IP Security

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Internet Security CSCE 813 IPsec
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Henric Johnson1 Chapter 6 IP Security Henric Johnson Blekinge Institute of Technology, Sweden
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
1 IPSec—An Overview Somesh Jha Somesh Jha University of Wisconsin University of Wisconsin.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
Henric Johnson1 Chapter 6 IP Security. Henric Johnson2 Outline Internetworking and Internet Protocols IP Security Overview IP Security Architecture Authentication.
IP Security. Overview In 1994, Internet Architecture Board (IAB) issued a report titled “Security in the Internet Architecture”. This report identified.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
1 Pertemuan 11 IPSec dan SSL Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
1 Chapter 6 IP Security Henric Johnson Blekinge Institute of Technology, Sweden Revised by Andrew.
IP Security: Security Across the Protocol Stack
NETWORK SECURITY.
CSCE 715: Network Systems Security
/IPsecurity.ppt 1 - Chapter 6 of William Stallings. Network Security Essentials (2nd edition). Prentice Hall.
IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
Karlstad University IP security Ge Zhang
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
Chapter 6 IP Security. We have considered some application specific security mechanisms in last chapter eg. S/MIME, PGP, Kerberos however there are security.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
Chapter 8 IP Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
1 IPv6 Security & QoS Babu Ram Dawadi. 2 Outline IP Security Overview IP Security Architecture Authentication Header Encapsulating Security Payload Combinations.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
Security IPsec 1 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Network Layer Security Network Systems Security Mort Anvari.
Presentaion on ipsecurity Presentaion given by arun saraswat To lavkush sharma sir arun saraswat1.
第六章 IP 安全. Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Virtual Private Network
CSCI 465 Data Communications and Networks Lecture 26
IP Security - Chapter 6 of William Stallings. Network Security Essentials (2nd edition). Prentice Hall Slides by Henric Johnson Blekinge Institute.
IPSec Detailed Description and VPN
Chapter 5 Network Security Protocols in Practice Part I
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
IPv6 Security & QoS Babu Ram Dawadi.
IPSecurity.
CSE 4905 IPsec.
Chapter 16 – IP Security If a secret piece of news is divulged by a spy before the time is ripe, he must be put to death, together with the man to whom.
Chapter 18 IP Security  IP Security (IPSec)
Somesh Jha University of Wisconsin
Internet and Intranet Fundamentals
IT443 – Network Security Administration Instructor: Bo Sheng
Internet Security CS457 Seminar Zhao Cheng
IPSec IPSec is communication security provided at the network layer.
CSE565: Computer Security Lecture 23 IP Security
Cryptography and Network Security
CSCE 815 Network Security Lecture 13
IP Security - Chapter 6 of William Stallings. Network Security Essentials (2nd edition). Prentice Hall Slides by Henric Johnson Blekinge Institute.
IP Security - Chapter 6 of William Stallings. Network Security Essentials (2nd edition). Prentice Hall Slides by Henric Johnson Blekinge Institute.
Virtual Private Networks (VPNs)
NET 536 Network Security Lecture 5: IPSec and VPN
Network Security Essentials
Virtual Private Networks (VPNs)
B. R. Chandavarkar CSE Dept., NITK Surathkal
Chapter 6 IP Security.
Lecture 36.
Lecture 36.
Cryptography and Network Security
Presentation transcript:

6-Jan-17 1 Ambo University Institute of Technology Gradute program in Computer Science IP SECURITY Presented By: Dejene Techane

 In today's massively interconnected business world of the Internet, intranets, branch offices, and remote access, sensitive information constantly crosses the networks.  Without security, both public and private networks are susceptible to unauthorized monitoring and access.  Therefore, there are different network security protocols widespread use for protecting private and public networks such as  IP Security(IPSec),  Transport Layer Security(TLS)  and Secure Shell(SSH).  Hence, only IPsec protects all application traffic over an IP network. 6-Jan-17 2

 IP security refers to security mechanism implemented at the IP (Internet Protocol) Layer to ensure  integrity,  authentication and  confidentiality of data during transmission in the open Internet environment  It is a protocol suite for secure IP communications that works by  Authenticating  And encrypting each IP packet of a communication session. 6-Jan-17 3

 IPSec is a set of protocol and algorithm used to secure IP data and network layer  Open standard for VPN implementation  Inbuilt in IPV6 and compatible with IPV4 6-Jan-17 4

 to verify sources of IP packets  authentication  to prevent replaying of old packets  to protect integrity and/or confidentiality of packets  data Integrity/Data Encryption 6-Jan-17 5

6 ESPAH IKE IPSec Security Policy Encapsulating Security Payload Authentication Header The Internet Key Exchange  Architecture : Covers the general concepts, security requirements, definitions and mechanisms defining IPsec technology.

 Provides source authentication  Protects against source spoofing  Provides connectionless data integrity  Protects against replay attacks  Use monotonically increasing sequence numbers  Protects against denial of service attacks  NO protection for confidentiality! 6-Jan-17 7

 Use 32-bit monotonically increasing sequence number to avoid replay attacks  Use cryptographically strong hash algorithms to protect data integrity (96-bit)  Use symmetric key cryptography  HMAC-SHA-96, HMAC-MD Jan-17 8

9 Authentication Data Sequence Number Security Parameters Index (SPI) Next header Payload length Reserved Old IP header (only in Tunnel mode) TCP header New IP header Authenticated Data Encapsulated TCP or IP packet Hash of everything else

 Provides all that AH offers, and  in addition provides data confidentiality  Uses symmetric key encryption Same as AH: ◦ Use 32-bit sequence number to counter replaying attacks ◦ Use integrity check algorithms Only in ESP: ◦ Data confidentiality: ◦ Uses symmetric key encryption algorithms to encrypt packets 6-Jan-17 10

6-Jan Authentication Data Sequence Number Security Parameters Index (SPI) Next header Payload length Reserved TCP header Authenticated IP header Initialization vector Data PadPad lengthNext Encrypted TCP packet

6-Jan  Bothe AH and ESP support transport and Tunnel modes Transport Mode SATunnel Mode SA AHAuthenticates IP payload and selected portions of IP header and IPv6 extension headers Authenticates entire inner IP packet plus selected portions of outer IP header ESPEncrypts IP payload and any IPv6 extension header Encrypts inner IP packet ESP with Authentication Encrypts IP payload and any IPv6 extension header Authenticates IP payload but no IP header Encrypts inner IP packet Authenticates inner IP packet

 The key management portion of IPSec involves  the determination and distribution of the secret keys.  A typical requirement is four keys for communication between two applications:  transmit and receive pairs for both AH and ESP  Support for two types of key management  Manual  Authomatic 6-Jan-17 13

6-Jan  SA describes a particular kind of secure connection between one device and another.  Security Associations are key to IPSEC’s authentication and confidentiality mechanisms.  SAs are needed to negotiate in the exchange of the “shared secret” process  Sharing the shared key secrete

 uniquely identified by three parameters:  Security Parameters Index (SPI): The SPI assigns a bit string to this SA that has local significance only.  The SPI is carried in AH and ESP headers to enable the receiving system to select the SA under which a received packet will be processed.  IP destination address : Currently, only unicast addresses are allowed; this is the address of the destination endpoint of the SA, which may be an end-user system or a network system such as a firewall or router.  Security protocol identifier : This indicates whether the association is an AH or ESP security association. 6-Jan-17 15

 Provides strong security when implemented in a firewall or router that can be applied to all traffic crossing the perimeter.  IPsec is resistant to bypass if all traffic from the outside must use IP and the firewall is the only way of entrance from the Internet into the organization.  Is below transport layer, hence transparent to applications.  Can be transparent to end users.  Can provide security for individual users if needed. 6-Jan-17 16

 Secure branch office connectivity over the Internet  Secure remote access over the Internet  Establishment of extranet and intranet connectivity with partners  Enhancement of electronic commerce security 6-Jan-17 17

 IP Security importance is growing, but unfortunately its operation imposes a significant burden on the encrypting devices. Furthermore, certain applications may suffer from the increase in latency (i.e., the time required to pass through an IPSec network device) due to the extra processing.  Finally, at a time when network security is increasingly vital, IPSec makes it easy for network managers to provide a strong layer of protection to their organization's information resources. 6-Jan-17 18

6-Jan-17 19