... Lecture 10. Network Security I. Information & Communication Security (WS 2014) Prof. Dr. Kai Rannenberg



Similar documents
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Networking Basics and Network Security

Computer Networks. Secure Systems

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Lecture 10: Communications Security

How To Protect Your Network From Attack

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Network Access Security. Lesson 10

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

CS5008: Internet Computing

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Cornerstones of Security

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Network Security Fundamentals

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Chapter 7 Transport-Level Security

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Security vulnerabilities in the Internet and possible solutions

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

Post-Class Quiz: Telecommunication & Network Security Domain

Chapter 4: Security of the architecture, and lower layer security (network security) 1

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

CS 4803 Computer and Network Security

Architecture. The DMZ is a portion of a network that separates a purely internal network from an external network.

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

INTRUSION DETECTION SYSTEMS and Network Security

Protocol Security Where?

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

ISM/ISC Middleware Module

12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

INTRODUCTION TO FIREWALL SECURITY

CTS2134 Introduction to Networking. Module Network Security

Network Security. by David G. Messerschmitt. Secure and Insecure Authentication. Security Flaws in Public Servers. Firewalls and Packet Filtering

Security Technology: Firewalls and VPNs

Measurement of the Usage of Several Secure Internet Protocols from Internet Traces

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Computer Networks/DV2 Lab

Insecure network services. Firewalls. Two separable topics. Packet filtering. Example: blocking forgeries. Example: blocking outgoing mail

Advanced Higher Computing. Computer Networks. Homework Sheets

Topics in Network Security

Security perimeter. Internet. - Access control, monitoring and management. Differentiate between insiders and outsiders - Different types of outsiders

Recommended IP Telephony Architecture

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Securing IP Networks with Implementation of IPv6

General Network Security

Security Engineering Part III Network Security. Security Protocols (II): IPsec

Firewalls, Tunnels, and Network Intrusion Detection

How To Protect Your Network From Attack From Outside From Inside And Outside

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

How To Understand And Understand The Security Of A Key Infrastructure

Transport Layer Security Protocols

NETWORK SECURITY (W/LAB) Course Syllabus

Application Firewalls

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Chapter 9. IP Secure

Network Security Part II: Standards

Firewalls and Intrusion Detection

21.4 Network Address Translation (NAT) NAT concept

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Chapter 32 Internet Security

12. Firewalls Content

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Securing an IP SAN. Application Brief

Firewalls, IDS and IPS

Internet Security and the Advantages of Different Models

Chapter 9 Firewalls and Intrusion Prevention Systems

Internet Privacy Options

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Introduction to Computer Security

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Transcription:

Lecture 10 Network Security I Information & Communication Security (WS 2014) Prof. Dr. Kai Rannenberg T-Mobile Chair of Mobile Business & Multilateral Security Goethe University Frankfurt a. M.

Introduction Network Organisation Security Protocols Wireless / Mobile Security Agenda 2

Ich mag Hasen I like rabbits Fax: #... I like rabbits Based on [Ta96] Layered Communication medium J aime les lapins I like rabbits Fax: #... I like rabbits 3

Application Layer Presentation Layer Session Layer Transportation Layer Network Layer Data Link Layer Physical Layer ISO/OSI Reference Model Information technology Open Systems Interconnection Basic Reference Model 7-Layer-Model First version ISO/IEC 7498-1:1984 Current version ISO/IEC 7498-1:1994 4

Internet Reference Model Application Layer Transport Layer Network Layer Data Link Layer Physical Layer [Ta96] 5

Communication Example [Ta96] 6

Application Layer Transport Layer Network Layer Data Link Layer Physical Layer Physical Layer Tasks: Bit transfer Mechanic (connector, medium) Electronic (signal durability of a bit, voltage) 7

Application Layer Transport Layer Network Layer Data Link Layer Physical Layer Data Link Layer Tasks: data transmission between stations in the direct neighbourhood error detection and elimination flow control Medium access control (MAC) 8

Bus-Network Example: Ethernet Developed by XEROX Additional nodes can easily be added. Protocol: Carrier Sense Multiple Access with Collision Detection (CSMA/CD) 9

CSMA/CD: Carrier Sense: Multiple Access: Collision Detection: Example: Ethernet Based on [Ta96, p.282] 10

Eavesdropping of all frames i.e. Ethereal: Frame sniffing composite packets of higher protocol layers [J. Buchmann: Lecture Public Key Infrastrukturen, FG Theoretische Informatik, TU Darmstadt] 11

Application Layer Transport Layer Network Layer Data Link Layer Physical Layer Network Layer Tasks: End-to-end connections between systems Routing Addressing Typically connectionless For example: IP 12

Application Layer Transport Layer Network Layer Data Link Layer Physical Layer Transport Layer Tasks: Connection between source and target Optimisation of quality of service and service costs Flow control Connection management For example: TCP, UDP 13

Application Layer Transport Layer Network Layer Data Link Layer Physical Layer Application Layer Tasks: provides services to the user/applications Examples (service/protocol): E-Mail / SMTP, WWW / HTTP, file transfer / FTP SMTP: Simple Mail Transfer Protocol HTTP: Hyper Text Transfer Protocol FTP: File Transfer Protocol 14

Introduction Network Organisation Firewalls Demilitarized Zone Intrusion Detection Security Protocols Wireless / Mobile Security Agenda 15

Introduction Network Organisation Firewalls Demilitarized Zone Intrusion Detection Security Protocols Wireless / Mobile Security Agenda 16

Firewall A firewall is an internetwork gateway that restricts data communication traffic to and from one of the connected networks (the one said to be inside the firewall) and thus protects that network s system resources against threats from the other network (the one that is said to be outside the firewall). [RFC 2828] 17

Private local network Internet Firewall Firewall 18

Introduction Network Organisation Firewalls Demilitarized Zone Intrusion Detection Security Protocols Wireless / Mobile Security Agenda 19

Demilitarized Zone (DMZ) The DMZ is a portion of a network, that separates a purely internal network from an external network. [Bi05] The outer firewall sits between the Internet and the internal network. The DMZ provides limited public access to various servers. The inner firewall sits between the DMZ and the subnets not to be accessed by the public. 20

Network using a DMZ [Bi05] 21

Additional Channel for Login Authorisation User view????? Login MyBank Confirm Cancel! Alarm Example: CamWebSIM 22

App Browser Security Module HTTP(S) HTML HTTP(S) HTML Example: WiTness Security Module for Login Authorisation System view DMZ Web Application Server - Corporate Access Point Challenge Provider JAAS Mapping Service Information Provider System RFC/SNC R/3 DB JAAS = Java Authentication and Authorization Service 23

Introduction Network Organisation Firewalls Demilitarized Zone Intrusion Detection Security Protocols Wireless / Mobile Security Agenda 24

Computer System Characteristics Computer systems that are not under attack exhibit several characteristics [Bi05]: 1. The actions of users and processes generally conform to a statistically predictable pattern. A user who does only word processing when using the computer is unlikely to perform a system maintenance function. 2. The actions of users and processes do not include sequences of commands to subvert the security policy of the system. In theory, any such sequence is excluded; in practice, only sequences known to subvert the system can be detected. 3. The actions of processes conform to a set of specifications describing actions that the processes are allowed to do (or not allowed to do). Denning [De87] hypothesized that systems under attack fail to meet at least one of these characteristics. 25

An attack tool is an automated script designed to violate a security policy. Attack Tool Example: Rootkits Exist for many versions of operating systems, i.e. Unix (but not only). Can be designed to sniff passwords from the network and to conceal their presence. Include tools to automate the installation procedure and has modified versions of system utilities. Installer is assumed to have root privileges (hence the name - rootkit). Can eliminate many errors arising from incorrect installation and perform routine steps to clean up detritus of the attack. [Bi05] 26

Goals of Intrusion Detection Systems Detect a wide variety of intrusions: Inside and outside attacks Known and previously unknown attacks should be detected. Adapt to new kinds of attacks Detect intrusions in a timely fashion Present the analysis in a simple, easy to understand format Be accurate: False positives reduce confidence in the correctness of the results. False negatives are even worse, since the purpose of an IDS is to report attacks. [Bi05] 27

Anomaly Detection Anomaly detection analyzes a set of characteristics of the system and compares their behavior with a set of expected values. It reports when the computed statistics do not match the expected measurements. [Bi05] 28

Misuse Detection Misuse detection determines whether a sequence of instructions being executed is known to violate the site security policy being executed. If so, it reports a potential intrusion. Example: Network Flight Recorder (NFR) [Bi05] 29

Network Flight Recorder (NFR) NFR has three components: The packet sucker reads packets off the network. The decision engine uses filters written in a language called N-code to extract information. The backend writes the data generated by the filters to disk. [Bi05] 30

Specification Based Detection Specification-based detection determines whether or not a sequence of instructions violates a specification of how a program, or system, should execute. If so, it reports a potential intrusion. Example threat source to be controlled: The Unix program rdist [Bi05] 31

Autonomous Agents An autonomous agent is a process that can act independently of the system of which it is a part. Example: The Autonomous Agents for Intrusion Detection (AAFID) [Bi05] 32

Intrusion Detection System [Bi05] 33

Introduction Network Organisation Security Protocols Virtual Private Networks Secure Socket Layer IPsec Wireless / Mobile Security Agenda 34

Introduction Network Organisation Security Protocols Virtual Private Networks Secure Socket Layer IPsec Wireless / Mobile Security Agenda 35

HTTP/ FTP/ TCP IP Ethernet Communication without a VPN Router IP Ethernet HTTP/ FTP/ TCP IP Ethernet [Based on: J. Buchmann: Lecture Public Key Infrastrukturen, FG Theoretische Informatik, TU Darmstadt] 36

HTTP/ FTP/ TCP IP Ethernet Local Network Tunnelling Protocol UDP IP Ethernet Virtual Tunnel Router IP Ethernet Internet Tunnelling Protocol UDP IP Ethernet HTTP/ FTP/ TCP IP Ethernet Local Network VPN [Based on: J. Buchmann: Lecture Public Key Infrastrukturen, FG Theoretische Informatik, TU Darmstadt] 37

Introduction Network Organisation Security Protocols Virtual Private Networks Secure Socket Layer IPsec Wireless / Mobile Security Agenda 38

www.my-bank.de/kontostand.html Actions of the browser: 1. DNS-Request 2. http-request www.my-bank.de get Kontostand.html 142.254. 112.17 Example: Online-Banking DNS server 142.254.112.17 39 [based on: J. Buchmann: Lecture Public Key Infrastrukturen, FG Theoretische Informatik, TU Darmstadt]

Possible attacks: 1. Compromise of DNS (DNS spoofing) à Server authentication DNS spoofing www.my-bank.de 142.254.112.17 23.17.34.16 get Kontostand.html 142.254. 112.17 DNS server 23.17. 34.16 [based on: J. Buchmann: Lecture Public Key Infrastrukturen, FG Theoretische Informatik, TU Darmstadt] 40

Possible attacks: 1. Compromise of DNS 2. Eavesdropping à Encryption (SSL/TLS) HTTP sniffing DNS server 142.254.112.17 www.my-bank.de? get Kontostand.html 23.17. 142.254. 34.16 112.17 41 [based on: J. Buchmann: Lecture Public Key Infrastrukturen, FG Theoretische Informatik, TU Darmstadt]

SSL/TLS (simplified): Hello! Server authentication Key exchange data (encrypted) [J. Buchmann: Lecture Public Key Infrastrukturen, FG Theoretische Informatik, TU Darmstadt] SSL/TLS 142.254. 112.17 42

SSL/TLS: Server- and client-authentication Key exchange for symmetric encryption MACs to secure integrity SSL/TLS Security Goal http https (SSL/TLS) Authenticity O P (mostly server only) Non-Repudiation O O Confidentiality O P Integrity O P Date documentation O O Based on [J. Buchmann: Lecture Public Key Infrastrukturen, FG Theoretische Informatik, TU Darmstadt] 43

Serious vulnerability in the popular OpenSSL cryptographic software library Heartbleed OpenSSL is an open-source implementation of the SSL/ TLS protocol. Heartbleed is not a design flaw in SSL/TLS protocol, but it is an implementation problem in the OpenSSL library. When the vulnerability is exploited, it leads to the leak of memory contents from the server to the client and from the client to the server. CVE-2014-0160 is the official reference to this bug (www.cve.mitre.org). based on [www.heartbleed.com] 44

Introduction Network Organisation Security Protocols Virtual Private Networks Secure Socket Layer IPsec Wireless / Mobile Security Agenda 45

Packet sniffing Attacker is able to eavesdrop IP packets. Ideally: at the gateway of sender or recipient 01 Based on: [J. Buchmann: Lecture Public Key Infrastrukturen, FG Theoretische Informatik, TU Darmstadt] 46

Data Packet ESP-Transport-Mode ESP-Tunnel-Mode IPsec Encapsulating Security Payload (ESP) New IP- Header IP-Header IP-Payload IP-Header ESP- Header encrypted ESP- Header encrypted IP-Payload IP-Header IP-Payload ESP- Trailer ESP- Trailer [J. Buchmann: Lecture Public Key Infrastrukturen, FG Theoretische Informatik, TU Darmstadt] 47

IP-Spoofing Attacker sends IP-packets with a faked sender address. [J. Buchmann: Lecture Public Key Infrastrukturen, FG Theoretische Informatik, TU Darmstadt] 01 48

Attacker impersonates the recipient. IP-Spoofing 01 [J. Buchmann: Lecture Public Key Infrastrukturen, FG Theoretische Informatik, TU Darmstadt] 49

Data Packet AH-Transport-Mode AH-Tunneling-Mode IPsec Authentication Header (AH) New IP- Header authenticated IP-Header authenticated AH IP-Header AH IP-Header IP-Payload IP-Payload IP-Payload Based on [J. Buchmann: Lecture Public Key Infrastrukturen, FG Theoretische Informatik, TU Darmstadt] 50

References [Bi05] Matt Bishop: Introduction to Computer Security. Boston: Addison Wesley, 2005, pp. 455-516 [De87] Dorothy Denning: An Intrusion- Detection Model, IEEE Transactions on Software Engineering, 13 (2), pp. 222-232 [He14] Heartbleed: The Heartbleed Bug, www.heartbleed.com [RFC 2828] Network Working Group: Request for Comments 2828 - Internet Security Glossary, 2000, www.faqs.org/ftp/rfc/pdf/rfc2828.txt.pdf [Ta96] A.S. Tanenbaum: Computer Networks, 3rd Edition, 1996 [4th edition available] 51