A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Internet Protocol Security (IP Sec)
Secure Mobile IP Communication
Network Security Essentials Chapter 11
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Unifying the conceptual levels of network security through use of patterns Ph.D Dissertation Proposal Candidate: Ajoy Kumar, Advisor: Dr Eduardo B. Fernandez.
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.
Network and Security Patterns
Virtual Private Networks and IPSec
Unifying the Conceptual levels of Network Security through use of Patterns. PhD Proposal Ajoy Kumar Secure Systems Research Group – Florida Atlantic University.
SSH: An Internet Protocol By Anja Kastl IS World Wide Web Standards.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Internet Protocol Security (IPSec)
PhD Proposal - Draft Ajoy Kumar Advisor: Dr. EF
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Virtual Private Network
VPN: Virtual Private Network Presented By: Gregg Dowdy Liz Farricker Whitney Mayoras.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
1 The SpaceWire Internet Tunnel and the Advantages It Provides For Spacecraft Integration Stuart Mills, Steve Parkes Space Technology Centre University.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Csci5233 Computer Security1 Bishop: Chapter 11 An Overview of Cipher Techniques (in the context of networks) ( )
1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang.
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
VPN: Virtual Private Network Presented By: Wesam Shuldhum ID:
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
IS3220 Information Technology Infrastructure Security
Securing Access to Data Using IPsec Josh Jones Cosc352.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
IP Security
Virtual Private Networks
Virtual Private Networks
Virtual Private Networks and IPSec
Virtual Private Networks
Virtual Private Networks (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
Chapter 18 IP Security  IP Security (IPSec)
VPN: Virtual Private Network
Virtual Private Networks (VPN)
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network (VPN)
VPN: Virtual Private Network
Virtual Private Network zswu
Topic 12: Virtual Private Networks
Presentation transcript:

A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca Raton, FL, USA Secure Systems Research Group – Florida Atlantic University

Introduction Virtual Private Networks (VPN) make use of public network resources to access internal nodes of an enterprise. Within the VPN, the transmission is protected by security mechanisms to provide confidentiality and integrity. So a “private” network is established. Since this network exists only in a virtual sense, it has been termed a virtual private network. Secure Systems Research Group – Florida Atlantic University

VPN VPN uses a technique called tunneling, in which data is transmitted across a public network in a cryptographic tunnel that simulates an end to end connection. The end connections could be both private or one end private with the other end being a public domain. Secure Systems Research Group – Florida Atlantic University

VPN R1 – Router at Site A. R2 – Router at Site B. Secure Systems Research Group – Florida Atlantic University

Figure 2. Network Layers and Patterns FireWallIDSVPNProtocol ApplicationXML FWXML IDSXML VPNSAML TCPProxy FWTCP IDSTLS/SSL VPNTLS IPPacket FWPacket IDSIPSec VPNIPSec AUTHENTICATIONAUTHENTICATION SECRECYSECRECY AUTHORIZATIONAUTHORIZATION IDENTIFICATIONIDENTIFICATION Secure Systems Research Group – Florida Atlantic University

Pattern Diagram for VPN VPN TLS VPNIP VPNXML VPN Authentication Secure Channel TLSIPSec Secure Systems Research Group – Florida Atlantic University

Problem In today’s world, a lot of people work remotely. They need a secure connection to their company network. We need to develop a secure architecture so that confidential work can be performed. Many companies have offices distributed all over the globe. The employees of such companies need to communicate securely. Secure Systems Research Group – Florida Atlantic University

Forces The number of users remotely connected may be growing; the system should be scalable. The system should be flexible enough to accommodate different ways of providing security. We should restrict access to the system to only authorized users. We need to use the Internet or public networks to reduce the cost; in turn subjecting the private network established within the public network to numerous threats faced by the public networks such as Denial of Services and other attacks. Secure Systems Research Group – Florida Atlantic University

Solution A secure VPN connection is established between the end user and the local network. A cryptographic tunnel is set up between the end user and the local network This VPN Tunnel may provide data integrity and confidentiality if properly implemented. The network is able to authenticate a user accessing an end point. Secure Systems Research Group – Florida Atlantic University

Network End Point VPN Authenticator Secure Channel Identity Base Identity * * * Class Diagram * Secure Systems Research Group – Florida Atlantic University

:End Point :VPN :Identity Base :Identity :Secure Channel:Network authenticated Establish Secure Channel VPN Connection Established RequestAuth Established authenticate check Sequence Diagram Secure Systems Research Group – Florida Atlantic University

Variants Virtual Priivate Networks can be established at the Application layer, IP Layer or the TCP layer. XML VPN are established at the application layer and IP VPN are established at the IP Layer and TSL VPN are established at the TCP Layer. Secure Systems Research Group – Florida Atlantic University

Known Uses Ctrix provides a site to site SSL VPN connection for remote users to log into the secure network as well as access applications on the company (secure) network. [Cit] Cisco VPN on the other hand uses a IPSec VPN. [Cis] Nokia VPN provides VPN connection for Nokia Mobile Users. [Nok] Secure Systems Research Group – Florida Atlantic University

Advantages Users are authenticated by the system to control their access to the VPN. We could add a logging system for the users logging in at the end points for future audits. If we use secure encryption, we can provide data confidentiality and integrity for the messages sent through the VPN. Secure Systems Research Group – Florida Atlantic University

Disadvantages If the VPN connection is compromised, the attacker could get full access to the internal network. Because of encryption, VPN traffic is invisible to IDS monitoring. If the IDS probe is outside the VPN server, as is often the case, then the IDS cannot see the traffic within the VPN tunnel. Therefore if a hacker gains access to the VPN, he can attack the internal systems without being detected by the IDS. Secure Systems Research Group – Florida Atlantic University

Disadvantages (Contd…) In case of VPN with a private end user, the remote computer used by the private user is vulnerable to outside attacks which in turn can attack the network it is connected to. The VPN Tunnel is only as strong as the cryptographic protocol used. Secure Systems Research Group – Florida Atlantic University

Related Patterns Firewalls can be added to each network layer to make the network layer more secure. [Fer03] IDS can also coexist in each of these network layers to detect attack. [Fer05] Secure Channel and Authenticator establishes the security mechanisms. Secure Systems Research Group – Florida Atlantic University

Conclusions A VPN is a basic component in network architectures. We presented here a pattern for its architecture and security properties. Future work will integrate this pattern with other patterns shown in Figure 3. Secure Systems Research Group – Florida Atlantic University

Q & A Suggestions Modifications Corrections Secure Systems Research Group – Florida Atlantic University