Introduction to Network Security
1
What is Network Security?
Network Security measures to protect
data during their transmission over a
network or internet.
Internet Security
2
Aspects of Network Security
ITU-T Recommendation X.800 Security
Architecture for OSI describes network
security in three aspects:
security attack
security service
security mechanism
3
Security Attack
Attack: any action that compromises the security
of information
Many different types of attacks
Can be generally classified as
Passive attacks
Active attacks
4
Passive Attacks
Reading contents of messages
Also called eavesdropping
Difficult to detect passive attacks
Defense: to prevent their success
5
Passive Attacks (cont..)
6
Active Attacks
Modification or creation of messages (by attackers)
Four categories: modification of messages, replay,
masquerade, denial of service
Easy to detect but difficult to prevent
Defense: detect attacks and recover from damages
7
8
9
10
11
Security Services (Goals)
Data Confidentiality: protecting data
from unauthorized disclosure.
Data Integrity:
assuring that data received is as sent
(w/o modification)
or detecting its non-integrity.
12
Authentication:
(from dictionary: the action of confirming
someone or something as authentic.)
(Peer) entity authentication: When
establishing a logical connection, assure
that the other party is as claimed.
Data origin authentication: In a
connectionless transfer, assure that the
source of received data is as claimed.
13
Message Authentication
Data origin authentication
Data integrity
Entity Identification
Entity authentication
14
Non-Repudiation:
Origin non-repudiation: preventing
sender from denying that he has sent a
message
Destination non-repudiation: preventing
receiver from denying that she has
received a message
15
Access Control: preventing
unauthorized use of a resource.
Availability: making systems or resources
available upon demand by legitimate
users.
16
Security Mechanisms
Means to implement security services:
Encryption
Symmetric-key encryption
Public-key encryption
Key management
Hash functions
Message authentication codes
Digital signatures
Entity authentication protocols
17