ppt - Courses
Download
Report
Transcript ppt - Courses
Network Security
IS250
Spring 2010
John Chuang
Outline
What is Network Security?
- Security properties
- Cryptographic techniques
Availability (or lack thereof)
- Denial of service (DoS) attacks
- DDoS and botnets
Operational security
- Firewalls
- Intrusion detection systems
- Virtual private networks
John Chuang
2
Securing the Network Stack
Application (layer 7): various
security protocols
Transport (layer 4): Transport
Layer Security (TLS)
Network (layer 3): IPsec
Data Link (layer 2): Wired
Equivalent Privacy (WEP); 802.11i
Physical (layer 1): control of
access to cables; perimeter
security; acoustic security; …
HTTPS, SSH, PGP, S-BGP,
DNSSEC,…
TLS
IPsec
WEP; 802.11i; …
Physical layer security
Unfortunately, IP address spoofing (forging of source address) is still
unsolved, and source of many network security problems.
John Chuang
3
Attacks
Wide ranging scope
Some common attacks:
Eavesdropping
- passwords, credit card
numbers, etc.
Data tampering
Impersonation
- Replay attack
- Man-in-the-middle attack
(e.g., IP address spoofing)
- Phishing attack
John Chuang
Unauthorized access
- System vulnerabilities
- Password guessing (e.g.,
dictionary attack)
- Social engineering (e.g.,
bribe, black-mail)
Denial-of-Service attack
Spam
Malware: Trojan horses,
viruses, worms
…
4
Security Properties
“CIA” and “AAA”
Confidentiality
- Prevents eavesdropping
Integrity
- Prevents modification of data
Authentication
- Proves your identity to a third party; prevents impersonation
Accountability (non-repudiation)
- Enables failure analysis; serves as deterrent
Authorization
- Prevents misuse
Availability
- Safeguards against denial-of-service
John Chuang
5
Cryptographic Techniques
Encryption
- Symmetric-key (e.g., AES)
- Asymmetric-key (e.g., RSA)
Cryptographic hash
(message digest)
Confidentiality
Authentication
Integrity
- e.g., MD5, SHA-1
Digital signature
John Chuang
Non-Repudiation
6
Outline
What is Network Security?
- Security properties
- Cryptographic techniques
Availability (or lack thereof)
- Denial of service (DoS) attacks
- DDoS and botnets
Operational security
- Firewalls
- Intrusion detection systems
- Virtual private networks
John Chuang
11
Availability
Denial-of-Service (DoS) Attack:
- Make a computer resource or service unavailable to users by
overwhelming the computational and/or communication resources of
the victim system
DoS statistics (Moore et al., Usenix 2001):
- Prevalence: 13,000 DoS attacks recorded in 3 weeks
- Duration: an attack can last for hours
- Intensity: 600,000 packets per second
2008 ISP Infrastructure Security Report (Arbor, 2008)
- Largest DDoS attack peak traffic volume of 40Gbps
John Chuang
12
TCP SYN Flood Attack
Recall TCP session establishment
- A B: SYN
- B A: SYN + ACK
- A B: ACK
B has to keep state for every
half-open connection, and an idle
connection is closed only after
long timeout
An attacker sends many SYN
messages (with spoofed source
IP addresses) to victim B
Legitimate clients cannot
establish TCP session with B
John Chuang
13
http://bluebuddies.com/gallery/Smurf_Art_Showcase/gif/Impus_Art_Smurf_Attack.gif
Smurf Attack
ICMP Echo Request attack
Attacker sends ICMP Echo
Request (ping) messages to
IP broadcast addresses
(e.g., 128.32.255.255)
These ping messages have spoofed IP source address of
target victim
Hosts receiving the Echo Request messages will respond
with Echo Response (pong) messages
Target is flooded with ICMP Echo Response (pong)
messages
This is an example of a reflected attack
John Chuang
14
Distributed DoS
(DDoS) Attack
Attacker takes over
machines via viruses
and launches DoS
attacks from these “zombies” or “bots”
Largest botnets can have millions of bots
Defensive approaches: filtering, traceback
Misaligned incentives an important contributor
- Many owners unaware that their machine is a zombie
- Owners not motivated to diligently patch their
machines to protect against malware in the absence
of perceived harm
John Chuang
15
Botnets
(Application layer overlay) network of bots (Trojan
horses) under the command & control of botnet
operator
Botnet operators may control millions of machines and
use them to launch DDoS attacks, send spam, perform
keylogging, commit click fraud,…
- Estimate: 70-90% of spam come from botnets
Underground market for botnet service
- e.g., $500 for a DDoS attack using 10K bots
- e.g., sites asked to pay $10-50k in extortion
John Chuang
16
Outline
What is Network Security?
- Security properties
- Cryptographic techniques
Availability (or lack thereof)
- Denial of service (DoS) attacks
- DDoS and botnets
Operational security
- Firewalls
- Intrusion detection systems
- Virtual private networks
John Chuang
17
http://www.randommart.com/images/firewall_1_images/firewall.diagram2.gif
Firewall
A firewall isolates an organization’s internal network from
the public Internet
- All traffic must pass through firewall
- Only authorized traffic, as defined by local security policy, can
pass
Two basic types: packet filter, application gateway
John Chuang
18
Firewall Policy Examples
Policy
Firewall Setting
No outside web access
Drop all outgoing packets to any
IP address, destination port 80
No incoming TCP connections,
except to public web server at IP
address 1.2.3.4
Drop all incoming TCP SYN
packets to any IP except 1.2.3.4,
port 80
Allow DNS packets to leave
network
Allow outgoing UDP packets to
any IP address, destination port
53
Prevent your network from being
tracerouted
Drop all outgoing ICMP TTL
expired traffic
Prevent your network from being
used for a Smurf attack
Drop all ICMP ping packets going
to a broadcast address
John Chuang
19
Application Gateway
Filters packets on
application data as
well as on
IP/TCP/UDP fields
host-to-gateway
telnet session
application
gateway
gateway-to-remote
host telnet session
router and filter
Source: Kurose and Ross, Computer Networking, 5th Edition
Example: allow select internal users to telnet outside
1.
2.
3.
require all telnet users to telnet through gateway
for authorized users, gateway sets up telnet connection to destination host.
Gateway relays data between 2 connections
router filter blocks all telnet connections not originating from gateway
John Chuang
20
Intrusion Detection System
Monitors and reports suspicious traffic by
performing deep packet inspection
- Signature-based or Anomaly-based
application
gateway
firewall
Internet
internal
network
IDS
sensors
Web
server
FTP
server
John Chuang
DNS
server
demilitarized zone (DMZ)
Source: Kurose and Ross, Computer Networking, 5th Edition
21
Virtual Private Networks
Problem:
- build a corporate intranet for an organization with multiple
sites
Solutions:
- Public internet connections (low cost)
- Private (dedicated) network connections (confidential)
- Virtual Private Network (both confidentiality and low cost)
- Implemented in software
John Chuang
22
VPN
VPN software in router at each site gives
appearance of a private network
Implementation:
- Obtain internet connection for each site
- Choose router at each site to run VPN software
- Configure VPN software in each router to know about
the VPN routers at other sites
- VPN software acts as a packet filter; next hop for
outgoing datagram is another VPN router
- Outgoing datagrams encrypted using IPsec
John Chuang
23
IPSec (RFC 2402, 2406)
Transport mode: payload encrypted; not header
Tunneling mode: entire packet encrypted; then
encapsulated in separate packet (to keep
source/destination addresses confidential)
Example:
- Datagram from host x at
site 1 to host y at site 2
- Router R1 on site 1 encrypts,
encapsulates in new datagram
for transmission to router R2
on site 2
John Chuang
Source: Doug Comer
24