Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
100% found this document useful (1 vote)
220 views

Network Security Basics

The document discusses network security basics including what network security is, common threats and attacks, and defenses against threats. Network security refers to protecting a network from various threats to ensure the reliability, integrity and safety of the network and data. Common threats include human error, natural disasters, service disruptions, and attacks such as viruses, denial of service attacks, and spoofing. Defenses include firewalls, virtual private networks, encryption, and maintaining separate network segments with different levels of security.

Uploaded by

Neil Esperon
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
220 views

Network Security Basics

The document discusses network security basics including what network security is, common threats and attacks, and defenses against threats. Network security refers to protecting a network from various threats to ensure the reliability, integrity and safety of the network and data. Common threats include human error, natural disasters, service disruptions, and attacks such as viruses, denial of service attacks, and spoofing. Defenses include firewalls, virtual private networks, encryption, and maintaining separate network segments with different levels of security.

Uploaded by

Neil Esperon
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 93

Network Security Basics

1
Outline of Network Security Basics

 What is Network Security?


 Threats and Attacks
 Defenses
 Cryptography

2
What is Security?

 “The quality or state of being secure—to be free


from danger”
 A successful organization should have multiple
layers of security in place:
 Physical security
 Personal security
 Operations security
 Network security
 Information security

3
What is Network Security?

 Network security refers to any activities designed to


protect your network, which protect the usability,
reliability, integrity, and safety of your network and
data. Effective network security targets a variety of
threats and stops them from entering or spreading
on your network

4
Balancing Security and Access

 Impossible to obtain perfect security—it is a


process, not an absolute

 Security should be considered balance between


protection and availability

 To achieve balance, level of security must allow


reasonable access, yet protect against threats

5
Figure 1-6 – Balancing Security
and Access

6
Outline of Network Security Basics

 What is Network Security?


 Threats and Attacks
 Defenses
 Cryptography

7
Threats

 Threat: an object, person, or other entity that


represents a constant danger to an asset

 Management must be informed of the different


threats facing the organization

 By examining each threat category,


management effectively protects information
through policy, education, training, and
technology controls
8
Threats to Information Security

9
Acts of Human Error or Failure
 Includes acts performed without malicious
intent
 Causes include:
 Inexperience
 Improper training
 Incorrect assumptions

 Employees are among the greatest threats to


an organization’s data
10
Acts of Human Error or Failure
(continued)
 Employee mistakes can easily lead to:
 Revelation of classified data

 Entry of erroneous data

 Accidental data deletion or modification

 Data storage in unprotected areas

 Failure to protect information

 Many of these threats can be prevented with controls

11
Forces of Nature
 Forces of nature are among the most
dangerous threats

 Disrupt not only individual lives, but also


storage, transmission, and use of information

 Organizations must implement controls to


limit damage and prepare contingency plans
for continued operations

12
Deviations in Quality of Service

 Includes situations where products or


services not delivered as expected

 Information system depends on many


interdependent support systems

 Internet service, communications, and power


irregularities dramatically affect availability
of information and systems

13
Internet Service Issues

 Internet service provider (ISP) failures can


considerably undermine availability of
information

 Outsourced Web hosting provider assumes


responsibility for all Internet services as well
as hardware and Web site operating system
software

14
Attacks

 Act or action that exploits vulnerability (i.e.,


an identified weakness) in controlled system
 Accomplished by threat agent which damages
or steals organization’s information

15
Table 2-2 - Attack Replication
Vectors

New Table

16
Attacks (continued)

 Malicious code: includes execution of


viruses, worms, Trojan horses, and active
Web scripts with intent to destroy or steal
information

 Back door: gaining access to system or


network using known or previously
unknown/newly discovered access
mechanism

17
Attacks (continued)

 Spoofing: technique used to gain unauthorized


access; intruder assumes a trusted IP address

 Man-in-the-middle: attacker monitors network


packets, modifies them, and inserts them back
into network

 Spam: unsolicited commercial e-mail; more a


nuisance than an attack, though is emerging as a
vector for some attacks
18
19
Attacks (continued)

 Denial-of-service (DoS): attacker sends large


number of connection or information requests to a
target
 Target system cannot handle successfully along with
other, legitimate service requests
 May result in system crash or inability to perform
ordinary functions

 Distributed denial-of-service (DDoS): coordinated


stream of requests is launched against target from
many locations simultaneously
20
Figure 2-9 - Denial-of-Service
Attacks

21
22
23
24
What Makes DDoS Attacks Possible?
 Internet was designed with functionality &
not security in mind
 Internet security is highly interdependent
 Internet resources are limited
 Power of many is greater than power of a few

25
Summary on Threats and Attacks

 Threat: object, person, or other entity


representing a constant danger to an asset

 Attack: a deliberate act that exploits


vulnerability

26
Outline of Network Security Basics

 What is Network Security?


 Threats and Attacks
 Defenses
 Cryptography

27
Firewalls

 Prevent specific types of information from


moving between the outside world (untrusted
network) and the inside world (trusted
network)
 May be separate computer system; a software
service running on existing router or server; or
a separate network containing supporting
devices

28
Firewall Categorization

 Processing mode
 Development era
 Intended deployment structure
 Architectural implementation

29
Firewalls Categorized by Processing
Modes
 Packet filtering
 Application gateways
 Circuit gateways
 MAC layer firewalls
 Hybrids

30
31
Packet Filtering

 Packet filtering firewalls examine header


information of data packets
 Most often based on combination of:
 Internet Protocol (IP) source and destination address
 Direction (inbound or outbound)
 Transmission Control Protocol (TCP) or User
Datagram Protocol (UDP) source and destination port
requests
 Simple firewall models enforce rules designed to
prohibit packets with certain addresses or partial
addresses

32
Packet Filtering (continued)

 Three subsets of packet filtering firewalls:


 Static filtering: requires that filtering rules governing
how the firewall decides which packets are allowed
and which are denied are developed and installed
 Dynamic filtering: allows firewall to react to emergent
event and update or create rules to deal with event
 Stateful inspection: firewalls that keep track of each
network connection between internal and external
systems using a state table

33
34
35
36
37
Application Gateways

 Frequently installed on a dedicated computer;


also known as a proxy server
 Since proxy server is often placed in
unsecured area of the network (e.g., DMZ), it
is exposed to higher levels of risk from less
trusted networks
 Additional filtering routers can be
implemented behind the proxy server, further
protecting internal systems
38
Screened Subnet Firewalls (with DMZ)
 Dominant architecture used today is the
screened subnet firewall
 Commonly consists of two or more internal
bastion hosts behind packet filtering router, with
each host protecting trusted network:
 Connections from outside (untrusted network)
routed through external filtering router
 Connections from outside (untrusted network) are
routed into and out of routing firewall to separate
network segment known as DMZ
 Connections into trusted internal network allowed
only from DMZ bastion host servers
39
40
Virtual Private Networks (VPNs)

 Private and secure network connection


between systems; uses data communication
capability of unsecured and public network
 Securely extends organization’s internal
network connections to remote locations
beyond trusted network

41
Virtual Private Networks (VPNs)
(continued)
 VPN must accomplish:

 Encapsulation of incoming and outgoing data

 Encryption of incoming and outgoing data

 Authentication of remote computer and (perhaps)


remote user as well

42
Transport Mode

 Data within IP packet is encrypted, but header


information is not
 Allows user to establish secure link directly with
remote host, encrypting only data contents of
packet
 Two popular uses:
 End-to-end transport of encrypted data
 Remote access worker connects to office network over
Internet by connecting to a VPN server on the perimeter

43
44
Tunnel Mode

 Organization establishes two perimeter tunnel servers

 These servers act as encryption points, encrypting all


traffic that will traverse unsecured network

 Primary benefit to this model is that an intercepted


packet reveals nothing about true destination system

 Example of tunnel mode VPN: Microsoft’s Internet


Security and Acceleration (ISA) Server

45
46
Summary of Firewalls and VPNs

 Firewall technology

 Four methods for categorization

 Firewall configuration and management

 Virtual Private Networks

 Two modes

47
Defenses against Intrusion
 Intrusion: type of attack on information assets in which instigator
attempts to gain entry into or disrupt system with harmful intent

 Intrusion detection: consists of procedures and systems created


and operated to detect system intrusions

 Intrusion reaction: encompasses actions an organization


undertakes when intrusion event is detected

 Intrusion correction activities: finalize restoration of operations


to a normal state

 Intrusion prevention: consists of activities that seek to deter an


intrusion from occurring

48
Intrusion Detection Systems (IDSs)

 Detects a violation of its configuration and


activates alarm

 Many IDSs enable administrators to configure


systems to notify them directly of trouble via e-
mail or pagers

 Systems can also be configured to notify an


external security service organization of a “break-
in”
49
IDS Terminology

 Alert or alarm
 False negative
 The failure of an IDS system to react to an actual attack
event.
 False positive
 An alarm or alert that indicates that an attack is in progress
or that an attack has successfully occurred when in fact
there was no such attack.
 Confidence value
 Alarm filtering
50
IDSs Classification
 All IDSs use one of two detection methods:

 Signature-based

 Statistical anomaly-based

 IDSs operate as:

 network-based

 host-based

 application-based systems

51
Signature-Based IDS

 Examine data traffic in search of patterns that


match known signatures

 Widely used because many attacks have clear


and distinct signatures

 Problem with this approach is that as new attack


strategies are identified, the IDS’s database of
signatures must be continually updated

52
Statistical Anomaly-Based IDS
 The statistical anomaly-based IDS (stat IDS) or
behavior-based IDS sample network activity to
compare to traffic that is known to be normal
 When measured activity is outside baseline
parameters or clipping level, IDS will trigger an alert
 IDS can detect new types of attacks
 Requires much more overhead and processing
capacity than signature-based
 May generate many false positives

53
54
Network-Based IDS (NIDS)

 Resides on computer or appliance connected to


segment of an organization’s network; looks for signs
of attacks

 When examining packets, a NIDS looks for attack


patterns

 Installed at specific place in the network where it can


watch traffic going into and out of particular network
segment

55
Advantages and Disadvantages of
NIDSs
 Good network design and placement of NIDS can
enable organization to use a few devices to
monitor large network

 NIDSs are usually passive and can be deployed


into existing networks with little disruption to
normal network operations

 NIDSs not usually susceptible to direct attack and


may not be detectable by attackers
56
Advantages and Disadvantages of NIDSs
(continued)
 Can become overwhelmed by network volume and fail
to recognize attacks

 Require access to all traffic to be monitored

 Cannot analyze encrypted packets

 Cannot reliably ascertain if attack was successful or not

 Some forms of attack are not easily discerned by NIDSs,


specifically those involving fragmented packets

57
Host-Based IDS
 Host-based IDS (HIDS) resides on a particular computer
or server and monitors activity only on that system
 Benchmark and monitor the status of key system files
and detect when intruder creates, modifies, or deletes
files
 Most HIDSs work on the principle of configuration or
change management
 Advantage over NIDS: can usually be installed so that it
can access information encrypted when traveling over
network

58
Advantages and Disadvantages of
HIDSs
 Can detect local events on host systems and detect
attacks that may elude a network-based IDS

 Functions on host system, where encrypted traffic will


have been decrypted and is available for processing

 Not affected by use of switched network protocols

 Can detect inconsistencies in how applications and


systems programs were used by examining records
stored in audit logs

59
Advantages and Disadvantages of HIDSs
(continued)
 Pose more management issues
 Vulnerable both to direct attacks and attacks against
host operating system
 Does not detect multi-host scanning, nor scanning of
non-host network devices
 Susceptible to some denial-of-service attacks
 Can use large amounts of disk space
 Can inflict a performance overhead on its host systems
60
Honey Pots, Honey Nets, and Padded Cell
Systems
 Honey pots: decoy systems designed to lure potential
attackers away from critical systems and encourage
attacks against the themselves
 Honey nets: collection of honey pots connecting
several honey pot systems on a subnet
 Honey pots designed to:
 Divert attacker from accessing critical systems
 Collect information about attacker’s activity
 Encourage attacker to stay on system long enough for
administrators to document event and, perhaps, respond

61
Outline of Network Security Basics

 What is Network Security?


 Threats and Attacks
 Defenses
 Cryptography

62
Cipher Methods
 Plaintext can be encrypted through bit stream
or block cipher method

 Bit stream: each plaintext bit transformed into


cipher bit one bit at a time

 Block cipher: message divided into blocks


(e.g., sets of 8- or 16-bit blocks) and each is
transformed into encrypted block of cipher
bits using algorithm and key
63
Cipher Methods (continued)
 Substitution cipher: substitute one value for another
 Monoalphabetic substitution: uses only one alphabet
 Polyalphabetic substitution: more advanced; uses two or
more alphabets

 Transposition cipher: rearranges values within a block to


create ciphertext

 Exclusive OR (XOR): function of Boolean algebra; two bits


are compared
 If two bits are identical, result is binary 0

 If two bits not identical, result is binary 1

64
Table 8-1 Exclusive OR
Operations

65
Cryptographic Algorithms
 Often grouped into two broad categories,
symmetric and asymmetric; today’s popular
cryptosystems use hybrid combination of
symmetric and asymmetric algorithms

 Symmetric and asymmetric algorithms


distinguished by types of keys used for
encryption and decryption operations

66
Cryptographic Algorithms
(continued)
 Symmetric encryption: uses same “secret
key” to encipher and decipher message

 Encryption methods can be extremely efficient,


requiring minimal processing

 Both sender and receiver must possess


encryption key

 If either copy of key is compromised, an


intermediate can decrypt and read messages
67
Figure 8-3 Symmetric
Encryption Example

68
Cryptographic Algorithms
(continued)
 Data Encryption Standard (DES): one of most
popular symmetric encryption cryptosystems
 64-bit block size; 56-bit key
 Adopted by NIST in 1976 as federal standard for
encrypting non-classified information
 Triple DES (3DES): created to provide security
far beyond DES
 Advanced Encryption Standard (AES):
developed to replace both DES and 3DES
69
Cryptographic Algorithms
(continued)
 Asymmetric Encryption (public key
encryption)

 Uses two different but related keys; either key


can encrypt or decrypt message

 If Key A encrypts message, only Key B can


decrypt

 Highest value when one key serves as private


key and the other serves as public key
70
Figure 8-4 Using Public Keys

71
Symmetric Key Crypto: DES
DES: Data Encryption Standard
 US encryption standard [NIST 1993]
 56-bit symmetric key, 64-bit plaintext input
 Block cipher with cipher block chaining
 How secure is DES?
 DES Challenge: 56-bit-key-encrypted phrase decrypted
(brute force) in less than a day
 No known good analytic attack
 To make DES more secure:
 3DES: encrypt 3 times with 3 different keys

72
Symmetric Key
Crypto: DES

DES Operation
Initial permutation
16 identical “rounds” of
function application,
each using different 48
bits of key
Final permutation

73
AES: Advanced Encryption Standard

 Symmetric-key NIST standard, replaced DES


(Nov 2001)
 Processes data in 128 bit blocks
 128, 192, or 256 bit keys
 Brute force decryption (try each key) taking 1
sec on DES, takes 149 trillion years for AES

74
Public Key Cryptography
Symmetric Key Crypto Public Key Crypto
 Requires sender, receiver  Radically different
know shared secret key approach [Diffie-
 Q: How to agree on key in Hellman76, RSA78]
first place (particularly if  Sender, receiver do not
never “met”)? share secret key
 Public encryption key
known to all
 Private decryption key
known only to receiver
Public Key Cryptography
+
KB Bob’s public
key
- Bob’s private
K
B key

Plaintext Encryption Ciphertext Decryption Plaintext


message, m algorithm + algorithm message
K (m) - +
B m = KB(K (m))
B

76
Public Key Encryption Algorithms
Requirements:

1 Need
+
.) and KB- (.) such that
KB (
- +
K (K (m)) = m
B B

2 Given public key K+ , it should be


B
impossible to compute private key
-
K
B

RSA: Rivest, Shamir, Adelson algorithm


77
Prerequisite: Modular Arithmetic
 x mod n = remainder of x when divided by n
 Facts:
[(a mod n) + (b mod n)] mod n = (a+b) mod n
[(a mod n) - (b mod n)] mod n = (a-b) mod n
[(a mod n) * (b mod n)] mod n = (a*b) mod n
 Thus
(a mod n)d mod n = ad mod n
 Example: x=14, n=10, d=2:
(x mod n)d mod n = 42 mod 10 = 6
xd = 142 = 196 xd mod 10 = 6
78
RSA: Getting Ready
 Message: just a bit pattern
 Bit pattern can be uniquely represented by an integer number
 Thus, encrypting a message is equivalent to encrypting a
number.
Example:
 m=10010001 . This message is uniquely represented by the
decimal number 145.
 To encrypt m, we encrypt the corresponding number, which
gives a new number (the ciphertext).

79
RSA: Creating Public/Private Key Pair

1. Choose two large prime numbers p, q.


(e.g., 1024 bits each)
2. Compute n = pq, z = (p-1)(q-1)
3. Choose e (with e<n) that has no common factors
with z (e, z are “relatively prime”).
4. Choose d such that ed-1 is exactly divisible by z.
(in other words: ed mod z = 1 ).
5. Public key is (n,e). Private key is (n,d).
+ -
KB KB

80
RSA: Encryption, Decryption
0. Given (n,e) and (n,d) as computed above
1. To encrypt message m (<n), compute
c = m e mod n

2. To decrypt received bit pattern, c, compute


m = c dmod n

Magic m = (me mod n)


d
mod n
happens!
c

81
RSA Example
Bob chooses p=5, q=7. Then n=35, z=24.
e=5 (so e, z relatively prime).
d=29 (so ed-1 exactly divisible by z).
Encrypting 8-bit messages.

bit pattern m me c = me mod n


Encrypt:
0000l000 12 24832 17

d
c c m = cd mod n
Decrypt:
17 481968572106750915091411825223071697 12

82
Why Does RSA Work?
 Must show that cd mod n = m
where c = me mod n
 Fact: for any x and y: xy mod n = x(y mod z) mod n
 where n= pq and z = (p-1)(q-1)
 Thus,
cd mod n = (me mod n)d mod n
= med mod n
= m(ed mod z) mod n
= m1 mod n
=m

83
RSA: Another Important Property
The following property will be very useful later:

- + + -
K (K (m)) = m = K (K (m))
B B B B

use public key use private key


first, followed by first, followed by
private key public key

result is the same!

84
- + + -
Why K (K (m)) = m = K (K (m))
B B B B
?

Follows directly from modular arithmetic:

(me mod n)d mod n = med mod n


= mde mod n
= (md mod n)e mod n

85
Why Is RSA Secure?
 Suppose you know Bob’s public key (n,e). How
hard is it to determine d?
 Essentially need to find factors of n without
knowing the two factors p and q
 Fact: Factoring a big number is hard

86
RSA In Practice: Session Keys
 Exponentiation in RSA is computationally
intensive
 DES is at least 100 times faster than RSA
 Use public key crypto to establish secure
connection, then establish second key –
symmetric session key – for encrypting data
Session key, KS
 Bob and Alice use RSA to exchange a symmetric key K S
 Once both have KS, they use symmetric key cryptography

87
Cryptography Tools
 Public Key Infrastructure (PKI): integrated
system of software, encryption
methodologies, protocols, legal agreements,
and third-party services enabling users to
communicate securely

 PKI systems based on public key


cryptosystems; include digital certificates
and certificate authorities (CAs)

88
Digital Signatures
 Encrypted messages that can be
mathematically proven to be authentic

 Created in response to rising need to verify


information transferred using electronic
systems

 Asymmetric encryption processes used to


create digital signatures

89
Digital Certificates
 Electronic document containing key value
and identifying information about entity that
controls key

 Digital signature attached to certificate’s


container file to certify file is from entity it
claims to be from

90
Figure 8-5 Digital Signatures

91
Summary of Cryptography
 Cryptography and encryption provide
sophisticated approach to security
 Many security-related tools use embedded
encryption technologies

 Encryption converts a message into a form that is


unreadable by the unauthorized

 Many tools are available and can be classified as


symmetric or asymmetric, each having
advantages and special capabilities
92
Acknowledgement

These slides are partially from our course reference texts:

James Kurose and Keith Ross, Computer Networking: A Top-Down Approach


Featuring the Internet, Addison Wesley, 2010, ISBN 13:978-0-13-607967-5 (5th edition
or later)

Michael E. Whitman and Herbert J. Mattord, Principles of Information Security,


Thomson/Course Technology, ISBN 0-619-21625-5, Fourth Edition, 2012 

93

You might also like