1 / 51

NETWORK SECURITY

NETWORK SECURITY. Source: Wired. Computer and Network Attack Taxonomy. Time. Source: Dissertation of John D. Howard, CMU, 1997. Group Task. Get together on groups of 3-5 people Discuss an attack that one of your group members have experienced or heard about

ida
Télécharger la présentation

NETWORK SECURITY

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. NETWORK SECURITY Source: Wired

  2. Computer and Network Attack Taxonomy Time Source: Dissertation of John D. Howard, CMU, 1997

  3. Group Task • Get together on groups of 3-5 people • Discuss an attack that one of your group members have experienced or heard about • For that attack, mark within which cells the attack belongs • Five minutes

  4. Securing Resources

  5. Threats to Security • Physical security • Access Security • Unauthorized access into a computer • Tapping into a data communications line • Personnel • Misuse by authorized personnel • Natural Disaster • Computer Viruses, Worms, Logic Bombs. • Denial of Service Attacks

  6. Security concepts/terminology Need to address following issues: • Secrecy/Privacy: guarantee that information given will not be misused • Authenticity: data provided to user must be authentic (i.e., is it really coming from X?) • Integrity: data stored in system must not be corrupted. • Non-repudiation: A mechanism which prevents a user from denying a legitimate, billable charge.

  7. Phishing

  8. Which one would YOU trust?

  9. User Identification and Authorization • Passwords • kept in encrypted file • should be changed frequently • automatic expiration • Ultra-sensitive applications • layered IDs (passwords at several levels) • user profiles (restrictions on who can do what) • access levels (read, write, execute, purge) • combining menus and user profiles (let user see only those options available to her)

  10. Time and Location Restrictions • Establish time intervals during which transaction is allowed • Certain transactions can run only from certain locations • attach applications to terminals • maintain terminal profile • Additional precautions on switched ports with dial-in access • call-back unit • restricted hours • safeguard telephone numbers • manual authentication in high security installations

  11. Other Methods • Recognizing unauthorized access attempts • after 3 failed attempts disallow log-in for 5 minutes • permit fake log-in after several failed attempts • Automatic log-off • log off anybody with no activity for 10 minutes • authentication for every transaction • Transaction logs • every log-in is logged (date, time user id, unsuccessful attempts, terminal id, location) No method is foolproof. These are delaying tactics.

  12. Securing Communications Setting: Europe Time: 1940-45 How?

  13. Data Encryption • Symmetric Key Cryptography • Data encryption standard (DES), Bureau of standards (based on symmetric key) • 56-bit encryption key (now available in longer keys) • uses 16 iterations of rearrangement and substitution combinations • Its 72-quadrillion combinations were broken in 1997 by a group using distributed computing (14,000 computers) – lead by Colorado programmer Rocke Verser • Public Key cryptography • (the other approach, covered later)

  14. 31798603996994715581310583186337934867429744958612

  15. 1 Billion How much is? 30 bits (9 zeros) Source: http://www.kokogiak.com/ megapenny/default.asp

  16. 10 Billion How much is? 40 bits (12 zeros)

  17. 1 Quadrillion How much is? 50 bits (15 zeros)

  18. 1 Quintillion How much is? 60 bits (18 zeros)

  19. 1 Octillion How much is? 128 bits (38 zeros) Previous collection (enlarged for your benefit)

  20. How much is? Number of pennies that can fit inside the Universe 300 bits (90 zeros) Thanks to Alexander Voronovich for help with calculation

  21. “RSA Laboratories currently recommends key sizes of 1024 bits for corporate use and 2048 bits for extremely valuable keys like the root key pair used by a certifying authority “ 2048 bits (616 zeros) Source: http://www.rsasecurity.com/rsalabs/node.asp?id=2218 Downloaded 04/06/06

  22. Symmetric Key Encryption Encrypted message: DSPEZHKE

  23. Data encryption based on symmetric key(A very old method) • Divide plain text into groups of 8 characters. Pad with blanks at end (if necessary) • Select an 8-character key • Rearrange plain text by interchanging adjacent characters (first with second, third with fourth) • Translate each character into a number (A-1, B-2, C-3, ....., Z-26, blank-0) • Add the numbers of the key (Step 2) to the results of above step.

  24. Data encryption based on symmetric key(contd.) • Divide each sum by 27 and keep remainder • Translate remainder back into character to yield the cipher text. At the receiving end • Perform the reverse operation (i.e., the same set of steps in reverse order) to restore the original text.

  25. Example • DATA _COM • ADATC_MO rearrange characters • 01 04 01 20 03 00 13 15 translate 16 18 15 20 15 03 15 12 key vals. 17 22 16 40 18 03 28 27 sum 17 22 16 13 18 03 01 00 mod 27 • Q V P M R C A _ result

  26. GOT IT! (That was easy) Access Equipment PAP: Direct Password (Password authentication protocol) “It’s me, and here’s my PASSWORD.” Carrier Services Remote LAN Access Server LAN • Simple password access • Vulnerable to snooping (Source: Ascend Corp)

  27. 1. “It’s me, Luigi” 3. “Here’s my password encrypted into your challenge: XYQWZY.” 2. “Here’s your unique challenge Luigi” 3 2 Access Equipment Remote LAN Access Server LAN CHAP: Secured Password Exchange (Challenge authentication protocol) ? Carrier Services • Uses challenge-based encrypted password • Makes snooping much less effective (Source: Ascend Corp)

  28. 2. User enters PIN and challenge into token 1. Challenge received from central site Challenge: XYZ123 Enter password: 4. user enters password at prompt 5. Password sent to central site Token 3. Token device generates one- time password password Token Device • Several types of token systems • Token generates exclusive one-time password • Requires possession of token device and PIN Source: Ascend Corp.

  29. Public Key Cryptography(A brilliant idea proposed in 1976)

  30. Generating Keys Public Key Private Key

  31. Example Public Key: -----BEGIN PGP PUBLIC KEY BLOCK----- Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com> mQGiBDvxSuQRBADwvXMXRZB+lJpzja9Dc3LVjxORM5tWsrPfQdVca2ATYXuFlq/d WdQzyvtc02e4RpTBeeA/X3UCtAhDxKN1QxB08qosV0tQ4XLmwcbazBsZySJQRv2S 0CygJiNltxZgCk4KVciZHQzXW3OU8U+KU7fTsUHkw9qhu1dFcXoVyqj1PQCg/5+u 8zconmVM7z0ivM9y0us9zocD/j5/G+2/tb6b3n3S9KIEo7fTLXytsIp2bN53Kmxx DnIFhXTIb0i3k7JvvQi7v7akPbdrRrNmc+49hYZsYzTIjLDoSzz/A516Rjpp3u/8 7DHZJp3XL60QRfVAYzUeq62PweBgEKcBBaHAe7ylS7ozqENdXe2l6X8sNJjoLmbJ oiqSBADEEt4GRI5/jB5m9QyDBv6h2yTn/J3Ofb6YXc6jlGdUMfCtJtE83EYxetJW qb306epyns6DhbjyR0wdOp9bkt4gOOnDjx01Jcs4ZxaV73daLdnETxOWdTj6aNw5 W+B4xnGBDd6pb2GFx37a29WtlciKqfCPq37gpYOH4tmpzrvP47QqS2FpIFIuIFQu IExhcnNlbiA8a2FpLmxhcnNlbkBjb2xvcmFkby5lZHU+iQBYBBARAgAYBQI78Urk CAsDCQgHAgEKAhkBBRsDAAAAAAoJEOKthI8QozYkJf4An0dsntidqj/NcjtcQQwU 03ehxQDoAJ9+ktKDWo8s4OpVr2q4ZFXIqm8yerkCDQQ78UrkEAgA9kJXtwh/CBdy orrWqULzBej5UxE5T7bxbrlLOCDaAadWoxTpj0BV89AHxstDqZSt90xkhkn4DIO9 ZekX1KHTUPj1WV/cdlJPPT2N286Z4VeSWc39uK50T8X8dryDxUcwYc58yWb/Ffm7 /ZFexwGq01uejaClcjrUGvC/RgBYK+X0iP1YTknbzSC0neSRBzZrM2w4DUUdD3yI sxx8Wy2O9vPJI8BD8KVbGI2Ou1WMuF040zT9fBdXQ6MdGGzeMyEstSr/POGxKUAY EY18hKcKctaGxAMZyAcpesqVDNmWn6vQClCbAkbTCD1mpF1Bn5x8vYlLIhkmuqui XsNV6TILOwACAgf8DeWZPsTT1hmXuDLNgq6ga2m3XDkyrn0+D8Xo99GsK6K+cw40 phiat4XpjgrR9rWxV9F4lfdbp5TZgKrOjvkQ3LRUZW3joL8iuUgWxednC/ZS2hQa YWgDUPSw1u76JbgocbwWyjMj/1Q/iehAZcMicPulPo4vugTuOdEUNHAyhhxCDJSC TofJ0nvj5qOwdL+iNU/73xrrckt5QPTnn3Y9mYm3cFYnG2XhU+p2PIzk8US0eUXL dhFVWVQRRa1Jtsk5gOYLPB0H34DjT5CJ7a4ujy4wzR83Mxh1/mmzjVD6Q+qiIbUw 8QJiXBcinwpf9B8/8LfC0eFEHTDU9QmeVDJIy4kATAQYEQIADAUCO/FK5AUbDAAA AAAKCRDirYSPEKM2JAgBAJ4wmc/dZOl7QCYiTHDM9nScqqymLgCg8/eca5JDodSE UqaAm5zi2diYK+s= =w3hs -----END PGP PUBLIC KEY BLOCK----- Private key looks similar, but with different information

  32. Central Repository of Public Keys

  33. Public Keyhole Private Keyhole Imagine a chest with two locks …now Imagine that you have the ability to generate such chests at will, and that they all react the same way to the keys belonging to it…as long as you have ONE key (either public or private, you can generate the chest…)

  34. Download Billy-Bob’s Public Key Billy-Bob opens chest using his secret key Central Repository of Public Keys Send chest with secret text to Billy-Bob Generate chest using B-B’s Public Key + insert secret text! So, you want to send a secret text to your friend, Billy-Bob? You Billy-Bob

  35. Public Key Cryptography • Sender encrypts message M into E(M) by applying public key or encryption key (E) of receiver • Receiver decrypts E(M) by applying her private key or decryption key (D): i.e, D(E(M)) = M Based on one-way (or trap door) functions which are easy to compute in one direction but not in the other. • E: Encryption or public key • D: Decryption or private key

  36. Billy-Bob downloads YOUR public key Billy-Bob tries YOUR public key in the lock of the chest – if the chest opens, it can only be from YOU! Insert your chest inside “his” chest! Billy-Bob opens chest using his secret key Central Repository of Public Keys Generate another chest using B-B’s public Key Send chest(s) to Billy-Bob But how do you prove to your friend, Billy-Bob that you are YOU? (you already have his public key) Use your own Private Key to generate an empty chest You Billy-Bob

  37. Electronic signatures(Another brilliant idea!) • How do you convince your bank that you are indeed the sender of a message? • Say Alice (A) is sending message to Bank (B): • Alice applies her decryption key • Alice applies bank’s encryption key • Sends message to bank • Bank applies its decryption key first : • Bank applies Alice’s encryption key • Based on the idea that keys are commutative, ie.

  38. PGP (Pretty Good Privacy)(a.k.a. Phil’s pretty good software)http://www.pgp.com • Software written by Phil Zimmerman (of Boulder fame!) • Implements public key cryptography • Available in public domain (on most Unix systems) • Basic commands • pgp -h (for help) • pgp -kg (to create your key) • pgp -e text_file her_user_id (to encrypt with recipient’s public key) • pgp ciphertextfile (to decrypt ciphertextfile) • pgp -ka keyfile ( to add contents of a key file to your key ring)

  39. Aircraft Downing in China • “The airplane is basically a really big flying tape recorder” • “Virtually anything transmitted through the air would be within reach” • “…dozens of sensitive antennae pick up signals from radar, radio, cell phones, perhaps even e-mail” Source: The Daily Camera, April 4th, 2001 EP-3E Source: NYT, April 4th, 2001

  40. FIREWALLS INTERNET A firewall is a mechanism used to protect a trusted network from an untrusted network. It implements the site's security policy and is the single point in your network through which all communications between the trusted and untrusted network must pass.

  41. Packet Filtering Firewalls -- Incorporate packet filters in the router software -- Reject/accept packets based on rules Filter Action Internal Port External Port Comment Rule Host Host 1 block * * HACKER * deny access to 2 allow Mail 25 * * connect to mail gateway -- Generally anything not expressly permitted is prohibited.

  42. Application-Level Gateways (or Proxy Servers) -- Use software applications to filter traffic for various services. -- Program acts like a gateway (or proxy server), and -- Logs traffic and forwards only the legitimate traffic. -- Do not need rules as with packet level filters, but -- Need a specialized program for each service (e.g. mail proxy, http proxy, etc.). -- Operates at higher layer of OSI protocol. -- Weakness:Runs on top of OS and subject to holes in OS.

  43. Internet Security Protocols S-MIME: Secure Multipurpose Internet Mail Extensions. SSL: Secure Socket Layer. SSL is a protocol for transmitting encrypted data over TCP/IP networks. S-HTTP: Secure HTTP. Security extension to HTTP to protect individual transaction requests and responses. SET: Secure Electronic Transaction. Developed by Visa and MasterCard to support bank card payments involving multiple parties (card holder, merchant, acquirer, issuer).

  44. Secure Web Transactions Symmetric algorithms are faster than public key algorithms, but public key algorithms are required to maintain privacy during the exchange of the faster symmetric keys. To preserve both efficiency and privacy, secure Web transactions begin with a public key exchange, followed by the exchange of a session key that follows a faster, symmetric algorithm.

  45. Digital Certificate Is the cyberspace equivalent of a driver’s license. Way of authenticating yourself to other party. • SSL authentication is done by X.509 certificates. • Certificates are issued by certification authorities (CAs), e.g. Verisign, GTE Cybertrust,etc., which act as trusted third parties. • Each certificate contains: • information about the certificate's format. • a unique serial number. • information about the algorithm used to sign the certificate. • the name of the CA which issued the certificate. • the validity period of the certificate. • identifying information about the "subject," or the entity to whom the • certificate belongs,the subject's public key, and the issuer’s signature.

  46. 4. Card Issuer authorizes transaction 9. Customer gets monthly bill 3. Bank checks card 2. Bank decrypts authorization and checks signature 7. Merchant asks to “capture” transaction and get money 5. Bank authorizes transaction 8. Merchant gets paid • Customer Initiates transaction with Order-form + Signed + Encrypted authorization 6. Customer gets goods + receipt How SECURE ELECTRONIC TRANSACTIONS (SET) WORK Card Issuer Acquiring Bank Customer Merchant

  47. Problems with Encryption • The Battle of Leyte Gulf (October 23-26 1944) • American navy forces split into two, each steaming to meet separate Japanese forces (located far away from each other) • Task Force 38 and Task Force 34 (commanded by Admiral Halsey) • Admiral Nimitz (in Pearl Harbor) was wondering about Task Force 34’s position, sent message: “Where is Task Force 34?” • Cryptographer stuffed message, and sent it as: • “Turkey trots to water XX Where repeat where is Task Force 34 XX The world wonders.” • Halsey’s cryptographer, forgetting to remove all the stuffing, sent the following message to the bridge: • “Where repeat where is Task Force 34 XX The world wonders.”

  48. Tennyson’s The Charge of the Light Brigade Half a league, half a league, Half a league onward,All in the valley of Death Rode the six hundred."Forward, the Light Brigade!"Charge for the guns!" he said:Into the valley of Death Rode the six hundred.

  49. Tennyson’s The Charge of the Light Brigade Flash'd all their sabres bare,Flash'd as they turn'd in air,Sabring the gunners there,Charging an army, while All the world wonder'd:… Then they rode back, but not Not the six hundred.

  50. Key Security Points • High-level security consists of multiple system components: • User identification • Access verification • Security administration • Combine multiple security mechanisms for desired level of • security • Both dial-up security and backbone security are important. • Individual responsibility is essential! Source: Ascend Corp.

More Related