TELE 301 Network Management. Lecture 18: Network Security



Similar documents
Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Chapter 7: Network security

Network Security. HIT Shimrit Tzur-David

Security: Focus of Control. Authentication

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

What is network security?

Content Teaching Academy at James Madison University

Principles of Network Security

COSC 472 Network Security

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Network Security #10. Overview. Encryption Authentication Message integrity Key distribution & Certificates Secure Socket Layer (SSL) IPsec

SECURITY IN NETWORKS

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Information Security

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Security & Privacy on the WWW. Topic Outline. Information Security. Briefing for CS4173

Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Module 7 Security CS655! 7-1!

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Network Security Protocols

Client Server Registration Protocol

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

Potential Targets - Field Devices

Security in Distributed Systems. Network Security

Network Security. Network Security. Security in Computer Networks

Savitribai Phule Pune University

Notes on Network Security - Introduction

Key Management (Distribution and Certification) (1)

CS5008: Internet Computing

Authentication Types. Password-based Authentication. Off-Line Password Guessing

REVIEW ON RISING RISKS AND THREATS IN NETWORK SECURITY

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

First Semester Examinations 2011/12 INTERNET PRINCIPLES

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Chapter 8 Network Security

2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries

CSE/EE 461 Lecture 23

Chapter 10. Network Security

Security Goals Services

Cryptography and Network Security

Chapter 6 CDMA/802.11i

Chapter 9 Key Management 9.1 Distribution of Public Keys Public Announcement of Public Keys Publicly Available Directory

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

WEBARROW: A CASE STUDY OF SECURE WEB DEPLOYMENT

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Chap. 1: Introduction

Detailed Description about course module wise:

E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.

Chapter 8 Network Security. Slides adapted from the book and Tomas Olovsson

SFWR ENG 4C03 - Computer Networks & Computer Security

TELE 301 Network Management. Lecture 16: Remote Terminal Services

Cryptography and Network Security

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act


Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

THE UNIVERSITY OF TRINIDAD & TOBAGO

NETWORK ADMINISTRATION AND SECURITY

Chapter 16: Authentication in Distributed System

Jort Kollerie SonicWALL

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

EE5723/EE4723. Computer & Network Security. Course Coverage. Prerequisites. Course Logistics. Truly a Network Security course

Compter Networks Chapter 9: Network Security

CS 3251: Computer Networking 1 Security Protocols I

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Application Layer (1)

OCR LEVEL 3 CAMBRIDGE TECHNICAL

Understanding Digital Certificates and Wireless Transport Layer Security (WTLS)

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028

A Systems Engineering Approach to Developing Cyber Security Professionals

Network Security Fundamentals

Firewalls, Tunnels, and Network Intrusion Detection

Chapter 8. Network Security

Authentication. Computer Security. Authentication of People. High Quality Key. process of reliably verifying identity verification techniques

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Computer Security (EDA263 / DIT 641)

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

How To Use Kerberos

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Chapter 8. Cryptography Symmetric-Key Algorithms. Digital Signatures Management of Public Keys Communication Security Authentication Protocols

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

CPSC 467b: Cryptography and Computer Security

Security vulnerabilities in the Internet and possible solutions

Q: Why security protocols?

The Hidden Dangers of Public WiFi

Chapter 7 Transport-Level Security

Part 2 D(E(M, K),K ) E(M, K) E(M, K) Plaintext M. Plaintext M. Decrypt with private key. Encrypt with public key. Ciphertext

Transcription:

TELE 301 Network Management Lecture 18: Network Security Haibo Zhang Computer Science, University of Otago TELE301 Lecture 18: Network Security 1

Security of Networks Security is something that is not necessary in a trusted world! Unfortunately, we are NOT living in a fully trusted world! TELE301 Lecture 18: Network Security 2

Cyber Crime Statics and Trends (1) http://www.go-gulf.com/blog/cyber-crime/ TELE301 Lecture 18: Network Security 3

Cyber Crime Statics and Trends (2) By 2017, the global Cyber Security market is expected to skyrocket to $120.1 billion from $63.7 billion in 2011. Common Types of Cyber Attacks Attack types % Viruses, malware, worms, trojans 50% Criminal insider 30% Theft of data-bearing devices 28% SQL injection 28% Phishing 22% Web-based attacks 17% Social engineering 17% others 11% TELE301 Lecture 18: Network Security 4

What is network security (1) Secures the network, as well as protecting and overseeing operations being done. Confidentiality: only sender, intended receiver should understand message contents Authentication: sender, receiver want to confirm identity of each other Message Integrity: sender, receiver want to ensure message not altered (in transit, or afterwards) without detection Access and Availability: which service or device should be accessible to which user TELE301 Lecture 18: Network Security 5

Confidentiality Friends and enemies: Alice, Bob, and Trudy Bob, Alice (lovers) want to communicate securely Trudy (intruder) may intercept, delete, and add messages channel data, control messages data secure sender secure receiver data TELE301 Lecture 18: Network Security 6

What can a Trudy do? A lot eavesdrop: intercept messages actively insert messages into connection impersonation: can fake (spoof) source address in packet (or any field in packet) hijacking: take over ongoing connection by removing sender or receiver, inserting himself in place denial of service: prevent service from being used by others (e.g., by overloading resources) TELE301 Lecture 18: Network Security 7

Principle of Cryptography Bob s encryption key K B Alice s decryption key K A plaintext secure sender ciphertext secure receiver plaintext symmetric key crypto: identical sender and receiver keys public-key crypto: encryption key public, decryption key private TELE301 Lecture 18: Network Security 8

Key Distribution Key Distribution Centre (KDC) Everyone has his/her individual key manually installed at KDC (a server) when he/she registers K A-KDC (A,B) KDC K A-KDC (R 1, K B-KDC (A, R 1 )) Alice knows R 1 K B-KDC (A, R 1 ) Bob and Alice communicate using shared session key R 1 Bob knows R 1 Setting up a one-time session key using a key distribution center TELE301 Lecture 18: Network Security 9

Key Distribution Using K A-KDC to encrypt her communication with the KDC, Alice sends a message to the KDC saying she (A) wants to communicate with Bob(B). The message is denoted as K A-KDC (A,B) The KDC, knowing K A-KDC, decrypts K A-KDC (A,B). The KDC then generates a random number, R1. This is the shared key value that Alice and Bob will use to perform symmetric encryption when they communicate with each other. R1 is the one-time session key. In addition KDC will send Alice a pair of values A and R1 encrypted by the KDC using Bob s key K B-KDC When Alice receives the message from the KDC, extracts R1 from the message and save it, then forwards K B-KDC (A, R1) to Bob Bob decrypts the message and knows the shared key with Alice. He takes care to authenticate Alice using R1 before proceeding further TELE301 Lecture 18: Network Security 10

Public Key Certification Masquerading using public key cryptography Trudy s private key Alice uses Trudy s public key thinking it is Bob s Alice: Deliver a pizza to me, Bob Encrypted message digest Trudy masquerades as Bob and orders pizza. Bob receives a pizza he did not order TELE301 Lecture 18: Network Security 11

Authentication Protocols (1) Scenario Alice, the sender, wants to communicate with Bob, the receiver Bob wants Alice to prove her identity to him Trudy tries to pretend to be Alice AP1.0 Alice sends a message to Bob saying she is Alice I am Alice. Failure scenario? I am Alice. TELE301 Lecture 18: Network Security 12

Authentication Protocols (2) AP2.0 Use the source IP address to authenticate Fails if IP spoofing is used Failure scenario? Alice s IP addr I am Alice Alice s IP addr OK Alice s IP addr I am Alice TELE301 Lecture 18: Network Security 13

Authentication Protocols (2) AP3.0 Use secret password Password can be eavesdropped Encrypted password can be played back Failure scenario? Alice s IP addr Encrypted password I am Alice Alice s IP addr OK Alice s IP addr OK Alice s IP addr Encrypted password I am Alice Playback attack TELE301 Lecture 18: Network Security 14

Authentication Protocols (3) AP4.0 Use a number, called a nonce, that will be used only once in a lifetime The protocol has the following procedures Alice sends I am Alice, to Bob Bob sends a nonce, R, to Alice Alice encrypts the nonce using Alice and Bob s symmetric secret key, K A-B, and sends it back to Bob Bob decrypts the received message. If the decrypted nonce equals the nonce he sent Alice, then Alice is authenticated. Key distribution can be a logistic problem. I am Alice. R K A-B (R) TELE301 Lecture 18: Network Security 15

Authentication Protocols (3) AP5.0 Use the public key encryption in AP4.0 The protocol has the following procedures Alice sends I am Alice, to Bob Bob sends a nonce, R, to Alice Alice encrypts the nonce using Alice s private key A and sends the encrypted nonce, d A (R) back to Bob Bob decrypts the received message using Alice public key. If the decrypted nonce equals the nonce he sent Alice, then Alice is authenticated. I am Alice. R - K A (R) Send me public key K A + Bob computes + - K A ( K A (R)) = R The retrieval of the public key could be a security hole TELE301 Lecture 18: Network Security 16

Access & Availability (1) Securing physical access to the network Physical security to servers Physical security to networking devices A common guideline If there is physical access to the equipment, there is no security! TELE301 Lecture 18: Network Security 17

Access & Availability (2) Securing access to data Authentication and authorization: who is permitted to access which network resources Encryption/decryption: data unusable to anyone except the authorized users Virtual private networks (VPNs): allow authorized remote access to a private network via the public Internet Firewalls: protect a computer from unauthorized access and attacks Virus and worm protection: secure data from software designed to destroy data or slow down the computer Spyware protection: securing from downloading and running programs that gather personal information Wireless security TELE301 Lecture 18: Network Security 18

Security Policy Security policy A formal statement of the rules by which people who are given access to an organisation s technology and information assets must abide RFC 2196: Site Security Handbook. It is a guide to developing security policies for sites that are connected to the Internet Purposes of security policies Policy is the first layer of protection for your resources and information To inform users, staff and managers of their obligations for protecting technology and information assets Should specify the mechanism through which these requirements can be met TELE301 Lecture 18: Network Security 19

Security Policy Policies have to be written explicitly Implied policies do not help Who should be involved in writing of a policy? Site security manager IT technical staff User representatives Security incident response team Responsible management Legal counsel TELE301 Lecture 18: Network Security 20

Security Policy Aspects of a security policy From outside the organisation From inside the organisation Against the interruption of services From user error User convenience What resources are we trying to protect? Whom are we trying to protect the resources from? What will happen if the system is compromised? How much work will we need to put into protecting the system? What risk is acceptable? Protect from loss: backup should be stored at a different physical location to the original. TELE301 Lecture 18: Network Security 21

Security Policy Criteria for a good policy Viable implementation through system administration procedures, Acceptable by the users Can be forced with security tools and sanctions Clearly defines the areas of responsibility for the users, administrators and management Otago IT policies http://www.otago.ac.nz/its/policies/otago018522.html TELE301 Lecture 18: Network Security 22