Network Security. Raj Jain. The Ohio State University. Columbus, OH 43210 Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/ Raj Jain 31-1



Similar documents
Chapter 31 Network Security

Virtual Private Networks

12. Firewalls Content

Network Security Concepts: Review

Cornerstones of Security

NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia

Internet Security Firewalls

Internet Security Firewalls

How To Protect Your Network From Attack

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

What would you like to protect?

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

Security in Computer Networks

CMPT 471 Networking II

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Distributed Systems. Firewalls: Defending the Network. Paul Krzyzanowski

Compter Networks Chapter 9: Network Security

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Firewalls and System Protection

Security Technology: Firewalls and VPNs

Chapter 10. Network Security

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

ABSTRACT CHAPTER I. Preliminary Background

Chapter 32 Internet Security

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

Proxy Server, Network Address Translator, Firewall. Proxy Server

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

In today s world the Internet has become a valuable resource for many people.

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Intranet, Extranet, Firewall

Firewall Design Principles Firewall Characteristics Types of Firewalls

Tutorial 3. June 8, 2015

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Packet filtering and other firewall functions

Network Security and Firewall 1

Lecture 23: Firewalls

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

E-commerce Revision. Typical e-business Architecture. Routing and Addressing. E-Commerce Web Sites. Infrastructure- Packets, Routing and Addressing

Chapter 37. Secure Networks

NETWORK ADMINISTRATION AND SECURITY

Overview. Firewall Security. Perimeter Security Devices. Routers

Raptor Firewall Products

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere

What is network security?

CS5008: Internet Computing

FIREWALL ARCHITECTURES

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Network Security. by David G. Messerschmitt. Secure and Insecure Authentication. Security Flaws in Public Servers. Firewalls and Packet Filtering

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

PGP (Pretty Good Privacy) INTRODUCTION ZHONG ZHAO

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Overview - Using ADAMS With a Firewall

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Overview - Using ADAMS With a Firewall

Security: Focus of Control. Authentication

Firewalls. Mahalingam Ramkumar

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

Network Security. Internet Firewalls. Chapter 13. Network Security (WS 2002): 13 Internet Firewalls 1 Dr.-Ing G. Schäfer

What is Firewall? A system designed to prevent unauthorized access to or from a private network.

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

Internet Architecture

Firewalls CSCI 454/554

Computer Security: Principles and Practice

Proxy firewalls.

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF COMPUTING DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING COURSE PLAN

Firewalls. Ahmad Almulhem March 10, 2012

Firewalls, Tunnels, and Network Intrusion Detection

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

Module 7 Security CS655! 7-1!

EXAM questions for the course TTM Information Security May Part 1

Chapter 7: Network security

Network Security Administrator

Computer Security DD2395

Lecture G1 Privacy, Security, and Cryptography. Computing and Art : Nature, Power, and Limits CC 3.12: Fall 2007

Network Security Topologies. Chapter 11

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

CSCI Firewalls and Packet Filtering

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)


CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

Network Security: From Firewalls to Internet Critters Some Issues for Discussion

Internet Security Using Firewalls Vincent C. Jones

Networking: EC Council Network Security Administrator NSA

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Key Management (Distribution and Certification) (1)

Transcription:

Network Security Columbus, OH 43210 Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/ 31-1

Overview Security Aspects Secret Key and Public Key Encryption Firewalls: Packet Filter, Bastion Host, Perimeter Nets Variations of firewalls Proxy servers 31-2

Security Aspects Data Integrity: Received = sent? Data Availability: Legal users should be able to use. Ping continuously No useful work gets done. Data Confidentiality and Privacy: No snooping or wiretapping Authentication: You are who you say you are. A student at Dartmouth posing as a professor canceled the exam. Authorization = Access Control: Only authorized users get to the data 31-3

Security Threats Normal Flow Interruption Interception Modification 31-4 Masquerade

Secret Key Encryption Encrypted_Message = Encrypt(Key, Message) Message = Decrypt(Key, Encrypted_Message) Example: Encrypt = division 433 = 48 R 1 (using divisor of 9) Text Ciphertext Key Ciphertext Text 31-5

Public Key Encryption Invented in 1975 by Diffie and Hellman Encrypted_Message = Encrypt(Key1, Message) Message = Decrypt(Key2, Encrypted_Message) Key1 Text Ciphertext Key2 Ciphertext Text 31-6

Public Key Encryption: Example RSA: Encrypted_Message = m 3 mod 187 Message = Encrypted_Message 107 mod 187 Key1 = <3,187>, Key2 = <107,187> Message = 5 Encrypted Message = 5 3 = 125 Message = 125 107 mod 187 = 125 (64+32+8+2+1) mod 187 = [(125 64 mod 187)(125 32 mod 187)... (125 2 mod 187)(125)] mod 187 = 5 125 4 mod 187 = (125 2 mod 187) 2 mod 187 31-7

Public Key (Cont) One key is private and the other is public Message = Decrypt(Public_Key, Encrypt(Private_Key, Message)) Message = Decrypt(Private_Key, Encrypt(Public_Key, Message)) 31-8

Digital Signature Encrypted_Message = Encrypt(Private_Key, Message) Message = Decrypt(Public_Key, Encrypted_Message) Authentic Private Key Text Signed text Public Key Signed text Text 31-9

User 1 to User 2: Confidentiality Encrypted_Message = Encrypt(Public_Key2, Encrypt(Private_Key1, Message)) Message = Decrypt(Public_Key1, Decrypt(Private_Key2, Encrypted_Message) Authentic and Private Your Public Key My Private Key Message 31-10

Simple Firewall: Packet Filter Internet Internal net Example: Only email gets in/out ftp to/from nodes x, y, z, etc. Problem: Filter is accessible to outside world 31-11

Filter Table: Example Interface Source Dest Prot. Src Port Dest Port 2 * * TCP * 21 2 * * TCP * 23 1 128.5.*.* * TCP * 25 2 * * UDP * 43 2 * * UDP * 69 2 * * TCP * 79 31-12

Bastion Host Internet R1 Bastion Host R2 Internal net Bastions overlook critical areas of defense, usually having stronger walls Inside users need a mechanism to get outside services Inside users log on the Bastion Host and use outside services. Later they pull the results inside. 31-13

Bastion Host (Cont) Perimeter Network: Outside snoopers cannot see internal traffic even if they break in the firewall (Router 2) Also known as "Stub network" 31-14

Screened Subnet Architecture Internet Bastion Host Exterior Router Interior Router Firewall Perimeter Network Internal Net 31-15

Multiple Bastion Hosts Internet FTP Bastion Host Exterior Router Interior Router SMTP/DNS Bastion Host Firewall Perimeter Network Internal Net 31-16

Merged Interior and Exterior Routers Internet FTP Bastion Host Firewall Exterior Router Perimeter Network Internal Net 31-17

Merged Bastion Host and Exterior Router Also known as a dual-homed gateway Internet Firewall Bastion Host/ Exterior Router Interior Router Perimeter Network Internal Net 31-18

Dual-Homed Host Architecture Internet Firewall Dual-Homed Host Internal Net 31-19

Merged Bastion Host and Interior Router (Not Recommended) Internet Firewall Exterior Router Bastion Host/ Interior Router Perimeter Network Internal Net 31-20

Proxy Client Proxy Server Proxy Servers Dual- Homed Host Specialized server programs on bastion host Take user's request and forward them to real servers Take server's responses and forward them to users Enforce site security policy May refuse certain requests. Also known as application-level gateways With special "Proxy client" programs, proxy servers are almost transparent 31-21 Internet Real Server

What Firewalls Can't Do Can't protect against malicious insiders Can't protect against connections that do not go through it, e.g., dial up Can't protect completely new threats Can't protect against viruses 31-22

Security Mechanisms on The Internet Kerberos Privacy Enhanced Mail (PEM) Pretty Good Privacy (PGP) MD5 31-23

Pretty Good Privacy (PGP) A popular version of the RSA algorithm. PGP generates a random session key to encrypt each message using IDEA algorithm Session key is encrypted using public key of the recipient The encrypted message and the session key are passed on to the application (e.g., mail) A file called key ring (pubring.pgp) contains public keys of all correspondents Another file called secret ring (secring.pgp) contains secret keys of the sender. A pass phrase is required to decrypt the secret keys. 31-24

Summary Integrity, Availability, Authentication, Confidentiality Private Key and Public Key encryption Packet filter, Bastion node, perimeter network, internal and external routers 31-25