Network Security Basics
Network Security Basics
1
Outline of Network Security Basics
2
What is Security?
3
What is Network Security?
4
Balancing Security and Access
5
Figure 1-6 – Balancing Security
and Access
6
Outline of Network Security Basics
7
Threats
9
Acts of Human Error or Failure
Includes acts performed without malicious
intent
Causes include:
Inexperience
Improper training
Incorrect assumptions
11
Forces of Nature
Forces of nature are among the most
dangerous threats
12
Deviations in Quality of Service
13
Internet Service Issues
14
Attacks
15
Table 2-2 - Attack Replication
Vectors
New Table
16
Attacks (continued)
17
Attacks (continued)
21
22
23
24
What Makes DDoS Attacks Possible?
Internet was designed with functionality &
not security in mind
Internet security is highly interdependent
Internet resources are limited
Power of many is greater than power of a few
25
Summary on Threats and Attacks
26
Outline of Network Security Basics
27
Firewalls
28
Firewall Categorization
Processing mode
Development era
Intended deployment structure
Architectural implementation
29
Firewalls Categorized by Processing
Modes
Packet filtering
Application gateways
Circuit gateways
MAC layer firewalls
Hybrids
30
31
Packet Filtering
32
Packet Filtering (continued)
33
34
35
36
37
Application Gateways
41
Virtual Private Networks (VPNs)
(continued)
VPN must accomplish:
42
Transport Mode
43
44
Tunnel Mode
45
46
Summary of Firewalls and VPNs
Firewall technology
Two modes
47
Defenses against Intrusion
Intrusion: type of attack on information assets in which instigator
attempts to gain entry into or disrupt system with harmful intent
48
Intrusion Detection Systems (IDSs)
Alert or alarm
False negative
The failure of an IDS system to react to an actual attack
event.
False positive
An alarm or alert that indicates that an attack is in progress
or that an attack has successfully occurred when in fact
there was no such attack.
Confidence value
Alarm filtering
50
IDSs Classification
All IDSs use one of two detection methods:
Signature-based
Statistical anomaly-based
network-based
host-based
application-based systems
51
Signature-Based IDS
52
Statistical Anomaly-Based IDS
The statistical anomaly-based IDS (stat IDS) or
behavior-based IDS sample network activity to
compare to traffic that is known to be normal
When measured activity is outside baseline
parameters or clipping level, IDS will trigger an alert
IDS can detect new types of attacks
Requires much more overhead and processing
capacity than signature-based
May generate many false positives
53
54
Network-Based IDS (NIDS)
55
Advantages and Disadvantages of
NIDSs
Good network design and placement of NIDS can
enable organization to use a few devices to
monitor large network
57
Host-Based IDS
Host-based IDS (HIDS) resides on a particular computer
or server and monitors activity only on that system
Benchmark and monitor the status of key system files
and detect when intruder creates, modifies, or deletes
files
Most HIDSs work on the principle of configuration or
change management
Advantage over NIDS: can usually be installed so that it
can access information encrypted when traveling over
network
58
Advantages and Disadvantages of
HIDSs
Can detect local events on host systems and detect
attacks that may elude a network-based IDS
59
Advantages and Disadvantages of HIDSs
(continued)
Pose more management issues
Vulnerable both to direct attacks and attacks against
host operating system
Does not detect multi-host scanning, nor scanning of
non-host network devices
Susceptible to some denial-of-service attacks
Can use large amounts of disk space
Can inflict a performance overhead on its host systems
60
Honey Pots, Honey Nets, and Padded Cell
Systems
Honey pots: decoy systems designed to lure potential
attackers away from critical systems and encourage
attacks against the themselves
Honey nets: collection of honey pots connecting
several honey pot systems on a subnet
Honey pots designed to:
Divert attacker from accessing critical systems
Collect information about attacker’s activity
Encourage attacker to stay on system long enough for
administrators to document event and, perhaps, respond
61
Outline of Network Security Basics
62
Cipher Methods
Plaintext can be encrypted through bit stream
or block cipher method
64
Table 8-1 Exclusive OR
Operations
65
Cryptographic Algorithms
Often grouped into two broad categories,
symmetric and asymmetric; today’s popular
cryptosystems use hybrid combination of
symmetric and asymmetric algorithms
66
Cryptographic Algorithms
(continued)
Symmetric encryption: uses same “secret
key” to encipher and decipher message
68
Cryptographic Algorithms
(continued)
Data Encryption Standard (DES): one of most
popular symmetric encryption cryptosystems
64-bit block size; 56-bit key
Adopted by NIST in 1976 as federal standard for
encrypting non-classified information
Triple DES (3DES): created to provide security
far beyond DES
Advanced Encryption Standard (AES):
developed to replace both DES and 3DES
69
Cryptographic Algorithms
(continued)
Asymmetric Encryption (public key
encryption)
71
Symmetric Key Crypto: DES
DES: Data Encryption Standard
US encryption standard [NIST 1993]
56-bit symmetric key, 64-bit plaintext input
Block cipher with cipher block chaining
How secure is DES?
DES Challenge: 56-bit-key-encrypted phrase decrypted
(brute force) in less than a day
No known good analytic attack
To make DES more secure:
3DES: encrypt 3 times with 3 different keys
72
Symmetric Key
Crypto: DES
DES Operation
Initial permutation
16 identical “rounds” of
function application,
each using different 48
bits of key
Final permutation
73
AES: Advanced Encryption Standard
74
Public Key Cryptography
Symmetric Key Crypto Public Key Crypto
Requires sender, receiver Radically different
know shared secret key approach [Diffie-
Q: How to agree on key in Hellman76, RSA78]
first place (particularly if Sender, receiver do not
never “met”)? share secret key
Public encryption key
known to all
Private decryption key
known only to receiver
Public Key Cryptography
+
KB Bob’s public
key
- Bob’s private
K
B key
76
Public Key Encryption Algorithms
Requirements:
1 Need
+
.) and KB- (.) such that
KB (
- +
K (K (m)) = m
B B
79
RSA: Creating Public/Private Key Pair
80
RSA: Encryption, Decryption
0. Given (n,e) and (n,d) as computed above
1. To encrypt message m (<n), compute
c = m e mod n
81
RSA Example
Bob chooses p=5, q=7. Then n=35, z=24.
e=5 (so e, z relatively prime).
d=29 (so ed-1 exactly divisible by z).
Encrypting 8-bit messages.
d
c c m = cd mod n
Decrypt:
17 481968572106750915091411825223071697 12
82
Why Does RSA Work?
Must show that cd mod n = m
where c = me mod n
Fact: for any x and y: xy mod n = x(y mod z) mod n
where n= pq and z = (p-1)(q-1)
Thus,
cd mod n = (me mod n)d mod n
= med mod n
= m(ed mod z) mod n
= m1 mod n
=m
83
RSA: Another Important Property
The following property will be very useful later:
- + + -
K (K (m)) = m = K (K (m))
B B B B
84
- + + -
Why K (K (m)) = m = K (K (m))
B B B B
?
85
Why Is RSA Secure?
Suppose you know Bob’s public key (n,e). How
hard is it to determine d?
Essentially need to find factors of n without
knowing the two factors p and q
Fact: Factoring a big number is hard
86
RSA In Practice: Session Keys
Exponentiation in RSA is computationally
intensive
DES is at least 100 times faster than RSA
Use public key crypto to establish secure
connection, then establish second key –
symmetric session key – for encrypting data
Session key, KS
Bob and Alice use RSA to exchange a symmetric key K S
Once both have KS, they use symmetric key cryptography
87
Cryptography Tools
Public Key Infrastructure (PKI): integrated
system of software, encryption
methodologies, protocols, legal agreements,
and third-party services enabling users to
communicate securely
88
Digital Signatures
Encrypted messages that can be
mathematically proven to be authentic
89
Digital Certificates
Electronic document containing key value
and identifying information about entity that
controls key
90
Figure 8-5 Digital Signatures
91
Summary of Cryptography
Cryptography and encryption provide
sophisticated approach to security
Many security-related tools use embedded
encryption technologies
93