@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013.

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
OSI Model OSI MODEL.
OSI Model OSI LAYER / MODEL.
Cryptography and Network Security Chapter 1
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
1 Fall 2005 Internetworking: Concepts, Architecture and TCP/IP Layering Qutaibah Malluhi CSE Department Qatar University.
Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not.
CSIT435 Spring 2001 Final Examination Study Guide.
Securing TCP/IP Chapter 6. Introduction to Transmission Control Protocol/Internet Protocol (TCP/IP) TCP/IP comprises a suite of four protocols The protocols.
EE 4272Spring, 2003 Protocols & Architecture A Protocol Architecture is the layered structure of hardware & software that supports the exchange of data.
Applied Cryptography for Network Security
Introduction CS-480b Dick Steflik. X.800 – OSI Security Services Security Service – a service provided by a protocol layer of communicating open systems,
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Bazara Barry1 Security on Networks and Information Systems Bazara I. A. Barry Department of Computer Science – University of Khartoum
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
OIS Model TCP/IP Model.
Lecturer: Tamanna Haque Nipa
Fundamentals of Computer Networks ECE 478/578 Lecture #2 Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University of Arizona.
Review security basic concepts IT 352 : Lecture 2- part1 Najwa AlGhamdi, MSc – 2012 /1433.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security Chapter 1
Chapter 2 Network Models
What is a Protocol A set of definitions and rules defining the method by which data is transferred between two or more entities or systems. The key elements.
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Network Security Essentials Chapter 1
SEED Infotech Pvt. Ltd. 1 Networking in Java. SEED Infotech Pvt. Ltd. 2 Objectives of This Session Describe issues related to any type of network using.
Network Security Essentials Chapter 1 Fourth Edition by William Stallings (Based on Lecture slides by Lawrie Brown)
Network Security Essentials Chapter 1
Chapter 1. Introduction. By Sanghyun Ahn, Deot. Of Computer Science and Statistics, University of Seoul A Brief Networking History §Internet – started.
The OSI Model.
Chapter 1 Overview. The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not on.
Network Security David Lazăr.
Chapter 9 Networking & Distributed Security. csci5233 computer security & integrity (Chap. 9) 2 Outline Overview of Networking Threats Wiretapping, impersonation,
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Renesas Electronics America Inc. © 2010 Renesas Electronics America Inc. All rights reserved. Overview of Ethernet Networking A Rev /31/2011.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
TCP/IP Protocol Suite Suresh Kr Sharma 1 The OSI Model and the TCP/IP Protocol Suite Established in 1947, the International Standards Organization (ISO)
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
@Yuan Xue CS 285 Network Security Fall 2012 Yuan Xue.
@Yuan Xue CS 285 Network Security Key Distribution and Management Yuan Xue Fall 2012.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their original slides that accompany the.
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
Computer Engineering and Networks, College of Engineering, Majmaah University Protocols OSI reference MODEL TCp /ip model Mohammed Saleem Bhat
Cryptography and Network Security
Networking Using the OSI Model.
A quick intro to networking
Information System and Network Security
Information Security.
Cryptography and Network Security
OSI Model The Seven Layers
Cryptography and Network Security
Network Basics and Architectures Neil Tang 09/05/2008
Presentation transcript:

@Yuan Xue CS 285 Network Security Placement of Security Function and Security Service Yuan Xue Fall 2013

@Yuan Xue Outline Review of Network Architecture Weakness at different layers Placement of Security Function Security function  encryption + message authentication Security Service and Mechanism

@Yuan Xue In A Nutshell KDC-based Decentralized Secret Key Distribution Message Encryption Message Authentication Public-key-based RSA, Diffei-Hellman Public-key-based RSA, Diffei-Hellman Announcement Directory Certificate Public-key management Session Keys Public Keys Decentralized (Web of Trust) Decentralized (Web of Trust)

@Yuan Xue Let’s first review the computer network architecture… Where Should We Implement The Security Functions?

@Yuan Xue Our Goal Suppose you are building a computer network. What technologies would serve as the underlying building blocks what kind of software architecture would you design to integrate these building blocks into an effective communication service what would be the weaknesses in the design that may be exploited by attackers

@Yuan Xue Direct Link Network Point-to-point network Encoding Framing Error detection

@Yuan Xue Multiple Access Network Media Access Control Protocol When the link is shared by multiple hosts, their accesses to the link need mediation. Ethernet -- CSMA/CD (Carrier Sense Multiple Access / Collision Detection)

@Yuan Xue Where the functions are implemented? Network adaptor encoding, framing, error detection, and media access control. MAC Address In Ethernet, each adaptor has a unique Ethernet address, which is also the MAC address of the corresponding host.

@Yuan Xue Where the functions are implemented? Packet reception Each frame transmitted on an Ethernet is received by every adaptor connected to that Ethernet. Each adaptor recognizes those frames addressed to its own address, and passes only those frames to the host. An adaptor can also be programmed to run in promiscuous mode, in which case it delivers all received frames to the host.

@Yuan Xue Where does the security issue come from? Frequency jamming Eavesdropping (e.g., packet sniffing) MAC address spoofing Etc. …

@Yuan Xue From Direct Link Network To InterNetworking

@Yuan Xue InterNetworking Issues Heterogeneity Scale Solution Internet Protocol (IP) is the key tool to build scalable, heterogeneous internetworks. Functions Fragmentation and Reassembly Addressing Routing and Forwarding

@Yuan Xue Addressing providing suitable identifiers for all these hosts in internetworks. Hierarchical addresses a network part + a host part. Address classes flexibility, allowing networks of vastly different sizes to be accommodated fairly efficiently.

@Yuan Xue Routing and Forwarding Forwarding

@Yuan Xue Routing and Forwarding Routing Distance vector Link state

@Yuan Xue Internet Routing Internet is organized into autonomous systems provide hierarchically aggregate routing information in a large internetwork to improve scalability. intra-domain routing within a single autonomous system  RIP and OSPF are used for intra-domain routing inter-domain routing between autonomous systems.  BGP (Border Gateway Protocol) is the routing protocol used in Internet for inter-domain routing.

@Yuan Xue More Security Issues IP spoofing Authentication of routing messages Etc …

@Yuan Xue End-to-End Protocols Problem turn this host-to-host packet delivery service into a communication channel between application processes. End-to-end protocols of Internet UDP and TCP Connectionless vs. Connection-oriented protocol More on TCP  Connection establishment  Reliable transmission  Congestion control

@Yuan Xue Security Issues Port scanning TCP SYN flooding TCP sequence number prediction Etc …

@Yuan Xue Network Architecture

@Yuan Xue Placement of Security Function What to encrypt/protect Message format Where the security function should be located? Network stack Link vs. End-to-end Where each layer is located and how it may get attacked Aspects to consider Message security (which fields in the packet are protected) Number of keys required Number of encryption/decryptions Transparency to users/end hosts

@Yuan Xue Link vs. End-to-End Encryption

@Yuan Xue Message format

@Yuan Xue Security Architecture, Service and Mechanism

@Yuan Xue OSI Security Architecture ITU-T X.800 “Security Architecture for OSI” Defines a systematic way of defining and providing security requirements Provides a useful abstract overview of the security concepts

@Yuan Xue Security Services (X.800) Authentication - assurance that the communicating entity is the one claimed Peer authentication Data origin authentication Access Control - prevention of the unauthorized use of a resource Data Confidentiality –protection of data from unauthorized disclosure Connection/connectionless/selective field/traffic flow Data Integrity - assurance that data received is as sent by an authorized entity  Connection/connectionless/selective field/with or without recovery Non-Repudiation - protection against denial by one of the parties in a communication Source/destination Refer to table 1.2 in [WS]

@Yuan Xue Security Mechanisms (X.800) Specific security mechanisms: encipherment, digital signatures, access controls, data integrity, authentication exchange, traffic padding, routing control, notarization Pervasive security mechanisms: trusted functionality, security labels, event detection, security audit trails, security recovery Refer to table 1.3 in [WS]

@Yuan Xue Relationship Between Security Service and Security Mechanisms