CSCE 715: Network Systems Security

Slides:



Advertisements
Similar presentations
A CGA based Source Address Authentication Method in IPv6 Access Network(CSA) Guang Yao, Jun Bi and Pingping Lin Tsinghua University APAN26 Queenstown,
Advertisements

Security Issues In Mobile IP
Secure Mobile IP Communication
NS-H /11041 Attacks. NS-H /11042 The Definition Security is a state of well-being of information and infrastructures in which the possibility.
CISCO NETWORKING ACADEMY PROGRAM (CNAP)
CSCE 715: Network Systems Security
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
1 Chapter06 Mobile IP. 2 Outline What is the problem at the routing layer when Internet hosts move?! Can the problem be solved? What is the standard solution?
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
Firewalls. Evil Hackers FirewallYour network Firewalls mitigate risk Block many threats They have vulnerabilities.
Network security Further protocols and issues. Protocols: recap There are a few main protocols that govern the internet: – Internet Protocol: IP – Transmission.
1 Mohamed M Khalil Mobile IPv4 & Mobile IPv6. 2 Mohamed M Khalil Mobile IP- Why ? IP based Network Sub-network A Sub-network B Mobile workforce carry.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
CSCE 715: Network Systems Security
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Chapter 19 Binding Protocol Addresses (ARP) A frame transmitted across a physical network must contain the hardware address of the destination. Before.
RFC 3964 Security Considerations for 6to4 Speaker: Chungyi Wang Adviser: Quincy Wu Date:
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 25 November 16, 2004.
Attacking on IPv6 W.lilakiatsakun Ref: ipv6-attack-defense-33904http://
DoS/DDoS attack and defense
Ethernet Network Systems Security Mort Anvari. 9/28/20042 Ethernet Most widely used LAN technology Low cost and high flexibility Versions of different.
MIPv6Security: Dimension Of Danger Unauthorized creation (or deletion) of the Binding Cache Entry (BCE).
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
 Mobile IP is the underlying technology for support of various mobile data and wireless networking applications.  It is designed by IETF.
Mobile IP Lecture 5.
IPSecurity.
Exploiting Layer 2 By Balwant Rathore.
Introduction Wireless devices offering IP connectivity
CSCE 715: Network Systems Security
Mobile Networking (I) CS 395T - Mobile Computing and Wireless Networks
Mobile IP.
Chapter 18 IP Security  IP Security (IPSec)
RPSEC WG Issues with Routing Protocols security mechanisms
Outline Basics of network security Definitions Sample attacks
CSCE 715: Network Systems Security
Error and Control Messages in the Internet Protocol
IPSec IPSec is communication security provided at the network layer.
Byungchul Park ICMP & ICMPv DPNM Lab. Byungchul Park
Net 323: NETWORK Protocols
Ethernet Network Systems Security
Security and Vulnerability of PING
Setting Up Firewall using Netfilter and Iptables
CSCE 715: Network Systems Security
CSE 313 Data Communication
Mobile IP Presented by Team : Pegasus Kishore Reddy Yerramreddy Jagannatha Pochimireddy Sampath k Bavipati Spandana Nalluri Vandana Goyal.
Other Routing Protocols
Mobile IP Outline Homework #4 Solutions Intro to mobile IP Operation
CSCE 715: Network Systems Security
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
ITIS 6167/8167: Network and Information Security
Outline The spoofing problem Approaches to handle spoofing
Outline Basics of network security Definitions Sample attacks
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Presentation transcript:

CSCE 715: Network Systems Security Chin-Tser Huang huangct@cse.sc.edu University of South Carolina

A Security Problem in Network An adversary that has access to a network can insert new messages, modify current messages, or replay old messages in the network These inserted, modified, and replayed messages can go undetected until they cause severe damage to network The physical location of the adversary in network may never be determined Cannot be mitigated by end-to-end security scheme Example: denial-of-service attacks 10/05/2010

Denial-of-Service (DoS) Attacks Aimed to deny normal service provided by the target computer Communication-stopping attacks ARP spoofing attack Resource-exhausting attacks Smurf attack SYN attack 10/05/2010

Ping Protocol Allow any computer to check whether any other computer in the Internet is up Any computer x can send a “ping” message to any computer y which replies by sending back a “pong” message (thus x knows y is up) In ping message: src = x and dst = y In pong message: src = y and dst = x ping(x, y) x y pong(y, x) 10/05/2010

Broadcast Ping Protocol If in ping message dst = “all”, a copy of ping is broadcast to every computer Each computer replies by sending back a pong, and x is flooded with pong messages In ping message: src = x and dst = “all” In pong messages: src = y, y’ and dst = x y´ pong(y´,x) ping(x,all) x y pong(y, x) 10/05/2010

Smurf Attack An adversary pretends to be x and broadcasts a ping message where src = x and dst = “all” Thus, x is flooded with pong messages that it has not requested: a denial-of-service attack at x a ping(x,all) y´ pong(y´,x) x y pong(y, x) 10/05/2010

Countering Smurf Attack Make each router check the src of each received message and discard the message if the src is suspicious src=x shouldn’t come to me R1 R2 R3 a y´ ping(x, all) x y 10/05/2010

Clever Smurf Attack An adversary inserts a ping(x, all) message between routers R2 and R3 R3 thinks the message was forwarded by R2 and so accepts the message a R1 R2 R3 y´ ping(x, all) x y 10/05/2010

Countering Clever Smurf Attack When R3 receives a message, R3 needs to determine whether message was indeed sent by R2, or was modified or replayed by an adversary between R3 and R2 If use IPSec, will need to set up SA’s between each pair of adjacent routers: too expensive Our solution: use hop integrity protocol between each pair of adjacent routers 10/05/2010

Hop Integrity Let p, q be routers connected to same subnetwork Detection of Message Modification: when q receives a message m supposedly from p, q can check that m was not modified after sent Detection of Message Replay: when q receives a message m supposedly from p, q can check that m was not a replay of an old message 10/05/2010

Adversary vs. Routers The adversary can perform three types of actions to disrupt communication between two routers Message loss Message modification Message replay The routers are assumed to be secure and cannot be compromised by the adversary The routers will execute hop integrity protocols that can detect and defeat the adversary actions 10/05/2010

Hop Integrity Protocol Each pair of adjacent routers need to share a secret S, which is updated periodically by the two routers using a secret exchange protocol To each IP message sent between two adjacent routers, add a sequence number seq, and an integrity check d d := MD(S | hdr | seq | txt) d 20 bytes if SHA-1 MD appropriate HMAC function seq 4 bytes hdr txt IP message hdr seq d txt 10/05/2010

Architecture of Hop Integrity Protocols router p router q Application s Applications Transport Transport secret exchange pe qe layer secrets secrets Network Network integrity check pw or ps qw or qs layer Subnetwork Subnetwork . 10/05/2010

Component of Hop Integrity Protocols Three protocols between each pair of adjacent routers secret exchange protocol weak integrity protocol strong integrity protocol 10/05/2010

How to Exchange Secret Each router p has a secret S that it uses for computing the digest of every msg sent to an adjacent router q Both p and q need to know S What if p sends secret update message to q periodically? Problem due to message loss What if p sends secret update message to q periodically and q sends an ack to p? Problem due to bundling of secret exchange layer and integrity check layer 10/05/2010

Secret Exchange Protocol q updates secret S used by p by sending a secret update message to p every T hours When p receives secret update message from q, p updates secret and sends an ack to q If q does not receive ack from p for t seconds, q retransmits the secret update message 10/05/2010

Secret Exchange Protocol q p S S[1] S[0] = S[1] = S S[0] old S[1] new BpS[0], S[1] if S = S[0]  S = S[1] then S :=S[1] BqS if S[1] = S then S[0] :=S[1] S[0] = S[1] = S T hours S[0] old S[1] new BpS[0], S[1] if S = S[0]  S = S[1] then S :=S[1] BqS if S[1] = S then S[0] :=S[1] S[0] = S[1] = S 10/05/2010

Recovery from Message Loss in Secret Exchange Protocol q p S S[1] S[0] = S[1] = S S[0] old S[1] new BpS[0], S[1] t seconds S[0] = S  S[1] BpS[0], S[1] if S = S[0] S = S[1] then S :=S[1] t seconds BqS S[1] = S  S[0] BpS[0], S[1] if S = S[0] S = S[1] then S :=S[1] BqS if S[1] = S then S[0] :=S[1] S[0] = S[1] = S 10/05/2010

Weak Integrity Protocol To detect insertion and modification Each sent msg from p to q is as follows (hd | d | txt) where p computes d as d = MD(S | hd | txt) On receiving a msg, q checks if d = MD(S[0] | hd | txt)  d = MD(S[1] | hd | txt) then q forwards msg else q discards msg 10/05/2010

Weak Integrity Protocol S[0] q p S S[1] (hd | d | txt) . 10/05/2010

Strong Integrity To detect replay, successive sequence numbers are attached to all sent msgs from p to q Problem with reset If p is reset, unbounded number of fresh messages are discarded by q If q is reset, it can accept unbounded number of replayed messages Two solutions to overcome reset Soft sequence numbers Hard sequence numbers 10/05/2010

Soft Sequence Numbers Successive sequence numbers are attached to all sent msgs from p to q: (hd | sq | txt) q maintains three variables exp sequence number of next msg c #msgs received cmax random value changed when c reaches it On receiving a msg, q checks if (exp  sq)  (c = cmax) then q forwards msg else q discards msg fi; q updates exp, c, cmax 10/05/2010

Soft Sequence Numbers q p exp sq c cmax (hd | sq | txt) sq sq+1 c = 0 . c = 1 . . c = cmax : choose new cmax, c = 0 10/05/2010

Strong Integrity Protocol Using Soft Sequence Numbers Each sent msg from p to q is as follows (hd | sq | d | txt) where p computes d as d = MD(S | hd | sq | txt) On receiving a msg, q checks if (d = MD(S[0] | hd | sq | txt)  d = MD(S[1] | hd | sq | txt) )  (exp  sq  c = random value cmax) then q forwards msg else q discards msg fi; q updates exp, c, cmax 10/05/2010

Hard Sequence Numbers To overcome reset, use two operations SAVE and FETCH When SAVE is executed, the last sequence number will be stored in persistent memory When FETCH is executed, the last stored sequence number will be loaded from persistent memory into memory 10/05/2010

Strong Integrity Protocol Using Hard Sequence Numbers Each sent msg from p to q is as follows (hd | sq | d | txt) where p computes d as d = MD(S | hd | sq | txt) On receiving a msg, q checks if (d = MD(S[0] | hd | sq | txt)  d = MD(S[1] | hd | sq | txt) )  (exp  sq) then q forwards msg else q discards msg fi; q updates exp p and q executes SAVE periodically When waking up from a reset, p (or q) executes FETCH to fetch last stored seq#, executes SAVE to store next seq#, and continues after SAVE finishes 10/05/2010

Tradeoff between Soft and Hard Sequence numbers Soft sequence numbers are easier to implement Do not require SAVE and FETCH operations and do not require persistent memory Hard sequence numbers provide better security When use soft sequence numbers, adversary has a chance, although small, to guess and get its sequence number accepted When use hard sequence numbers, p and q stick to their sequence numbers and leave adversary no chance 10/05/2010

Other Applications of Hop Integrity Mobile IP Secure multicast Security of routing protocols 10/05/2010

Mobile IP A mobile computer c can visit a foreign network F other than its home network H Msgs destined for c will be received by its home agent (HA) and forwarded to its foreign agent (FA) m m home agent (HA) c Internet m F H foreign agent (FA) 10/05/2010

Problem with Mobile IP Mobile computer c can send a msg thru FA However, this msg may be filtered out by next router q because its source address is “strange” ? m q home agent (HA) c Internet m F H foreign agent (FA) 10/05/2010

Mobile IP with Hop Integrity With integrity check d added to msg m, q can check that m was indeed forwarded by FA Thus, q ignores strange source of msg m and forwards m toward its ultimate destination m d m d q home agent (HA) c Internet m d F H foreign agent (FA) 10/05/2010

Multicast Multicast msgs are forwarded through a spanning tree from root to every multicast destination If a destination receives a multicast msg, then each destination receives a copy of same msg with high probability 10/05/2010

Multicast Multicast msgs are forwarded through a spanning tree from root to every multicast destination If a destination receives a multicast msg, then each destination receives a copy of same msg with high probability 10/05/2010

Multicast Multicast msgs are forwarded through a spanning tree from root to every multicast destination If a destination receives a multicast msg, then each destination receives a copy of same msg with high probability 10/05/2010

Multicast Multicast msgs are forwarded through a spanning tree from root to every multicast destination If a destination receives a multicast msg, then each destination receives a copy of same msg with high probability 10/05/2010

Security Problem with Multicast If adversary inserts or modifies a multicast msg between two routers in middle of tree, then only a small fraction of multicast destinations receive the inserted or modified msg 10/05/2010

Multicast with Hop Integrity With hop integrity, an inserted or modified multicast message will be detected and discarded at its first hop in the spanning tree 10/05/2010

Routing Information Protocol (RIP) Every 30 seconds, RIP process in router R’ sends its routing table in a response msg to RIP process in each adjacent R R updates its routing table when it receives a response msg from any adjacent R’ Security problem R R RIP RIP UDP IP IP 10/05/2010

RIP with Hop Integrity With hop integrity, the response msgs are protected against message modification, insertion, and replay R R RIP RIP UDP Secret Update Secret Update IP IP Integrity Check Integrity Check 10/05/2010

Security of Routing Protocols Hop integrity can also provide uniform protection (against message modification, insertion, and replay) for other routing protocols OSPF protocols (Hello, Exchange, Flood) RSVP Better than custom security mechanisms that have been proposed for some protocols 10/05/2010

Implementation of Hop Integrity Implementation of hop integrity protocols in Linux kernel Add integrity check digest and soft sequence number to IP options in IP header Compatible with legacy routers Flexibility of deployment 10/05/2010

Related Works Ingress filtering [RFC2827] and egress filtering [RFC3013]: Completes hop integrity Secure routing: Not needed if hop integrity is installed Traceback: Cannot prevent denial-of-service attacks, but can detect some of them IPsec: Has goals other than dealing with denial-of-service attacks 10/05/2010

Next Class Midterm Exam on Oct. 12: good luck to all of you! After Midterm Exam: Security in transport layer SSL and TLS Application of SSL/TLS in Web security 10/05/2010