Network Security: By: Sukhdeep Singh IT-IV Year (0702913108)
Network Security: By: Sukhdeep Singh IT-IV Year (0702913108)
Overview
What is security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures
Firewalls & Intrusion Detection Systems Denial of Service Attacks TCP Attacks Packet Sniffing Social Problems
2
What is Security
Dictionary.com says:
1. Freedom from risk or danger; safety. 2. Freedom from doubt, anxiety, or fear; confidence. 3. Something that gives or assures safety, as:
1. A group or department of private guards: Call building security if a visitor acts suspicious. 2. Measures adopted by a government to prevent espionage, sabotage, or attack. 3. Measures adopted, as by a business or homeowner, to prevent a crime such as burglary or assault: Security was lax at the firm's smaller plant.
etc.
3
What is Security
Dictionary.com says:
1. Freedom from risk or danger; safety. 2. Freedom from doubt, anxiety, or fear; confidence. 3. Something that gives or assures safety, as:
1. A group or department of private guards: Call building security if a visitor acts suspicious. 2. Measures adopted by a government to prevent espionage, sabotage, or attack. 3. Measures adopted, as by a business or homeowner, to prevent a crime such as burglary or assault: Security was lax at the firm's smaller plant.
etc.
4
What is Security
Dictionary.com says:
1. Freedom from risk or danger; safety. 2. Freedom from doubt, anxiety, or fear; confidence. 3. Something that gives or assures safety, as:
1. A group or department of private guards: Call building security if a visitor acts suspicious. 2. Measures adopted by a government to prevent espionage, sabotage, or attack. 3. Measures adopted, as by a business or homeowner, to prevent a crime such as burglary or assault: Security was lax at the firm's smaller plant.
etc.
5
What is Security
Dictionary.com says:
1. Freedom from risk or danger; safety. 2. Freedom from doubt, anxiety, or fear; confidence. 3. Something that gives or assures safety, as:
1. A group or department of private guards: Call building security if a visitor acts suspicious. 2. Measures adopted by a government to prevent espionage, sabotage, or attack. 3. Measures adopted, as by a business or homeowner, to prevent a crime such as burglary or assault: Security was lax at the firm's smaller plant.
etc.
6
Provide
Guarantee
availability of resources
7
Who is vulnerable?
Financial
institutions and banks Internet service providers Pharmaceutical companies Government and defense agencies Contractors to various government agencies Multinational corporations ANYONE ON THE NETWORK
8
Denial of Service
Ingress filtering, IDS
TCP hijacking
IPSec
Packet sniffing
Encryption (SSH, SSL, HTTPS)
Social problems
Education
9
Firewalls
Basic
problem many network applications and protocols have security problems that are fixed over time
Difficult for users to keep up with changes and keep host secure Solution
Administrators limit access to end hosts by using a firewall Firewall is kept up-to-date by administrators
10
Firewalls
A
Only one point of access into the network This can be good or bad
Can
be hardware or software
Ex. Some routers come with firewall functionality ipfw, ipchains, pf on Unix systems, Windows XP and Mac OS X have built in firewalls
11
Firewalls
Internet
Firewall
DMZ
Web server, email server, web proxy, etc
Firewall
Intranet
12
Intrusion Detection
Used
Open
13
Dictionary Attack
Denial of Service
Purpose:
Make a network service unusable, usually by overloading the server or network Many different kinds of DoS attacks
SYN flooding SMURF Distributed attacks
15
Denial of Service
SYN flooding attack Send SYN packets with bogus source address
Why?
Server responds with SYN ACK and keeps state about TCP half-open connection
Eventually, server memory is exhausted with this state
TCP Attacks
Recall
how IP works
End hosts create IP packets and routers process them purely based on destination address alone
Problem:
End hosts may lie about other fields which do not affect delivery
Source address host may trick destination into believing that the packet is from a trusted source
Especially applications which use IP addresses as a simple authentication method Solution use better authentication methods
17
TCP Attacks
TCP
values?
Port numbers are sometimes well known to begin with (ex. HTTP uses port 80) Sequence numbers are sometimes chosen in very predictable ways
18
TCP Attacks
If
an attacker learns the associated TCP state for the connection, then the connection can be hijacked! Attacker can insert malicious data into the TCP stream, and the recipient will believe it came from the original source
Ex. Instead of downloading and running new program, you download a virus and execute it
19
TCP Attacks
Say
20
TCP Attacks
Alice
21
TCP Attacks
Mr.
Big Ears lies on the path between Alice and Bob on the network
He can intercept all of their packets
22
TCP Attacks
First,
Mr. Big Ears must drop all of Alices packets since they must not be delivered to Bob (why?)
23
TCP Attacks
Then,
Mr. Big Ears sends his malicious packet with the next ISN (sniffed from the network)
ISN, SRC=Alice
24
TCP Attacks
Why
Web server
Malicious user
25
TCP Attacks
How
26
Packet Sniffing
Recall
how Ethernet works When someone wants to send a packet to some else They put the bits on the wire with the destination MAC address And remember that other hosts are listening on the wire to detect for collisions It couldnt get any easier to figure out what data is being transmitted over the network!
27
Social Problems
People
Conclusions
The
Internet works only because we implicitly trust one another It is very easy to exploit this trust The same holds true for software It is important to stay on top of the latest CERT security advisories to know how to patch any security holes
29
Thank You
30