0% found this document useful (0 votes)
26 views78 pages

Network Infrastructure Security Overview

Uploaded by

temsiyonmohe1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views78 pages

Network Infrastructure Security Overview

Uploaded by

temsiyonmohe1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

chapter Five

Introduction to Network Infrastructure


Security
Computer Security & Information Assurance
(InTc505)
1. Introduction
 Information security is concerned with data confidentiality and
integrity by using techniques like cryptography.
 Whereas network infrastructure security is concerned with the
protection of the network infrastructure itself.
 That is, to focus on how to detect and prevent routers or other
network devices from being attacked or compromised.

 Although information assurance is important, it becomes


meaningless if the data, no matter how secure its content is,
cannot be delivered through the Internet infrastructure to the
targeted destination correctly.
2
1.1 Internet Infrastructure
 Internet:- In 1969, it was started with four interconnected computers in
U.S. and was known as ARPAnet, a project funded by the Advanced
Research Projects Agency of the U.S. Department of Defense.
 Today, it is made up of hundreds of millions of hosts and hundreds of
thousands of networks all over the world, carrying various kinds of
information and services, such as electronic mail, World Wide Web, and
file transfer.
 ISPs:- are the companies that provide access to the Internet.
 If you want to access to the Internet or get the Internet services, your
computer must be part of an Internet Service Provider (ISP) network.
 Residential users may use a modem and a dial-up line to connect to an ISP.

 Commercial companies or educational institutes also require ISPs to


3 provide connections from their LANs to the Internet.
Contd.
 POP:- most large communication companies have any Point of
Presences(POPs) in various regions, and the POPs are interconnected
via high-speed links.
 POP is a service provider’s location for connecting users.

 For example, ETC(Ethiopian Telecommunication Corporation) is a large ISP

that has a POP in each state of Ethiopia, and owns its dedicated fiber-
optic backbones connecting the POPs.

 In this way, the customers in the same state should connect to the same POP

in that state, and all of ETC’s customers in Ethiopia can talk to each other
even though they are located at different states.

 However, at the current stage, they cannot talk to the customers of another
4
ISP.
Contd.
 NAP:- is a location where ISPs can connect with one another and
exchange traffic among them.
 To achieve the intercommunication between two ISP’s customers, both of the

ISPs have to agree to connect to a common Network Access Point (NAP)


simultaneously, which is also known as Internet Exchange Point (IXP).

 NAPs are usually operated by Internet backbone providers.

 Currently, there are dozens of large ISPs interconnected at NAPs all over

the world.

 In this way, every computer on the Internet can talk to every other.

 NAPs are critical components of the global Internet infrastructure, as the

5 connectivity they provide determines how data traffic is actually routed.


Contd.
 There are plenty of significant NAPs in the world. Some of them are:

 USA – MAE-West California, MAE-East Wash. DC, Chicago NAP,

New York NAP, Nap of the Americas

 UK - MaNAP, LINX, LoNAP, ScotIX…

 Japan - JPIX, Media Exchange (TTNet), NSPIXP

 China - TerreNAP, SHIX (ShangHai IX)

 Singapore - SingTel IX

 Hong Kong – HKIX, ReachIX, Pilhana


6
Network of Networks
 The Internet infrastructure is essentially a global collection of

networks.

 End computers are connected to a LAN, and LANs are connected

to an ISP (a kind of network).

 Access-level ISPs are usually interconnected through national and

international ISPs that are interconnected at the NAPs (another

kind of network) operated by Internet backbone providers


7
Contd.

Fig. 1.1 The Internet is essentially a global collection of networks.


8
1.2 Key Components in Internet Infrastructure
 Each ISP and NAP is essentially a network of routers and
communications links.
 Since the Internet infrastructure is made up of ISPs and NAPs, it
can be said that the Internet Infrastructure is made up of links
and routers.
 However, to implement the host-to-host communication on the
Internet, in addition to these physical components, it also requires
an addressing scheme and a naming system.
 That is, the hosts on the Internet conform to certain naming and
address conventions.
9
Contd.
1. Links:- The links on the Internet are made up of different types of
physical media, ranging from copper wire, coaxial cable, to optical

fiber and radio spectrum.

 Different types of media transmit data at different rates, and the rates

are typically measure in bits per second (bps).

 This link may be an actual physical link or it may be a logical link that

uses one or more actual physical links.

 When the link is a logical link the type of physical link should always

be specified (e.g., data link, uplink, downlink, fiber optic link, point-to-

10
point link, etc.)
Contd.

Fig. 1.2 The Internet is essentially a network of routers and communications links.
11
Types of Links
A. Point-to-point:- is a dedicated link that connects exactly two
communication facilities (e.g., two nodes of a network, an intercom
station at an entryway with a single internal intercom station, a radio
path between two points, etc.)
B. Broadcast:- connect two or more nodes and support broadcast
transmission, where one node can transmit so that all other nodes can
receive the same transmission. Example Ethernet.
C. Multipoint ( also known as "multidrop" link):- is a link that connects
two or more nodes.
• Also known as general topology networks, these include ATM and Frame
Relay links, as well as X.25 networks when used as links for a network layer
protocol like IP.
• Unlike broadcast links, there is no mechanism to efficiently send a single
message to all other nodes without copying and retransmitting the
12
message.
Contd. Types of Links

D. Point-to-multipoint:- is a specific type of multipoint link which

consists of a central connection endpoint (CE) that is connected

to multiple peripheral CEs.

 Any transmission of data that originates from the central CE is

received by all of the peripheral CEs while any transmission of

data that originates from any of the peripheral CEs is only

received by the central CE.

13
Contd.
 The final leg of delivering connectivity from an ISP to a customer (can
be a residential user or a company’s LAN) is called last mile.
 This last mile is about 2-3 miles or it may include:
 Integrated Service Digital Network (ISDN)
 Digital Subscriber Line (DSL), e.g., ADSL, HDSL, and VDSL
 Cable and the cable modem
 Leased lines, e.g., T1, T3
 Wireless, e.g., 802.11, 802.20, WiMAX

 As the Internet backbones are the points of most Internet congestion,


they are typically made up of fiber optic trunk lines that transmit data
at extremely high rates.
 The trunk line uses multiple fiber optics in parallel to increase the link
speed. Optical Carrier (OC) levels are used to specify the speed of
fiber optic networks.
14  For example, OC-1 = 51.85 Mbps and OC-3 = 155.52 Mbps.
Contd. Key Components in Internet Infrastructure
2. Routers:- Networks on the Internet are not usually directly
connected.
 Instead, they are indirectly connected through many intermediate
network devices known as routers.
 A router is a special-purpose dedicated computer that attaches to
two or more links (networks).
 When it receives a packet from one of its incoming links, it makes
a routing decision, and then forwards that packet to one of its
outgoing links.
 The decision is usually made based on the current state of the
networks the router is connected to.
 No matter how many networks a router is connected to, its basic
15
operation remains the same.
How Routers Work
 To make the selection of the next hop efficient, each router uses a
routing table to keep track of routes to a particular network
destination.
 A simple routing table looks like this:
 For example, if the router with the
Destination Outgoing link
above routing table receives a packet
Network 1 Serial Line 1
destined for Network 2, it will forward
Network 2 Serial Line 2
that packet to its attached serial line
number 2.
 Routing tables are built according to
Network N Serial Line 1
the routing algorithm that the routers
in the network use.

16
Contd.
 End computers are not usually directly connected to routers.
 To form a local area network, switches are commonly used to
interconnect end computers.
 Switches operate at the data link layer (of the Open Systems
Interconnection (OSI) reference model), and split up networks into
smaller individual collision domains.
 When a switch receives a frame, it first reads the destination
data-link address from the header information in the frame, then
establishes a temporary circuit between the source and
destination switch ports, and finally sends that frame on its way.
17
Addressing
 On the Internet, every participating machine is identified by an Internet
Protocol (IP) address, which is a unique 32-bit binary number.

 That is, IP addresses are normally expressed as a string of four decimal


octets separated by periods, ranging from [Link] to
[Link], with some reserved values for specific purposes.

 Therefore, the IP address of like 10000000 00001011 00000011


00011111can be written as [Link]

 Internet addresses are not only used to identify a host but also to
specify routing information on the Internet.

 Data packets traverse the Internet by following a path from their source
through a number of routers to the final destination.
18
Contd.
 The data packets are called IP packets or datagrams, which is the basic
unit of transmission across the Internet and contains both source and
destination IP address.

 Upon receiving a datagram, based on the destination address, a router


determines a next hop to which the datagram should be sent.

 Since IP addresses exhibit a hierarchical structure, they can be used to


make routing decisions.

 Each 32-bit IP address is divided into two parts: network ID and host
ID.

 The addresses of the hosts in the same network should have the same
network ID but different host ID.
19
Contd.
 IP defines three classes of networks: classes A, B and C with network IDs
8, 16 and 24 bits long respectively.

 In classful IP addressing, the network portion can take only these three
predefined number of bits.

 In classless addressing, any number of bits can be assigned to the


network ID.

 To determine the length of the network ID, the use of subnet mask is
needed.

 The subnet mask is a kind of bit mask containing a number of ones


starting from the left hand side, which can be expressed by the slash
form or the decimal-octets-periods form.
20
Contd.
 For example, if the network ID is 24 bits long, the subnet mask can be
expressed by “/24” or “[Link]”.

 By performing a bit-wise AND on the IP address and the subnet mask,


the corresponding network ID can be obtained.

21
IP Addressing: Classful Addressing
 In classful addressing, the address space is divided into five classes: A, B, C, D, and E.
Parts in IP Address: Netid and Hostid
 Each IP address is made of two parts; netid and hostid.

 The netid identifies the network whereas the hostid identifies a


host on that network. Both parts are required in an IP address.
 This is known as Hierarchal addressing.

23
How IP Addresses and Subnet Masks Interact
 When an IP host is configured, a subnet mask is assigned along with an IP address.
 Like the IP address, the subnet mask is 32 bits long.
 It signifies which part of the IP address is network and which part is host.
 The subnet mask is compared to the IP address from left to right, bit for bit.
 The 1s in the subnet mask represent the network portion; the 0s represent the host
portion.
 In the example shown, the first three octets are network, and the last octet represents
the host.
 When a host sends a packet, it compares its subnet mask to its own IP address and the
destination IP address.
 If the network bits match, both the source and destination host are on the same network
and the packet can be delivered locally.
 If they do not match, the sending host forwards the packet to the local router interface to be
sent on to the other network.

24
Private Vs. Public IP Addresses
 All hosts that connect directly to the Internet require a unique public IP
address..
 Because of the finite number of 32-bit addresses available, there is a
risk of running out of IP addresses.
 One solution to this problem was to reserve some private addresses for
use exclusively inside an organization.
 This allows hosts within an organization to communicate with one another
without the need of a unique public IP address.
 Private IP addresses are not recognized globally.

Class Network Address Total


Class A 10.0.0 1
Class B [Link] to [Link] 16

25 Class C 192.168.0 .0 to [Link] 256


Contd.
 Private addresses can be used internally by hosts in an organization
as long as the hosts do not connect directly to the Internet.
 Therefore, the same set of private addresses can be used by multiple
organizations.
 Private addresses are not routed on the Internet and will be quickly
blocked by an ISP router.
 The use of private addresses can provide a measure of security since
they are only visible on the local network, and outsiders cannot gain
direct access to the private IP addresses.
 There are also private addresses that can be used for the diagnostic
testing of devices.
 This type of private address is known as a loopback address. The
26 class A, [Link] network, is reserved for loopback addresses.
Subnetting and Supernetting
A. Subnetting:- is the segmentation of classful network into
smaller subnetworks.
 The main purpose of subneting is to avoid wastage of IP address
usage.
 As per our network requirement we can can create an IP address
assignment.
 [Read more on this]

B. Supernetting
 Combining several class C addresses to create a larger range of
addresses
 [Read more on this]

27
cont’d
 Three levels of hierarchy : netid, subnetid, and hostid
Naming Systems
 As IP addresses are in numeric form, they are difficult for human
to remember or mention.
 Therefore, in addition to an IP address, we can also assign a
symbolic name to a machine on the Internet.
 The symbolic name consists of a series of alpha-numeric text
separated by periods.
 For example, the machine with IP address [Link] can be
assigned the name [Link].
 Although users prefer to the more mnemonic symbolic names, the
underlay network protocols and routers operate based on IP
addresses which is fixed-length and hierarchically structured.
 Thus, application software (e.g., Web browser and email client) in
the sending machine, which allows users to enter the symbolic
name, is responsible for translating the name into an equivalent IP
address of the destination, and assigning the IP address in binary
29 form in IP packets.
Contd.
 The translation process requires a directory service that maps
symbolic names to IP addresses.

 It is the main task of the Internet’s Domain Name System (DNS).

 The DNS is a distributed database implemented with many servers


located all over the world.

 The servers are called name servers or DNS servers, each of them
only maintains part of the database and none of them has a
complete copy.

 More specifically, a name server only holds the name-to-address


mappings of the machines under its management.
30
Contd.
 In summary, DNS provides the infrastructure for translating
domain names into their equivalent IP addresses for application
software on the Internet.

 In spite of its importance, DNS provides no security mechanisms.


DNSSEC (short for DNS Security Extensions) adds a set of
security extensions to DNS to provide authenticity and integrity.

 The extensions are mostly based on the use of cryptographic


digital signature.

31
Internet Infrastructure Security
 Internet infrastructure security focuses on the protection of the key
infrastructure components, such as links, routers, DNS servers, and
naming systems.

 At the beginning, the Internet was designed without the concern of


security.

 As a result, the infrastructure is vulnerable to a variety of security


threats and attacks, leading to various kinds of network problems.

32 Fig. 1.3 Packet Mistreatment Attack


Contd.
Threat Description
Interruption To stop packets from reaching authorized destinations
Interception To get unauthorized access to the packet content
Modification To alter the packet content
Fabrication To construct packets that look like originating from
authorized users
Replication To replay packets
Routing-table positioning To purposely send bogus information to poison a router’s
routing table.
Packet mistreatment To alter the normal behavior of traffic
Address Spoofing To illegally forge an address so as to hide the attacker’s
identity
Server Compromising To intrude a server to modify its configuration

33 Table 1.1Typical Internet Infrastructure Security Threats


Contd.
Problem Description
Sub-optimal routes Packets will go through a path that is less optimal, instead of going
through the most favorable or desirable path, leading to a longer
latency, and unnecessary network traffic
Routing loops The path to convey packets forms a loop, preventing the packets
from reaching their destinations
Congestion Packets are maliciously forwarded to particular links or networks,
making the offered loads of them exceed their capacity, resulting
in high latency and even packets drop
Network partition A single network will be artificially separated into two or more
partitions, making hosts belonging to one partition cannot
communicate with host belonging to the other partitions
Blackhole An area of the network where packets enter but do not come out.
Denial of Service Because of the abnormal huge amount of traffic, routers are
overloaded, and unable to serve the legitimate requests.
Traffic subversion The traffic is redirected to pass through a certain link so that the
attacker could eavesdrop or modify the data, though the traffic will
be still forwarded to the correct destination
34
Table 1.2 Network Problems
Importance of Network Infrastructure Security
1. Attack to the infrastructure would affect a large portion of the
Internet and creates a large amount of service disruption.

Fig. 1.4 The attacker increases the cost of link B so that traffic
from domains W, X and Y to domain K takes the
35 suboptimal path, causing denial of service
Contd.
2. The growing fear of cyberterrorism.
 Cyberterrorism is a phrase used to describe the use of Internet
based attacks in terrorist activities, including acts of deliberate,
large-scale disruption of computer networks, especially of
personal computers attached to the Internet, by the means of
tools such as computer viruses.
 Cyberterrorism is related to deployments, by known terrorist
organizations, of disruption attacks against information systems
for the primary purpose of creating alarm and panic.
 It can also be defined much more generally as any computer
crime targeting computer networks without necessarily affecting

36
real world infrastructure, property, or lives.
Difficulties of Securing the Infrastructure
A. Internet Infrastructure is Vulnerable
 Many network devices and protocols were designed without security
concerns in mind at the beginning, making the Internet vulnerable to
various kinds of attack.
B. Solutions usually require a larger scale of modification
 The design of network infrastructure is fundamentally insecure, new
security solutions usually require certain level of modification of
existing network devices such as firmware updates or even device
replacement.
 The cost and efforts spending on large-scale deployment can be high.
C. Security and performance tradeoff
 Security usually requires extra processes to run or more CPU cycles to
execute the security process, which reduces the performance of the
37
current devices.
Contd.
D. Security is only as strong as the weakest link
 Since the Internet is heterogeneous and made up of various kinds
of networks, the overall security level will highly depend on the
weakest link or computer on the networks.
 Though there are advanced security technologies, if any one of the
nodes in the network does not (or fails to) employ them, the security
of the network is not guaranteed
 Besides, though some nodes employ self-defense technologies,
which make them less vulnerable, they may still believe some
malicious messages (as they look legitimate) from the compromised
node.
 On the other hand, there is no central authority or organization to
38 ensure the security level of each network on the Internet.
Contd.
E. Attacks can be easily launched and difficult to be traced.
 Because of the inherent openness of the Internet, anyone with a
computer and a Internet connection can reach any point on the
Internet, making it possible to launch attack from anywhere in
the world.
 Compounding the problem, a general computer can easily
pretend itself as a switch or router (by running a special
software package), and broadcast malicious information to
mislead the real network devices to perform abnormally.

39
Assignment
1. Read about the data link layer protocols such as
Address Resolution Protocol (ARP), Spanning Tree
Protocol (STP), and Virtual Local Area Network
(VLAN) protocols.
2. Read about the different VLAN attack types

40
Security Policies, Services and Mechanisms

Computer Security & Information


Assurance
(InTc505)
Overview
 Security polices, Attacks, services and mechanisms

 Security attacks

 Security services

 Methods of Defense

 A model for Internetwork Security

42
Security Policy
 is a document or set of documents that states an organization’s
intentions and decisions on what and how electronic information
should be secured.
 a statement of what is and what is not allowed.

 It is a set of rules and practices that specify or regulate how


a system or organization provides security services to protect
sensitive and critical system resources.
 Is also the set of rules laid down by the security authority
governing the use and provision of security services and
facilities.
43
Security attacks, Mechanisms and Services
 Security attack: any action that will compromise the security of
information.
 These attacks take many forms, but in most cases, they seek to
obtain sensitive information, destroy resources, or deny legitimate
users access to resources.

 Security mechanism:- is a mechanism that is designed to


detect , prevent, or recover from a security attack.

 Security services: A service that enhances the security of data


processing systems and information transfers.
 A security service makes use of one or more security mechanisms.
44
Security Attacks
 Is an assault on system security- an intelligent act that is a deliberate
attempt to evade security services and violate the security policy of
a system.
Information Information
source destination

a) Normal flow

b) Interruption
c) Interception

45 d) Modification e) Fabrication
Contd.
Interruption

 The system is destroyed or becomes unavailable


 This is an attack on availability.
 This could be a destruction of a piece of hardware or
cutting a communication line.
46
Contd.
Interception

 Unauthorized party gets access to information


 This is an attack on confidentiality
• Overhearing, eavesdropping over a communication line
 The attacker could be a person or program.
• Eg. of this could be unauthorized copying of files.
47
Contd.
Modification

 An unauthorized party gains access to information and also


modifies it.
 This is an attack on integrity of information.
 Modification of program or date files to operate or contain
different information.
 Corrupting transmitted data or tampering with it before it reaches its
48 destination
Contd.
Fabrication

 An unauthorized party injects fabricated information into


the system.
 That is, Faking data as if it were created by a legitimate and
authentic party
 This is an attack on authenticity.
 Examples of this is insertion of spurious messages, addition
of records to a file etc.
49
Attack Types
1. Passive attacks:- are the type of attacks which do not
change or modify the information flowing between the parties.
 This type of attacks are hard to detect since it does not involve
the other party or alter the data.
 The objective of the opponent is to obtain the information that
is being transmitted.
 Passive attacks attempt to learn or make use of information
from the system but don’t affect the system resources.
 This kind of attack can be prevented rather than detected.
Examples are Eavesdropping or monitoring of traffic.
50
Passive Attack Types
A. Release of Message Content:- Messages, such as telephone
conversation, an e-mail, and transferred file, may contain sensitive or
confidential information.
 An opponent may get to know the contents of the message.

 Prevent the opponent from learning the contents of these


transmission.

B. Traffic Analysis:- Analyzing or determining the location and


identity of hosts and paths to guess on the nature of communication
that is/was taking place.
 Here, the link traffic profile and information gathering is done by
the opponent.
51
52
Contd.
2. Active attacks:- are types of attacks which attempt to

alter system resources or affect their operation


 Are easier to detect since the information stream is altered and
involves the other party.

 Harder to prevent since no absolute protection is


available with the current buggy systems.
 Involves some modification of the data stream or creation
of a false stream.

53
Active Attack Types
A. Masquerading:- The entity pretends to be a different entity.

 It usually includes one of the other forms

B. Replay:- involves the passive capture of a data unit and its


subsequent retransmission to produce an authorized effect.
 Passive capture of data, alter and then retransmit.

C. Modification of Message:- Means some portion of the legitimate

message is altered, or the messages are delayed or reordered,


to produce an authorized effect.
D. Denial of Service:- Prevents or inhibits the normal use or
management of communications facilities.
54
55
Security Services
 A security service is the collection of mechanisms, procedures and

other controls that are implemented to help reduce the risk associated

with threat.

 For example, the identification and authentication service helps

reduce the risk of the unauthorized user threat.

 Some services provide protection from threats, while other services

provide for detection of the threat occurrence.

 An example of this would be a logging or monitoring service.


56
Security Services Types
A. Confidentiality (privacy):- is the protection of
transmitted data from passive attacks.
 The other aspect of confidentiality is the protection of
traffic flow from analysis.
 The attacker will not be able to observe the source and
destination, frequency, length or other characteristics of the
traffic on a communications facility.

B. Integrity (has not been altered):- ensures that the


messages are received with no duplication, insertion,
modification, reordering or replays.
57
Contd.
 Connection oriented service:- addresses DoS and modifications

(duplication, insertion, modification and reordering problems


handled).
 Connectionless service:- deals with only individual messages and

only assures against modification. This is because it only deals with


individual packets.
C. Access Control:- This service controls who can have access to a
resource, under what conditions access can occur and what those
accessing the resources are allowed to do.
D. Non-repudiation:- Prevents either sender or receiver from denying a
transmitted message.
58
Contd.
E. Authentication:- is the assurance that the communicating
entity is the one that it claims to be.
I. Peer Entity Authentication:- is used in association with a logical
connection to provide confidence in identity of the entities.
II. Data Origin Authentication:- In a connectionless transfer, it
provides assurance that the source of received data is as cl

F. Audit:- Recording & analyses of participation, roles and actions in


information communication by relevant entities..

G. Availability:- having your data accessible and obtainable at all


times.
59
Contd.
1. Confidentiality
 Data Confidentiality
 Traffic Confidentiality
Primary Services
2. Data Integrity
3. Authentication
 Data Origin Authentication
 Peer Authentication
4. Access Control
5. Non-Repudiation
 Non-Repudiation of Origin
 Non-Repudiation of Reception
6. Audit
60
7. Availability – an after-thought but increasingly important
Security Mechanisms
1. Encipherment:- is the use of mathematical algorithms to transform

data into a form that is not readily intelligible.

2. Digital Signature:- is a mathematical scheme for demonstrating the

authenticity of a digital message or document.

 A valid digital signature gives a recipient reason to believe that the

message was created by a known sender, and that it was not altered in

transit.

3. Access Control:- a variety of mechanisms that enforce access

rights to resources.
61
Contd.
4. Data Integrity:- a variety of mechanisms used to assure the integrity
of data unit or stream of data units.
5. Authentication Exchange:- a mechanism intended to ensure the
identity of an entity by means of information exchange.

6. Traffic Padding:- The insertion of bits into gaps in a data stream to


frustrate traffic analysis attempt.

7. Routing Control:- Enables selection of particularly secure routes from


certain data & allows routing changes, especially when a breach of
security is suspended.

8. Notarization:- The use of a trusted 3rd party to assure certain

62 properties of a data exchange.


Confidentiality
• Protection of information from disclosure to unauthorized entities
(organizations, people, machines, processes).
• Information includes data contents, size, existence, communication
characteristics, etc.
Service Types Protection Mechanisms
 Data Confidentiality / Disclosure  Data Encryption
Protection  Symmetric (Secret-Key)
 Connection Oriented  Asymmetric (Public-Key)
 Connectionless
 Selective Field
 Traffic Flow Confidentiality
 Origin Destination Association
 Message Size
 Transmission Patterns
63
 Accompanied with Data Integrity
Integrity
 Protection of data against creation, alteration, deletion,
duplication, re-ordering by unauthorized entities (organizations,
people, machines, processes).
 Integrity violation is always caused by active attacks.

Service Types Protection Mechanisms


 Message Integrity  Message Digests (Hashing)
 Associated with  Sequence Numbers
connectionless communication  Nonce ID (Random Number)
 Message Stream Integrity  Time Stamps
 Associated with
connection oriented
communication
64
Authentication
• Communicating entities are provided with assurance & information of
relevant identities of communicating partners (people, machines,
processes).
• Personnel Authentication requires special attention.

Service Types Protection Mechanisms


 Data Origin Authentication  Password
 Associated with  Manual
Connectionless Communication
 One-Time Password
 Peer Entity Authentication
 Key Sharing
 Associated with
 Manual
Connection Oriented Communication
 Symmetric Key (Tickets)
 Fundamental for access control
 Asymmetric Key (Certificates)
hence, confidentiality & integrity
 Challenge – Response
 Nonce Based
 Zero Knowledge Proof
65
Access Control
Protection of information resources or services from access or use by unauthorized
entities (organizations, people, machines, processes).
 Privileges – rights to access or use resources or services
 Principles – entities own access control privileges
 Subjects – entities exercise access control privileges
 Objects / Targets – resources or services accessed/used by subjects
 Delegation – transfer of access control privileges among principals
 Authorization – transfer of access control privileges from principals to subjects

Service Types Protection Mechanisms


 Subject Based Typing  Access Control Lists (ACLs)
 Identity Based  Object Based Specification
 Role Based Ex.: UNIX File System
 Enforcement Based Typing  Capabilities
 Mandatory Access Control  Subject Based Specification
― Management Directed  Issue Tickets/Certificates
 Discretionary Access Control ―
66
Resource Owner Directed
Non-Repudiation
Protection against denial of participation by communicating

entities in all or part of a communication.

Service Types Protection Mechanisms


 Non-Repudiation of Origin  Notarization

 Non-Repudiation of Reception  Time Stamp

 Digital Signature

67
Audit
 Recording & analyses of participation, roles and actions in

information communication by relevant entities.

Service Types Protection Mechanisms


 Intrusion Monitors / Sensors
 Off-line Analysis
 Common Intrusion Detection
(Computer Forensic)
Framework (CIDF)
 On-line Analysis
 Common Information Model
(Real-time Intrusion Detection) (CIM)

68
Service vs. Layer Mapping
Service / Layer 1 2 3 4 6 7
Confidentiality, Connectionless Y Y Y Y
Confidentiality, Connection Y Y Y Y Y
Confidentiality, Selected Field Y Y
Confidentiality, Traffic Flow Y Y
Authentication, Data Origin ? Y Y Y
Authentication, Peer Entity Y Y Y
Integrity, Message Y Y Y Y
Integrity, Message Stream ? Y Y Y
Access Control ? Y Y Y
Non-Repudiation, Origin Y
Non-Repudiation, Receipt Y
? = difference between IEEE802 and ISO
69
A Model for Network Security

70
Design Issues in the Model
1. Design an algorithm for performing the security-related
transformation.
 The algorithm should be such that an opponent cannot defeat its
purpose.
2. Generate the secret information to be used with the
algorithm.
3. Develop methods for the distribution and sharing of the secret
information.
4. Specify a protocol to be used by the two principles that
makes use of the security algorithm and the secret information
to achieve a particular security service.
71
Other Considerations
1. Network Design Considerations
 Designing for acceptable risk.

 Use of network models with security (LAN/WAN more secure, Dedicated/non-


dedicated, segregation and isolation)

2. Host hardening
 Firewalls, Packet filtering

3. Choice of network devices


 Choice of routers and other hardware

 Routing protocols

4. Intrusion detection systems (IDS)


 Host based IDS

 Network based IDS

72
Network Penetration Attacks and Firewalls

Passed Packet Attack


Internet Packet
Firewall
Hardened
Client PC Internet

Attacker

Dropped
Packet

Hardened
Server Internal
Log File Corporate
Network
73
Intrusion Detection System

1.
4. Alarm Intrusion Suspicious
Detection Packet
System
Network
2. Suspicious
Administrator Internet
Packet Passed
Attacker

3. Log
Packet

Hardened
Server
Log File Corporate Network

74
Encryption for Confidentiality

Encrypted
Message
“100100110001”

Client PC Server
Bob Alice
“100100110001”

Attacker (Eve) intercepts


Original but cannot read Decrypted
Message Message
“Hello” “Hello”

75
Impersonation and Authentication

I’m Bob

Prove it!
Client PC Attacker (Authenticate Yourself)
Server
Bob (Eve) Alice

76
Secure Dialog System

Secure Dialog

Client PC
Automatically Handles Server
Bob
Negation of Security Options Alice
Authentication
Encryption
Integrity
Attacker cannot
read messages, alter
messages, or impersonate

77
Hardening Host Computers
1. The Problem
 Computers installed out of the box have known vulnerabilities
 Not just Windows computers
 Hackers can take them over easily
 They must be hardened—a complex process that involves many
actions
2. Elements of Hardening
 Physical security
 Secure installation and configuration
 Fix known vulnerabilities
 Turn off unnecessary services (applications)
 Harden all remaining applications
 Manage users and groups
 Manage access permissions
 For individual files and directories, assign access permissions specific
users and groups
 Back up the server regularly
78
 Advanced protections

You might also like