Notes on Network Security - Introduction



Similar documents
Chap. 1: Introduction

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

Cryptography and Network Security

IY2760/CS3760: Part 6. IY2760: Part 6

Information System Security

COSC 472 Network Security

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Cryptography and Network Security Chapter 1

Table: Security Services (X.800)

544 Computer and Network Security

CSCI 4541/6541: NETWORK SECURITY

Introduction to Security

7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

Network Security. Network Security Hierarchy. CISCO Security Curriculum

Content Teaching Academy at James Madison University

1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services

Chapter 6: Fundamental Cloud Security

Lecture II : Communication Security Services

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security: Overview

TELE 301 Network Management. Lecture 18: Network Security

Security Requirements for Wireless Networks and their Satisfaction in IEEE b and Bluetooth

Introduction. -- some basic concepts and terminology -- examples for attacks on protocols -- main network security services

Security Goals Services

Basics of Internet Security

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Compter Networks Chapter 9: Network Security

How To Write A Transport Layer Protocol For Wireless Networks

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

Overview of computer and communications security

Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik

Building A Secure Microsoft Exchange Continuity Appliance

Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Security Issues with Integrated Smart Buildings

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Wireless Security with Cyberoam

INTERNATIONAL TELECOMMUNICATION UNION $!4! #/--5.)#!4)/..%47/2+3 /0%. 3934%-3 ).4%2#/..%#4)/. /3) 3%#52) #452%!.$!00,)#!4)/.

Information Security Basic Concepts

HANDBOOK 8 NETWORK SECURITY Version 1.0

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

INTERNATIONAL TELECOMMUNICATION UNION DATA COMMUNICATION NETWORKS: OPEN SYSTEMS INTERCONNECTION (OSI); SECURITY, STRUCTURE AND APPLICATIONS

Introduction to Internet Security

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

CS5008: Internet Computing

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

ETSI TS V4.0.0 ( )

A 360 degree approach to security

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

CS 4803 Computer and Network Security

CS5490/6490: Network Security- Lecture Notes - November 9 th 2015

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

CPSC 467: Cryptography and Computer Security

Weighted Total Mark. Weighted Exam Mark

Wireless Network Security

Practical Overview on responsibilities of Data Protection Officers. Security measures

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Passing PCI Compliance How to Address the Application Security Mandates

VOICE OVER IP SECURITY

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications

CS 203 / NetSys 240. Network Security

How To Protect Your Data From Being Hacked On A Network (Kerberos) On A Pc Or Mac Or Ipad (Ipad) On An Ipad Or Ipa (Networking) On Your Computer Or Ipam (Network

Chapter 7 Transport-Level Security

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

CPSC 467b: Cryptography and Computer Security

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

INSTANT MESSAGING SECURITY

Lesson 4: Introduction to network security

Managing IT Security with Penetration Testing

Advanced File Integrity Monitoring for IT Security, Integrity and Compliance: What you need to know

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers

Client Server Registration Protocol

Securing IP Networks with Implementation of IPv6

Potential Targets - Field Devices

Chapter 10. Cloud Security Mechanisms

Protocol Rollback and Network Security

Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon

Security and Privacy in Cloud Computing

WEB SERVICES SECURITY

Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.

Skoot Secure File Transfer

Data Storage Security in Cloud Computing

External Supplier Control Requirements

Residual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.)

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

MANAGEMENT OF SECURE SYSTEMS AND SECURITY WITHIN OSI 1

Security vulnerabilities in the Internet and possible solutions

Transcription:

Notes on Network Security - Introduction Security comes in all shapes and sizes, ranging from problems with software on a computer, to the integrity of messages and emails being sent on the Internet. Network Security is a term to denote the security aspects attributed to the use of computer networks. This involves the protection of the integrity of the communications that are sent over the network, who is able to access the network or information system present, and also what can be sent over the network. There are a multitude of scenarios and areas that a network and its use can be exploited. The problem is that given the OSI Network Model of: Application, Transport,Network, Datalink and Physical, where amongst this can security be deployed? Should everything be concentrated at the data link or network or transport layers? or should a Defense in Depth strategy be employed? These notes details the various ways in which networks can be made secure. The remainder of this chapter provides some introductory material in relation to networks and their security. First, some terminology: Security Attack: Any action that compromises the security of information exchanges and systems. Security Service: A service that enhances the security of information exchanges and systems. A sercurity service makes use of one or more security mechanisms. Security Mechanism*: A mechanism that is designed to detect, prevent or recover from a security attack. 2.1. Security Attacks There exist several attack types and they can be divided into two distinct category s: Passive and Active, they denote the amount of work that an attacker must do. 2.1.1. Passive Attacks A Passive Attack is one that involves either the eavesdropping or monitoring of data communications. The goal of the malicious entity is to acquire the information or learn more about the communication.

Release of Message Contents: This is when during the transmission of data from one party to another, a third and malicious party intercepts the message and learns its contents. Traffic Analysis: Traffic analysis is concerned with the analysis of patterns generated by the actions of the parties involved. This may simply involve the detection of an encrypted message being sent from a single party. Such attacks are difficult to detect, due to their inherent nature. Though one can use encryption in order to inhibit the success-fullness of such attacks. 2.1.2. Active Attacks Active Attacks are those that involve the modification of the communication channel or the data being sent across the channel. Masquerade: This is simply the impersonation of a legitimate entity in order to abuse or access the resources accessible by the entity. Replay: Involves the retransmission of existing and already transmitted data in order to produce an unauthorized effect. Message Modification: The delay, modification, reorder on a legitimate message such that it produces an unauthorized effect. Denial of Service: This involves the prevention of or reduction in quality, of a legitimate service. Such attacks may target specific hosts or entire networks. In contrast to passive attacks, active ones are easy to detect but harder to counter, as it would involve the protection of all the communication services offered. 2.2. Security Services A Security Service, as defined by X.800, is a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or data transfers. There are five categories mentioned, together with availability: Availability The property of a system or a system resource being accessible and usable upon demand by an authorized system entity, according to performance specifications for the system. Access Control The prevention of unauthorised use of a resource. Authentication

This is the assurance that the communicating entity is the one that it claims to be. There are two classes of authentication: Peer Entity involves the authentication of a logical entity in a communication process; and Data Origin involves assurances relating to the origin of the source of received data. Data Confidentiality The protection of data from unauthorised disclosure. This can be further specified as: Connection Confidentiality The protection of all user data on a connection. Connectionless Confidentiality The protection of all user data in as single data block. Selective-Field Confidentiality The confidentiality of selected fields within the user data on a connection or in a single data block. Traffic-Flow Confidentiality The protection of the information that might be derived from observation of traffic flows. Data Integrity The assurance that data received is in the exact same format as it was when sent by an authorised entity. This can be considered in terms of Connection Integrity: Connection Integrity with Recovery Provided for the integrity of all user data on a connection and detects any modification, insertion, deletion or replay of any data within an entire data sequence, with recovery attempted. Connection Integrity without Recovery As previously but provides only detection without recovery. Selective-Field Connection Integrity Provides for the integrity of selected field within the user data of a data block transferred over a connection and takes the form of determination of whether the selected fields have been modified, inserted, deleted or replayed. Connectionless Integrity Provides for the integrity of a single connectionless data block and may take the form of a detection of data

modification. Additionally a limited form of replay detection may be provided. Selective-Field Connectionless Integrity Provides for the integrity of selected fields within a single connectionless data block; takes the form of determination of whether the selected fields have been modified. Non-repudiation Provides protection against denial by one of the entities involved in a communication of having participated in all or part of the communication. This can imply: Origin Non-repudiation Proof that the message was sent by the specified party. Destination Non-repudiation Proof that the message was received by the specified party. 2.3. Security Mechanisms Security Mechanisms refer to tools and techniques that can be implemented within a specific protocol layer or outwith the layer that provided some form of security. Some examples are listed below. Specific Mechanisms Encryption, Digital Signatures, Access Control, Data Integrity, Authentication Exchange, Traffic Padding, Routing Control, Notarisation Pervasive Mechanisms Trusted Functionality, Security Label, Event Detection, Security Audit Trail, Security Recovery 2.4. Security Models There are two main security models that are used when dealing with network security: Secure Communication and Secure Systems. 2.4.1. Secure Communication

Figure 1. Secure Communication In this model, there are two principal agents i.e. Alice and Bob, who wish to send a message via a information channel to each other that contains some secret information. In order to protect the secret information the parties involved will perform some form of Security Related Transformation on the information to be sent, using some form of shared secret that is known only by the parties involved. Such activities may involve the use of a Trusted Third Party to whom some responsibilities such as distribution of secret information or authorisation/authentication, are entrusted to. This is summarised in the figure above. This model is used for most areas of network security when the transmission of data is concerned. [Stallings2008] mentions that there are four basic task involved in designing a security service using this model: 1. Design an algorithm for performing the security related transformation. 2. Generate the secret information that is to be used. 3. Develop method for distribution and sharing of the secret information. 4. Specify a protocol to be used by the two principals that utilises the security algorithm and secret information to achieve a particular security service. 2.4.2. Secure Systems Figure 2. Secure System The other model reflects the remainder of the security problems that are associated with the protection of an information system i.e. a network, from malicious entities. Such entities can be a hacker that aims to gain access to a system for fun and profit, a disgruntled employee who wishes to cause damage or a criminal who wishes to exploit the resources for financial gain. Furthermore this model incorporates the

notion of additional software that aims to exploit vulnerabilities in the system and targets applications and utility programs. They can be classed as: Information access threats interception/modification of data; and Service Threats-- exploitation of service flaws. Moreover in order to protect the information system a Gatekeeper Function is used to perform access control and restrict the accessibility of the system. If this fails then some form of internal security controls are needed to identify any, stop the actions of and repair any damage as caused by, intruders. This is summarised in Figure fig:secure:sys. 2.5. Outline of Notes The notes are organised into two distinct parts: Part One: Security Protocols o this looks at the various protocols and techniques used to ensure security of networks. This utilises the Secure Communication Model and will look at topics such as Wireless and Wired network security and protocols such asssh and SSL/TLS. Part Two: System Security o this looks at the ways in which an information system can be attacked and defended. This utilises the Secure System Model and will look at topics such in relation to both Attacking and Defending information systems. Part Three: Guest Lectures o during the course three guest lectures were given by security professionals from KPMG and Quarantainenet, looking at Covert Channels, Eavesdropping on DECT Communication and Quarantining. This topics, as given by them will be addressed. Source: http://jfdm.host.cs.st-andrews.ac.uk/notes/netsec/#_security_attacks