MASK. Agenda Introduction –IRC prelude –What is IRC? –How does IRC work? Architecture –Client/Server –IRC commands –3 major types of communication on.

Slides:



Advertisements
Similar presentations
CMPE208 Presentation Terminal Access Controller Access Control System Plus (TACACS+) By MARVEL (Libing, Bhavana, Ramya, Maggie, Nitin)
Advertisements

Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Bots and Botnets CS-431 Dick Steflik. DDoS ● One of the most common ways to mount a Distributed Denial of Service attacks is done via networks of zombie.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Chat applications and IRC Presented by Tyler Maciolek.
Adaptive Security for Wireless Sensor Networks Master Thesis – June 2006.
Information Networking Security and Assurance Lab National Chung Cheng University Guidelines on Electronic Mail Security
SYN Flooding: A Denial of Service Attack Shivani Hashia CS265.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Securing Instant Messaging Matt Hsu. Outline Introduction Instant Messaging Primer Instant Messaging Vulnerabilities and Exploits Securing Instant Messaging.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Net+ Chapter 1 Introduction to Networks. First Things First: What’s a Network? LAN WAN Workgroup How do you connect LANs?
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
Internet Relay Chat David Holl IS 373. Overview Introduction Standards Body History Specifications Advantages and Disadvantages Privacy Security Pervasiveness.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Secure Remote Access to an Internal Web Server Christian Gilmore, David Kormann, and Aviel D. Rubin ATT Labs - Research “The security policy usually amounts.
Virtual Private Network
Network Topologies.
SSH Secure Login Connections over the Internet
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
FTP File Transfer Protocol. Introduction transfer file to/from remote host client/server model  client: side that initiates transfer (either to/from.
The Internet’s Hardware Much of the hardware components that make up the Internet are owned or shared by thousands of private and public organizations.
Introduction to Networking Concepts. Introducing TCP/IP Addressing Network address – common portion of the IP address shared by all hosts on a subnet/network.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Chapter 13 – Network Security
Networking Basics Lesson 1 Introduction to Networks.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Chapter 21 Distributed System Security Copyright © 2008.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
ACM 511 Introduction to Computer Networks. Computer Networks.
CPT 499 Internet Skills for Educators Session Seven Class Notes.
An analysis of Skype protocol Presented by: Abdul Haleem.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
Chien-Chung Shen Bot and Botnet Chien-Chung Shen
Security fundamentals Topic 10 Securing the network perimeter.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 14 How Internet Chat and IM Work.
Introduction to Networks Mr. Grimming. Types of Networks Wide Area Network (WAN) Cover large geographic area Nodes connected by coaxial cable, microwave.
Implementing Secure IRC App with Elgamal By Hyungki Choi ID : Date :
Client – Server Architecture A Basic Introduction 1.
Role Of Network IDS in Network Perimeter Defense.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Netprog: Chat1 Chat Issues and Ideas for Service Design Refs: RFC 1459 (IRC)
P2P Networking: Freenet Adriane Lau November 9, 2004 MIE456F.
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
1 SUBMITTED BY- PATEL KUMAR C.S.E(8 th - sem). SUBMITTED TO- Mr. DESHRAJ AHIRWAR.
1 Example security systems n Kerberos n Secure shell.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Network Architecture Characteristics  Explain four characteristics that are addressed by.
Network Topologies for Scalable Multi-User Virtual Environments Lingrui Liang.
Apr 1, 2003Mårten Trolin1 Previous lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
Security fundamentals
Introduction What is a Network?
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
Network Configurations
PPP – Point to Point Protocol
Network Services.
Chat Refs: RFC 1459 (IRC).
Kerberos Kerberos is an authentication protocol for trusted hosts on untrusted networks.
Chinese wall model in the internet Environment
Test 3 review FTP & Cybersecurity
Presentation transcript:

MASK

Agenda Introduction –IRC prelude –What is IRC? –How does IRC work? Architecture –Client/Server –IRC commands –3 major types of communication on IRC networks

Agenda (cont…) Problems with IRC –Scalability –Labels –Channels –Servers Security –Authentication –Denial of Service Attacks Questions & Answers

Introduction IRC prelude –Internet Relay Chat –Originally written by Jarkko Oikarinen in 1988 –In use by over 60 countries around the world –RFC 1459

Introduction (cont…) What is IRC? –Communication in real time –Multi-user and multi-channel chatting system –FTP –Communication is established over "channels“ –No restriction on the number of people in a given channel or the number of channels that can be formed on IRC.

Introduction (cont…) How does IRC work? –Install an IRC client application (ircII, mIRC) – Establish connection to one of many IRC server on the IRC networks. –The user chooses a nickname and joins the channel (rooms) according to locations, philosophies or interests. –There are thousands of networks where people may meet, participate in group discussion or opt to chat privately –The client can issue commands (/help, /whois, list) to get help or query the IRC networks. –Servers are interconnected –Messages are passed from server to server over the IRC networks Note: IRC does not allow any two clients to communicate directly and all the communication is relayed through the servers only.

Architecture Servers –Network of servers which form a spanning tree among themselves. –These servers provide a point to which clients and other server may connect to each other. –Each server acts as a central node among other servers. Clients –A client is basically a node that is connecting to a server that is not another server. –Each client is distinguished by a unique nickname. –When a client connects to one of those servers and sends a message, it will travel along the backbone of each connected servers.

Architecture (cont…) IRC networks Reference: Image:Ircnetz-Schema.svg

Architecture (cont…) IRC commands –Client commands /NICK – change nickname /HELP – print help screen /LIST – list IRC channels, # users, topics –Server commands KICK – eject a client from channel INVITE – invite a client to an invite-only channel MODE – change the channel’s mode

Architecture 3 Major types of communication –Client to Server Occurs when there is a change in the state information such as channel membership, channel mode, client message transport…etc –Server to Server Broadcast message and are mostly required when it is affecting any channel or user. –Termination Client-Server connection termination (normal) is done through a “\Quit” command sent by the client. Server-Server connection termination (abnormal) is either done by some natural causes or through “SQuit” command. The server that detected the connection termination must update IRC networks.

Problems with IRC Scalability –Because each server must know about every other server and client connect to the IRC network, updating these information as soon as they occur is expensive as the IRC network expands. Labels –Because users can pick up any labels for nicknames, server name and channel name which may result in collisions. Need to establish unique labels for all objects within the IRC networks. Channels –As the number of channels grows, privacy becomes harder to maintain. Servers –Data consistency checks with the database are to far and between with the current servers, instead it relies heavily on neighbouring servers data(which are assumed to be flawless). –Race conditions can occcur without unique labels being implemented in IRC.

Security Authentication –Weak authentication mechanism with the passwords being communicate in clear text amongst the servers. –No real effort is made to encrypt. –Solution: encrypt the password. Denial of Service Attacks (DoS) –Its almost impossible to ensure that every server is properly secure as almost anyone can sign up to host a server. –The attacker can flood the server with garbage data and keep it busy while making it unavailable to another user. –Solution: Operators can find these offenders and punish them; –Solution: Client enforce protection through firewalls and anti- viruses themselves

Probable Solutions Timestamping Nick/Channel Delay

Conclusion Excellent Multi-user service Attacked by the users who use it most Undergone revisions continuously (4) Major Applications –DCC ( Secure Chat Protocol) –Iphone (internet Telephone)

Questions & Answers