0% found this document useful (0 votes)
38 views30 pages

Chapter 5 S

The document summarizes network security concepts across three layers: infrastructure, services, and applications. It describes vulnerabilities at each layer, including IP spoofing, man-in-the-middle attacks, and session hijacking at the internet layer. The document also outlines eight security dimensions that address network vulnerabilities, such as access control, authentication, and data integrity.

Uploaded by

Nasis Dereje
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views30 pages

Chapter 5 S

The document summarizes network security concepts across three layers: infrastructure, services, and applications. It describes vulnerabilities at each layer, including IP spoofing, man-in-the-middle attacks, and session hijacking at the internet layer. The document also outlines eight security dimensions that address network vulnerabilities, such as access control, authentication, and data integrity.

Uploaded by

Nasis Dereje
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

Chapter Five

Network Security Management

Fundamental of SOftware Security


(SE7431)

Compiled by Alemu w., ([email protected]) , 10 M ay 2015 EC


Introduction
The security architecture addresses three essential issues:
1. What kind of protection is needed and against what threats?
2. What are the distinct types of network equipment and facility groupings that need
to be protected?
3. What are the distinct types of network activities that need to be protected?

Security Layers
Security Layers represents hierarchical approach to securing a network
Mapping of the network equipment and facility groupings to Security Layers
Determining how the network elements in upper layers can rely on protection that the
lower layers provide.

2
Threat Model (simplified)
1Threat
- Destruction
Models:(an attack on availability):
– Destruction of information and/or network resources
X
2 - Corruption (an attack on integrity):
– Unauthorized tampering with an asset

3 - Removal (an attack on availability):


– Theft, removal or loss of information and/or other resources

4 - Disclosure (an attack on confidentiality):


– Unauthorized access to an asset

5 - Interruption (an attack on availability):


– Interruption of services. Network becomes unavailable or
unusable X
3
• Limit & control access to Eight Security Dimensions Address
network elements, services the Breadth of NetworkVulnerabilities • Provide Proof of Identity
& applications • Examples: shared secret,
• Examples: password, ACL, PKI, digital signature,
Access Control digital certificate
firewall
• Prevent ability to deny that Authentication • Ensure confidentiality of data
an activity on the network • Example: Encryption
occurred
Data Confidentiality
• Examples: system logs, • Ensure data is received as
digital signatures sent or retrieved as stored
Non-repudiation
• Ensure information only • Examples: MD5, digital
flows from source to signature, anti-virus
destination Data Integrity software
• Examples: VPN, MPLS,
L2TP Communication Security • Ensure identification and
network use is kept
• Ensure network elements,
Availability private
services and application
• Example: NAT, Encryption
available to legitimate users
• Examples: IDS/IPS, network Privacy
redundancy, BC/DR
4 Each Security Dimensions applied to each Security Perspective (layer and plane)
Three Security Layers 3 - Applications Security Layer:
• Network-based applications accessed by
 end-users
Vulnerabilities • Examples:
– Web browsing
Threats – Directory assistance
– Email and E-commerce
Attacks 2 - Services Security Layer:
• Services Provided to End-Users
 Destruction
 Corruption
• Examples:
 Removal – Frame Relay, ATM, IP
 Disclosure – Cellular,Wi-Fi,
 Disclosure
 Interruption
– VoIP, QoS, IM, Location services
– Toll free call services
1 - Infrastructure Security Layer:
• Fundamental building blocks of networks services and applications
• Examples:
– Individual routers, switches, servers
5 – Point-to-point WAN links and Ethernet links
Cont.…
 Infrastructure Security Layer

 Individual routers, servers


 Communication links

 Services Security Layer

 Basic IP transport
 IP support services (e.g., AAA, DNS, DHCP)
 Value-added services: (e.g., VPN, VoIP, QoS)

 Applications Security Layer

 Basic applications (e.g. FTP, web access)


 Fundamental applications (e.g., email)
 High-end applications (e.g., e-commerce, e-training)
6
Reviewing the TCP/IP Communications Flow
When a user at a computer wants to access a Web page:
Starts a Web browser application and types the name of the Web site
 The web browser application generates a request to have the Web site name resolved
to an IP address.
The browser then attempts to establish communications with that Web site.

When application data is sent from one computer to another:


The information is passed from the Application layer to the Transport layer.
The Transport layer protocols:
Considers the Application layer information as the payload (or data)
Create a header that contains information such as source and destination port

Information is passed to the Internet layer.


7
Cont.…
The Internet layer protocols:
Considers the Transport layer information as the payload
Create an IP header that contains information such as destination IP addresses
Information is passed to the Network Interface layer.

The Network Interface layer protocols:


Consider the Internet layer information as the payload
Creates a preamble and a frame header, which contains the source and destination
MAC addresses
Once it arrives, and trailer information, called a checksum that contains the count of
the number of bits in a transmission so that the receiver can ensure the packet did
not get damaged in transit.

8 The information is placed on the local network.


Cont.….
At Distension Point when the information reaches the destination computer :
The Network Interface layer protocols strip the preamble and checksum from the
packets and then pass the payload to the Internet layer.
The Internet layer protocols strip the IP header from the packet and pass the payload
to the Transport layer.
The Transport layer protocol strips the TCP or UDP header and passes the payload to
the Application layer.
The application that is specified to manage that data receives the data.

9
TCP/IP Layers andVulnerabilities
Identifying Possible Application Layer Attacks
Some of the most difficult to protect against because they take advantage of
vulnerabilities in applications and lack of end-user knowledge of computer security.
Some of the ways the Application layer can be exploited to compromise the CIA triad
include the following:
E-mail application exploits:
Attachments
Embedded malicious code in Hypertext Markup Language (HTML) formatted
messages.
Web browser exploits:
FTP client exploits:
10
Cont.…
Identifying Possible Transport Layer Attacks
Either a UDP or TCP header is added to the message
 The application that is requesting the service determines what protocol will be used.
Some of the ways the Transport layer can be exploited to compromise the C-I-A triad
include the following:
Manipulation of the UDP or TCP ports.
DoS
Session hijacking
This attack occurs after a source and destination computer have established a
communications link.
A third computer disables the ability of one the computers to communicate, and
then imitates that computer.
11
Cont.…
Identifying Possible Internet Layer Attacks
IP datagrams are formed

The packet is comprised of two areas: The header and the payload
Some of the ways the Internet layer can be exploited to compromise the C-I-A triad
include the following:
IP address spoofing
If the IP header fields and lengths are known, the IP address in the IP datagram can
be easily discovered and spoofed. Any security mechanism based on the source IP
address is vulnerable to this attack
Man-in-the-middle attacks
A hacker places himself between the source and destination computer in such a
way that neither notices his or her existence.
12
Meanwhile, the attacker can modify packets or simply view their contents.
Cont.…
DoS
Corrupting packets
If the packet is intercepted, the information in the header can be modified,
corrupting the IP datagram.
It could change the protocols and payload information in the datagram
At the Network Interface layer, the packet of information that is placed on the
wire is known as a frame.
The packet is comprised of three areas:
The header, the payload, and the FCS
Because the Network Interface layer is used for communications on a local
network, the attacks that occur at this level would be carried out on local
networks.
13
Cont.…
Identifying Possible Network Layer Attacks
MAC address spoofing
Attackers can easily spoof the MAC address of another computer.
Any security mechanism based on MAC addresses is vulnerable to this attack.
Denial of service (DoS)
ARP cache poisoning
The ARP(Address Resolution Protocol), a TCP/IP protocol for determining the
hardware address (or physical address) of a node on a local area network connected
to the Internet cache stores MAC (Media Access Control)
If incorrect, or spoofed, entries were added to the ARP cache, then the computer
is not able to send information to the correct destination

14
Chapter Six
Viruses and Related Threats

Information Security
(SE3052)

Compiled by Alemu w., ([email protected]) , 13 January 2016


Introduction
 The security of the data and information contained on computers and digital devices

today is threatened by more different types of attacks than ever before, and the threats
and attacks are escalating on a daily basis.

 Successful attacks on computers today generally consist of two elements.

 Malicious software programs: created by attackers to silently infiltrate computers

with the intent to do harm.


 Tricking users into performing a compromising action or providing sensitive

information.

 Who Are the Attackers?

 Black hat hackers: were those attackers who violated computer security for personal

gain (such as to steal credit card numbers) or to inflict malicious damage (corrupt a
hard drive).
16
Cont.…
 White hat hackers: were described as “ethical attackers”: with an organization’s

permission they would attempt to probe a system for any weaknesses and then
privately provide information back to that organization about any uncovered
vulnerabilities.
 Gray hat hackers: who would attempt to break into a computer system without the

organization’s permission (an illegal activity) but not for their own advantage;
instead, they would publically disclose the vulnerability in order to shame the
organization into taking action.

 However, these “hat” titles did not always accurately reflect the different motives and

goals of the attackers and are not widely used in the security community.

 Instead, more descriptive categories of attackers are used, including cybercriminals,

script kiddies, brokers, insiders, cyber terrorists, hactivists, and state-sponsored


17
attackers
Attacks and Defenses
 Attacks can be launched against a computer or network, the same basic steps are used

in most attacks.

 *An attacker who attempts to break into a web server or computer network actually

follows these same steps, known as the Cyber Kill Chain:


1. Reconnaissance: Probe for any information about the system.
2. Weaponization: The attacker creates an exploit (like a virus) and packages it into a
deliverable payload (like a Microsoft Excel) that can be used against the target.
3. Delivery: At this step the weapon is transmitted to the target, such as by an email
attachment or through an infected web server.
4. Exploitation: Triggers the intruders’ exploit. Generally the exploitation targets an
application or operating system vulnerability, but it also could involve tricking the
user into taking a specific action.
18
Cont.…
5. Installation: The weapon is installed to either attack the computer or install a
remote “backdoor” so the attacker can access the system.
6. Command and Control: Many times the compromised system connects back to the
attacker so that the system can be remotely controlled by the attacker and receive
future instructions.
7. Actions on Objectives: Now the attackers can start to take actions to achieve their
original objectives, such as stealing user passwords or launching attacks against
other computers. Reconnaissance Installation

Exploitation
Command and
Weaponization
Control

Actions on
19 Delivery
Objectives
Defenses Against Attacks
 Protecting computers against general steps in an attack calls for following five

fundamental security principles.

 These principles provide a foundation for building a secure system.

1. Layering: Layered security provides the most comprehensive protection and


useful in resisting a variety of attacks.
2. Limiting: Limiting access to information reduces the threat against it. This means
that only those personnel who must use the data should have access to it.
3. Diversity: Closely related to layering. Protect data with layers of security, the
layers also must be different (diverse). If attackers penetrate one layer, they
cannot use the same techniques to break through all other layers.
4. Obscurity: Conceal information to make attack more difficult to the attacker.
5. Simplicity: Complex security systems can be hard to understand, troubleshoot,
20
and even feel secure about.
Attacks Using Malware
 Malware is software that enters a computer system without the user’s knowledge or

consent and then performs an unwanted and usually harmful action.

 Strictly speaking, malware uses a threat vector to deliver a malicious “payload” that

performs a harmful function once it is invoked.

 However, malware is most often used as a general term that refers to a wide variety of

damaging software programs.

 In order to detect malware on an infected computer, a software scanning tool can search

for the malware, looking to match it against a known pattern of malware.

 In order to circumvent this detection of their software, attackers can mask the presence of

their malware by having it “mutate” or change.

 Three types of mutating malware are:


 Oligomorphic malware: Changes its internal code to one of a set number of
21
predefined mutations whenever it is executed.
Cont.…
 Polymorphic malware: Malware code that completely changes from its original
form whenever it is executed is known as polymorphic malware.
 Metamorphic malware: Can actually rewrite its own code and thus appears
different each time it is executed. It does this by creating a logical equivalent of its
code whenever it is run.
 Classifying the various types of malware is by using the primary trait that the malware

possesses. These traits are:


 Circulation:

 Its primary trait is spreading rapidly to other systems

 Circulate through a variety of means: by using the network to which all the

devices are connected, through USB flash drives that are shared among users, or
by sending the malware as an email attachment.
 Can be circulated automatically or it may require an action by the user.

22  Virus, Trojan Horse, Worms are some examples


Cont.…
 Infection:

 The malware might run only one time and then store itself in the computer’s

memory, or it might remain on the system and be launched an infinite number of


times through an auto-run feature.
 Some malware attaches itself to a benign program while other malware functions

as a stand-alone process.
 Concealment:

 Its primary trait is avoiding detection by concealing its presence from scanners.

 Polymorphic malware attempts to avoid detection by changing itself, while other

malware can embed itself within existing processes or modify the host OS.
 Payload capabilities:When payload capabilities are the primary focus of malware,
the focus is on what nefarious action(s) the malware performs.
 In some cases the purpose of the malware is to use the infected system to launch
23
attacks against other computers.
Virus Life cycle
1. Dormant phase: the virus is idle. (not all viruses have this stage)

2. Propagation phase: the virus places an identical copy of itself into other programs of

into certain system areas.

3. Triggering phase: the virus activated to perform the function for which it was created.

4. Execution phase: the function is performed, it may be harmless or damaging.

 Types ofVirus:

 Parasitic

 Memory Resident

 Stealth

 Polymorphic

 Bootsector
24
Virus (cont.…)
 How Viruses append themselves to …

 AppendedViruses:- a program virus attaches itself to a program: then, whenever

the program is run, the virus is activated.


 Virus that surround a Program:- an alternative the attachment is a virus runs the

original program but has control before and after its execution.
 IntegratedVirus:- occurs when a virus replaces some program instructions by

integrating itself into the original code of the target.

 High risk virus properties:


 Hard to detect and destroy
 Spread infection widely
 Can re-infect
 Easy to create
 Machine independent
25
Virus (cont.…)
 Virus Signatures:

 Storage pattern: Code always located on a specific address and increased file size

 Execution pattern:

 Transmission pattern:

 Polymorphic Viruses:

 Antivirus Approaches:

1. Detection: Determine infection and locate the virus.

2. Identification: Identify the specific virus.

3. Removal: Remove the virus from all infected systems

4. Recovery: Restore the system to its original state.

26
Firewalls
 Firewalls are an excellent security mechanism to protect networks from intruders

 They can establish a relatively secure barrier between a system and the external

environment.

 Firewall products are available with a variety of functionality and features, such as

strong authentication, the ability to create VPNs, and easy-to-use interfaces.

 Selecting the appropriate firewall for an organization's needs requires careful

consideration of the available types and products.

 Types of Firewalls:

 Packet Filters

 Application-gateway

 Circuit-gateways

27  Hybrid
Cont.…
 Packet Filters:

 The most basic type of firewall

 It receives packets and evaluates them according to a set of rules that are usually in

the form of access control lists.


 These packets may be forwarded to their destinations, dropped, or dropped with a

return message to the originator describing what happened.


 The types of filtering rules vary from one vendor's product to another, but those

most frequently applied are:


 Source and destination IP address (e.g.: All packets from source address 128.44.9.0

through 128.44.9.255 might be accepted, but all other packets might be rejected).
 Source and destination port (e.g.: All TCP packets originating from or destined to port

25—the simple mail transfer protocol, or SMTP, port— might be accepted, but all TCP
28
packets destined for port 79—the finger port—might be dropped).
Cont.…
 Components that make up a firewall:

 The Internet access security policy of the organization: States, at a high level, what

degree of security the organization expects when connecting to the Internet.


 The mapping of the security policy onto technical designs and procedures that are to

be followed when connecting to the Internet.


 The firewall system, which is the hardware and software which implements the

firewall.

 Firewalls have a number of advantages:

 They can stop incoming requests to inherently insecure services

 They can control access to other services.

 They are more cost effective than securing each host on the corporate network

29
 They are more secure than securing each host
Reading Assignment
 Types of Firewalls other than Packet Filters Firewalls
 Architectures and Drawbacks of Firewalls
 Mobile Security
 Wireless Security
 Other Advanced Security Techniques

30

You might also like