Summer Workshop on Cyber Security Computer s Security (Part 1) Dr. Hamed Mohsenian-Rad University of California at Riverside and Texas Tech University August 12-16, 2013 Supported by National Science Foundation
Overview of Computer s Our Goal: Get feel and terminology Focus on the Internet What is the Internet? What is the Protocol? Layered Architecture. Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 2
Overview of Computer s Our Goal: Get feel and terminology Focus on the Internet What is the Internet? What is the Protocol? Security Layered Architecture. Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 3
What is the Internet Millions of connected computing devices: End systems / Hosts (Running Net Apps) Communication s (Wired or Wireless) mobile network home network global ISP regional ISP Routers and Switches (Forward Packets ) institutional network Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 4
What is the Internet of s ISPs Institutional s Home s Mobile s mobile network home network global ISP regional ISP Internet Protocols: Control Sending & Receiving of Messages E.g.: TCP, IP, HTTP, 802.11 institutional network Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 5
What is a Protocol? Human Protocol: What time is it?, I have a question., Protocols: Machines instead of humans. Protocols define format and order of messages sent and received among network entities, and actions taken on message transmission and message receipt. Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 6
What is a Protocol? Protocol define the interaction sequences over time: Hi Hi Got the time? 2:00 Time TCP connection request TCP connection response Get http://www.awl.com/kurose-ross <file> Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 7
Protocol Layers s are complex with many pieces : Hosts Routers Wired s Wireless s s Protocols Hardware Software Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 8
Protocol Layers s are complex with many pieces : Hosts Routers Wired s Wireless s s Protocols Hardware Software Q: How can we organize the structure of networks? Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 9
Example: Organization of Air Travel A series of steps are taken at different layers : ticket (purchase) baggage (check) gates (load) runway takeoff airplane routing airplane routing ticket (complain) baggage (claim) gates (unload) runway landing airplane routing Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 10
Example: Organization of Air Travel Each layer implements a service : Via its own internal-layer actions. ticket (purchase) ticket (complain) ticket baggage (check) baggage (claim baggage gates (load) gates (unload) gate runway (takeoff) runway (land) takeoff/landing airplane routing airplane routing airplane routing airplane routing airplane routing departure airport intermediate air-traffic control centers arrival airport Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 11
Internet Protocol Stack There are five layers in Internet Protocol Stack with different functionalities and protocols. Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 12
Internet Protocol Stack : Supporting network apps FTP, HTTP, SMTP, Skype Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 13
Internet Protocol Stack : Supporting network apps FTP, HTTP, SMTP, Skype Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 14
Internet Protocol Stack : Supporting network apps FTP, HTTP, SMTP, Skype Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 15
Internet Protocol Stack : Supporting network apps FTP, HTTP, SMTP, Skype : Process-to-process data transfer TCP, UDP Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 16
Internet Protocol Stack : Supporting network apps FTP, HTTP, SMTP, Skype : Process-to-process data transfer TCP, UDP They all use TCP Protocol for reliable data transmission. (Socket Programming) (Each socket has a port #) Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 17
Internet Protocol Stack : Supporting network apps FTP, HTTP, SMTP, Skype : Process-to-process data transfer TCP, UDP : Routing from source to destination IP, Routing Protocols Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 18
Internet Protocol Stack : Supporting network apps FTP, HTTP, SMTP, Skype : Process-to-process data transfer TCP, UDP : Routing from source to destination IP, Routing Protocols Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 19
Internet Protocol Stack : Supporting network apps FTP, HTTP, SMTP, Skype : Process-to-process data transfer TCP, UDP : Routing from source to destination IP, Routing Protocols Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 20
Internet Protocol Stack : Supporting network apps FTP, HTTP, SMTP, Skype : Process-to-process data transfer TCP, UDP : Routing from source to destination IP, Routing Protocols : Routing from source to destination Ethernet, IEEE 802.11 (WiFi) Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 21
Internet Protocol Stack : Supporting network apps FTP, HTTP, SMTP, Skype : Process-to-process data transfer TCP, UDP : Routing from source to destination IP, Routing Protocols : Routing from source to destination Ethernet, IEEE 802.11 (WiFi) Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 22
Internet Protocol Stack : Supporting network apps FTP, HTTP, SMTP, Skype : Process-to-process data transfer TCP, UDP : Routing from source to destination IP, Routing Protocols : Routing from source to destination Ethernet, IEEE 802.11 (WiFi) : Bit-by-bit transmission Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 23
Packets communications are essentially 0-1 bit streams: But we break down bit streams to small bit chunks = packets. The packet at each layer: Can have different names (frame, segment, etc.) Can have different sizes Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 24
Packets Message Segment Datagram Frame Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 25
Packet Headers Protocol at each layer adds its own headers for control data. Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 26
Packet Headers Protocol at each layer adds its own headers for control data. Message Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 27
Packet Headers Protocol at each layer adds its own headers for control data. Segment Message H T Used by TCP and UDP Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 28
Packet Headers Protocol at each layer adds its own headers for control data. Datagram Message H T H N Used by IP, Routing Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 29
Packet Headers Protocol at each layer adds its own headers for control data. Used by Ethernet, Message H T H N H L Frame Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 30
What is Next? For the rest of this track we will cover: Part 2: Common Tools & Techniques in Security (Dr. Akbar Siami-Namin) Part 3: Cyber Security in the Internet Protocol Stack (Dr. Hamed Mohsenian-Rad) Part 4: Research and Education in Security (Dr. Rattikorn Hewett) Summer Workshop on Cyber Security August 12-16, 2013 Security, UCR & TTU 31