NETWORK SECURITY EE122 Section 12. QUESTION 1 SYN SYN ACK ACK Data RST ACK time A B Data RST ABRUPT TERMINATION  A sends a RESET (RST) to B  E.g.,

Slides:



Advertisements
Similar presentations
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Advertisements

TCP Flooding. TCP handshake C S SYN C SYN S, ACK C ACK S Listening Store data Wait Connected.
TRUE Blind ip spoofed portscanning Thomas Olofsson C.T.O Defcom.
CISCO NETWORKING ACADEMY Chabot College ELEC Transport Layer (4)
Computer Security and Penetration Testing
Are you secured in the network ?: a quick look at the TCP/IP protocols Based on: A look back at “Security Problems in the TCP/IP Protocol Suite” by Steven.
Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
Chapter 7 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain the need for the transport layer.  Identify.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
1 TCP - Part I Relates to Lab 5. First module on TCP which covers packet format, data transfer, and connection management.
1 CS 4396 Computer Networks Lab Transmission Control Protocol (TCP) Part I.
Network Security. Reasons to attack Steal information Modify information Deny service (DoS)
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
Security (Continued) V.T. Raja, Ph.D., Oregon State University.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
Distributed Denial of Service Attacks CMPT Distributed Denial of Service Attacks Darius Law.
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
Slide 1 Attacks on TCP/IP. slide 2 Security Issues in TCP/IP uNetwork packets pass by untrusted hosts Eavesdropping (packet sniffing) uIP addresses are.
8-1 Internet security threats Mapping: m before attacking: gather information – find out what services are implemented on network  Use ping to determine.
TCP/IP Network and Firewall. IP Packet Protocol  1 ICMP packet  6 TCP packet  17 UDP packet.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
04/12/2001ecs289k, spring ecs298k Distributed Denial of Services lecture #5 Dr. S. Felix Wu Computer Science Department University of California,
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Transport Protocols Slide 1 Transport Protocols.
1 CCNA 2 v3.1 Module Intermediate TCP/IP CCNA 2 Module 10.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 7: Denial-of-Service Attacks.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
1 ELEN 602 Lecture 15 More on IP TCP. 2 byte stream Send buffer segments Receive buffer byte stream Application ACKs Transmitter Receiver TCP Streams.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
CS426Fall 2010/Lecture 331 Computer Security CS 426 Lecture 33 Network Security (1)
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Firewalls. Evil Hackers FirewallYour network Firewalls mitigate risk Block many threats They have vulnerabilities.
1 Network Security (and related topics) EE122 Fall 2012 Scott Shenker Materials with thanks to Jennifer Rexford,
Network security Further protocols and issues. Protocols: recap There are a few main protocols that govern the internet: – Internet Protocol: IP – Transmission.
1 7-Oct-15 OSI transport layer CCNA Exploration Semester 1 Chapter 4.
CS426Network Security1 Computer Security CS 426 Network Security (1)
CSE 461 Section. Let’s learn things first! Joke Later!
Bandwidth Distributed Denial of Service: Attacks and Defenses.
CS526Topic 18: Network Security1 Information Security CS 526 Network Security (1)
1 The Attack and Defense of Computers Dr. 許 富 皓. 2 Network Architecture:
NETWORK ATTACKS Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
Denial of Service Attack 발표자 : 전지훈. What is Denial of Service Attack?  Denial of Service Attack = DoS Attack  Service attacks on a Web server floods.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
TCP Security Vulnerabilities Phil Cayton CSE
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
DoS/DDoS attack and defense
Breno de MedeirosFlorida State University Fall 2005 The IP, TCP, UDP protocols A quick refresher.
Lecture 17 Page 1 CS 236, Spring 2008 Advanced Topics in Network Security: IP Spoofing and DDoS CS 236 On-Line MS Program Networks and Systems Security.
Telecommunications Networking II Lecture 41d Denial-of-Service Attacks.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
1 Figure 4-11: Denial-of-Service (DoS) Attacks Introduction  Attack on availability  Act of vandalism Single-Message DoS Attacks  Crash a host with.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
Transport Layer1 TCP Connection Management Recall: TCP sender, receiver establish “connection” before exchanging data segments r initialize TCP variables:
Confidentiality using Conventional Encryption Chapter 5.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
1 14-Jun-16 S Ward Abingdon and Witney College CCNA Exploration Semester 1 OSI transport layer CCNA Exploration Semester 1 Chapter 4.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 OSI transport layer CCNA Exploration Semester 1 – Chapter 4.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
TCP Sliding Windows For each TCP connection each hosts keep two Sliding Windows, send sliding window, and receive sliding window to make sure the correct.
Network Security (part 2)
CSCE 715: Network Systems Security
Figure 3-23: Transmission Control Protocol (TCP) (Study Figure)
IIT Indore © Neminath Hubballi
Intrusion Detection and Hackers Exploits IP Spoofing Attack
Advanced Computer Networks
ITIS 6167/8167: Network and Information Security
Transport Layer 9/22/2019.
TCP Connection Management
Presentation transcript:

NETWORK SECURITY EE122 Section 12

QUESTION 1

SYN SYN ACK ACK Data RST ACK time A B Data RST ABRUPT TERMINATION  A sends a RESET (RST) to B  E.g., because application process on A crashed  B does not ack the RST  Thus, RST is not delivered reliably  And: any data in flight is lost  But: if B sends anything more, will elicit another RST

END-TO-END SECURITY  Application layer  TLS/SSL encrypts all application layer data  … but does not encrypt the TCP header!

END-TO-END SECURITY Encrypted Content TCP Header IP Header TLS/SSL (Application Layer)

END-TO-END SECURITY  Application layer  TLS/SSL encrypts all application layer data  … but does not encrypt the TCP header!  Transport layer  TCP sequence number defends against blind spoofing  … but not man-in-the-middle attacks  Network layer  IPsec encrypts the entire IP payload, including the TCP header

END-TO-END SECURITY Encrypted Content TCP Header IP Header Encrypted IP Header IP Header Encrypted Content Encrypted TCP Header TLS/SSL (Application Layer) IPsec (Network Layer)

BLIND SPOOFING  Need to know the sequence number

BLIND SPOOFING  Need to know the sequence number  How? Guess all numbers!  Alternatively, infer  first send a legitimate TCP SYN  Let’s say the receiver responds with sequence number A  Then spoof a TCP SYN assuming the receiver responds with A+1  Defenses?

QUESTION 2

/16

Source IP:

/16 Source IP: Egress Filtering

/16 Source IP:

/16 Source IP: Ingress Filtering

/16 Source IP: Ingress Filtering What’s missing?

Receiver Attacker SYN SYNACK (seqno = y) Source ??? ACK (ackno = k?)

Receiver Attacker … Confirmation Request Source ??? Confirmation Response Defenses?

Receiver Attacker … Confirmation Request (123) Source ??? Confirmation Response (456?) Nonce

QUESTION 3

You Web server X 100Mbps 1Gbps Web server X can comfortably handle the load you generate

DISTRIBUTED DENIAL-OF-SERVICE (DDOS) MasterSlave 1 Slave 3 Slave 4 Slave 2 Victim Control traffic directs slaves at victim src = random dst = victim Slaves send streams of traffic (perhaps spoofed) to victim

Reflector (R) Internet Attacker (A) Victim (V) SYN SYNACK REFLECTORS  Cause one non-compromised host to attack another  E.g., host A sends TCP SYN with source V to server R  R sends reply to V

DIFFUSE DDOS: REFLECTOR ATTACK MasterSlave 1 Slave 3 Slave 4 Slave 2Victim Control traffic directs slaves at victim & reflectors Request: src = victim dst = reflector Reflectors send streams of non-spoofed but unsolicited traffic to victim Reflector 1Reflector 9Reflector 4Reflector 2Reflector 3Reflector 5Reflector 6Reflector 7Reflector 11Reflector 8Reflector 10 Reply: src = reflector dst = victim

MITIGATING DDOS  No good defense…  Solutions so far  Overprovision  Distribute service to multiple machines

QUESTION 4

AndrewSteve E(M, Steve pub )

AndrewSteve E(M, Steve pub ) Man-In-The- Middle

AndrewSteve Man-In-The- Middle E(M’, Steve pub )

AndrewSteve E(M, Steve pub ) MAC(H(M), Andrew private ) Andrew pub ???

AndrewSteve E(M, Steve pub ) MAC(H(M), Andrew private ) E(Andrew pub, Steve pub )

AndrewSteve Man-In-The- Middle MAC(H(M), Andrew private ) E(Andrew pub, Steve pub ) E(M, Steve pub )

AndrewSteve Man-In-The- Middle MAC(H(M’), MITM private ) E(MITM pub, Steve pub ) E(M’, Steve pub )