CS 203 / NetSys 240. Network Security & Privacy

Similar documents
CS 203 / NetSys 240. Network Security

Network Security and Privacy

Cryptography and Network Security Chapter 1

COSC 472 Network Security

Information System Security

Cryptography and Network Security

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

CSCI 4541/6541: NETWORK SECURITY

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Chap. 1: Introduction

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

Computer and Network Security

EECS 588: Computer and Network Security. Introduction

Content Teaching Academy at James Madison University

CSE331: Introduction to Networks and Security. Lecture 1 Fall 2006

544 Computer and Network Security

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

CPSC 467: Cryptography and Computer Security

Introduction to Computer Security

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

EECS 588: Computer and Network Security. Introduction January 14, 2014

7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.

Course mechanics. CS 458 / 658 Computer Security and Privacy. Course website. Additional communication

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

FERPA: Data & Transport Security Best Practices

CIS433/533 - Computer and Network Security Introduction

Basic Security Considerations for and Web Browsing

Security Goals Services

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

National Cyber Security Month 2015: Daily Security Awareness Tips

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

CSC 474 Information Systems Security

Malware: Malicious Code

Introduction to Information Security

CS 458 / 658 Computer Security and Privacy. Course mechanics. Course website. Module 1 Introduction to Computer Security and Privacy.

Why Security Matters. Why Security Matters. 00 Overview 03 Sept CSCD27 Computer and Network Security. CSCD27 Computer and Network Security 1

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

PREVENTING ZERO-DAY ATTACKS IN MOBILE DEVICES

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

What is Web Security? Motivation

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Internet threats: steps to security for your small business

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Intrusion Detection. Overview. Intrusion vs. Extrusion Detection. Concepts. Raj Jain. Washington University in St. Louis

CS 464/564 Networked Systems Security SYLLABUS

NATIONAL CYBER SECURITY AWARENESS MONTH

10 Quick Tips to Mobile Security

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

CS5008: Internet Computing

Cybersecurity for the C-Level

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Institute of Southern Punjab, Multan

Notes on Network Security - Introduction

Section 12 MUST BE COMPLETED BY: 4/22

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

Information Security Threat Trends

Weighted Total Mark. Weighted Exam Mark

Introduction to Security

Course Outline Computing Science Department Faculty of Science. COMP Credits Computer Network Security (3,1,0) Fall 2015

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Passing PCI Compliance How to Address the Application Security Mandates

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

CNT Computer and Network Security Review/Wrapup

Barracuda Web Site Firewall Ensures PCI DSS Compliance

EXIN Information Security Foundation based on ISO/IEC Sample Exam

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

Skoot Secure File Transfer

Application Intrusion Detection

Overview of computer and communications security

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

BBM 461: SECURE PROGRAMMING INTRODUCTION. Ahmet Burak Can

CS 450/650 Fundamentals of Integrated Computer Security

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

What is Really Needed to Secure the Internet of Things?

Computer Security (EDA263 / DIT 641)

Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers


The Business Case for Security Information Management

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Transcription:

CS 203 / NetSys 240 Network Security & Privacy Winter 2016 http://sconce.ics.uci.edu/203-w16/ 1 Contact Information Instructor: Gene Tsudik Email: gene.tsudik *AT* uci.edu Phone: (949) 824-43410 use only as the last resort Office Hours: Mondays 11-noon, DBH 3228 (Bren Hall) Regular Office: ICS1 458E (for urgent issues only) Otherwise, by email Reader (for now): Sky Faber Email: fabers *AT* uci.edu Office Hours: Wednesdays 3-4pm, ICS1 468A 2 1

Prerequisites: Desired: Operating systems Computer networks Recommended: Intro to Cryptography/Security Algorithms/Data Structures/Complexity This course is TOTALLY UNSUITABLE for new grad students without undergraduate CS background 3 Class Info Days: Tu/Th Time: 9:30 10:50 Place: ICS 180 Lecture format Slides (usually not posted before class) Why not? Interaction in class 4 2

Class Info Browse course Web site http://sconce.ics.uci.edu/203-w16/ check it regularly all news and lecture notes (in PDF) will be posted there Read email from the class mailing list! Check aggressive spam filters 5 Course Readings Recommended but not mandatory: Cryptography and Network Security: Principles and Practice, 4 th Edition By William Stallings Prentice Hall, 2006, 592 pages ISBN-10: 0131873164 ISBN-13: 9780131873162 Plus: Some research papers (will be made available on line) Also: check out Handbook of Applied Cryptography, available FREE at: http://www.cacr.math.uwaterloo.ca/hac/index.html This is an excellent reference book at a great price J 6 3

Student Expectations Keep up with material complete relevant readings before class browse lecture slides afterwards Slides will be posted on-line the same day, after class If not there by next morning, HOLLER! Attend lectures Read your email regularly. No excuses! Exams and projects: No collaboration, unless authorized explicitly Must cite/quote all sources Violations will result in, at the very least, an immediate F in the course 7 Drop Policy Drop anytime in first 2 weeks of quarter until Monday, January 18. Thereafter, no drop Incompletes to be avoided at all costs I don t care if you have to graduate this quarter or this year 8 4

Keep in mind: This is not a course for wimps You don t have to be here 9 also: This course is constantly being modified If you stay, you might have fun I make mistakes: please point them out! I want your feedback (even anonymously) Please participate and ask lots of questions 10 5

Course Grading Midterm (30%) + Final (35%) + Project (35%) more on this later BTW: I might curve I will give grades of B and lower (I usually do) 11 Today Administrative stuff (done!) Course organization Course topics Introduction to: Computer security Network security 12 6

Why take this course? Security is HOT Insecurity is ubiquitous Hackers & malware abound There is a great need for security-literate people Even the best security techniques won t help the ignorant Security touches ALL aspects of CS Networking Databases Graphics Medical Informatics Operating Systems Hardware / Architecture Embedded Systems / Sensors HCI Etc., etc. 13 Course Topics last time Security attacks/services Security Overview User Authentication Web Authentication Network Attacks Phishing Firewalls Spam Usable Security Privacy & Anonymity Tools and Attacks E-currency, Ecash, etc. RFID, IoT, etc. Embedded Systems, HW Security 14 7

Focus of the class Recognize security threats Learn basic defense mechanisms Appreciate how much remains to be learned after taking this course AND: You will certainly not become an expert You will (I hope) be interested to study further 15 Bird s eye view Network Security CRYPTO THIS COURSE Computer Security 16 8

Computer/Network Security The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable. The Art of War, Sun Tzu This motivates which of the two types of security research? 1. Reactive 2. Proactive 17 Computer/Network Security Security in general: 1. Prevention (e.g., locks, alarms) 2. Detection (e.g., evidence = discovery of attack) 3. Reaction (e.g., investigation, etc.) 18 9

Computer Security Confidentiality: prevention of unauthorized disclosure of information. Integrity: prevention of unauthorized modification of information. Availability: ability to mitigate withholding (or lack) of information or resources. 19 Computer Security Authenticity: prevention of unauthorized modification of information s origin Accountability: prevention of modification of activity history (logs) and ability to unambiguously attribute actions to entities Reliability: continued operation after accidental or malicious failures Safety: limiting impact of failures on the environment How do we evaluate these features? 20 10

How do we show/know that something is secure? Evaluation Criteria US Trusted Computer System Evaluation Criteria (Orange Book) US Trusted Network Evaluation Criteria (Red Book) European Information Technology Security Evaluation Criteria (ITSEC) Canadian Trusted Computer Product Evaluation Criteria (CTCPEC) 21 Security is a cost... Security mechanisms require additional computational, communication & storage resources Security steals CPU cycles, bandwidth, disk space Security interferes with normal working patterns Security is burden on devices and users (e.g., password prompts) Effort has to be spent on managing security Security requires additional (human and computing) resources 22 11

Principles of Computer Security At which layer(s) of the computer system should a security mechanism be placed? Applications Services OS OS Kernel Hardware 23 Principles of Network Security At which layer(s) of the network protocol stack should a security mechanism be placed? Application Presentation Session Transport Network Data Link Physical 24 12

Definitions Computer Security - protect data and resources (usually applies to computer systems) Network Security - protect data during transmission/communication (and resources involved, e.g., routers/switches/bridges/aps) Internet Security - protect data during transmission over a collection of heterogeneous interconnected networks 25 Aim of Course Our focus is on Network and Internet Security measures to deter, prevent, detect, and correct security violations/attacks that involve transmission of information 26 13

Services, Mechanisms, Attacks need systematic way to define requirements consider three aspects of information security: security attack security mechanism security service 27 Security Service something that enhances security intended to counter attacks uses one or more security mechanisms replicates functions normally associated with physical counterparts: e.g., documents have signatures, dates; need protection from disclosure, tampering, or destruction; be notarized or witnessed; be recorded or licensed 28 14

Security Mechanism something designed to detect, prevent, or recover from an attack no single mechanism can ever support all security services required one particular element underlies many security mechanisms: cryptographic techniques NOTE: you cannot be a security expert without knowledge of cryptography 29 Security Attack an action that seeks to compromise security of information or resource security is about preventing (or, at least, detecting) attacks need to consider widest possible range of attacks (without sounding like a paranoid lunatic, e.g., perhaps okay to ignore attacks by the Devil or the Martians) Note: threat & attack often mean the same thing. The former is a possibility of the latter. 30 15

Standard Security Services (X.800) Authentication - assurance that the communicating entity is the one claimed Access Control - prevention of the unauthorized use of a resource Confidentiality protection of data from unauthorized disclosure Integrity - assurance that data received is as sent by an authorized entity Non-Repudiation - protection against denial by one of the parties in a communication 31 Standard Security Mechanisms (X.800) encryption, digital signatures, access control, data integrity, authentication exchange, traffic padding, routing control, notarization 32 16

Security Attack Classification passive attacks eavesdropping on communication in order to: Learn contents Or Learn frequency/timing, size and addressing information active attacks modification of data, e.g.: one entity masquerading as another replay of previously recorded messages modification of messages in transit denial of service 33 Network Defenses People End uses Password managers, company policies Systems Implementations Firewalls, intrusion detection Blueprints Protocols and policies TLS, IPsec, access control Building blocks Cryptographic primitives RSA, DSS, SHA-1 All defense mechanisms must work correctly and securely 17

What motivates the attacker? Put up a fake financial website, collect users user-ids and passwords, empty out their accounts Insert a hidden program into unsuspecting users computers, use it to spread spam or for espionage Subvert copy protection for music, video, games Stage denial of service attacks on websites, extort money Wreak havoc, achieve fame and glory in the blackhat community Marketplace for Vulnerabilities Option 1: bug bounty programs Google: up to $3133.7 in 2010, now up to $20K per bug Facebook: up to $20K per bug Microsoft: up to $150K per bug Pwn2Own competition: $10-15K Option 2: vulnerability brokers ZDI, idefense: $2-25K Option 3: gray and black markets Up to $100-250K reported (hard to verify) A zero-day against ios sold for $500K (allegedly) 18

it s just another kind of business Several companies specialize in finding and selling exploits ReVuln, Vupen, Netragard, Exodus Intelligence The average flaw sells for $35-160K $100K+ annual subscription fees Nation-state buyers Israel, Britain, Russia, India and Brazil are some of the biggest spenders. North Korea is in the market, as are some Middle Eastern intelligence services. Countries in the Asian Pacific, including Malaysia and Singapore, are buying, too -- NY Times (Jul 2013) Marketplace for Stolen Data [Dell SecureWorks, 2013] Single credit card number: $4-15 Single card with magnetic track data: $12-30 Fullz : $25-40 Full name, address, phone, email addresses (with passwords), date of birth, SSN, bank account and routing numbers, online banking credentials, credit cards with magnetic track data and PINs Online credentials for a bank account with $70-150K balance: under $300 Prices dropped since 2011, indicating supply glut 19

Marketplace for Victims Pay-per-install on compromised machines US: $100-150 / 1000 downloads, global mix : $12-15 Can be used to send spam, stage denial of service attacks, perform click fraud, host scam websites Botnets for rent DDoS: $10/hour or $150/week Spam: from $10/1,000,000 emails Tools and services [Trend Micro, Russian Underground 101, 2012] Basic Trojans ($3-10), Windows rootkits ($300), email, SMS, ICQ spamming tools ($30-50), botnet setup and support ($200/month, etc.) Bad News Security often not a primary consideration New features, performance and usability take precedence Feature-rich systems may be poorly understood Implementations are buggy Buffer overflows are the vulnerability of the decade Cross-site scripting and other Web attacks Networks are more open and accessible than ever Increased exposure, easier to cover tracks Many attacks are not even technical in nature Phishing, social engineering, etc. 20

Better News There are many defense mechanisms We ll study some It s important to understand their limitations If you think cryptography will solve your problem, then you don t understand cryptography and you don t understand your problem Many security holes are based on misunderstandings Security awareness and user buy-in can help Other important factors: usability and economics Ken Thompson Unix, C co-designer, 1983 ACM Turing Award Recipient 21

Reflections on Trusting Trust http://www.acm.org/classics/sep95 What code can we trust? Consider "login" or "su" in Unix Is Ubuntu binary reliable? RedHat? Does it send your password to someone? Does it have backdoor for a special remote user? Can't trust the binary, so check source code or write your own, recompile Does this solve problem? Reflections on Trusting Trust http://www.acm.org/classics/sep95 Who wrote the compiler? Compiler looks for source code that looks the login process, inserts backdoor into it Ok, inspect the source code of the compiler Looks good? Recompile the compiler! Does this solve the problem? 22

Reflections on Trusting Trust The compiler is written in C compiler(s) { if (match(s, "login-pattern")) { compile (login-backdoor) return } if (match(s, "compiler-pattern")) { compile (compiler-backdoor) return }... /* compile as usual */ } Reflections on Trusting Trust The moral is obvious. You can't trust code that you did not totally create yourself. (Especially code from companies that employ people like me.) 23

Summary We have considered: some basic security definitions security services, mechanisms, attacks models for network security WHAT YOU MUST DO within a week from today: See this website (undergrad course): http://sconce.ics.uci.edu/134-w15/ Familiarize yourself with ALL material If you can t dig it, drop this course Pair up and think about project topics 47 Project Proposals (1-page max) due Thu, Jan 21 by email to me and the reader Types of projects (not an exhaustive list): Experiment with, or analyze, new problem/vulnerability Write a literature survey on a specific topic, identify open problems and elaborate on them Attempt to reproduce (or disprove) claimed results Propose new solution to current or anticipated problem Attack/break proposed (paper) solution/technique 48 24