20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7



Similar documents
CS5008: Internet Computing

Outline. CSc 466/566. Computer Security. 18 : Network Security Introduction. Network Topology. Network Topology. Christian Collberg

Chapter 8 Security Pt 2

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Linux Network Security

CMPT 471 Networking II

Firewalls. Ahmad Almulhem March 10, 2012

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

A S B

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

Firewalls. Network Security. Firewalls Defined. Firewalls

Networks: IP and TCP. Internet Protocol

Attack Lab: Attacks on TCP/IP Protocols

Firewalls, Tunnels, and Network Intrusion Detection

CSCE 465 Computer & Network Security

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Content Distribution Networks (CDN)

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

Firewalls and Intrusion Detection

Abstract. Introduction. Section I. What is Denial of Service Attack?

Firewalls. Chapter 3

Safeguards Against Denial of Service Attacks for IP Phones

Network Security TCP/IP Refresher

Proxy Server, Network Address Translator, Firewall. Proxy Server

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

1. Firewall Configuration

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

VLAN und MPLS, Firewall und NAT,

Ethernet. Ethernet. Network Devices

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Security Technology White Paper

Lecture 23: Firewalls

Solution of Exercise Sheet 5

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

How do I get to

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Network Security. Internet Firewalls. Chapter 13. Network Security (WS 2002): 13 Internet Firewalls 1 Dr.-Ing G. Schäfer

DATA COMMUNICATIONS MANAGEMENT. Gilbert Held INSIDE

- Basic Router Security -

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Denial Of Service. Types of attacks

CSCE 465 Computer & Network Security

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

Security vulnerabilities in the Internet and possible solutions

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

Chapter 8 Network Security

co Characterizing and Tracing Packet Floods Using Cisco R

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Denial of Service. Tom Chen SMU

Networking Test 4 Study Guide

Chapter 9. IP Secure

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Computer Security: Principles and Practice

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

CS 356 Lecture 16 Denial of Service. Spring 2013

Computer Security DD2395

CS155 - Firewalls. Simon Cooper <sc@sgi.com> CS155 Firewalls 22 May 2003

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

CMS Operational Policy for Firewall Administration

Firewalls, IDS and IPS

Acquia Cloud Edge Protect Powered by CloudFlare

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Network Security. Chapter 13. Internet Firewalls. Network Security (WS 07/08): 13 Internet Firewalls 1 Dr.-Ing G. Schäfer

Introduction of Intrusion Detection Systems

CloudFlare advanced DDoS protection

Secure Software Programming and Vulnerability Analysis

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Network Security in Practice

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Firewall Design Principles Firewall Characteristics Types of Firewalls

Network Concepts. IT 4823 Information Security Concepts and Administration. The Network Environment. Resilience. Network Topology. Transmission Media

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Security Type of attacks Firewalls Protocols Packet filter

Client Server Registration Protocol

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Internet Packets. Forwarding Datagrams

Firewall Firewall August, 2003

Network Security Fundamentals

TCP/IP Security Problems. History that still teaches

General Network Security

Protecting and controlling Virtual LANs by Linux router-firewall

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

10 Configuring Packet Filtering and Routing Rules

allow all such packets? While outgoing communications request information from a

Transcription:

20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7

Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic analysis Publicity: deface website, DoS Legal: try to convince jury of flaw in system

Security Needs Privacy: information stolen by bad-guys may cause disaster Multiple levels of privacy: launch codes vs. location of ships Anonymity: a spy must be anonymous while working Authentication: party on the other end must be a good-guy Integrity: data should not change in transit or over time Repudiation: sender can deny sending message Non-repudiation: sender cannot deny sending message Plausible deniability: receiver cannot prove sender to others Audit: logging of events to detect fraud if it occurs Self destruct: message is destroyed on delivery

Who Are The Attackers? Hackers: do it for fun or to alert a sysadmin Criminals: do it for monetary gain Malicious insiders: ignores perimeter defenses, very dangerous Industrial espionage: why the internet is nearly free Media: looking for a scoop, hide behind right to know Organized crime: bank thefts in different countries Police: may take more risk than others Terrorists: cause harm rather than seek information National and international intelligence agencies: Infowarriors: the new battleground? SCADA?

Network Basics OSI model (1984) - seven layers: 1. physical: unstructured stream of bits across a link 2. data link: organizes physical layer s bits into frames 3. network: computes internet paths; creates and forwards packets from source to destination 4. transport: establishes reliable communication stream 5. session: extra features to maintain reliability 6. presentation: encodes application data into a system-independent format 7. application: user applications

Network Basics TCP/IP model (DoD adoption in 1982) - five layers: 1. physical: unstructured stream of bits across a link 2. data link: organizes physical layer s bits into packets 3. Internet Protocol (IP): computes internet paths and forwards packets from source to destination 4. Transmission Control Protocol (TCP) and User Datagram Protocol (UDP): TCP establishes reliable communication UDP provides a datagram service 5. application: user applications

Network Basics Why Layers? New protocols for safely, reliably, confidentially communcating information can be facilitated without fundamentally changing the transport or physical nature of the internet. The idea is to send data in packets with a header containing subsections each with some level information.

Packet Header - Destination

Packet Header - Source

Packet Header - Port

Packet Header - IP Layer

Packet Header - TCP Layer

Packet Payload

Address Resolution Protocol Packet

Remote Procedure Call

Firewalls Why? Secure a network from other, insecure networks Usually the first line of defense against attacks Most applications have weak security features Nature of protection Damage limited to a few machines: network segmentation Confidentiality: hard for attacker to see network topology Corruption of data: hard for attacker to access network Denial of service: rules to deny protocols, ports, addresses

Firewalls Where does it go? Internet Secure Private Network Firewall/ Router...... Workstation Workstation Workstation

How does it protect? Firewalls Network Address Translation (NAT) each machine gets a local address 198.162.1.xxx outside world communicates to machine through a port Examines every packet if packet passes certain criteria it passes to recipient otherwise it is blocked, and incident may be logged Logs traffic analysis of logs may lead to denied IP addresses etc. Examples of filtering rules: source and/or destination address and port numbers type of traffic (say by protocol - maybe disallow ntp) packet attribute or state

How can it filter? Firewalls Depends on the layer at which the firewall operates Layer 3: Packet Filtering Firewall can determine whether packet is from trusted source knows destination and port number cannot be concerned with what it contains or the contents of other associated packets Layer 4: Circuit Level Gateway can monitor TCP handshaking protocol for legitimacy can hide protected network details from the outside Layer 5: Application Level Gateway (Proxy) can check application level commands and packet contents can log user logins and activity

Good: Packet Filter Firewall (IP Layer) cheap transparent to end users: apps do not have to be reworked can filter services built around firewall-supported protocols Bad: administrator must be familiar with network protocols no authentication does not conceal protected network s architecture a compromised computer deemed secure can get through does not protect against weaknesses in unfiltered services logs would be meaningless

Circuit Level Gateway (TCP Layer) Good: conceals network topology from outsiders non-requested data coming from outside the firewall is not allowed into the protected network Bad: does not filter individual packets unless combined with another form of filtering, any type of data requested from inside the firewall is allowed though

Application Level Gateway (Proxies) Good: no direct communication between inside and outside computers all incoming and outgoing packets are filtered through proxy can filter on content, e.g. http::get or taboo subject matter can log activity effectively security rules are easy to define - defer analysis to apps user authentication is implemented internal architecture of the network may be concealed network address translation Bad: not transparent to end users: must configure client computers system administration is much harder

General problems: Firewalls convenience is sacrificed firewall can be a traffic bottleneck security is concentrated in one spot

Firewalls Attacks that can be averted: Arp Poisoning Need to resolve a MAC address against an IP addr Broadcast Who has 10.63.1.1 Tell 10.63.1.91 Ahead of the Router Behind the Router Router...... Switch Switch Switch......... Users / Attackers / Victims

Firewalls Attacks that can be averted: Arp Poisoning Need to resolve a MAC address against an IP addr Broadcast Who has 10.63.1.1 Tell 10.63.1.91 Ahead of the Router/Firewall Behind the Router Router/Firewall...... Static ARP Cache Users / Attackers / Victims

Firewalls Attacks that can be averted: Syn Flood Each TCP/IP layer imposes limits regarding the number of TCP connections waiting for a port (usually small) and therefore service. Normal handshake for entry is as follows: 1. A SYN B 2. A SYN/ACK B 3. A ACK B If no ACK is received in 75 sec the request is cancelled. If SYN/ACK goes to wrong machine, RST is sent instead. Bad guy uses bogus address, never responds to SYN/ACK. The result is denial of service. Fix: do not accept SYNs from the internet

Firewalls Attacks that can be averted: IP spoofing Bad guy uses IP address of trusted GG-X to send packets to GG-Y. But ACK packets are sent to GG-X. At the same time bad guy SYN floods GG-X so it can t send RST. Bad Guy... Firewall... GG-X is trusted by GG-Y no password needed by sysadmin to login to GG-X or GG-Y from GG-X GG-X GG-Y Use Virtual Private Network protocol such as IPSec: data and header are encrypted and signed and source address can be authenticated.

Firewalls Attacks that can be averted: Source Routing Strict source routing: option to force a return path Loose source routing: option forces a node in return path Bad Guy Firewall Good Guy.................... Access List Bad guy spoofs address of good guy But packets will go to good guy and may miss the bad guy So bad guy enables loose source routing http://www.networksorcery.com/enp/protocol/ip.htm

Firewalls Attacks that can be averted: ICMP Redirect Tells router to override something in its routing table Router tells host there is a better route or this one is wrong Bad Guy Router Router Table Bad guy acts as host, sends ICMP redirect to router and puts its address into one or more paths. May be used for DoS (route to nowhere) http://www.networksorcery.com/enp/protocol/icmp.htm

Firewalls Attacks that can be averted: Others Ping Flood: (ICMP) disruption of bandwidth IP Fragmentation: IP packets can be 65536 bytes but frames are 1500 bytes max. Since TCP info only in header, can manipulate flags field to More Fragments and fragment offset field to force an overrun Server Hijacking: Broadcast music to dorms from victim Bugs in Applications: Block traffic to unnecessary servers Bugs in the OS: More serious - care must be used to select one that performs and is relatively safe