virus, Worm, Types of solutions: Security audit, Encryption, firewalls, Secret Key and Public Key Encryption Secure Hash Functions Message Authentication Code (MAC) Digital Signature and Digital Certificates RSA Public Key Encryption based on exponentiation 11-25

Homework Exercise 1: If 125 2048 mod 187 is 86, what is 125 4096 mod 187? Exercise 2: In a public key system using RSA, you intercept the cipher text C=10 sent to a user whose public key is e=5, n=35. What is the plain text M? 11-26

References W. Stallings, Data and Computer Communications, 7 th Ed, Prentice Hall, 2004, Chapter 21, R. R. Brooks, Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks, CRC Press, 2004, pp. 5-55, ISBN:0849322723 Sudhir Dixit and R. Prasad, (Eds), Wireless IP and Building the Mobile Internet, Artech House, 2002, pp. 587-617 Frank Ohrtman, Voice over 802.11, Artech House, 2004, pp. 97-126, ISBN: 1580536778 11-27