First concepts. Terminology FLORIDA STATE UNIVERSITY



Similar documents
CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

Notes on Network Security - Introduction

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Ethernet. Ethernet. Network Devices

How To Understand The Layered Architecture Of A Network

CSE 3461 / 5461: Computer Networking & Internet Technologies

Computer Networks CS321

Cryptography and Network Security

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Chapter 1: Introduction

Information System Security

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

How To Understand And Understand The Security Of A Key Infrastructure

Communications and Computer Networks

Communication Networks. MAP-TELE 2011/12 José Ruela

Data Communications and Networking Overview

The OSI and TCP/IP Models. Lesson 2

VPN. Date: 4/15/2004 By: Heena Patel

Security. TestOut Modules

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

Computer Networks III

Protocol Architecture

Network Security Fundamentals

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Advanced Higher Computing. Computer Networks. Homework Sheets

Chap. 1: Introduction

Convergence Technologies Professional (CTP) Course 1: Data Networking

Virtual Private Networks Solutions for Secure Remote Access. White Paper

Networking Basics and Network Security

Local Area Networks (LANs) Blueprint (May 2012 Release)

Chapter 5. Data Communication And Internet Technology

COSC 472 Network Security

Chapter 10 Security Protocols of the Data Link Layer

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Steelcape Product Overview and Functional Description

Cisco Which VPN Solution is Right for You?

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Introduction p. 2. Introduction to Information Security p. 1. Introduction

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

7.1. Remote Access Connection

Virtual Private Networks

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Layered Architectures and Applications

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

CSCI 362 Computer and Network Security

Introduction To Computer Networking

Chapter 9. IP Secure

Post-Class Quiz: Telecommunication & Network Security Domain

Network Concepts. IT 4823 Information Security Concepts and Administration. The Network Environment. Resilience. Network Topology. Transmission Media

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

How To Write A Transport Layer Protocol For Wireless Networks

Basics of Internet Security

Protocols and Architecture. Protocol Architecture.

Cryptography and Network Security Chapter 1

Link Layer and Network Layer Security for Wireless Networks

Chapter 4: Security of the architecture, and lower layer security (network security) 1

Network System Design Lesson Objectives

IY2760/CS3760: Part 6. IY2760: Part 6

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

ADMINISTRATIVE POLICY # (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # (2014) Remote Access

Network Security. Vorlesung Kommunikation und Netze SS 10 E. Nett

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

Mathatma Gandhi University

ICS 153 Introduction to Computer Networks. Inst: Chris Davison

VPN SECURITY. February The Government of the Hong Kong Special Administrative Region

Security + Certification (ITSY 1076) Syllabus

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

Virtual Private Networks

Encryption of Traffic

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking

High-Level Data Link Control

MCTS Guide to Microsoft Windows 7. Chapter 14 Remote Access

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

Configure A VoIP Network

ASM Educational Center (ASM) Est. 1992

NETWORK SECURITY (W/LAB) Course Syllabus

EXPLORER. TFT Filter CONFIGURATION

Module 1. Introduction. Version 2 CSE IIT, Kharagpur

The OSI & Internet layering models

Security Functions in Telecommunications Placement & Achievable Security

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

ASIA/PAC AERONAUTICAL TELECOMMUNICATION NETWORK SECURITY GUIDANCE DOCUMENT

Cisco IOS Firewall. Scenarios

544 Computer and Network Security

Communication Systems Internetworking (Bridges & Co)

Firewalls and Virtual Private Networks

Internet Concepts. What is a Network?

Chapter 2 - The TCP/IP and OSI Networking Models

The OSI Model and the TCP/IP Protocol Suite PROTOCOL LAYERS. Hierarchy. Services THE OSI MODEL

Matrix Technical Support Mailer 167 NAVAN CNX200 PPTP VPN with Windows Client

Network Security and Firewall 1

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

Transcription:

First concepts Terminology

What is Security? Definitions from the Amer. Herit. Dict. : Freedom from risk or danger; safety. (NO!) Measures adopted to prevent a crime such as burglary or assault. (ALMOST!) Network security measures: Mechanisms to prevent, detect, and recover from network attacks, or for auditing purposes.

Terminology Assets and liabilities Policies Security breeches Vulnerabilities Attacks Threats Threat Intensity

A Secured Network A network is secured if it has deployed adequate measures for prevention of, detection of, and recovery from attacks. Adequate = commensurate with the value of the network s assets and liabilities, and the perceived threat intensity. By Breno

Security Goals C onfidentiality I ntegrity A vailability

Confidentiality Prevent against: adversarial capture (of information) undue public disclosures Audit of data accesses Detection of unauthorized data access Retaliation (legal, PR, info. warfare)

Integrity: Data integrity + Authenticity Prevent against unauthorized data modification, and impersonation attacks Detect impersonation and/or undue data modification Recover from detected attacks Audit data modification, entity authentication

Availability Continuous service, quality of service, resource wastefulness reduction Typical attack: DoS, DDoS Prevention by removal of bottlenecks Detection of attacks Recovery of service provision ability Audit of service requests.

Concrete Security Measures Securing an open network requires adoption of a myriad of measures: Policies, audit and evaluation Personnel training Physical security/ EM emanation shielding Authentication and access control Communication security: Cryptographybased techniques.

Open Systems Interconnection A standard-centric networking model

Open Systems Open Systems: general-purpose networks that support standardized communication protocols and may accommodate heterogeneous sub-networks transparently. Corporate Intranets: Ethernet, Token Ring and Wireless subnets. Internet

Open Systems Interconnection Model ISO s layered approach to standardization Application layer FTP, Telnet, SSH Presentation layer MIME, XDR, SSH 5. Session layer NetBios, FTP, Telnet, SSH 4. Transport layer TCP,UDP,SSL/TLS 3. Network layer IP, ICMP, IPSEC 2. Data link layer Ethernet, PPP, ISDN 1. Physical layer pins, cabling, radio

1-2. Physical/Data Link Layers Physical layer: Radio, fiber, cable, pins Data link layer orchestrates the signaling capabilities of the physical medium (unreliable, noisy channel) into reliable transmission of protocol data units (PDUs). PDUs contain control information, addressing data, and user data. Hardware-based encryption operates at 1+2.

3. Network Layer Exports a logical network interface, allowing for uniform addressing and routing over heterogeneous subnetworks. E.g.: IP can route between Ethernet- and 802.11x - networks

4. Transport Layer Permits connection and connectionless associations. Connections enable reliable transmission of data streams. End-to-end security first becomes meaningful at this level. Security associations: An association is either a connection or a connectionless transmission service at levels 4-7.

Levels 5 and Higher Application through session protocol layers. Many network applications implement their own session management. Moreover, they typically depend on system libraries for presentation layer capabilities. Such applications, from a data-path viewpoint, may be considered a single layer: PDUs only typically appear at the session layer.

Example: SSH SSH provides provides services at all topmost three OSI layers. Application: Terminal/file transfer Presentation: Encryption Session: Connection, synchronization Only at the session layer the data (encrypted buffers of user input) gets first packaged into a protocol data unit for transmission.

TCP/IP networking model A data-path centric model

TCP/IP network model ( TCP/IP Protocol) TCP/IP Application Layer TCP/IP Transport Layer TCP/IP Network Layer TCP/IP Data Link Layer TCP/IP Physical Layer 7. OSI Application 6. OSI Presentation 5. OSI Session 4. OSI Transport 3. OSI Network 2. OSI Data Link Layer 1. OSI Physical Layer

Protocol PDU Wrapping SUN Sun Product Documentation

Protocol Dependencies comptechdoc.org Computer Technology Documentation Project

Fitting Security How security measures fit into the network models

Network Configuration Wireless access point Security Mechanisms in... V. L. Voydock and S. T. Kent

Association Model An association is either a connectionless data transmission service or a connection at any of OSI layers 4-7, or TCP/IP application /transport layers An N-association is the data-path through which N+1 entities communicate: Generally at session layer or below. N+1-layer data packaged into N-PDUs

Association Model (2) The association model simplifies the network environment, while still capturing the essential elements needed for security design. Security Mechanisms in... V. L. Voydock and S. T. Kent

Security at levels 1-3 Implemented at the host/network interface level (lack notion of association): Link-to-link security. Encryption/authentication requires operations at each network node. Each network node must be trusted. Impractical for Open Systems?

Security protocols 3 Many VPN technologies work at level 2 PPTP, L2F, L2TP Rationale: Directed at dial-up VPN networks, (PPP is level-2). Provide service to a variety of network-level protocols, such as IP or IPX. IPSEC works at level 3, essentially extends IPv6/IPv4.

Security above level 3 Most flexible security measures End-to-end security: The security policies and mechanisms can be based on associations between entities (applications, processes, connections), as opposed to hostbased: In multi-user environments, or when hosts are not physically secure, host-based policies are not sufficiently fine-grained.

Summary Security measures can take three main forms: 1. End-to-end security at the TCP/IP application layer (5-7 OSI model layers) 2. End-to-end security at the (TCP/IP,OSI) transport layer 3. Link-to-link security at the network, datalink and physical layers.

Attacks A taxonomy

Attack Types And their impact on end-to-end communication security mechanisms

Passive Attacks Observation of N+1-layer data in an N-layer PDU: release of data contents, or eavesdropping Observation of control/ address information on the N-PDU itself: traffic analysis. Transport/network boundary = End-to-end/ link-to-link boundary. Traffic analysis is least effective if N+1 = 4.

Active Attacks Impersonation Packet injection (attacker-generated PDU) Packet deletion/delay Packet modification/re-ordering Replay attacks If a breech can be achieved by both active and passive attacks, which is more powerful? (problematic)