Network and Security Patterns

Slides:



Advertisements
Similar presentations
h Protection from cyber attacks is achieved by acting on several levels: first, at the physical and material, placing the server in a place as safe as.
Advertisements

Encrypting Wireless Data with VPN Techniques
Network Security Essentials Chapter 11
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Guide to Network Defense and Countermeasures Second Edition
Unifying the conceptual levels of network security through use of patterns Ph.D Dissertation Proposal Candidate: Ajoy Kumar, Advisor: Dr Eduardo B. Fernandez.
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Module 5: Configuring Access for Remote Clients and Networks.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
1 © NOKIA Presentation_Name.PPT / DD-MM-YYYY / Initials Company Confidential The Internet offers no inherent security services to its users; the data transmitted.
Unifying the Conceptual levels of Network Security through use of Patterns. PhD Proposal Ajoy Kumar Secure Systems Research Group – Florida Atlantic University.
Chapter 12 Network Security.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Virtual Private Networking Karlene R. Samuels COSC513.
Copyright Kenneth M. Chipps Ph.D. 1 VPN Last Update
PhD Proposal - Draft Ajoy Kumar Advisor: Dr. EF
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Network
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Intranet, Extranet, Firewall. Intranet and Extranet.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Securing Microsoft® Exchange Server 2010
Joseph Ferracin Director IT Security Solutions Managing Security.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Patterns for Application Firewalls Eduardo B. Fernandez Nelly A. Delessy Gassant.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
The University of Oklahoma Virtual Private Network How it works.
A Pattern Language for Firewalls Eduardo B. Fernandez, Maria M. Petrie, Naeem Seliya, Nelly Delessy, and Angela Herzberg.
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Module 10: Windows Firewall and Caching Fundamentals.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
K. Salah1 Security Protocols in the Internet IPSec.
Securing Access to Data Using IPsec Josh Jones Cosc352.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Virtual Private Networks
CSCI 465 Data Communications and Networks Lecture 26
Virtual Private Networks (VPN)
Virtual Private Networks
Securing the Network Perimeter with ISA 2004
Virtual Private Networks (VPN)
CIT 480: Securing Computer Systems
Goals Introduce the Windows Server 2003 family of operating systems
Virtual Private Network
IS4680 Security Auditing for Compliance
Cengage Learning: Computer Networking from LANs to WANs
Topic 12: Virtual Private Networks
Presentation transcript:

Network and Security Patterns Ajoy Kumar

Introduction Network Layer Security is something which has become the of prime importance in designing any network system. We look at the important layers of the network and try to identify the different Security Patterns associated with each layer. My work will be trying to fill the gaps at each layer where security patterns are missing or not well established.

VPN Security We first look at the available patterns in the system. And as the next step, we try to understand the VPN architecture and we try to develop a Security pattern for the VPN Architecture.

Network Architecture Security Objects AU T H E N I CA ON SECRECY AUTHOR ZAT ION IDENT F C A O FireWall IDS VPN Protocol Application XML FW XML IDS XML VPN SAML TCP Proxy FW TCP IDS TLS/SSL VPN TLS IP Packet FW Packet IDS IPSec VPN IPSec

Class Diagram for XML Firewall[Ne06]

Class Diagram for a Packet FW[Fe06]

Class Diagram for Proxy FireWall[Fe03]

Class Diagram for IDS.[Fer05]

VPN Architecture VPN make use of public network resources to connect to the private network of the enterprise. Within the VPN, the transmission is protected by security principles to assure confidentiality of the user(s) and data integrity. So a “private” network is established in the public domain. Since this network exists in a logical sense, it has been termed as virtual private network.

Features of a good VPN Security Reliability Scalability Network management Policy management

Problem In the company where I work we have a lot of remote employees who log in from different parts of the world such as St. Louis, USA or Israel. These developers log into a machine in Boca and work virtually from Boca. These connections are done using an VPN architecture. We need to develop the most safe architecture so that the work is done most efficiently and with the least threats to security.

Context Local networks with applications being executed in distributed systems. Access to the network can be from the Internet or from other external networks using a VPN connection.

Forces There are many remote users trying to connect to the same network from different end points. A good VPN system must accommodate all these users. There may be different end users that may require different levels of security. We need to define appropriate policies for each of these VPN connections. The company has various employees joining and leaving the company. Hence the security policies need to be constantly modified. Hence the VPN configuration should be easily configurable. The number of users and applications may increase significantly; adding more users or applications should be done transparently and at proper cost. A VPN set up should avoid access to the corporate network from all harmful external elements There are many ways to perform authentication. The VPN must support the different methods.

Pattern Diagram TCP VPN IP VPN XML VPN Authentication Secure Channel Authorization IPSec TLS Secrecy Message Authentication VPN PKI RM

Class Diagram for a VPN End User Secure Network VPN Network End User Auth Point Secure Channel Identity Base Policy Base Identity Policy

Sequence Diagram for a VPN Authentication :End User :VPN :EndUserAuthPT :IdentityBase :Policy Base :SecureCh :SecureN/W rqstConn rqstConn authenticate authenticated checkAccess accessAllowed openSecConn Established Established

Solution Whenever an end user tries to connect to a VPN, the network should ask for authorization. An user can access a network only if a specific policy authorizes it to do. Policy enforcing includes authenticating the end user who is trying to connect to the network. The VPN Tunnel created should maintain its confidentiality and data integrity.

Consequences Advantages Company can define the policies for VPN end users thus centralizing the policies and makes the administration better. Since authorization is used, company can keep a log of end users connected in the present and in the past. A secure tunnel guarantees data integrity and secrecy. Usually a PKI system of encryption is used for sending data over the tunnel. As authentication of end users are performed, users can be held responsible for their actions . We can also incorporate RBAC based on the role of the end user. Usually a Firewall complements a VPN setup..

Consequences (Contd…) Liabilities If the VPN is compromised, then the attacker gets full access to the internal network too. VPN traffic is often invisible to IDS monitoring.If the IDS probe is outside the VPN server, as is often the case, then the IDS cannot see the traffic within the VPN tunnel because it is encrypted. Therefore if a hacker gains access to the VPN, he can attack the internal systems without being picked up by the IDS. Whatever type of VPN we use, VPN is only as secure as the remote computer connected to it.

Liabilities (Contd…) The pattern does not discuss the attack at the end points. VPN Tunnel is only as strong as the cryptography that enables it.

Known Users Citrix. Citrix provides a site to site VPN connection for remote users to log into the secure network as well as access applications on the company (secure) network.

Related Patterns Patterns for Application Firewalls using PEP and PAP. Nelly Delessy-Gassant, Eduardo B. Fernandez, Saeed Rajput,and Maria M. Larrondo Petrie

Future Work Expand on the VPN Pattern and create separate patterns for IP, SSL and XML VPNs. Developing the patterns missing in the network security diagram shown before.

Thank You Q&A Suggestions Concerns