Bezpečnosť v počítačových sieťach

Slides:



Advertisements
Similar presentations
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Advertisements

IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Internet Protocol Security An Overview of IPSec. Outline:  What Security Problem?  Understanding TCP/IP.  Security at What Level?  IP Security. 
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Networking Theory (part 2). Internet Architecture The Internet is a worldwide collection of smaller networks that share a common suite of communication.
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Circuit & Application Level Gateways CS-431 Dick Steflik.
Chapter Overview TCP/IP Protocols IP Addressing.
Internet TCP/IP Cameron Schmidt Jordan Gallo. Outline History TCP/IP Layers Applications Transport Internetwork – IPV6 Network Interface and Hardware.
IST 228\Ch3\IP Addressing1 TCP/IP and DoD Model (TCP/IP Model)
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Chapter 13 – Network Security
TCP/IP. The Internet Protocol Suite is the set of communications protocols used for the Internet and other similar networks. It is commonly also known.
Advanced Higher Computing Computer Networking Topic 1: Network Protocols and Standards.
Introduction to Packet Accelerator (PA). Communication Models Network Access Ethernet ARP FDDI Internet IP Host-to-Host TCP UDP Application TELNET FTP.
TCP/IP Protocols Contains Five Layers
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
INDEX oWoWhat is TCP/IP protocol suite ? oDoDifferent layers. oEoEncapsulation. oPoProtocol Interface.
TCP/IP MODEL   Short overview for OSI model;  What is TCP/IP model?;  How is divided;  The TCP/IP structure;  The Application Layer;  The Transport.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Slide #1 CIT 380: Securing Computer Systems TCP/IP.
Fall 2004FSU CIS 5930 Internet Protocols1 TCP/IP Protocol Suite Reading: Chapter 13.
TCP/IP Protocol Suite ©Richard L. Goldman September 25, 2002.
Advanced Higher Computing Computer Networking Topic 1: Network Protocols and Standards.
K. Salah1 Security Protocols in the Internet IPSec.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
Lecture 4 : Network Architectures (cont..) 1. 2 Summary of OSI Layers.
11/18/2016Basic TCP/IP Networking 1 TCP/IP Overview Basic Networking Concepts.
Virtual Private Networks and IPSec
Networking Using the OSI Model.
The OSI Model & TCP/IP model
Executive Director and Endowed Chair
CompTIA Security+ Study Guide (SY0-401)
Virtual Private Networks
Application layer tcp/ip
Virtual Private Networks
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Chapter 3 Understanding the OSI Model
Securing the Network Perimeter with ISA 2004
Understand the OSI Model Part 2
How data travels through a network The Internet
Virtual Private Networks (VPN)
NT2640 Unit 1 Activity 1 Handout
CompTIA Security+ Study Guide (SY0-401)
2018 Valid Cisco Exam Dumps IT-Dumps
Chapter 4 Core TCP/IP Protocols
Introduction to TCP/IP
Topic 5: Communication and the Internet
Packet Switching To improve the efficiency of transferring information over a shared communication line, messages are divided into fixed-sized, numbered.
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Find the Critical Path and the Time Required
Transport Protocols An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Lecture 2: Overview of TCP/IP protocol
Networking Theory (part 2)
Internet & Web.
1 TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP/IP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University, Puducherry –
Chapter 2 Network Models
Introduction to Network Security
Unit 8 Network Security.
OSI Reference Model Kashif Ishaq.
Internet protocol stack
Introduction to Networking Security
Networking Theory (part 2)
Networking Theory (part 2)
Presentation transcript:

Bezpečnosť v počítačových sieťach Jaroslav Porubän KPI FEI TU Košice © 2006 http://hornad.fei.tuke.sk/~poruban/bis Jaroslav.Poruban@tuke.sk

Zabezpečené spojenie Zabezpečné spojenie dvoch komunikačných bodov zahŕňa spoľahlivý prenos údajov autentifikáciu oboch komunikačných bodov ochranu pred odpočúvaním ochranu pred zmenou resp. falšovaním údajov

TCP/IP model Aplikačná vrstva (Application layer) telnet, FTP, SMTP, HTTP, DNS, SQL Transportná vrstva (Transport layer) TCP, UDP Sieťová vrstva (Network layer/Internet layer) IP, ARP, RARP, ICMP Vrstva prístupu k sieti (Network access layer/Data link layer) IEEE 802.x, FDDI, ATM, PPP Application Transport Network Data link

Základné protokoly v TCP/IP IP (Internet Protocol) slúži na prenos datagramov, rôznymi typmi sietí TCP (Transport Control Protocol) zaručuje doručenie paketu, ak nedostane potvrdenie o doručení paket je poslaný opäť UDP (User Datagram Protocol) nezaručuje doručenie, nepreposiela pakety

IP a UDP hlavička

TCP hlavička

Prenos údajov

Bezpečnosť v TCP/IP Protokoly IP, TCP a UDP nedefinujú mechanizmy zabezpečenia komunikácie šifrovaním údajov ani autentifikáciu Protokoly Telnet, FTP, SMTP, POP, HTTP tiež nezabezpečujú dôvernosť a autentifikáciu

Zabezpečenie komunikácie v modely TCP/IP Application Transport Network Data link Aplikačná vrstva aplikačne závislé Transportná vrstva SSL/TLS (zabezpečenie TCP) Sieťová vrstva IPSec (zabezpečenie IP) If we integrate secure communication into the application layer, we have to do so for each application on a host. The application has access to the full user context and can enforce role-based access control. The application need not depend on the underlying host or operating system for security services and can coexist with other services that are not secured. The application can use high-level interfaces with other security service providers and can directly manage events such as alarms. ■■ If we add security at the transport layer, we gain application independence but are now further from the application, possibly with less information. The security mechanism might require the use of a specific transport-level protocol because it depends on its services. SSL, for example, runs over TCP because its sessionoriented nature requires reliable communication. Alarm management can still be handed to the application but is often sent to the system log or passed to a dedicated alarm management process on the host because the application might not be prepared to handle security events. ■■ If we add security at the network level, we lose even more contact with the application. We might be unable to originate the connection from a particular application, let alone a specific user within that application. The network-level security mechanism must depend on a higher-layer interaction to capture this user context and pass it down to the network layer. This context is called a security association and must be established according to security policy guidelines that might be unavailable at this low level. ■■ At the data link and the physical level, we can use hardware encryption units or purchase dedicated private lines to protect a communications link. These are completely divorced from the application and are generally statically configured.

IPSec navrhnutý IETF zabezpečenie dôvernosti, autentifikácie a integrity údajov na internetovej vrstve poskytuje dva základné typy ochrany: autentifikácia šifrovanie

IPSec

IPSec módy Transport Mode Tunnel Mode host-host host-network IP Header TCP Header Data Transport Mode Tunnel Mode host-host host-network network-network IP Header TCP Header Data IPSec Header IP Header TCP Header Data IPSec Header New IP Header

IPSec spojenie

Firewall množina HW a SW prostriedkov, ktorých úlohou je oddeliť lokálnu sieť od Internetu (ohnivá stena)

Firewall bezpečnostná politika mechanizmus identifikácie a autentifikácie mechanizmus riadenia prechodu údajov cez firewall

Výhody firewall-u celá komunikácia lokálnej siete s okolím prechádza cez jeden bod zakrytie lokálnej siete tvorba auditačných záznamov zabránenie exportu informácií preklad lokálnych adries

Nedostatky firewall-u nechráni proti útokom zvnútra nezabraňuje vytvoreniu alternatívnej cesty v prípade prekonania ochranného mechanizmu je sieť nezabepečná jeho výkon je kritický pre sieť

Filtrovanie paketov filtrovanie prechádzajúcich paketov na základe definovaných pravidiel jednoduché riešenie vysoká rýchlosť zložité postihovanie výnimiek pre konkrétne aplikácie internetová vrstva podľa adresy zdroja a cieľa, čísla protokolu transportná vrstva aj podľa zdrojového a cieľového portu, stavu komunikácie

Filtrovanie paketov - príklad odkiaľ kam práva *:* deny 192.168.1.*:* *:80 allow *:20 *:21

Aplikačné brány bezpečnejšie ako paketové filtre pre každú službu existuje proxy – zástupca (HTTP, FTP) nižšia rýchlosť povoľuje len služby, pre ktoré existuje proxy analyzovanie obsahu paketov antivírová kontrola skrývanie mien lokálnej siete

Aplikačné brány

Kombinované firewally stavová inšpekcia paketov – vychádza z filtrovania paketov, umelo je vybudovaná logika o prebiehajúcej komunikácii adaptívne proxy – komunikácia je začatá na úrovni aplikácie, po overení je možné časť komunikácie prepúšťať priamo

Firemná sieť

Virtuálne privátne siete (VPN)