1657ebe0-7f22-4a7c-b24f-f7a2aa2c895d
1657ebe0-7f22-4a7c-b24f-f7a2aa2c895d
18EC821 1
Course Outcomes:
After studying this course, students will be
able to:
1. Explain network security services and mechanisms and
explain security concepts.
2. Understand the concept of Transport Level Security and
Secure Socket Layer.
3. Explain Security concerns in Internet Protocol security.
4. Explain Intruders, Intrusion detection and Malicious
Software.
5. Describe Firewalls, Firewall Characteristics, Biasing and
Configuration.
18EC821 2
Module-1
Attacks on Computers and Computer Security 8 hours
18EC821 3
Module-2
Transport Level Security 8 hours
• Transport Level Security:
• Web Security Considerations,
• Secure Sockets Layer,
• Transport Layer Security,
• HTTPS,
• Secure Shell (SSH)
18EC821 4
Module-3
IP Security 8 hours
IP Security:
• Overview of IP Security (IPSec),
• IP Security Architecture,
• Modes of Operation,
• Security Associations (SA),
• Authentication Header (AH),
• Encapsulating Security Payload (ESP),
• Internet Key Exchange.
18EC821 5
Module-4
Intruders
8 hours
• Intruders,
• Intrusion Detection.
• MALICIOUS SOFTWARE:
• Viruses and Related Threats,
• Virus Counter measures,
18EC821 6
Module-5
Firewalls 8 hours
Firewalls:
• The Need for firewalls,
• Firewall Characteristics,
• Types of Firewalls,
• Firewall Biasing,
• Firewall location and configuration
18EC821 7
TEXT BOOKS:
1. Cryptography and Network Security Principles and
Practice , Pearson Education Inc., William Stallings, Slh
Edition, 2014, ISBN: 978-81- 317- 6166-3.
2. Cryptography and Network Security, Atul Kahate, TMH,
2003.
REFERENCE BOOKS:
3. Cryptography and Network Security, Behrouz A.
Forouz.an, TMH, 2007.
18EC821 8
Why is Security Required?
18EC821 9
The Need for Security
18EC821 10
Contd..
Two typical examples of such security mechanisms were
as follows:
18EC821 11
Information traveling from a client
to a server over the internet.
Fig. Example of information traveling from a client to a server over the Internet
18EC821 12
Some real time attacks
• Russian Attacker Maxim actually manage to intruder into a
merchant Internet site & obtained 300,000 credit card numbers
from its DB.
• He then attempted extortion by demanding protection
money($100,000) from the merchant.
• The merchant refused to oblige.
• Following this, the attacker published about 25,000 of the
credit card numbers on the internet!
• Some banks reissued all the credit cards at a cost of $20 per
card & others forewarned their customers about unusual
entries in their statements.
18EC821 13
Consequences of Attack
• Great Losses-both in terms of finance & goodwill.
• Cost of attack $20*300000=$6M
• Another Example:-
• 1999 Swedish hacker broke into Microsoft’s Hotmail Website & created a
mirror site.
• This allowed anyone to enter any Hotmail user’s email id & read their
emails.
• 2005 survey about the losses that occur due to successful attacks on
security. $455,848,000
• Next year this figure reduced to $201,757340!
18EC821 14
Modern Nature of Attacks
1. Automating Attacks:-
Traditional Attack: Produce Coins using machinery & Bring them
into circulation.
Modern Attack: Steal half a dollar from million accounts in a
few minutes time digitally.
2. Privacy Concern:-Every Company are collecting & processing
lots of information about us. Without we
realizing when & how it is going to be used.
3. Distance does not matter:- Attack Can be launched from the
distance.
E.g:- In 1995, a Russian hacker broke into Citibank’s computer
remotely, stealing $12M.
Although the attacker was traced, it was very difficult to get
extradited him for the court case.
18EC821 15
Fig. The changing nature of attacks due to automation
18EC821 16
Fig. Attacks can now be launched from a distance
18EC821 17
SECURITY APPROACHES
1.Trusted Systems-A trusted system is a computer system that can be
trusted to a specified extent to enforce a specified security policy.
18EC821 18
Contd..
2. Security Models- An organization can take several
approaches to implement its security model.
a) No Security
c) Host Security
d) Network Security
18EC821 19
a) No security: This is the simplest model with no security at all.
18EC821 20
3. Security-Management Practices-Good security-management
practices always talk of a security policy
18EC821 21
Once a security policy is in place, the following points should be
ensured.
18EC821 22
Principle/Goals of Security
• These r the 4 chief principles of security.
1. Confidentiality:- Is msg seen by someone else?
2. Authentication:- Do u trust the sender of msg?
3. Integrity:- Is the meg changed during transmit?
4. Non-repudiation:- Can sender refute the msg?
• Two more principles that are linked to the overall system are:
18EC821 23
Confidentiality
• Confidentiality is the process of preventing disclosure
of information to unauthorized individuals or systems.
18EC821 24
Interception Causes Loss of
Message Confidentiality
Examples:
18EC821 26
Fabrication is possible in absence of
proper authentication
Absence of authentication
18EC821 27
Integrity
• Integrity means that data cannot be
modified/change without Authorization
18EC821 28
Modification Causes Loss of Message integrity
18EC821 30
It does not allow the sender of a message to
refute the claim of not sending that message
18EC821 31
Access Control
➢ The principle of access control determines who should be
able to access what.
➢ For instance, we should be able to specify that user A can
view the records in a database, but cannot update them.
However, another user B might be allowed to make updates as
well. An access control mechanism can be set up to ensure this.
➢ Access control is broadly related to two areas: role
management and rule management.
➢ Role management concentrates on the user side (which user
can do what)
➢ Rule management focuses on the resources side (which
resource is accessible, and under what circumstances).
18EC821 32
Availability
• For any information/system to serve its purpose,
• The information must be accessible & usable when it
is needed.
• Computing systems used to store and process the
information, the security controls used to protect it,
and the communication channels used to access it
must be functioning correctly.
18EC821 33
Interruption puts the availability of
resources in danger.
18EC821 38
Publicity Attacks
Legal Attacks
18EC821 39
• 2.Attacks: A Technical View
1. Theoretical Concepts behind this attack.
Interception:- Copying of data & program & listening to N/W Traffic.
Fabrication:-Attacker may add fake records to a database. Creation of
illegal objects on the computer system.
Modification:-Attacker modifies Value of DB
Interruption:- Resources became unavailable, lost or unusable.
Causing problems to a H/W device, erasing program, Data or OS
components.
18EC821 40
Further Grouped in to two types:
18EC821 43
Active Attack
• Unlike passive attacks, the active attacks are based on the
modification of the original message in some manner, or in
the creation of a false message.
• These attacks cannot be prevented easily. However, they
can be detected with some effort, and attempts can be made
to recover from them. These attacks can be in the form of
interruption, modification and fabrication.
• Modification
• Creation of False Msg.
• No prevention
• Solution Detection & Recovery
18EC821 44
In active attacks, the contents of the original message
are modified in some way.
• Trying to pose as another entity involves
masquerade attacks.
• Modification attacks can be classified further into
replay attacks and alteration of messages.
• Fabrication causes Denial of Service (DOS) attacks
18EC821 45
Classification of Active Attack
18EC821 47
1. Application-level Attacks
18EC821 48
2. Network-level Attacks
• These attacks generally aim at reducing the capabilities of a network
by a number of possible means. These attacks generally make an
attempt to either slow down, or completely bring to halt, a computer
network.
• This automatically can lead to application-level attacks, because once
someone is able to gain access to a network, usually he/she is able to
access/modify at least some sensitive information.
• These two types of attacks can be attempted by using various
mechanisms, as discussed next. We will not classify these attacks into
the above two categories, since they can span across application as
well as network levels.
• Security attacks can happen at the application level or the network
level
18EC821 49
Programs Attack
1. Virus :A virus is a computer program that attaches itself to another
legitimate program, and causes damage to the computer system or to the
network.
Fig. Virus
18ec831 50
Virus Conti…
18EC821 51
Virus Conti…
Viruses can be classified into the following categories:
• (a) Parasitic Virus :This is the most common form of virus. Such a virus
attaches itself to executable files and keeps replicating. Whenever the
infected file is executed, the virus looks for other executable files to
attach itself and spread.
• (b) Memory-resident Virus: This type of virus first attaches itself to an
area of the main memory and then infects every executable program that
is executed.
• (c) Boot sector Virus :This type of virus infects the master boot record
of the disk and spreads on the disk when the operating system starts
booting the computer.
18EC821 52
Virus Conti…
• (d) Stealth Virus: This virus has intelligence built in, which prevents
anti-virus software programs from detecting it.
• (e) Polymorphic Virus: A virus that keeps changing its signature (i.e.
identity) on every execution, making it very difficult to detect.
• (f) Metamorphic Virus: In addition to changing its signature like a
polymorphic virus, this type of virus keeps rewriting itself every time,
making its detection even harder.
• There is another popular category of viruses, called the macro virus.
• This virus affects specific application software, such as Microsoft Word
or Microsoft Excel.
• They affect the documents created by users, and spread quite easily since
such documents are very commonly exchanged over email.
• There is a feature called macro in these application-software programs,
which allows users to write small, useful, utility programs within the
documents. Viruses attack these macros, and hence the name macro
virus.
18EC821 53
2. Worm
• A worm does not perform any destructive actions, and instead, only
consumes system resources to bring it down
• Similar in concept to a virus, a worm is actually different in
implementation.
• A virus modifies a program (i.e. it attaches itself to the program under
attack).
• A worm does not modify a program. Instead, it replicates itself again and
again.
• The replication grows so much that ultimately the computer or the
network on which the worm resides, becomes very slow, ultimately
coming to a halt.
• The basic purpose of a worm attack is different from that of a virus. A
worm attack attempts to make the computer or the network under attack
unusable by eating all its resources.
18EC821 54
Worm Conti..
Fig.Worm
18EC821 55
3. Trojan Horse
18EC821 58
Applets and ActiveX Controls Conti..
18EC821 59
Applets and ActiveX Controls Conti..
• Sun Microsystems provides Java applets
• Microsoft’s technology makes use of ActiveX controls.
18EC821 60
Applets and ActiveX Controls Conti..
To prevent these attacks
• Java applets have strong security checks as to what they can do and
what they cannot.
• ActiveX controls have no such restrictions.
• New version of applets called as signed applets allows
Accesses similar to ActiveX.
• Java applets (from Sun Microsystems ) and provides
ActiveX controls (from Microsoft’s corporation) are client side programs
that might cause security problems, if used by attackers with a malicious
intention.
18EC821 61
Cookies
• Cookie Definition: Cookies are pieces of information generated
by a Web server and stored in the user's computer, ready for
future access.
• Cookies are embedded in the HTML information
flowing back and forth between the user's
computer and the servers.
• Cookies were implemented to allow user-side
customization of Web information. For example,
cookies are used to personalize Web search
engines, to allow users to participate in
WWW-wide contests (but only once!), and to store
shopping lists of items a user has selected while
browsing through a virtual shopping mall.
18EC821 62
Cookies Contin…
• Essentially, cookies make use of user-specific
information transmitted by the Web server onto
the user's computer so that the information might
be available for later access by itself or other
servers.
• In most cases, not only does the storage of
personal information into a cookie go unnoticed,
so does access to it.
• Web servers automatically gain access to relevant
cookies whenever the user establishes a
connection to them, usually in the form of Web
requests.
18EC821 63
Cookies Contin…
Two Stage Process
• First the cookie is stored in the user's computer without their consent or
knowledge.
• For example, with customizable Web search engines like My Yahoo!, a
user selects categories of interest from the Web page. The Web server
then creates a specific cookie, which is essentially a tagged string of text
containing the user's
preferences, and it transmits this cookie to the user's computer.
• The user's Web browser, if cookie-savvy, receives the cookie and stores it
in a special file called a cookie list.
• This happens without any notification or user consent. As a result,
personal information (in this case the user's category preferences) is
formatted by the Web server, transmitted, and
saved by the user's computer.
18EC821 64
Two Stage Process (cont.)
• During the second stage, the cookie is
clandestinely and automatically transferred
from the user's machine to a Web server.
• Whenever a user directs her Web browser to
display a certain Web page from the server, the
browser will, without the user's knowledge,
transmit the cookie containing personal
information to the Web server.
18EC821 65
Cookies Contin…
18EC821 66
Cookies Contin…
18EC821 67
Cookies Contin…
Some modern tricks allow attackers to misuse cookies interms of
collecting personal data and invading people’s privacy. This attack works
is as follows.
• An advertising agency (say My Ads) contacts major Web sites and places
banner ads for its corporate clients products on their pages. It pays some
fees to the site owners for this.
• Instead of providing an actual image that can be embedded by the
respective web sites in their pages directly, it provides a link(URL) to
add to each page. This is shown in Fig.
18EC821 68
Cookies Contin…
18EC821 69
Cookies Contin…
18EC821 70
Dealing with Viruses
18EC821 71
Dealing with Viruses Conti..
18EC821 72
Generations of anti-virus software
18EC821 73
Generations of anti-virus software Conti..
18EC821 74
Generations of anti-virus software Conti..
18EC821 75
Specific Attacks
• Sniffing and Spoofing On the Internet, computers exchange messages
with each other in the form of small groups of data, called packets. A
packet, like a postal envelope contains the actual data to be sent, and the
addressing information. Attackers target these packets, as they travel
from the source computer to the destination computer over the Internet.
These attacks take two main forms: (a) Packet sniffing (also called
snooping), and (b) Packet spoofing. Since the protocol used in this
communication is called Internet Protocol (IP), other names for these two
attacks are (a) IP sniffing, and (b) IP spoofing. The meaning remains the
same.
18EC821 76
Specific Attacks Conti..
Two attacks are:
• Packet Sniffing: Packet sniffing is a passive attack on an ongoing
conversation. An attacker need not hijack a conversation, but instead, can
simply observe (i.e. sniff) packets as they pass by. Clearly, to prevent an
attacker from sniffing packets, the information that is passing needs to be
protected in some ways. This can be done at two levels: (i) The data that
is traveling can be encoded in some ways, or (ii) The transmission link
itself can be encoded. To read a packet, the attacker somehow needs to
access it in the first place. The simplest way to do this is to control a
computer via which the traffic goes through. Usually, this is a router.
However, routers are highly protected resources. Therefore, an attacker
might not be able to attack it, and instead, attack a less-protected
computer on the same path.
18EC821 77
Specific Attacks Conti..
• Packet spoofing : In this technique, an attacker sends packets with an
incorrect source address. When this happens, the receiver (i.e. the party
who receives these packets containing false addresses) would
inadvertently send replies back to this forged address (called spoofed
address), and not to the attacker. This can lead to three possible cases: (i)
The attacker can intercept the reply If the attacker is between the
destination and the forged source, the attacker can see the reply and use
that information for hijacking attacks. (ii) The attacker need not see the
reply If the attacker’s intention was a Denial Of Service (DOS) attack,
the attacker need not bother about the reply. (iii) The attacker does not
want the reply The attacker could simply be angry with the host, so it
may put that host’s address as the forged source address and send the
packet to the destination. The attacker does not want a reply from the
destination, as it wants the host with the forged address to receive it and
get confused.
18EC821 78
Phishing
18EC821 79
Phishing Conti..
• The attacker decides to create his/her own Web site, which looks very
identical to a real Web site. For example, the attacker can clone
Citibank’s Web site. The cloning is so clever that the human eye will not
be able to distinguish between the real (Citibank’s) and fake (attacker’s)
site.
• The attacker can use many techniques to attack the bank’s customers.
18EC821 80
Phishing Conti..
Fig. 1.19 Attacker sends a forged email to the innocent victim (customer)
18EC821 81
Phishing Conti..
Fig. 1.21 Fake PayPal site asking for user’s credit-card details
18EC821 83
Pharming (DNS Spoofing)
18EC821 84
Pharming (DNS Spoofing) Conti..
DNS spoofing attack works as follows
• Suppose that there is a merchant (Ankith) whose site’s domain name is
www.ankith.com, and the IP address is 100.10.10.20. Therefore, the DNS
entry for Ankith in all the DNS servers is maintained as follows:
www. ankith.com 100.10.10.20
• The attacker (say, Trudy) manages to hack and replace the IP address of
Ankith with her own (say 100.20.20.20) in the DSN server maintained
by the ISP of a user, say Alice. Therefore, the DNS server maintained by
the ISP of Alice now has the following entry: www. ankith.com
100.20.20.20
18EC821 85
Pharming (DNS Spoofing) Conti..
18EC821 86
Pharming (DNS Spoofing) Conti..
• When Alice wants to communicate with Bob’s site, her Web browser
queries the DNS server maintained by her ISP for Bob’s IP address,
providing it the domain name (i.e. www.bob.com). Alice gets the
replaced (i.e. Trudy’s) IP address, which is 100.20.20.20.
• Now, Alice starts communicating with Trudy, believing that she is
communicating with Bob! Such attacks of DNS spoofing are quite
common, and cause a lot of havoc. Even worse, the attacker (Trudy)
does not have to listen to the conversation on the wire! She has to
simply be able to hack the DNS server of the ISP and replace a single
IP address with her own!
18EC821 87
Pharming (DNS Spoofing) Conti..
• A protocol called DNSSec (Secure DNS) is being used to thwart such
attacks. Unfortunately, it is not widely used.
18EC821 88
THANK
YOU
18EC821 89