Network Security. Chapter 1 Introduction. Network Security IN2101. Georg Carle. Course organization



Similar documents
Compter Networks Chapter 9: Network Security

IY2760/CS3760: Part 6. IY2760: Part 6

Network Security. Chapter 1. Introduction

Chap. 1: Introduction

Cryptography and Network Security

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

Network Security. Chapter 1 Introduction. Prof. Dr.-Ing. Georg Carle

COSC 472 Network Security

Cryptography and Network Security Chapter 1

Content Teaching Academy at James Madison University

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Notes on Network Security - Introduction

Information System Security

7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.

Introduction to Security

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

Netzwerksicherheit [NetSec] Systemsicherheit [SysSec]

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

CSCI 4541/6541: NETWORK SECURITY

Network Security. Network Security Hierarchy. CISCO Security Curriculum

TÓPICOS AVANÇADOS EM REDES ADVANCED TOPICS IN NETWORKS

544 Computer and Network Security

Information Security Basic Concepts

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Security Goals Services

Table: Security Services (X.800)

Information Security

Network Security. Introduction. Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015

CS 203 / NetSys 240. Network Security

Lecture II : Communication Security Services

How To Protect Your Data From Attack

Newcastle University Information Security Procedures Version 3

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Securing VoIP Networks using graded Protection Levels

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS Next Generation Networks Security

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

Network Security. Chapter 14. Security Aspects of Mobile Communications

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

Cryptography and Network Security: Overview

CNT5412/CNT4406 Network Security. Course Introduction. Zhenhai Duan

HANDBOOK 8 NETWORK SECURITY Version 1.0

Weighted Total Mark. Weighted Exam Mark

CSC 474 Information Systems Security

Fundamentals of Network Security - Theory and Practice-

Wireless Network Security

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Intrusion Detection for Mobile Ad Hoc Networks

Authentication requirement Authentication function MAC Hash function Security of

Using BroadSAFE TM Technology 07/18/05

CRYPTOGRAPHY IN NETWORK SECURITY

How To Pass A Credit Course At Florida State College At Jacksonville

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Skoot Secure File Transfer

Technical Standards for Information Security Measures for the Central Government Computer Systems

A Framework for Secure and Verifiable Logging in Public Communication Networks

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

ETSI ETR 278 TECHNICAL March 1996 REPORT

CPSC 467b: Cryptography and Computer Security

SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Telecommunication security. Framework of security technologies for home network

TELECOMMUNICATION NETWORKS

Module 7 Security CS655! 7-1!

Evaluate the Usability of Security Audits in Electronic Commerce

Wireless Sensor Networks Chapter 14: Security in WSNs

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

CHAPTER 1 INTRODUCTION

Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik

Network Security. Chapter 2 Basics 2.2 Public Key Cryptography. Public Key Cryptography. Public Key Cryptography

1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services

External Supplier Control Requirements

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Overview of computer and communications security

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

ICANWK406A Install, configure and test network security

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

External Supplier Control Requirements

INTERNATIONAL TELECOMMUNICATION UNION $!4! #/--5.)#!4)/..%47/2+3 /0%. 3934%-3 ).4%2#/..%#4)/. /3) 3%#52) #452%!.$!00,)#!4)/.

Business Phone Security. Threats to VoIP and What to do about Them

The Comprehensive Guide to PCI Security Standards Compliance

INTERNATIONAL TELECOMMUNICATION UNION DATA COMMUNICATION NETWORKS: OPEN SYSTEMS INTERCONNECTION (OSI); SECURITY, STRUCTURE AND APPLICATIONS

Transcription:

Chair for Network Architectures and Services Institute for Informatics TU München Prof. Carle Network Security IN101 Prof. Dr.-Ing. Georg Carle Dipl.-Inform. Ali Fessi Institut für Informatik Technische Universität München http://www.net.in.tum.de Georg Carle Studium Elektrotechnik, Universität Stuttgart Master of Science in Digital Systems, Brunel University, London, U.K. (Master Thesis bei General Electric Corporation, Hirst Research Centre, London) Projekt bei Telecom Paris - Ecole Nationale Supérieure des Télécommunications (ENST), Paris Promotion in Informatik an der Universität Karlsruhe, am Institut für Telematik; Stipendium im Graduiertenkolleg 'Beherrschbarkeit komplexer Systeme' Postdoktorand am Institut Eurecom, Sophia Antipolis, France Fraunhofer Institut FOKUS (GMD FOKUS), Berlin Leiter des Competence Center Global Networking Universität Tübingen, Lehrstuhl für Rechnernetze und Internet Seit 1. April 008: Lehrstuhl für Netzarchitekturen und Netzdienste, TU München Network Security, WS 008/09, Chapter 1 Chair for Network Architectures and Services Institute for Informatics TU München Prof. Carle Network Security Chapter 1 Introduction Course organization Lecture Tuesday, 16:15-17.45, MI 00.08.08 Bi-weekly Wednesday, 16:15-17.45, MI 00.08.08 Exercises Typically Bi-weekly Wednesday 16:15-17.45, MI 00.08.08 Students are requested to subscribe to lecture and exercises at http://www.net.in.tum.de/de/lehre/ws0809/vorlesungen/network-security/ Email list for subscribers to lecture and exercises Questions and Answers / Office hours Prof. Dr. Georg Carle, carle@net.in.tum.de After the course and upon appointment Dipl.-Inform. Ali Fessi, fessi@in.tum.de Course Material All slides are available online. Slides may be updated during the course. This course is based to a significant extend on slides provided by Prof. Günter Schäfer, author of the book "Netzsicherheit - Algorithmische Grundlagen und Protokolle" by Günter Schäfer, available in German from dpunkt Verlag. (An English version is also available.) We gratefully acknowledge his support. Network Security, WS 008/09, Chapter 1 4

Fragen Wer studiert was Bachelor Informatik / Wirtschaftsinformatik Master Informatik / Wirtschaftsinformatik Diplom Welche Vorkenntnisse Grundlagen Rechnernetze und Verteilte Systeme Was noch Kryptografie etc Wer will an den Übungen teilnehmen Chapter 1 Introduction Motivation Threats in communication networks Security goals & requirements Network security analysis Security measures Bibliography Network Security, WS 008/09, Chapter 1 5 Network Security, WS 008/09, Chapter 1 6 Motivation: A Changing World A High Level Model for Internet-Based IT-Infrastructure Mobile communication networks and ubiquitous availability of the global Internet have already changed dramatically the way we communicate, conduct business, and organize our society Private Networks... Public Internet Mobile Communication Networks Access Network With current research and developments in sensor networks and pervasive computing, we are even creating a new networked world However, the benefits associated with information and communication technology imply new vulnerabilities Increasing dependence of modern information society on availability and secure operation of communication services Sensor Networks Network Management DNS Server... Support Infrastructure Web-Servers etc. ISP Networks Network Security, WS 008/09, Chapter 1 7 Network Security, WS 008/09, Chapter 1 8

What is a Threat in a Communication Network Security goals depending on the application environment (1) Abstract Definition: A threat in a communication network is any possible event or sequence of actions that might lead to a violation of one or more security goals The actual realization of a threat is called an attack Examples for threats: A hacker breaking into a corporate computer Disclosure of emails in transit Someone changing financial accounting data A hacker temporarily shutting down a website Someone using services or ordering goods in the name of others... What are security goals Security goals can be defined: depending on the application environment, or in a more general, technical way Banking: Protect against fraudulent or accidental modification of transactions Identify retail transaction customers Protect PINs from disclosure Ensure customers privacy Electronic trading: Assure integrity of transactions Protect corporate privacy Provide legally binding electronic signatures on transactions Government: Protect against disclosure of sensitive information Provide electronic signatures on government documents Network Security, WS 008/09, Chapter 1 9 Network Security, WS 008/09, Chapter 1 10 Security goals depending on the application environment () Security Goals Technically Defined Public Telecommunication Providers: Restrict access to administrative functions to authorized personnel Protect against service interruptions Confidentiality ("Vertraulichkeit"): Data transmitted or stored should only be revealed to an intended audience Confidentiality of entities is also referred to as anonymity Protect subscribers privacy Corporate / Private Networks: Data Integrity ("Datenintegrität"): It should be possible to detect any modification of data Protect corporate / individual privacy Ensure message authenticity All Networks: Prevent outside penetrations (who wants hackers) Accountability ("Zurechenbarkeit"): It should be possible to identify the entity responsible for any communication event Accountability directly supports non-repudiation ("Nicht-Abstreitbarkeit"), and also deterrence, intrusion prevention, security monitoring, and others Security goals are also called security objectives Availability ("Verfügbarkeit"): Services should be available and function correctly Controlled Access ("kontrollierter Zugang"): Only authorized entities should be able to access certain services or information Network Security, WS 008/09, Chapter 1 11 Network Security, WS 008/09, Chapter 1 1

Threats Technically Defined (1) Threats and Technical Security Goals Masquerade: An entity claims to be another entity (also called Impersonation ) Eavesdropping: An entity reads information it is not intended to read Loss or Modification of (transmitted) Information: Data is being altered or destroyed Denial of Communication Acts (Repudiation): An entity falsely denies its participation in a communication act Forgery of Information: An entity creates new information in the name of another entity Sabotage/Denial of Service Any action that aims to reduce the availability and / or correct functioning of services or systems Authorization Violation: An entity uses a service or resources it is not intended to use The realization of a threat (attack) will try to break one or more security goals: Technical Security Goals Masquerade Eavesdropping Authorisation Violation Confidentiality x x x General Threats Loss or Modification of (transmitted) information Denial of Communication acts Forgery of Information Data Integrity x x x x Accountability x x x x x These threats are often combined in order to perform an attack! Sabotage (e.g. by overload) Availability x x x Controlled Access x x x x Network Security, WS 008/09, Chapter 1 1 Network Security, WS 008/09, Chapter 1 14 Network Security Analysis Attacks on Communication Networks In order to take appropriate countermeasures against threats, these have to be evaluated appropriately for a given network configuration. Therefore, a detailed network security analysis is needed that: evaluates the potential risk of the threats to the entities using a network, and estimates the expenditure (resources, time, etc.) needed to perform known attacks. Attention: It is generally impossible to assess unknown attacks! A detailed security analysis of a given network configuration / a specific protocol architecture: may be required to convince financially controlling entities in an enterprise to grant funding for security enhancements can be structured according to the more fine grained attacks on the message level. Alice Eavesdropping of messages/ Recognition of communication parties Passive attacks attacks Traffic analysis Passive attacker Replay/delay messages Message forging Insert / delete messages Aktive attacker Aktive Aktive attacks attacks Bob Masquerade Sabotage ( Denial of Service attacks) Network Security, WS 008/09, Chapter 1 15 Network Security, WS 008/09, Chapter 1 16

Attacking Communications on the Message Level Communication in ed Protocol Architectures Passive attacks: Eavesdropping of messages Active attacks: Delay of messages Replay of messages Deletion of messages Modification of messages Insertion of messages A security analysis of a protocol architecture has to analyse these attacks according to the architecture s layers 5-7 5-7 44 Network Data Link Network Application Transport Network Data Link Endsystem Endsystem 5-7 5-7 44 11 Physical 11 11 Physical 11 Network Security, WS 008/09, Chapter 1 17 Network Security, WS 008/09, Chapter 1 18 Security Analysis of ed Protocol Architectures (1) Security Analysis of ed Protocol Architectures () End system (Initiator) Network End system (Responder) 5 5 44 Application Transport 5 5 44 Network Network Data Link Data Link 11 Physical 11 11 Physical 11 Dimension 1: At which interface does the attack take place Dimension : In which layer does the attack take place Network Security, WS 008/09, Chapter 1 19 Network Security, WS 008/09, Chapter 1 0

A High Level Threat Tree for Internet-Based IT-Infrastructure Measures against Information Security Threats (1) Physical Security: Locks or other physical access control Tamper-proofing of sensitive equipment (c.f. Tamper resistance and tamper-evident systems) Personnel Security: Identification of position sensitivity Employee screening processes Security training and awareness Administrative Security: Controlling import of foreign software Procedures for investigating security breaches Reviewing audit trails Reviewing accountability controls Emanations Security: Radio Frequency and other electromagnetic emanations controls Network Security, WS 008/09, Chapter 1 1 Network Security, WS 008/09, Chapter 1 Measures against Information Security Threats () Communications Security: Some Terminology Media Security: Safeguarding storage of information Controlling marking, reproduction and destruction of sensitive information Ensuring that media containing sensitive information are destroyed securely Scanning media for viruses Lifecycle Controls: Trusted system design, implementation, evaluation and endorsement Programming standards and controls Documentation controls Computer Security: Protection of information while stored / processed in a computer system Protection of the computing devices itself Communications Security: (the main subject of this course) Protection of information during transport from one system to another Protection of the communication infrastructure itself Security Service: An abstract service that seeks to ensure a security goal A security service can be realised with the help of cryptographic algorithms and protocols as well as with conventional means: One can keep an electronic document on a floppy disk confidential by storing it on the disk in an encrypted format as well as locking away the disk in a safe Usually a combination of cryptographic and other means is most effective Fundamental security services: Confidentiality Entity authentication Message authentication Access control Intrusion detection Network Security, WS 008/09, Chapter 1 Network Security, WS 008/09, Chapter 1 4

Security Services Overview Cryptographic Algorithm and Cryptographic Protocol Confidentiality The most popular security service, ensuring the secrecy of protected data Entity Authentication The most fundamental security service which ensures that an entity has in fact the identity it claims to have Message Authentication This service ensures that the source of a message can be verified (data origin authentication) and that data can not be modified without detection (data integrity) Access Control Controls that each identity accesses only those services and information it is entitled to Intrusion detection Cryptographic Algorithm: A mathematical transformation of input data (e.g. data, key) to output data Cryptographic algorithms are used in cryptographic protocols Cryptographic Protocol: A series of steps and message exchanges between multiple entities in order to achieve a specific security objective Security Supporting Mechanism: Security relevant functionality which is part of a cryptographic protocol or of a security procedure Network Security, WS 008/09, Chapter 1 5 Network Security, WS 008/09, Chapter 1 6 Security Supporting Mechanisms Course Overview (to be updated during the course) General mechanisms: Key management: All aspects of the lifecycle of cryptographic keys Random number generation: Generation of cryptographically secure random numbers Event detection / security audit trail: Detection and recording of events that might be used in order to detect attacks or conditions that might be exploited by attacks Intrusion detection: Analysis of recorded security data in order to detect successful intrusions or attacks Notarization: Registration of data by a trusted third party that can confirm certain properties (content, creator, creation time) of the data later on Communication specific mechanisms: Traffic Padding: Creation of bogus traffic in order to prevent traffic flow analysis Routing Control: Influencing the routing of messages in a network. Basics of cryptography. Symmetric cryptography 4. Asymmetric cryptography 5. Modification check values 6. Cryptographic protocols 7. Integrating security services into communication architectures 8. Security protocols of the data link layer 9. The IPSec architecture for the Internet Protocol 10. Security protocols of the transport layer 11. Internet Firewalls 1. Security of wireless local area networks 1. Security of GSM and UMTS networks 14. Intrusion Detection Network Security, WS 008/09, Chapter 1 7 Network Security, WS 008/09, Chapter 1 8

Bibliography Main books: [Bless05] R. Bless, S. Mink, E.-O. Blaß, M. Conrad, H.-J. Hof, K. Kutzner, M. Schöller: "Sichere Netzwerkkommunikation", Springer, 005, ISBN: -540-1845-9 [Sch0] G. Schäfer. Netzsicherheit Algorithmische Grundlagen und Protokolle. Soft cover, 4 pages, dpunkt.verlag, 00. [Sch96] B. Schneier. Applied Cryptography - Second Edition: Protocols, Algorithms and Source Code in C. John Wiley & Sons, 1996. Additional references will be provided for each chapter depending on the topic Network Security, WS 008/09, Chapter 1 9