Tải bản đầy đủ (.pdf) (99 trang)

Tài liệu Network Security I CSCI 4971 / 6968 doc

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (514.45 KB, 99 trang )

Network Security I
CSCI 4971 / 6968
www cs rpi edu/~yener/TEACHING/Netsec/Spring11/
www
.
cs
.
rpi
.
edu/~yener/TEACHING/Netsec/Spring11/
B
ü
lent Yener
B
ü
lent

Yener

Lecture
1
Lecture
-
1
1/26/11
This presentation is in part based on the slides of W. Stallings
Outline
• Class information
Network security I and II

Network



security

I

and

II
Bk d ditdti

B
ac
k
groun
d
an
d

i
n
t
ro
d
uc
ti
on
• Basic concepts: attacks, services,
mechanisms
2
Aim of the Courses


Our focus is on both
Network
&
Internet
Our

focus

is

on

both

Network
&

Internet

Security and Cryptography

NetSec I is focusing on a cryptography

NetSec

I

is


focusing

on

a

cryptography

and basics
NtS IIbild Nt I
d

N
e
tS
ec
II

b
u
ild
s upon
N
e
t
sec
I
an
d
covers

advance topics.
3
CSCI-4971 and 6968
NkSi
N
etwor
k

S
ecur
i
ty

Basic Cryptography
Basic

Cryptography
• Basic Number Theory

Security Goals
Security

Goals
– Authentication, Privacy, Integrity, Key exchange

Security Solutions
Security

Solutions
– SSL, PGP, SSH, IPSEC


Security Practice
Security

Practice
– E-mail, IP security, Web security, …
• And more: Internet and Network securit
y
issues
4
y
Definitions

Computer Security
-
generic name for
Computer

Security
generic

name

for

the collection of tools designed to protect
data and to thwart hackers
data

and


to

thwart

hackers
• Network Security - measures to protect
data during their transmission
data

during

their

transmission
• Internet Security - measures to protect
dt d i thit i i
d
a
t
a
d
ur
i
ng
th
e
i
r
t

ransm
i
ss
i
on over a
collection of interconnected networks
5
Standards Organizations
Standards

Organizations

National Institute of Standards &

National

Institute

of

Standards

&

Technology (NIST)

Internet Society (ISOC)

Internet


Society

(ISOC)
International Telecommunication Union
Tl i ti St d di ti
T
e
l
ecommun
i
ca
ti
on
St
an
d
ar
di
za
ti
on
Sector (ITU-T)
International Organization for
Standardization (ISO)
Example
XXX bank wants to provide web banking
XXX

bank


wants

to

provide

web

banking

service to its customers. They have
alread
y

p
ro
g
rammed web
p
a
g
es and
yp g p g
applications. Every customer has an id
and password to access their account
if ti
i
n
f
orma

ti
on.
– What are the threats?
Wh t th it h i t t

Wh
a
t
are
th
e secur
it
y mec
h
an
i
sms
t
o preven
t

them?
What are the security services?
7

What

are

the


security

services?
Case Study
Attacker
Banking Server
Bank Customer
Internet
Bank Network
Internet
Web Serve
r
Bank

Network
Dial-up
A
8
A
ccess
Server
Security Attacks

Passive attacks
-
eavesdropping on, or
Passive

attacks

eavesdropping

on,

or

monitoring of, transmissions to:
– obtain message contents, or
– Intercept, or monitor traffic flows
• Active attacks – modification of data stream to:
– masquerade of one entity as some other
– fabricate a message

replay previous messages
– modify messages in transit
denial of service
9

denial

of

service
Threats
Banking Server
Attacker
Bank Customer
Attacker
Bank Network
Bank


Network
carrier
Web Serve
r
Customer
ISP
Bank ISP
10
Internet
Backbone
carrier
carrier
Targets
• Customer computer

DoS
– Malicious codes: Virus, Worms
– Attacker may take control of computer
Ct
WbS i ti

C
us
t
omer

W
e
b


S
erver commun
i
ca
ti
on
– Eavesdropping
– Man-in-the-middle
dif i j t d d l t
•mo
dif
y,
i
n
j
ec
t
an
d

d
e
l
e
t
e messages
– Session hijacking
– DoS: SYN attack


Internet Infrastructure

Internet

Infrastructure
– Eavesdropping
– BGP attacks

Router OS attacks
11

Router

OS

attacks
–DoS
Targets (cont.)
• Web Server

Stack smashin
g
g
– Portable programs
– IP spoofing
– Unsafe Services

Malicious codes: Virus and worms
– DoS: SYN attack, ping flooding
• Bank Network and Servers


Use backdoor to access
– Eavesdropping
– Man-in-the-middle : Web Server to Banking Server
Session hijacking

Session

hijacking
–DoS
– DNS attack

Use unsafe services in other servers
12

Use

unsafe

services

in

other

servers
– Install malicious codes in other servers
Targets (cont.)
• DNS servers
– DNS cache poisoning

– DNS DoS
13
Customer Computer
• Physical security
• Strong passwords
• OS security patches

Application security patches

Application

security

patches
• Unsafe services
– telnet, ftp, nfs
– rpc, remote commands (rlogin, rsh, …)
– dns, web
• Browser confi
g
uration
g
– Not to accept mobile codes automatically
– Selection of strongest crypto algorithms as default

Personnel Firewall
14

Personnel


Firewall
– Not a Swiss cheese! must be carefully configured
• Virus guard and scanners
Customer-Web Server Comm.
• Authentication
– UserID/Password: “you know”
Cli t C tifi t “ i t ”

Cli
en
t

C
er
tifi
ca
t
e:

g
i
ven
t
o you

– Prevent stolen client certificates
• Short life time, not feasible!
• Associate certificate to User ID. Accept a certificate if:
– It is valid
» Check authority

»
Check expiration date
»
Check

expiration

date
» Check black list (certificate revoke list)
» Has user correctly proven his knowledge of the private key
associated with the certificate
User entered matching user ID (stored in certificate) and

User

entered

matching

user

ID

(stored

in

certificate)

and


correct password
– Server certificate

Generate one time session key (we do not want to
15
Generate

one

time

session

key

(we

do

not

want

to

use our password or private key to provide
confidentiality!)
Customer-Web Server Comm.


Confidentiality & Integrity
Confidentiality

&

Integrity
– Key exchange

Authenticated must be part of the authentication

Authenticated
,
must

be

part

of

the

authentication

process
• One time for life time of a session
– Strong crypto algorithms

Access


co
n
t
r
o
l
at

custo
m
e
r
a
n
d

ba
nk
s
i
de
ccess co t o at custo e a d ba s de
16
Customer-Web Server Comm.
Client
Server
Hello
Server Certificate
Client Certificate
Proof : Server Certificate

Proof: Client Certificate
Secret key exchange
Secret

key

exchange
Communication with
Confidentiality & Integrity with the secret
Looks like SSL!
17
SSL

What is SSL?
What

is

SSL?
– Secure Sockets Layer
Provides secure communication between you

Provides

secure

communication

between


you

and the server

How do you know that it is active:

How

do

you

know

that

it

is

active:
• The lock shown by your browser

When the lock is close or unbroken
• Web address starting with HTTPS
18
Model for Network Security
19
Model for Network Security


Using this model requires us to:
Using

this

model

requires

us

to:

– design a suitable algorithm for the security
transformation
– generate the secret information (keys) used
by the algorithm

develop methods to distribute and share the
secret information
specify
protocols
enabling the principals to

specify

protocols
enabling

the


principals

to

use the transformation and secret information
for a securit
y
service
20
y
Model for Network Access Security
21
Model for Network Access Security

Using this model requires us to:
Using

this

model

requires

us

to:

– select appropriate gatekeeper functions to
identify users

identify

users

– implement security controls to ensure only
authorised users access designated
authorised

users

access

designated

information or resources

Trusted computer systems can be used to
Trusted

computer

systems

can

be

used

to


implement this model
22
How SSL Works?

How SSL works?
How

SSL

works?
– Authentication:

Uses Digital certificates

Uses

Digital

certificates

– Privacy

Encrypts the data
Encrypts

the

data


– Integrity

Generates a digest from the data
Generates

a

digest

from

the

data
23
SSL - Authentication

Your browser authenticates the web server just
Your

browser

authenticates

the

web

server


just

like a bank teller authenticates you!
– They both ask for an ID
• Bank teller asks you to show a picture ID (Driver’s License,
Passport)
•Y
ou
r
b
r
o
w
se
r
as
k
s

a

ce
r
t
ifi
cate

ou b o se as s a ce t cate
– They both trust the issuer of ID
• Bank teller trusts Department of Motor Vehicle

DMV h k bi h ifi i h li

DMV
c
h
ec
k
s
bi
rt
h
cert
ifi
cate to
i
ssue t
h
e
li
cense
• Your browser trusts certificate authorities
– VeriSign, Entrust, Entrust, RSA, AOL
24
SSL – Authentication (cont…)

They both validate the ID
They

both


validate

the

ID
• Bank teller checks whether it is a real ID:
– Is it like a real license of the NY DMV?
– Does picture and name match?
– Expiration date?

Your browser checks whether it is a real certificate:
Your

browser

checks

whether

it

is

a

real

certificate:
– Is it like a real certificate of the certificate authority under
consideration?

Does ID Name and/or other information match?

Does

ID
,
Name

and/or

other

information

match?
– Expiration date?
25

×