Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett



Similar documents
Layered protocol (service) architecture

Kick starting science...

Computer Networks CS321

Chapter 5. Data Communication And Internet Technology

The OSI and TCP/IP Models. Lesson 2

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet?

Protocoles internet. Carole Delporte paris- diderot.fr Introduc8on. C. Delporte M2- Internet 1

Internet and IP addressing

Computer Networks Vs. Distributed Systems

Network Edge and Network Core

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS

Network Concepts. IT 4823 Information Security Concepts and Administration. The Network Environment. Resilience. Network Topology. Transmission Media

CSCI Topics: Internet Programming Fall 2008

Introduction cont. Some Structure in the Chaos. Packet switching versus circuit switching. Access networks and physical media

Computer Networks & Security 2014/2015

CompTIA Network+ (Exam N10-005)

TCIPG Reading Group. Introduction to Computer Networks. Introduction 1-1

Overview of Computer Networks

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

Network Security Engineering: Introduction

Computer Networks and the Internet

Overview: Internet vs Data Center Networks

Chapter 1 Computer Networks and the Internet

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Telecommunications, Networks, and Wireless Computing

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

CSCI 362 Computer and Network Security

Introduction to computer networks and Cloud Computing

Communication Networks. MAP-TELE 2011/12 José Ruela

Networks. Connecting Computers. Measures for connection speed. Ethernet. Collision detection. Ethernet protocol

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

ICS 153 Introduction to Computer Networks. Inst: Chris Davison

CSIS CSIS 3230 Spring Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

How To Understand The Layered Architecture Of A Network

Data Communication Networks and Converged Networks

Post-Class Quiz: Telecommunication & Network Security Domain

What is Network Latency and Why Does It Matter?

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

Introduction to Computer Networks

CSE 3461 / 5461: Computer Networking & Internet Technologies

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Data Link Protocols. TCP/IP Suite and OSI Reference Model

CITS1231 Web Technologies. Client, Server, the Internet, and the Web

Transport and Network Layer

Architecture and Performance of the Internet

AERONAUTICAL COMMUNICATIONS PANEL (ACP) ATN and IP

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Oct 15, Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

IT Data Communication and Networks (Optional)

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

Chapter 9. IP Secure

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Mobile IP Network Layer Lesson 01 OSI (open systems interconnection) Seven Layer Model and Internet Protocol Layers

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.

Internet structure: network of networks

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

COMPUTER NETWORK TECHNOLOGY (300)

How To Understand The Internet From A Telephone To A Computer (For A Computer)

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

Chapter 8 Security Pt 2

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Technical Support Information Belkin internal use only

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Advanced Higher Computing. Computer Networks. Homework Sheets

TCP/IP Protocol Suite. Marshal Miller Chris Chase

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

Own your LAN with Arp Poison Routing

Computer Networking Networks

Layered Architectures and Applications

Page 1 of 7. Computer Networking

IT4405 Computer Networks (Compulsory)

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

COSC 472 Network Security

The OSI & Internet layering models

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

SSVP SIP School VoIP Professional Certification

Cisco Data Center Network Solutions Sales Exam.

Course book: Computer Networking. Computer Networks 3 rd edition. By Andrew ST S.Tanenbaum. Top Down approach 3 rd edition.

Networking Technology Online Course Outline

CISC 1600 Introduction to Multi-media Computing

Internet Privacy Options

How To Understand The Internet Of S (Netware)

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Chapter 4 Connecting to the Internet through an ISP

Transport Layer Protocols

Lab VI Capturing and monitoring the network traffic

Overview of TCP/IP. TCP/IP and Internet

CPS221 Lecture: Layered Network Architecture

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Chapter 1 Introduction

Transcription:

Network Security Internet not originally designed with (much) security in mind original vision: a group of mutually trusting users attached to a transparent network Security considerations in all layers! attacks on Internet infrastructure (putting malware into hosts via the Internet): infecting/attacking hosts: spyware, virus,worms denial of service: prevent access to servers 41

What can bad guys do: malware? Spyware: infection by downloading e.g. web page with spyware records passwords, web sites visited, upload info to collection site Virus infection by receiving object (e.g., e-mail attachment), actively executing self-replicating: propagate itself to other hosts, users Worm: infection without explicit user interaction (e.g. using an e-mail program) self- replicating Example: Slammer worm: # hosts infected doubled every 8.5 secs in the first minutes after its outbreak 90% of the vulnerable hosts infected within 10 minutes 42

Denial of service attacks attackers make resources (e.g. servers) unavailable to legitimate traffic by overwhelming resource with bogus traffic (works very well in client/server applications) 1. select target 2. break into hosts around the network (see malware) 3. send packets toward target from compromised hosts target 43

Sniffing Packet sniffing: broadcast media (shared Ethernet, wireless) network interface reads/records all packets (e.g., including passwords!) passing by A C src:b dest:a payload B - needs confidentiality measures 44

Masquerade as you IP spoofing: send packet with false source address A C src:b dest:a payload B - needs authentication measures 45

Internet History (1) 1983: deployment of TCP/IP 1982: smtp e-mail protocol defined 1983: DNS defined for name-to-ip address translation 1985: ftp protocol defined 1988: TCP congestion control 100,000 hosts connected to confederation of networks 46

Internet History (2) Internet Explosion: commercialization, the Web, new apps early 1990s: Web hypertext [Bush 1945, Nelson 1960 s] HTML, HTTP: Berners-Lee browsers: pioneered by Mosaic (1994), later Netscape late 1990 s: commercialization of the Web (Internet commerce) Late 1990 s 2000 s: more killer apps: instant messaging (pioneered by ICQ), MP3 file sharing (pioneered by Napster), network security to forefront backbone links running at Gbps 47

Internet History (3) Today: ~900 million hosts Voice/Video over IP P2P applications: BitTorrent (file distribution), Skype (VoIP), PPLive (television over IP) more applications: YouTube (video sharing), gaming high-speed wireless networks 48

Introduction: Summary Covered a ton of material! Overview of Internet structure What are its main components? what s a protocol? network edge, core, access network packet-switching versus circuit-switching Topics central to the field of computer networking: performance: loss, delay, throughput layered reference models security Brief history You now have hopefully: context, overview, feel of networking 49

TCP/IP reference model (Internet architecture) The Internet protocol stack and the respective protocol data units (PDUs): The physical layer is not addressed further. It deals with transmitting raw bits over a physical transmission medium. The delivered service at the interface to the upper layer must ensure that sending a bit 1 at one side will result in receiving bit 1 at the other side. To do so, it must reflect the specific properties of the medium. Examples for transmission media: wired: magnetic media, twisted pair, coaxial cable, fiber optics wireless: electromagnetic spectrum, radio- micro-, infrared waves 50

Data Link Layer(1a) Some terminology: hosts and routers are nodes communication channels that connect adjacent nodes along communication path are links wired links wireless links LANs layer-2 packet is a frame, encapsulates datagram from the network layer data-link layer has responsibility of transferring datagram from one node to adjacent node over a link encapsulated in a frame 51

Data Link Layer(1b) Virtual communication versus actual communication: 52

Data Link Layer(1c) frames transferred by different link protocols over different links: e.g., Ethernet on first link, PPP on an intermediate link, 802.11 on the last link each link protocol provides different services e.g., may or may not provide rdt (reliable data transfer) over link transportation analogy trip from Princeton to Lausanne limo: Princeton to JFK plane: JFK to Geneva train: Geneva to Lausanne tourist = frame transport segment = communication link transportation mode = link layer protocol travel agent = routing algorithm 53

Data Link Layer (1d) Specific services to carry out: framing determining how the bits of the physical layer are grouped into frames dealing with transmission errors: error detection: receiver detects presence of errors: signals sender for retransmission and drops frame error correction: receiver identifies and corrects bit error(s) without resorting to retransmission flow control: pacing between adjacent sending and receiving nodes separate MAC sublayer controlling channel access if shared medium by so-called MAC protocols 54