Lecture 9: Network Security Introduction



Similar documents
CS5008: Internet Computing

Network Concepts. IT 4823 Information Security Concepts and Administration. The Network Environment. Resilience. Network Topology. Transmission Media

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

A Very Incomplete Diagram of Network Attacks

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Chapter 8 Security Pt 2

Network Security Fundamentals

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Networks: IP and TCP. Internet Protocol

CSCE 465 Computer & Network Security

General Network Security

CS 356 Lecture 16 Denial of Service. Spring 2013

Denial Of Service. Types of attacks

Security Technology White Paper

How do I get to

A S B

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

1. Firewall Configuration

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

Denial of Service Attacks. Notes derived from Michael R. Grimaila s originals

Linux MDS Firewall Supplement

Firewall Firewall August, 2003

10 Configuring Packet Filtering and Routing Rules

MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN

Network Security. Computer Security & Forensics. Security in Compu5ng, Chapter 7. l Network Defences. l Firewalls. l Demilitarised Zones

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

E-BUSINESS THREATS AND SOLUTIONS

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Proxy Server, Network Address Translator, Firewall. Proxy Server

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Firewalls, Tunnels, and Network Intrusion Detection

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Abstract. Introduction. Section I. What is Denial of Service Attack?

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Denial of Service Attacks

Malicious Network Traffic Analysis

How To Protect A Dns Authority Server From A Flood Attack


Information Technology Career Cluster Introduction to Cybersecurity Course Number:

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Attack Lab: Attacks on TCP/IP Protocols

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Attack and Defense Techniques

Networking Basics and Network Security

SECURITY FLAWS IN INTERNET VOTING SYSTEM

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

SECURING APACHE : DOS & DDOS ATTACKS - I

Description: Course Details:

Linux Network Security

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Protocol Rollback and Network Security

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Security: Attack and Defense

Frequent Denial of Service Attacks

CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Overview. Packet filter

Learn Ethical Hacking, Become a Pentester

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

Description: Objective: Attending students will learn:

Secure Software Programming and Vulnerability Analysis

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Introduction to IP networking

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Lecture 6: Network Attacks II. Course Admin

Network Security: A Practical Approach. Jan L. Harrington

How To Write A Transport Layer Protocol For Wireless Networks

How To Protect A Database From Attack

COSC 472 Network Security

Denial of Service. Tom Chen SMU

Huawei Traffic Cleaning Solution

Security vulnerabilities in the Internet and possible solutions

Computer forensics

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Protocol Specification & Design. The Internet and its Protocols. Course Outline (trivia) Introduction to the Subject Teaching Methods

Security Type of attacks Firewalls Protocols Packet filter

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

CS2107 Introduction to Information and System Security (Slid. (Slide set 8)

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Firewalls. Ahmad Almulhem March 10, 2012

BASIC ANALYSIS OF TCP/IP NETWORKS

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

Course Title: Penetration Testing: Security Analysis

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

DoS/DDoS Attacks and Protection on VoIP/UC

How To Protect Your Network From Attack From Outside From Inside And Outside

Overview. Firewall Security. Perimeter Security Devices. Routers

Computer Networks CS321

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Certified Ethical Hacker (CEH)

Proxies. Chapter 4. Network & Security Gildas Avoine

co Characterizing and Tracing Packet Floods Using Cisco R

How To Understand A Network Attack

Transcription:

ENTS 689i Lecture 9: Network Security Introduction Part III: Network Security

Part III: Goals Review how networks work Explore why networks break Understand tools and techniques used by attackers (threats) Study network defense mechanisms (protocols, systems, etc) Broaden our security mindset to networks 2

Part III: Organization Section format Three lectures In-class exam Mini-lecture: Network Attacks in the News Assignments (2) (1) Written assignment (1) Lab assignment Office hours Following class 3

Ethical Computing We are going to discuss concepts and techniques that work against real systems Isolated virtual machines will be used for all experimentation YOU are responsible for knowing what is acceptable and what is not! 4

Part III: Outline November 6: Network Security Intro November 7: HW 4 out November 13: Secure Protocols November 16: HW 4 due November 20: Infrastructure Defense November 21: HW 5 out November 30: HW 5 due December 4: Network Attacks in the News EXAM 3 5

Part III: Outline November 6 (Today) Networking Basics Network Security Services (Goals) Threat Model Anatomy of an Attack Attacks on Internet Services Denial of Service Attacks 6

Network Security: Motivation Network Security Information Computers (Applications, OS, Database) Connections between them Why study network security? Banking/credit card transactions Communications (telephone, Internet, etc) Personal information (PII, CCNs) Network enabled! 7

Networks Two devices connected across a communications medium (simplified) Devices: laptop, workstation, cell phone, printers, scanners Medium: cables, wireless, cellular, satellite Communications Medium 8

Protocols Networks rely on protocols Communication medium is transparent Copper wire, wireless, cellular Rules/message formats (PL) Protocol Stacks Layers of abstraction Provides (above)/use (below) service ISO Open Systems Interconnection reference model TCP/IP Suite 9

OSI Reference Model Sender Application Presentation Session Transport Network Data Link Physical Receiver Application Presentation Session Transport Network Data Link Physical 10

Layering Message Transport Packet Dst Src Message Network Frame MAC Dst MAC Src Dst Src Message Data Link 11

TCP/IP Reference Model Objects Passed Between layers Messages or Streams Transport Protocol Packets IP Datagrams Network frames Application Transport Internet Physical Boundary Application Software Operating System Software IP Addresses Physical Addresses 12

Transport Layer Provides communication between application programs (end-to-end) Messages Packets TCP (Transmission Control Protocol) Reliable transport: ordering, integrity Flow control UDP (User Datagram Protocol) Unreliable/Connection-less (user datagram) 13

Protocol Ports Communication endpoint (port number) Demultiplexes traffic within a machine Process binds socket to a port (snd/rcv) Port numbers (16-bits: 0-65535) Services: 0-1023 (assigned, superuser), well-known Clients: 1024-65535 (dynamic, ephemeral) Common Ports (IANA) TCP: 80 (http), 443 (https), 25 (SMTP) UDP: 123 (NTP), 69 (TFTP), 67:68 (BOOTP,DHCP) 14

Internet Layer Provides communication between machines Packets Datagram Internet Protocol (IP) Unreliable/Connectionless IP address (IANA) IPv4: 32-bit address (127.0.0.1) IPv6: 128-bit address Responsible for routing 15

Router Host Application Host Application Transport Internet Router Internet Transport Internet Physical Physical Physical 16

Segmentation/Fragmentation Application Message M1 M2 Transport M1a M1b M2a M2b Internet 17

Programming Example (client) int main() { int sock, bytes_recvd; char recvdata[4096]; struct hostent *host; struct sockaddr_in server_addr; host = gethostbyname("127.0.0.1"); // AF_INET IPv4 Internet protocols // SOCK_STREAM TCP // SOCK_DGRAM UDP sock = socket(af_inet, SOCK_STREAM, 0); server_addr.sin_family = AF_INET; server_addr.sin_port = htons(4444); server_addr.sin_addr = *((struct in_addr *)host->h_addr); bzero(&(server_addr.sin_zero),8); connect(sock, (struct sockaddr *)&server_addr, sizeof(struct sockaddr)); } bytes_recvd=recv(sock,recvdata,4096,0); close(sock); 18

Network Security Services (Goals) Confidentiality Only authorized people or systems can access protected data Integrity Data was not modified in transit Availability Authorized parties have the ability to access/use resource 19

Network Security Services (Goals) Authentication Data source: From authorized party Entity: Are who they claim to be Access Control/Authorization Only authorized parties can access/use resources Non-repudiation Prove message transmission (sndr/rcvr) Anonymity Protect identity/data association 20

Standard Corporate Topology Intranet Demilitarized Zone Mail Mail Internal Firewall Web Web File DNS Logs DNS External Firewall User Workstations Internet 21

Why are Networks Vulnerable? Anonymity Who and where is the attacker? Unknown perimeter Where is my networks boundary? Unknown path Who controls the systems? (shared medium) System complexity What should be happening on the network? Sharing Who needs access to what and why? Points of failure What is the weakest link? 22

Passive vs. Active Attacks Passive Attack Eavesdrops on communication (covertly) Data in transit Does not modify the message stream Sniffer (Wireshark), Passive OS Fingerprinting (PoF) Active Attack Manipulate messages Create, replay, modify, delete Impersonation, Man-in-the-middle 23

Man-in-the-Middle Active third party Participates from the start of session Mediates communications between parties Security protocols Implementation No identity binding Authentication Who? Trusted? Key Server User 1 User 2 24

Anatomy of an Attack Reconnaissance Propagate Mission Penetrate Persist 25

Reconnaissance Network Scanning Port scanning Operating system/application fingerprinting Nmap scanner (Fyodor) Social Engineering (HUMINT) Social skills/personal interaction Open Source Intelligence (OSINT) Information from publicly available sources Maltego (email addresses, relationships, documents) 26

Web Attacks Servers Brute force (authentication) Software vulnerabilities (buffer overflows) User input validation SQL injection, application boundaries (dot-dot-slash) Remote timing attack (OpenSSL) Clients Browser vulnerabilities Masquerading web sites (man-in-the-middle) Domain typo squatting Malicious content: Trojan ( Security software ) Hidden functionality (IFRAMES, JavaScript) 27

Email Attacks Message interception (Confidentiality) Eavesdropping Typo-squatting Message Spoofing (Authentication) Message Modification (Integrity) Deliver malicious content Malicious software (Trojan) Malicious documents (Office Documents) Malicious links: Phishing (Click this link!) 28

Domain Name Service (DNS) Associates host names and IP addresses Forward record: host name IP address Reverse record: IP address host name Data is distributed (hierarchical: root servers) Caching Vulnerabilities: Software vulnerabilities (buffer overflows) Information disclosure (zone transfers) DNS cache poisoning DNS Spoofing (authoritative) Denial of Service (UDP) 29

Network Security Defenses Confidentiality/Integrity/Authentication IPSec/VPN SSL Authentication/Access Control Kerberos Firewalls Availability Redundancy/Sensors Significant threat to networks More than security protocols. 30

Denial of Service (DoS) Limit or disrupt authorized access to resources Flooding attacks (overwhelm resources) Single source Multiple source (DDoS) Reflector (DDoS) Protocol vulnerability Protocol design 31

Single Source Flooding Relative resource allocation (asymmetric) 10 MB 10 MB Internet 100 MB 32

TCP Handshake (3-way) Client initiates connection (SYN) Server acknowledges connection request (SYN/ACK). Allocates resources. Client sends Final message (ACK) (connection is established) Client Server SYN seq=x SYN seq=y ACK x+1 ACK y+1 Time 33

SYN Flood Attack Attacker floods victim with TCP SYN packets Source address is spoofed (unreachable host) Victim allocates resources (memory) to open connections (SYN/ACK) Handshakes never complete Connections are pending, eventually time out Victim unable to service legitimate requests Why use an unreachable host? 34

SYN Flood Attack Unreachable Address Victim Attacker SYN seq=x SYN seq=y ACK x+1 35

Multiple Source DDoS Attack Victim Attacker Slaves, bots, zombies 36

DDoS Reflector Attack TCP SYN, UDP, ICMP Reflections Victim Attacker Reflectors Masters 37

Defending DDoS Entities Multiple source networks (globally distributed) Intermediate networks (service providers) Victim network Challenges Slashdot effect Detected close to the victim but needs to be stopped close to the sources Who controls the sources? 38

DDoS Defenses Victim Network Firewalls/IDS/Proxies? Bandwidth Defense Large pipes and large distributed networks Load balancing Intermediate Network Upstream packet filtering ISPs IP traceback (probabilistic marking) Try to find source networks 39

Protocol Vulnerabilities Vulnerabilities in the network stack Network code runs in the kernel (crash) Examples Land: SYN packet with same src/dest addrs/ports Reassembly: Teardrop (UDP), Ping of Death (ICMP) Still relevant? Vulnerabilities resurface: MS 1997 (March,2005) New Protocols: IPv6 Tools: IP Stack Integrity Checker (ISIC) 40

Teardrop (Example) http://users.tkk.fi/~lhuovine/study/hacker98/dos.html Ist fragment 2nd fragment Good End-offset>0 offset end Bad End-offset<0 end offset 41

Protocol Design Protocols often not designed for malicious adversary Adaptation (network conditions) Determinism Low-rate (average) TCP denial of service Congestion control mechanism (packet drops) Sample round trip time Retransmission time-out (RTO) Reduce transmission rates/volume exponentially 42

References Computer Security: Art and Science Matt Bishop Information Security Cristina Nita-Rotaru Security in Computing Charles P. Pfleeger and Shari Lawrence Pfleeger Internetworking with TCP/IP Douglas E. Comer Low-Rate TCP-Targeted Denial of Service Attacks Aleksandar Kuzmanovic and Edward W. Knightly 43