EE5723/EE4723. Computer & Network Security. Course Coverage. Prerequisites. Course Logistics. Truly a Network Security course



Similar documents
COSC 472 Network Security

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Chap. 1: Introduction

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

CSC 474 Information Systems Security

CSCI 4541/6541: NETWORK SECURITY

Cryptography and Network Security

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

TELE 301 Network Management. Lecture 18: Network Security

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

CSE 5392 Sensor Network Security

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

Introduction to Security

Cryptography and Network Security Chapter 1

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

Notes on Network Security - Introduction

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

CNT4406/5412 Network Security Introduction

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

CIS 6930/4930 Computer and Network Security. Dr. Yao Liu

Network Security. HIT Shimrit Tzur-David

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Content Teaching Academy at James Madison University

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)

Chapter 7 Transport-Level Security

Network Security. Introduction. Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

Network Security #10. Overview. Encryption Authentication Message integrity Key distribution & Certificates Secure Socket Layer (SSL) IPsec

How To Write A Transport Layer Protocol For Wireless Networks

Information System Security

CS5008: Internet Computing

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

Tema 5.- Seguridad. Problemas Soluciones

Chapter 8. Network Security

Information Security Basic Concepts

1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services

Computer and Network Security

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

CS 450/650 Fundamentals of Integrated Computer Security

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Security for Ad Hoc Networks. Hang Zhao

Cryptography and network security CNET4523

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

CS 464/564 Networked Systems Security SYLLABUS

Security Goals Services

Wireless Sensor Networks Chapter 14: Security in WSNs

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

Weighted Total Mark. Weighted Exam Mark

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.

Module 7 Security CS655! 7-1!

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Course mechanics. CS 458 / 658 Computer Security and Privacy. Course website. Additional communication

Network Security Fundamentals

544 Computer and Network Security

SECURITY IN NETWORKS

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Chapter 6: Fundamental Cloud Security

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

Network Concepts. IT 4823 Information Security Concepts and Administration. The Network Environment. Resilience. Network Topology. Transmission Media

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Overview of computer and communications security

CSE/EE 461 Lecture 23

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

CS 458 / 658 Computer Security and Privacy. Course mechanics. Course website. Module 1 Introduction to Computer Security and Privacy.

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. March 19, 2015

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Cryptography and Network Security: Overview

Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

CS 203 / NetSys 240. Network Security

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress

Wireless Network Security

Chapter 8 Network Security

Cornerstones of Security

CSC574 - Computer and Network Security Module: Introduction

CRYPTOGRAPHY IN NETWORK SECURITY

information security and its Describe what drives the need for information security.

Network Security Protocols

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt University of Zurich

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

Overview. SSL Cryptography Overview CHAPTER 1

Security: Focus of Control. Authentication

Protocol Rollback and Network Security

Security Awareness. Wireless Network Security

Transcription:

EE 5723/EE4723 Computer & Network Security Classroom: EERC 508 Course Logistics Meeting time: MWF 12:05pm-12:5512:55 pm Office hours: MW 3:00pm-4:00pm Other time by appointment Instructor Office: EERC 712 Dr. Tricia Chigan cchigan@mtu.edu Spring, 2012 Email: cchigan@mtu.edu Phone: 487-2494 Course website: http://www.ece.mtu.edu/ee/faculty/cchigan/ee5723-security/indexspring12.html Course Coverage Truly a Network Security course NOT focus on Database Security Operating System Security Program Security Prerequisites You should have taken Computer Network class such as EE4272 or EE5722 Medium-level of Programming (C or C++, Java, ns2, OPNET, etc.) Skill 1

Textbooks & References Required texts - Network security: PRIVATE communication in a PUBLIC world by C. Kaufman, et al I will follow it for the fundamental network security topics References Fundamentals of Computer Security Technology, by Edward Amoroso, 1994 Network Security Essentials, 2nd edition, by William Stallings, 2002 The Practice of Network Security, by Allan Liska, 2003 Cryptography p y and Network Security: Principles & Practices, by William Stallings, 2003 Security in Computing, by Charles P. Pfleeger, Shari Lawrence Pfleeger, 2003 Research Papers on MANET, WSN, Smart Grid, Cloud Computing Security Course Objectives Understanding of fundamental issues, concepts, principles, and mechanisms in network security Cryptography, authentication. Key Distribution & Management Well known network security protocols such as IPSec, SSL, WEP Advanced topics: Preparation for graduate/senior level research in network security Original research on MANET (including VANET) security Wireless sensor network (WSN) security Cyber-security for critical infrastructures (e.g., Power Infrastructure) Cloud Computing security Structure of the Course Fundamental principles of cryptography & network security (week 1~10) I will lecture this part of the material HWs & Midterm exam will be given Advanced topics on MANET/WSN/etc. security (week 11~15) Each student is required to lead a 60-minutes presentation on one advanced topic Followed by a 10-minute discussion led by the instructor (and/or the speaker) The topic list will be given by the instructor on week 3 Student Project Final In-class Presentation/Demo (week 15) Homework 20% Grading System Midterm 30% 6:00pm~8:00pm on March 1 st (tentative) Cover the fundamental topics only Student Presentation 20% Focus on the advanced topics for MANET, WSN, Smart Grid, or Cloud Computing Security Research-oriented/programming-based Project 30% Phase I (5%): 1 page project proposal Phase II (5%): 2~3 pages mid-term report Phase III (20%): 8~10 pages final report; In-class final presentation (and demo) 2 Programming-based (15% for each) implementations. 2

Course Outline: Fundamental Topics System View of Network Security Model Security Threat Model: Identify network vulnerabilities Security Services Model Security Basis: Cryptography Secret key cryptography Hashes and message digests Public key cryptography Key distribution and management Network Security Applications Authentication and security handshakes pitfalls Well known network security protocols such as Kerberos, IPSec, SSL/SET, PGP& PKI, WEP Course Outline Advanced Topics Mobile Ad Hoc Network (MANET), Wireless Sensor Network (WSN), Smart Grid, or Cloud Computing Security (tentative): presented by students Threat Model in MANET & WSN Secure routing in MANET Denial-of-service attacks and countermeasures Energy-aware security mechanisms Distributed certification authority & self-organized key management MAC misbehavior & countermeasures in MANET Countermeasure selfish attacks and trust establishment in MANET Distribution and revocation of cryptographic keys and light-weight security primitives Security bootstrapping & secure neighbor discovery in WSN Secure data aggregation in WSN Location privacy in WSN Cyber-security for Critical Infrastructures (e.g., Power Infrastructure) Cloud Computing Security Advanced Topic Presentation The finalized list of the advanced topics will be provided by the instructor by the end of the 3rd week. The students have to choose their topics by the end of the 6 th week. The topic bidding procedure will follow the First Come First Serve rule. Each student will be required to give a 60-minute presentation on one advanced research topic in the area of MANET, WSN, Smart Grid, or Cloud Computing security, followed by A 10-minute discussion led by the instructor (and/or the speaker). The presentation should follow the style of teaching fellow students on the selected topic as an expert. The presentation should have good balance of the width and depth on the selected topic Relate the presented work to the big picture and other relevant topics: problem setting, problem assumptions, results, possible extensions Reflect the work on its strength and weakness: assumptions; key ideas & performance data/analysis Critique the paper (s) by identifying: open research problems; limitations in the papers and explore solutions The slides draft is due 1 week before the scheduled presentation. The instructor will provide feedbacks by going through the slides with the speaker 1~2 times before the presentation. Course Research-oriented Projects The course research project can be a design of new secure algorithms/protocols; an analysis/evaluation/implementation of existing secure algorithms, protocols, or systems; Identifying new attacks and vulnerabilities in MANET, WSN, Smart Grid, or Cloud Computing security algorithms or protocols. Potential project topics will be distributed and discussed in the 4 th week. Students are encouraged to identify the topics based on their own background and interests. With a chosen topic, the students should identify an open problem, formulate a concrete proposal to address the problem, research the related work, propose a new scheme or develop a novel analysis, and obtain results to evaluate their ideas. A 1-page proposal is due on 6 th week which describes with a clear statement of the specific problem of your focused topic, and the expected results. A 2~3-page mid-term project progress report is due on week 10, which describes the research topic, prior work relevant to the problem, the methodology to be followed, and preliminary results. A 8~10-page highquality final report is due on week 15. A final in-class presentation from all project teams will be given in week 15. Often a research project will demand performance evaluation via simulation. You are free to use whatever programming language (C/C++/Java, ns2, OPNET) for your project implementation. Each project team is formed up to 1~2 students. The project teams should be formed by the end of 4 th week. The projects will be graded on the basis of both team success and individual effort. 3

Programming-based Project Alternative DES/IDEA Programming Due on 10 th Week Secure Instant Messenger with RSA Due on 15 th week Self-selected Application Upon the approval of the instructor Overview of Network Security (I) First Step to Network Security Outline What is network security? Network Attacks & Classifications vs. Security Services Security Policy, Mechanism, and Protocols Friends and enemies: Alice, Bob, Trudy well-known in network security world Bob, Alice want to communicate securely Alice data Trudy (intruder) may intercept, delete, add messages secure sender channel data, control messages secure receiver Bob data System Views of Network Security Trudy 4

Who might Bob, Alice be? well, real-life Bobs and Alices! Web browser/server for electronic transactions (e.g., on-line purchases) on-line banking client/server DNS servers routers exchanging routing table updates There are bad guys (and girls) out there! Q: What can a bad guy do? A: a lot! eavesdrop: intercept messages actively insert messages into connection impersonation: can fake (spoof) source address in packet (or any field in packet) hijacking: take over ongoing connection by removing sender or receiver, inserting himself in place denial of service: prevent service from being used by others (e.g., by overloading resources) Security Threats and Attacks A threat is a potential violation of security. Flaws in design, implementation, and operation. An attack is any action that violates security. Active adversary. Attack on Privacy Intercept communication attendants identity information (Usually refers to IP addresses of communication attendants) Eavesdropping - Message Interception (Attack on Confidentiality) Unauthorized access to information Packet sniffers and wiretappers illicit copying of files and programs Bob: 202.141.25.56 202.141.25.56 WWW.Alice-Bob.org (135.175.43.14) Alice: www.alice-bob.org Bob Please lend me your credit card Card #: 4036548265843254 Exp Date: 11/2011 Security Code: 123 Alice Trudy: Eavesdropper Trudy: Eavesdropper 5

Integrity Attack - Tampering With Messages Stop the flow of the message Delay and optionally modify the message Release the message again Bob I m starved I m very well Alice Authentication Attack - Fabrication Unauthorized use of other s identity Generate and distribute objects under this identity Related Issues Non-repudiation : offer of evidence that a party indeed is the sender or a receiver of certain information Access control : Service is only provided to authenticated user Alice Bob Trudy: Perpetrator Trudy: Masquerader I m Bob. Please come to Florida to help me. Attack on Availability Destroy hardware (cutting fiber) or software Modify software in a subtle way (alias commands) Block packets in transit Bob (A Student in MTU) Golden Shield Blatant denial of service (DoS): Crashing the server Overwhelm the server (use up its resource) Alice (CNN, BBC, English Google, Wiki, etc.) What is network security? Anonymity: identity of sender or receiver is hidden. Confidentiality: protection of communication content privacy. Authentication: Identity confirmation. Message Integrity: communication attendants want to ensure message not altered. Non-repudiation: p non-repudiation prevents either sender or receiver from denying a transmitted message. Access and availability: Services must be accessible and available to eligible users. 6

Outline Types of Attacks What is network security? Network Attacks & Classifications vs. Security Services Security Policy, Mechanism, and Protocols System Views of Network Security Active Attacks: Attackers need to gain physical access control of a portion of the communications link and be able to insert and capture transmissions. Passive Attacks: Attackers merely need to be able to observe transmissions. Close-knit Attack Family All attacks can be related and are dangerous! Passive attacks re-target sniff for content re-target Active Attacks jam/cut it capture & modify traffic analysis - who is talking pretend More on Attack Classification Classification of attacks depending upon Passive and Active Attacks Security Services Layer in OSI Protocol stack Cost/Damage of Attack Node side and Link side Attacks who to impersonate I need to be Bill 7

Network Security Services Security Services vs. Attacks Different Classes of Attacks vs. Security Services Confidentiality Integrity Authentication Anonymity Availability Access control Non-repudiation Anonymity: Identity of sender is hidden from receiver When receiver receives message m, receiver has no clue about the sender of m Each attack class can have various implementations across multiple layers Security Provisioning Strategy Since the list of security attacks is endless, security design and provisioning should be security service oriented rather than individual attack countermeasure oriented. Protecting security services (properties) rather than counter against various security attacks. Security Services Confidentiality: protection of information from being exposed to unintended entities Information content. Parties involved. Where they are, how they communicate, how often, etc. 8

Security Services - Cont d Authentication: assurance that an entity of concern or the origin of a communication is authentic - it s what it claims to be or from Integrity: assurance that the information has not been tampered with Non-repudiation: offer of evidence that a party indeed is the sender or a receiver of certain information Security Services - Cont d Access control: facilities to determine and enforce who is allowed access to what resources, hosts, software, network connections Monitor & response (Intrusion Detection/Tolerant): facilities for monitoring security attacks, generating indications, surviving (tolerating) and recovering from attacks Security Services - Cont d Security management (system level): facilities for coordinating users service requirements and mechanism implementations throughout the enterprise network and across the Internet Trust model Trust communication protocol Trust management infrastructure Outline What is network security? Network Attacks & Classifications vs. Security Services Security Policy, Mechanism, and Protocols System Views of Network Security 9

Security Policy, Mechanism & Protocol Policy: a statement of what is, and is not allowed. Application related! Mechanism: a procedure, tool, or method of enforcing a policy Security mechanisms: implement functions that help prevent, detect, and respond to recover from security attacks. Security functions are typically made available to users as a set of security services through APIs or integrated interfaces. Cryptography underlies many security mechanisms. Security protocols: A set of security policies and related mechanisms Outline What is network security? Network Attacks & Classifications vs. Security Services Security Policy, Mechanism, and Protocols System Views of Network Security Systematic View of Network Sec: Security Model Definition: A framework wherein the security policies are developed Various Security Models RFC 2196 - Site Security Handbook: www.ietf.org/rfc/rfc2196.txt Applicable to various companies w/ various network infrastructures CISCO SAFE - specifically defined for VPN & Internet : www.cisco.com/go/safe Common Criteria/ISO 15048: http://www.commoncriteriaportal.org/ http://www.niap-ccevs.org/cc-scheme/ scheme/ OCTAVE - hybrid of ISO15048 & RFC2196: www.cert.org/octave/ (Operationally Critical Threat, Asset, and Vulnerability Evaluation) Build asset-based threat profiles Identify Infrastructure vulnerabilities Develop security strategy & plans The Security Life-Cycle Security Model Policy Threats Specification Design Implementation Operation and Maintenance 10