How To Protect Your Data From Attack



Similar documents
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Chapter 10. Network Security

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Cryptography and network security CNET4523

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Information Security

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Client Server Registration Protocol

Chapter 8. Network Security

Chapter 7 Transport-Level Security

CSE/EE 461 Lecture 23

What is network security?

4.1: Securing Applications Remote Login: Secure Shell (SSH) PEM/PGP. Chapter 5: Security Concepts for Networks

Content Teaching Academy at James Madison University

Chapter 7: Network security

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

EXAM questions for the course TTM Information Security May Part 1

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Security vulnerabilities in the Internet and possible solutions

Chapter 17. Transport-Level Security

Lecture 9 - Network Security TDTS (ht1)

Authenticity of Public Keys

Information Security Basic Concepts

IT Networks & Security CERT Luncheon Series: Cryptography

CPS Computer Security Lecture 9: Introduction to Network Security. Xiaowei Yang

Overview Windows NT 4.0 Security Cryptography SSL CryptoAPI SSPI, Certificate Server, Authenticode Firewall & Proxy Server IIS Security IE Security

Lecture 9: Application of Cryptography

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Cornerstones of Security

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Network Security Fundamentals

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Chapter 15: Security

Transport Level Security

Is your data safe out there? -A white Paper on Online Security

Introduction to Cryptography

Chap. 1: Introduction

IP Security. Ola Flygt Växjö University, Sweden

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Chapter 32 Internet Security

CS 5490/6490: Network Security Fall 2015

Netzwerksicherheit: Anwendungen

Network Security Essentials Chapter 5

Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009

Virtual Private Networks

Network Security - Secure upper layer protocols - Background. Security. Question from last lecture: What s a birthday attack? Dr.

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

NETWORK ADMINISTRATION AND SECURITY

CS 758: Cryptography / Network Security

Overview. Protocols. VPN and Firewalls

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Security: Focus of Control. Authentication

VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls

Internetwork Security

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Savitribai Phule Pune University

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Managing and Securing Computer Networks. Guy Leduc. Chapter 3: Securing applications. Chapter goals: security in practice:

Network Security Protocols

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

A Comparative Study of Security Features in FreeBSD and OpenBSD

Sync Security and Privacy Brief

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

Chapter 18: System Security

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Chapter 8 Network Security. Slides adapted from the book and Tomas Olovsson

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

CPSC 467b: Cryptography and Computer Security

CSC 474 Information Systems Security

Message authentication and. digital signatures

Network Security #10. Overview. Encryption Authentication Message integrity Key distribution & Certificates Secure Socket Layer (SSL) IPsec

Lukasz Pater CMMS Administrator and Developer

NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028

How To Understand And Understand The Security Of A Key Infrastructure

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Module 7 Security CS655! 7-1!

VoIP Security. Seminar: Cryptography and Security Michael Muncan

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Overview. SSL Cryptography Overview CHAPTER 1

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

Transcription:

Security in Communication Networks Lehrstuhl für Informatik 4 RWTH Aachen Prof. Dr. Otto Spaniol Dr. rer. nat. Dirk Thißen Page 1

Organization Lehrstuhl für Informatik 4 Lecture Lecture takes place on Thursday, 13:15 14:45 Exercises Fortnightly Exercise is given on Monday, 16:45 18:15 Frontal exercise Exact dates depend upon the lecture dates Exercise sheets are provided on the web page two weeks before an exercise date Planned exercise dates: 23.4. 7.5. 4.6. 25.6. 9.7. Page 2

Organization Lehrstuhl für Informatik 4 Slide Copies Copies to the lecture slides as well as exercise sheets are placed on the web page to the lecture: http://www-i4.informatik.rwth-aachen.de/content/teaching/lectures/sub/sikon/sikonss07/index.html Written Exam At the end of summer term Contact Information for questions regarding lecture/exercises Prof. Dr. Otto Spaniol, Dr. Dirk Thißen Lehrstuhl für Informatik 4, RWTH Aachen Ahornstraße 55, 52074 Aachen Phone: 0241 / 80 21400/21450 email: {spaniol, thissen}@informatik.rwth-aachen.de Page 3

Literature Lehrstuhl für Informatik 4 Kaufman, Charlie; Perlman, Radia; Speciner, Mike: Network Security Private Communication in a Public World. Prentice-Hall, 2002 Schneier, Bruce: Applied Cryptography - Protocols, Algorithms, and Source Code in C. John Wiley & Sons, 1996 Mao, Wenbo: Modern Cryptography. Prentice Hall, 2004 Spaniol, Otto; Güneş, Mesut: Skript zur Vorlesung Sicherheit in Kommunikationsnetzen. Mainz-Verlag, 2000 Page 4

Evolution of the Internet Necessity is the mother of invention, and computer networks are the mother of modern cryptography - R. L. Rivest The Story of the Internet: During the latter half of the 1980's ARPANET moved from the research domain into a transcontinental reality In November 1988 the "Internet worm" brought the ARPANET to its knees Since then an almost continuous stream of security-related incidents has affected thousands of computer systems and networks throughout the world (see for more information http://www.cert.org) By 2005, the Internet had grown from 60,000 host computer systems to over 350 million Many companies and private users now rely on the Internet for their daily business and private communication (sharing financial, business, or personal information) Attacks: illegal gain of information, unrecognized change of information, disturbance of the functionality (Confidentiality, Integrity, Availability) Page 5

Attacks on Computer Stand-alone computer system (UNIX operating system): Only legitimate user with physical access to the computer system is able to log in by providing name and password Attacker must have physical access and the login information Networked computer (UNIX operating system): System makes available some basic network services: telnetd: remote terminal access service, provided at port 23 sendmail: electronic mail service, provided at port 25 httpd: WWW, provided at port 80 nsfd: network file service, provided at port 2049 Attacker does not need physical access Attacker can use any TCP/IP service offered by the system Page 6

Attacks on Computer Only an attacker who is able to physically access or connect to a computer system can attack it By adding more network connections, more vulnerabilities are added automatically A networked computer system runs software that is inherently more complex and error prone An attacker must know and be able to exploit just one single bug (administrator or security expert must know and fix each bug) Security Goal: protect networked computers by separating a company network from the Internet (e.g. by a Firewall) Page 7

Attacks on Communication Processes Passive Attack: Passive wiretapping attack: the attacker is able to interpret the data and to extract information Traffic analysis attack: attacker can observe who communicates with whom (e.g. two companies begin to exchange a large number of messages and combines them) Available programs: etherfind, tcpdump,... Active Attack: Modify, extend, delete, and replay data units Influence or modify routing tables Denial of service attack (flood a server) Network Router Alice attacker Page 8

Security in Communication Processes Confidentiality Message contents should be kept confidential; i.e., only the communication partners may see it Sender and/or receiver of messages should remain anonymous, and third parties (including the network operators) should be unable to observe their communication Neither potential communication partners nor third parties (including the network operators) should be able to locate mobile stations Integrity Forging message contents (including sender s address) should be detected The recipient of a message should be able to prove that a particular message has been sent, and if that the addressee has received the message Nobody can cheat the network operators in terms of usage fees. On the other hand, the network operators can only charge fees for correctly delivered services Availability The communication network enables communication between all parties who wish to communicate and who are allowed to do so Page 9

Security Techniques Known techniques for Confidentiality: Data encryption, anonymity techniques Integrity: Data encryption, digital signatures, access control and authentication Availability: Fault-tolerant systems, access control, firewall, intrusion detection Important term: Cryptography Secrecy Steganography: Hide message, e.g. in a picture Encryption: enc_algorithm: (plaintext, key) ciphertext Authentication Identification, entity authentication: Who is currently on the other end of this connection? Message authentication: Who created this message? Digital Signature: Convince a third party about who created this message. Page 10

Requirement: Trusted Domains Nearly no security technique is perfect: you mostly need to trust somebody: Protection against every possible attacker is impossible Before the design of a protection technique it is necessary to identify trusted domains A trusted domain comprises systems or parts of systems (e.g. security module) No attackers are assumed within a trusted domain (restriction of the attacker) A trusted domain is always related to a single user or group of users Trusted Domain Source Untrusted Area Trusted Domain Destination Protection technique Protection technique Page 11

Shared-key Encryption Scheme One-time pad, DES, IDEA etc. Can handle data volumes of several Gigabyte/s, but security is questionable Key sizes of 56-128 bit Key distribution: secret channel needs a key distribution center or public-key scheme random secur. param. Key generator k k Secret Channel Trusted Domain k m or error Decryption algorithm enc(k, m) Encryption algorithm m m = message, k = key Page 12

Shared-key Authentication Scheme Message authentication codes Specific constructions, or based on block ciphers or keyed hash functions Limitation: third party cannot check authenticity random secur. param. m Key generator k Auth. algorithm k Secret Channel Trusted Domain m, auth(k, m) Test ok algorithm or error k m = message, k = key Page 13

Cryptographic Hash Functions Hash Function H: variable length in fixed length out ( 128 bit) One-way: easy to compute infeasible to invert Collision resistant Practical hash functions: SHA, MD5, etc. Cryptographic primitive H: collision-resistant one-way hash-function fixed H: H(x) simulates a random oracle easy variable H: Keyed hash functions, family of hash functions H infeasible Page 14

Public-key Encryption Scheme RSA, Diffie-Hellman/El Gamal About 10 times slower than symmetric schemes Key size of 512-2048 bit for RSA Typically used to exchange a shared key for a symmetric scheme random secur. param. m or error Trusted Domain Key generator sk Decryption algorithm pk Authenticated Channel enc(pk, m) Trusted Domain pk Encryption algorithm m m = message, sk = secret key, pk = public key Page 15

Digital Signature Scheme Digital Signature: A hash value (collision-resistant) of a message is encrypted with the secret key of a public-key encryption scheme. RSA, El Gamal, etc. Asymmetry allows third party to check authenticity (since public key is known to all). random secur. param. m Trusted Domain Key generator sk Signature algorithm pk Authenticated Channel m, sign(sk, H(m)) Trusted Domain pk Test algorithm ok or error m = message, sk = secret key, pk = public key, H = hash function Page 16

Access Control Lehrstuhl für Informatik 4 In general: authentication refers to the process of verifying the claimed identity of a principal User Computer Knows (proof of knowledge) Possesses (proof of possession) Biometric characteristics (proof by property) User System (via network) Password-Based (Name A, Password B) Address-Based (Name A, Address B) Cryptographic: Name: A Challenge: X Response: Y=f(X) Page 17

Security in Layered Protocols There are always alternative ways to provide a (security) service Higher layers are more application dependent and technology independent End-to-end security is easier provided at higher layers; link (point-to-point) security at lower layers Higher layers are more likely implemented in software; lower layers in hardware Higher layer encryption cannot protect lower layer headers; lower layer encryption may have to trust intermediate nodes Security services may need to be provided at more than one layer Application PGP, PEM,... Application Transport SSH, SSL,... Transport IP AH, ESP IP PGP = Pretty Good Privacy, PEM = Privacy Enhanced Mail, SSH = Secure Shell, SSL= Secure Socket Layer, AH = Authentication Header, ESP = Encapsulating Security Payload Page 18

Anonymity Lehrstuhl für Informatik 4 Multi-party protocol: collectively use of cryptographic protocols The sender and/or the recipient of a communication can remain anonymous Nobody (not even the network operator) can trace communication relations Untraceability Alice Bob Unobservable by Outsiders Page 19

Protection of Networks: Firewall A firewall represents a barrier between a privately owned and protected network and another network (e.g. the Internet) Purpose: prevent unwanted and unauthorized communication into or out of the protected network Assume: Firewall is a trusted domain Intranet Internet Firewall Accessibility Security Page 20

Protection of Networks: Intrusion Detection System (IDS) IDS is a burglar alarm for computers and networks Functional components An analysis engine that finds signs of intrusion A response component that generates reactions based on the outcome of the analysis engine Analysis engine: Offline: analysis of stored log data Online: on the fly analysis of observed data Response capabilities after analysis: Alarm Deny operation Attack Recognition: learning of attack patterns or usual habit of users Privacy problem Page 21

Content Lehrstuhl für Informatik 4 Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer e.g. IPsec, SSL, TLS, Chapter 4: Security on the Application Layer e.g. Kerberos, PGP Chapter 5: Security Concepts for Networks e.g. Firewalls, Intrusion Detection Page 22