Network Security KA Webinar - Slides
Network Security KA Webinar - Slides
Knowledge:
Network Security
• Introduction
• Internet Architecture
• Network Protocols and Vulnerabilities
• Application Layer Security
• Transport Layer Security
• Network Layer Security
• Link Layer Security
• Wireless LAN Security
• Network Defence Tools
• Advanced Network Security topics
Network Security 2
Introduction
➢ Internet connectivity is essential but is vulnerable to threats
Network Security 3
Introduction
➢ We explore
o The challenges in securing a network under a variety of
attacks
o Widely used security protocols
o Emerging security challenges and solutions
Network Security 4
Internet Architecture
➢ A complex system such as distributed applications
running over a range of networking technologies is best
understood when viewed as layered architecture
➢ Figure 1 (next slide) shows the 7-layer ISO OSI protocol stack
and the interaction between various layers
o TCP/IP protocol stack uses only five layers from OSI model i.e.,
layers 1- 4 and 7
o Presentation and Session layers (shown in dotted box) are
optional and their functionality can be offloaded to the
application layer
Network Security 5
Client Server
Communication
Network
L7. L7.
Application Layer
Application Application
L6. L6.
Presentation Layer
Presentation Presentation
L3. Network Net. Layer L3. Network L3. Network Net. Layer L3. Network
L2. Datalink D/L Layer L2. Datalink L2. Datalink D/L Layer L2. Datalink
L1. Physical Phy. Layer L1. Physical L1. Physical Phy. Layer L1. Physical
Network Security 7
Network Security Attacks
➢ We will use the popular network security characters Alice, Bob,
Eve and Mallory
Network Security 8
Network Security Attacks
➢ Denial of Service (DoS) attack is launched by an attacker by
sending an avalanche of bogus packets to a server to keep the
server constantly busy or clog up the access link with the aim
of disrupting the service for the legitimate users
Network Security 9
Desirable properties of secure
communication
Network Security 10
Application Layer Security
Network Security 11
Application Layer Security
➢ Assume Alice and Bob want to use email
Network Security 12
Application Layer Security
➢ Assume Alice and Bob want to use email
Network Security 13
Application Layer Security
D. Alice uses public key cryptography and calculates the
message hash using SHA-3 algorithm and uses her private key to
encrypt the hash (forming digital signature). Bob now decrypts
this hash using the Alice’s public key
➢ How does Bob get Alice’s public key and trust that Eve or
Mallory are not using a forged public/private key to perform
MiTM?
Network Security 14
Application Layer Security
➢ Public Key Infrastructure (PKI) provides a solution for
registering and managing a trustworthy public key
➢ Government agencies or standard organisations appoint or
recognise registrars who issue keys, and keep track of the
public certificates of entities (individuals, servers, routers etc.)
o The registrars themselves have a registered public/private
key pair
➢ Typically, a user’s identity, public-key and CA information are
used as an input to the hash function. The hash is then signed
with the CA’s private key to produce a Public Key Certificate
(PKC)
o The fields on the certificate include a unique identifier/serial
number, a signature algorithm used by the CA and the
period of validity.
➢ Bob can get the PKC for Alice from a CA and apply CA’s public
key to retrieve Alice’s authentic public key
Network Security 15
Application Layer Security
➢ Alice and Bob can sign each other certificates certifying their
public keys. Other entities if they trust on Alice, can use Bob’s
certificate duly certified by Alice
Network Security 16
Application Layer Security
Network Security 17
Application Layer Security
➢ Various original application layer protocols lacked
security features
Protocol Name Functionality Security Attacks
Network Security 18
Application Layer Security
Network Security 19
Transport Layer Security
Network Security 20
➢ TLS protocol has 3 phases:
Handshake, key-derivation and data transfer
Alice (Receiver)
Bob (Sender)
Internet
Start of TLS
TCP 3-way Handshake
Handshake
Application Data
Encrypted
Traffic
Figure No 2
TLS Protocol Handshake
Network Security 22
TLS Protocol Key Derivation
➢ A pseudorandom function produces a Master Secret (MS) using
client nonce, server nonce and Pre-Master Secret (PMS)
Network Security 23
TLS Protocol Data Transfer
➢ TLS defines a record format to keep track of the data being sent
0-byte 1 2 3 4
Content Type
Version Length
Payload
MAC
Padding (block ciphers only)
Network Security 24
Transport Layer Security
➢ Various attacks on Transport layer
Network Security 25
QUIC
Network Security 26
Network Layer Security
➢ Why do we need security mechanisms at the network layer?
Network Security 27
IPsec
IP TCP/UDP Data
Header Header Payload
Public
Internet IP IPSec TCP/UDP Data
Header Header Header Payload
IPSec compliant
Encrypted Gateway Router
Enterprise Network
IP IPSec TCP/UDP Data
Header Header Header Payload
Encrypted
IPSec Compliant
Host
Home Network Network Security 28
IPsec
➢ IPsec provides data confidentiality, integrity, origin
authentication and replay attack prevention
Network Security 29
IPsec
Network Security 30
IPsec
Network Security 31
Network Layer Security
➢ IPv6 proliferation
o 128 bit addresses increases the searchable address
space
o IPv6 L3 addresses are derived directly from L2
addresses without the need to do ARP
o Allows cryptographically generated addresses (CGA)
binding addresses to a public signature key
o IPsec initially mandated but now recommended
Network Security 32
Network Layer Security
Network Security 33
Network Layer Security
➢ Border Gateway Protocol (BGP) is the de-facto exterior
gateway protocol that advertises the reachability information
within and across ASs
➢ BGP also lacks integrity and authentication mechanisms by
default and hence subject to attacks such as
o BGP route hijacking attack
▪ Divert all traffic to flow through your AS or another AS
o BGP DoS attack
▪ Attacking the BGP border router
➢ BGPSec
o Utilises PKI to verify the signatures of the BGP peers
▪ Signature verification comes at a cost
o Can use IPsec for point to point security for exchanging
update messages
Network Security 34
Link Layer Security
Network Security 35
Link Layer Security
➢ 802.1X Port based Authentication
o For both wired and wireless networks
o A station (supplicant) must authenticate with the switch or
Access Point (AP) (Authenticator) before connecting
o The AS and authenticator can be co-located or if separate
preconfigured with a shared secret
Authenticator Authentication
Server
Protected
Infrastructure
RADIUS,LDAP,
Active Directory
Supplicant Supplicant
Network Security 36
Link Layer Security
➢ Supplicant uses Extensible Authentication Protocol (EAP) for
authentication by AS through the Authenticator
o Uses L2 protocol between supplicant and authenticator and
higher layer protocol between the authenticator and AS
EAP TLS
EAP
RADIUS/LDAP/.. EAP over LAN (EAPOL)
UDP/IP IEEE 802.11
Hub
Wired LAN
AS (RADIUS) Authenticator
(Switch/AP)
Wireless Device
Supplicant
EAP in action
➢ When a new client (supplicant) is connected to an
authenticator, the port on the authenticator is set to the
’unauthorised’ state, allowing only 802.1X traffic
➢ The authenticator sends out the EAP-Request identity to the
supplicant. The supplicant responds with the EAP-response
packet, which is forwarded to the AS.
o This typically includes the supplicant’s credentials
(username and hash of password).
➢ Upon verification, the AS returns one of the following
responses: Access Accept, Access Reject, Access Challenge
for extra credentials. If the result is Access Accept, the
authenticator unblocks the port to let higher layer traffic
through.
➢ When the supplicant logs off, the EAP-logoff to the
authenticator sets the port to block all non-EAP traffic.
Network Security 38
EAP Tunneling
Network Security 39
Ethernet Switched LANs
➢ Ethernet switched LANs operate on self-learning and configuring
protocols; various attacks are possible
➢ Switch Poisoning Attack: The attacker fills up the switching table
with bogus MAC addresses forcing the switch to broadcast all
incoming data frames to all outgoing ports
o Attacker controls a device attached to one of the port
Network Security 40
Ethernet Switched LANs
Network Security 41
Link Layer Security
➢ Various attacks on Switched Ethernet LANs
Attack Counter measure
Network Security 42
Wireless LANs Security
➢ Wireless Equivalent Privacy (WEP)
➢ Provides integrity, confidentiality and authentication using
symmetric key encryption
o A 24-bit initialisation vector (IV) is combined with 104-bit
shared key and fed into a pseudo random number generator
(PRNG such as RC4 stream cipher)
o The plaintext payload and the CRC of the frame are then
combined with the key sequence generated by the RC4 using
bit-wise exclusive-or operation for encryption
o A new IV is used for each frame and sent in plaintext along
with the encrypted frame
o The receiver input the received IV and shared secret key into
PRNG to get the keystream, XOR the keystream with the
encrypted data for decryption
o Data integrity through 32-bit CRC and authentication using
128-bit nonce
Network Security 43
Wireless LANs Security
Network Security 44
Wireless LANs Security
Network Security 45
Wireless LANs Security
➢ WPA2 (2004):
o Relies on 128 bit AES Counter Mode with the Cipher
Block chaining Message Authentication Code Protocol
(CCMP)
▪ Improves temporal key generation
▪ Improved four way handshake
➢ WPA3 (2018):
o PSK is replaced with a new key distribution called
Simultaneous Authentication of Equals (SAE) based on
IETF Dragonfly key exchange
o WPA3-Personal uses a 128-bit encryption
o WPA3-Enterprise uses 192-bit encryption
Network Security 46
Wireless LANs Security
➢ Robust Security Network (RSN):
o 802.1X-based mechanism for access control
o EAP for authentication and key-generation
o TKIP and CCMP for encryption/decryption, integrity and origin
authentication
➢ RSN key derivation
o User device and AP have a pre-shared PSK or in enterprise
solutions Master Session Key (MSK) is generated during
802.1X authentication
o PSK can be used as a pair-wise master key (PMK) or PMK
can be generated from MSK
o Pair-wise Transient Key (PTK) is generated using Host and AP
addresses, nonce and PMK
o PTK is split three ways generating separate keys for each
function
Network Security 47
Robust Security Network (RSN)
Confirmation
Key
128-bits
EAP (Possible
AAA Key
path truncation)
PRF using
≥ 256-bits
Pairwise HMAC- Pairwise Encryption
Master SHA-1 transient Key
Key Key
128-bits
Out-of- 256-bits 256-bits
Pre-shared (TKIP)
band
Key 384-bits
path
(CCMP)
256-bits
Temporal
Key
Pairwise key hierarchy 128-bits
Components of
PTK
Network Defense Tools
Network Security 49
Network Defense Tools
➢ Packet filters and firewalls
➢ Two types stateless and stateful
o Stateless filters do not retain any state information about the
packets/flows/sessions
o Stateful packet filters can track transport layer flow, a chain of
packets belonging to a session
Network Security 50
Network Defense Tools
➢ Application Gateway (AG) / Application Proxies can perform
access control through user authentication
➢ Can inspect information from full 5-layers of TCP/IP stack
o Can be co-located with a firewall or uses a firewall
o Can create two sessions: one between the client and AG, and
one between AG and the destination that goes through the
firewall
o AG can terminate a SSL connection.
▪ AG does the resource intensive encryption/decryption and
passes the un-encrypted traffic to the backend servers
▪ AGs can inspect encrypted outbound traffic where the
clients are configured with corresponding certificates
installed at the AG
➢ AGs can slow down the connection
o Authentication, policy checks, state maintenance
Network Security 51
Network Defense Tools
Network Security 52
Network Defense Tools
➢ Intrusion detection systems (IDS)
➢ Does deep packet inspection using agents/sensors/monitors on
the network or the hosts
Network Security 53
Network Defense Tools
Network Security 54
Network Defense Tools
Network Security 55
Network Defense Tools
Network Security 56
Network Security Architecture
Design
➢ Network protection tools are most effective when deployed
in combination
Network Security 57
Advanced Network Security Topics
➢ Software Defined Network (SDN), Virtualisation
Network Security 58
Advanced Network Security Topics
➢ SDN platform has to be secured itself
Network Security 59
Advanced Network Security Topics
Network Security 60