CSE 4905 Network Security Overview

Slides:



Advertisements
Similar presentations
Summer Workshop on Cyber Security Computer Networks Security (Part 1) Dr. Hamed Mohsenian-Rad University of California at Riverside and Texas Tech University.
Advertisements

6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We’re making these slides freely available.
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
IEEE Overview and Meshed Networking ELEC6076 Computer Networks Alan Ford
20 – Collision Avoidance, : Wireless and Mobile Networks6-1.
Lecture 3 Introduction 1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit.
6: Wireless and Mobile Networks6-1 Chapter 6: Wireless and Mobile Networks Background: r # wireless (mobile) phone subscribers now exceeds # wired phone.
1-1 Internet Overview: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching, packet.
6/2/05CS118/Spring051 Chapter 6: Wireless and Mobile Networks r Cover the following sections only:  6.3: wireless LANs  6.5: mobility management:
Lecture 1 Overview: roadmap 1.1 What is computer network? the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  network.
5-1 Data Link Layer r What is Data Link Layer? r Wireless Networks m Wi-Fi (Wireless LAN) r Comparison with Ethernet.
8/7/20151 Mobile Computing COE 446 Wireless Multiple Access Tarek Sheltami KFUPM CCSE COE hthttp://faculty.kfupm.edu.sa/coe/tarek/coe446.htm Principles.
Chapter Overview TCP/IP Protocols IP Addressing.
WLAN What is WLAN? Physical vs. Wireless LAN
6: Wireless and Mobile Networks6-1 Elements of a wireless network network infrastructure wireless hosts r laptop, PDA, IP phone r run applications r may.
Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on.
OSI Model Routing Connection-oriented/Connectionless Network Services.
6: Wireless and Mobile Networks6-1 Chapter 6 Wireless and Mobile Networks Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition.
Computer networks 6: Wireless and Mobile Networks.
CS 372 – introduction to computer networks* Announcements: r Final exam on Friday  The materials after chapters 1,2  Emphasis on the material covered.
Adapted from: Computer Networking, Kurose/Ross 1DT066 Distributed Information Systems Chapter 6 Wireless, WiFi and mobility.
Chapter 5 outline 5.1 Introduction and services
ECE 4450:427/527 - Computer Networks Spring 2015
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Wi-Fi Wireless LANs Dr. Adil Yousif. What is a Wireless LAN  A wireless local area network(LAN) is a flexible data communications system implemented.
Instructor: Christopher Cole Some slides taken from Kurose & Ross book IT 347: Chapter 1.
ECE 4400:427/527 - Computer Networks Spring 2015 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 3: Network Architectures Dr. Nghi.
Wireless Access avoid collisions: 2 + nodes transmitting at same time CSMA - sense before transmitting –don’t collide with ongoing transmission by other.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
OSI Model Data Communications. 7 layer “research” model ApplicationPresentationSessionTransportNetworkLinkPhysical.
Wireless and Mobility The term wireless is normally used to refer to any type of electrical or electronic operation which is accomplished without the use.
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
Network Security7-1 Today r Reminder Ch7 HW due Wed r Finish Chapter 7 (Security) r Start Chapter 8 (Network Management)
Introduction 1-1 Chapter 1 Introduction Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on.
WIRELESS COMMUNICATION Husnain Sherazi Lecture 1.
EEC-484/584 Computer Networks Lecture 14 Wenbing Zhao
CO5023 Wireless Networks. Varieties of wireless network Wireless LANs: the main topic for this week. Consists of making a single-hop connection to an.
K. Salah1 Security Protocols in the Internet IPSec.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 27 November 23, 2004.
A special acknowledge goes to J.F Kurose and K.W. Ross Some of the slides used in this lecture are adapted from their original slides that accompany the.
Data Communications I & Computer Security I Faculty currently includes: G. Chen, Costello, Elbirt, Liu, D. Martin, Wang.
Computer Networks Dr. Adil Yousif CS Lecture 1.
Course on Computer Communication and Networks Lecture 1 Chapter 1: Introduction Part A: Internet, Protocol Layering and Data CTH EDA344/ GU DIT 420.
Instructor Materials Chapter 6 Building a Home Network
CS 3214 Computer Systems Networking.
Network Security Mechanisms
Computer Networks.
Network Introduction.
Slides taken from: Computer Networking by Kurose and Ross
Encryption and Network Security
Part I. Overview of Data Communications and Networking
Chapter 6 Wireless and Mobile Networks
Wireless LANs Wireless proliferating rapidly.
The OSI Model and the TCP/IP Protocol Suite
OSI Protocol Stack Given the post man exemple.
CS 3214 Computer Systems Networking.
Wireless Mesh Networks
The Open System Interconnection (OSI) Model & Network Protocols.
ECE 4400:427/527 - Computer Networks Spring 2017
Lectures Computer networking تمرین 3 نمره. پژوهش عملیاتی 2 نمره.
CS 457 – Lecture 7 Wireless Networks
The OSI Model and the TCP/IP Protocol Suite
Chapter 12 Communications Security & Countermeasures
컴퓨터 네트워크 Chapter 4 컴퓨터 네트워크.
Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge
EEC-484/584 Computer Networks
Review and Announcement
TCP/IP Protocol Suite: Review
EEC-484/584 Computer Networks
The OSI Model and the TCP/IP Protocol Suite
Presentation transcript:

CSE 4905 Network Security Overview

Internet: “nuts and bolts” view mobile network global ISP regional ISP home network institutional Internet: “network of networks” Interconnected ISPs protocols control sending, receiving of msgs e.g., TCP, IP, HTTP, Skype, 802.11 Internet standards RFC: Request for comments IETF: Internet Engineering Task Force

Computer networks Support communication among computers Hosts (computers), routers, network links, protocols Each machine has multiple addresses MAC address, IP address Each message from the sender to receiver may stop at many intermediate hops till it reaches its destination (routing) Possible attacks to computer networks? How addresses are obtained? Is it private? Universally known? Possible to fake? All these questions have important implications on security; will come to later on.

Many possible attacks! eavesdrop: intercept messages actively insert messages into connection impersonation: can fake (spoof) source address in packet (or any field in packet) hijacking: “take over” ongoing connection by removing sender or receiver, inserting himself in place denial of service: prevent service from being used by others (e.g., by overloading resources) …

Eavesdropping: one example BEN: remind what FTP is, the protocol isn’t popularly known anymore

Security goals of computer networks Counter various attacks Confidentiality, Integrity, Availability Network security at different layers Security measures at different layers Many approaches rely heavily on crypto See examples of what to do and what not to do… It is not easy… BEN: would make the point that we’ll see examples of what to do and what not to do. It is not easy to compose the building blocks we covered in the first couple of weeks.

Internet protocol stack application: supporting network applications FTP, SMTP, HTTP transport: process data transfer TCP, UDP network: routing of datagrams from source to destination IP, routing protocols link: data transfer between neighboring network elements Ethernet, 802.111 (WiFi), PPP physical: bits “on the wire” application transport network link physical

ISO/OSI reference model presentation: allow applications to interpret meaning of data, e.g., encryption, compression, machine-specific conventions session: synchronization, checkpointing, recovery of data exchange Internet stack “missing” these layers! these services, if needed, must be implemented in application needed? application presentation session transport network link physical BEN: can you give a little bit of background on why these are not present in the internet?

Encapsulation source destination application transport network link message M application transport network link physical segment Ht M Ht datagram Ht Hn M Hn frame Ht Hn Hl M link physical switch destination network link physical Ht Hn M Ht Hn Hl M M application transport network link physical Ht Hn M Ht M Ht Hn M router Ht Hn Hl M

Exercise: security at link layer Incentives? What does an encrypted frame look like? What is being encrypted and what is not? Suppose use symmetric-key encryption Who need to agree on the key? How to agree on the key? How to ensure integrity? Is authentication needed? If you have perfect security at link layer, do you still need security measures at other layers? If you have perfect security at other layers, do you still need security measures at link layers?

Exercise: security at link layer Attackers’ incentives Interference, eavesdrop, insert messages, know volume of traffic, … What does an encrypted frame look like? Link layer header not encrypted, other headers (IP, transport layers) and payload encrypted If you have perfect security at link layer, do you still need security measures at other layers? Link-layer security only deals with the link between two adjacent hosts If you have perfect security at other layers, do you still need security measures at link layers? Yes, e.g., if you want to hide the sender IP, or hide link-layer management traffic

Exercise: security at network (IP) layer Incentives? What does an encrypted datagram look like? What is being encrypted and what is not? Suppose use symmetric-key encryption Who need to agree on the key? How to agree on the key? How to ensure integrity? Is authentication needed? If you have perfect security at IP layer, do you still need security at other layers? If you have perfect security at other layers, do you still need security at IP layer?

Exercise: security at network (IP) layer What does an encrypted datagram look like? Transport layer header and payload are encrypted; others are not If you have perfect security at IP layer, do you still need security at other layers? You may still want to have link-layer security; you may not want to use IP layer security (from some traffic)… If you have perfect security at other layers, do you still need security at IP layer? Yes, e.g., you want to provide a logic isolation of all data from your computer (you’ll have to do this for each individual session if you use transport-layer security; link-layer security only deals a hop)…

Why need security at different layers? Different layers have different functionalities, security at different layers serve different purposes Selectively choose what to use If one layer not secure, you still have some safeguard from some other layers e.g., security measures for WiFi network does not work initially

Physical layer security Many open problems Particularly for wireless networks Require knowledge in digital communication Not covered in this class

Link layer security Link layer basic services: move a frame from one node to an adjacent node over a communication link Wireless networks particularly vulnerable Why? Case study: securing WiFi networks (802.11 wireless LANs)

Sniffing wireless traffic

Securing WiFi networks WiFi basics Security protocols WEP (first attempt, severe security flaws) 802.11i, WPA and WPA2 (current protocols)

IEEE 802.11 Wireless LAN 802.11a 5 GHz range up to 54 Mbps 802.11g 2.4 GHz range 802.11n: multiple antennae 2.4 and/or 5 GHz range up to 200 Mbps 802.11b 2.4 GHz unlicensed spectrum up to 11 Mbps direct sequence spread spectrum (DSSS) in physical layer all use CSMA/CA for multiple access all have base-station and ad-hoc network versions

802.11 LAN architecture wireless host communicates with base station Internet wireless host communicates with base station base station = access point (AP) Basic Service Set (BSS) (aka “cell”) in infrastructure mode contains: wireless hosts access point (AP): base station AP hub, switch or router AP BSS 1 BSS 2

802.11: association host: must associate with an AP Security issues scans channels, listening for beacon frames containing AP’s name (SSID, service set ID) & MAC address selects AP to associate with (use different schemes) will typically run DHCP to get IP address in AP’s subnet Security issues which SSID to select? Automatically select AP? host authenticate to AP?

802.11: passive/active scanning BBS 1 BBS 1 BBS 2 BBS 2 AP 1 AP 2 AP 1 1 AP 2 1 1 2 2 2 3 3 4 H1 H1 Passive Scanning: beacon frames sent from APs association Request frame sent: H1 to selected AP association Response frame sent: selected AP to H1 Active Scanning: Probe Request frame broadcast from H1 Probes response frame sent from APs Association Request frame sent: H1 to selected AP Association Response frame sent: selected AP to H1