Lecture 36.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Chapter 5 Network Security Protocols in Practice Part I
SCSC 455 Computer Security Virtual Private Network (VPN)
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
1 Lecture 15: IPsec AH and ESP IPsec introduction: uses and modes IPsec concepts –security association –security policy database IPsec headers –authentication.
Securing TCP/IP Chapter 6. Introduction to Transmission Control Protocol/Internet Protocol (TCP/IP) TCP/IP comprises a suite of four protocols The protocols.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
K. Salah1 Security Protocols in the Internet IPSec.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
OSI Model Routing Connection-oriented/Connectionless Network Services.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Karlstad University IP security Ge Zhang
Network Security David Lazăr.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
K. Salah1 Security Protocols in the Internet IPSec.
第六章 IP 安全. Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
IP Security
CSCI 465 Data Communications and Networks Lecture 26
Virtual Private Networks and IPSec
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
IPSec Detailed Description and VPN
Chapter 5 Network Security Protocols in Practice Part I
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
IPSecurity.
Web Applications Security Cryptography 1
Virtual Private Networks
CSE 4905 IPsec.
Encryption and Network Security
Chapter 16 – IP Security If a secret piece of news is divulged by a spy before the time is ripe, he must be put to death, together with the man to whom.
Chapter 18 IP Security  IP Security (IPSec)
Internet and Intranet Fundamentals
IT443 – Network Security Administration Instructor: Bo Sheng
Network Security.
Cryptographic Hash Function
UNIT.4 IP Security.
IPSec IPSec is communication security provided at the network layer.
CIT 480: Securing Computer Systems
CSE565: Computer Security Lecture 23 IP Security
Cryptography and Network Security
Topic 5: Communication and the Internet
IP Security - Chapter 6 of William Stallings. Network Security Essentials (2nd edition). Prentice Hall Slides by Henric Johnson Blekinge Institute.
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Virtual Private Networks (VPNs)
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
VPN: Virtual Private Network
NET 536 Network Security Lecture 5: IPSec and VPN
Outline Using cryptography in networks IPSec SSL and TLS.
Virtual Private Networks (VPNs)
Chapter 6 IP Security.
Security in Wide Area Networks
Security in Wireless Metropolitan Area Networks (802.16)
Security in Wireless Metropolitan Area Networks (802.16)
Lecture 36.
Cryptography and Network Security
Presentation transcript:

Lecture 36

Limit the Signal Wire integrity and tapping In a traditional Ethernet, signals do not radiate far beyond the wire, so eavesdropping requires physical proximity to the network cable and physically tapping the line. This is done by splicing into the line (old “thicknet” Ethernet used “vampire” taps to add stations to the network, which actually tapped into the wire), stealing a line from a hub (which splits a network into a star topology), bridging the network, or similar techniques. Tapping can be detected by the change in electrical resistance in the wire. 11/20/2019

Physical limitation The problem then becomes physically limiting who has access to the machines or the endpoints once the problem of tapping the wire between endpoints has been addressed. Machines need to run secure (enough) operating systems and have accounts and secure passwords. 11/20/2019

Encryption One of the most common and useful techniques to protect data is encryption. Encryption has been used for thousands of years; in fact, a simple technique called the Caesar cipher was said to be used by Julius Caesar. Since modern computer speeds have rendered many techniques insecure, we will focus on the essential components of the methods that are used currently 11/20/2019

Private key or symmetric encryption. Public and private key encryption Private key or symmetric encryption. Public key or asymmetric encryption 11/20/2019

Computational and data overhead Private key algorithms generally run significantly faster than public key ones. This computational overhead becomes a factor when significant amounts of data must be encrypted (or decrypted) or if the processing power of the computer is limited, as in palmtop devices o sensor networks. 11/20/2019

Integrity Codes Checksum versus cryptographic hash Checksums are a common type of basic integrity code and are transmitted with the data. The receiver applies a simple formula to the data and compares the result with the integrity code that was transmitted to ensure with high probability that he received the message intact. Parity bits and cyclic redundancy checks (CRCs) are examples of checksums. 11/20/2019

Message authentication code (MAC) A message authentication code (MAC) is a one-way hash function plus a secret key. In the first approach, the function computes the MAC by encrypting the hash of the message using the key; in the second approach, the function computes the MAC by taking the hash of the message and the key concatenated together. MACs protect the message’s authenticity without secrecy. The MACs are attached to the message. 11/20/2019

Payload versus header A packet consists of a header and a payload. The header contains source and destination address information and additional information such as the protocol, sequence number, and special flags. The payload is the data. 11/20/2019

Traffic analysis Even with encryption and integrity codes, packets are still vulnerable to a traffic analysis attack. This is particularly problematic if the header and payload are encrypted together because many parts of the header are predictable. 11/20/2019

Other Security-Related Mechanisms Authentication protocols Authentication protocols provide a mechanism to verify a user’s claimed identity when he establishes a connection to a remote system. Protocols that allow a remote system login or code execution, such as telnet, ssh, and RPC, use the remote operating system’s authentication mechanism (typically a username and password combination). 11/20/2019

AAA Authentication, authorization, and auditing (AAA) help to maintain the security of systems. An IETF Working Group focuses on developing the requirements for AAA and protocols that implement them [AAA]. 11/20/2019

special hardware can be used. One type of hardware is smartcards that contain cryptographic tokens or run algorithms to generate one-time passwords. Another type of hardware is a transmitter that makes it difficult to receive transmissions. Personal and local area networks, as well as cell phones , transmit with only enough power for the corresponding receiver to detect the signal successfully. In addition, they use frequency-hopping and spread-spectrum technology to increase the effective bandwidth, which also has the effect of making it more difficult to reconstruct the signal. 11/20/2019

IPSec IP Security IP Security (IPSec) are protocols that provide security for Internet Protocol (IP) packets. There are three main components to IPSec. The Internet key exchange (IKE) defines a hybrid protocol to negotiate and provide authenticated keying material for security associations in a protected manner. The authentication header (AH) provides message integrity. The encapsulating security payload (ESP) provides confidentiality. 11/20/2019

Authentication header The AH uses a MAC (see Section 13.3.2), referred to as an integrity check value (ICV), to guarantee the integrity of the data. It also can prevent replay attacks by including a sequence number in the header. Similar in ESP, it can operate in transport or tunnel mode. In transport mode, the AH information is added immediately following the IP header information. In tunnel mode, the entire original IP datagram becomes the payload of the IPSec packet, with the AH providing integrity for both its headers and the payload. 11/20/2019

Encapsulating security payload The ESP is a mechanism to provide confidentiality and integrity to data by encrypting the payload. ESP operates in one of two modes, tunnel mode or transport mode, and the packet’s payload consists of either the upper-layer protocol (e.g., TCP, UDP, ICMP, or IGMP) or the entire IP datagram, respectively 11/20/2019

In transport mode, the ESP is added after the IP header, before any upper-layer protocols. The original IP headers are still visible. In tunnel mode, the entire IP datagram is encrypted within the ESP. Tunnel mode can be used by security gateways. The endpoint hosts communicate with the security gateways (through a protected intranet), and the security gateways communicate with each other via IPSec. 11/20/2019