CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.

Slides:



Advertisements
Similar presentations
A Client Side Defense against Address Resolution Protocol (ARP) Poisoning George Mason University INFS 612, Spring 2013 Group #3 (C. Blair, N. Eisele,
Advertisements

Chapter 5 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Describe the operation of the Ethernet sublayers.
1 Address Resolution Protocol (ARP) Relates to Lab 2. This module is about the address resolution protocol.
Media Access Control (MAC) addresses in the network access layer ▫ Associated w/ network interface card (NIC) ▫ 48 bits or 64 bits IP addresses for the.
 As defined in RFC 826 ARP consists of the following messages ■ ARP Request ■ ARP Reply.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 8 Address Resolution Protocol.
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
Chapter 19 Binding Protocol Addresses (ARP) Chapter 20 IP Datagrams and Datagram Forwarding.
Overview of simple LANs. Networking basics: LAN TCP/IP is the protocol used in the Internet and dominates the internet and transport layers The subnet.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Ethernet, ARP.
Network Layer (Part IV). Overview A router is a type of internetworking device that passes data packets between networks based on Layer 3 addresses. A.
Chapter 6 High-Speed LANs Chapter 6 High-Speed LANs.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 3 Address Resolution Protocol (ARP)
Network Layer – Subnetting and Control Protocols Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing,
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 03_a
Exploring the Packet Delivery Process Chapter
Common Devices Used In Computer Networks
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Address Resolution Protocol(ARP) By:Protogenius. Overview Introduction When ARP is used? Types of ARP message ARP Message Format Example use of ARP ARP.
CSCE 715: Network Systems Security
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
Internetworking – What is internetworking? Connect multiple networks of one or more organizations into a large, uniform communication system. The resulting.
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
Chapter 19 - Binding Protocol Addresses
CS 447 Networks and Data Communication ARP (Address Resolution Protocol) for the Internet Department of Computer Science Southern Illinois University Edwardsville.
ARP Spoofing Attacks Dr. Neminath Hubballi IIT Indore © Neminath Hubballi.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Ethernet Network Fundamentals – Chapter 9.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Chapter 19 Binding Protocol Addresses (ARP) A frame transmitted across a physical network must contain the hardware address of the destination. Before.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
Cisco Discovery Home and Small Business Networking Chapter 3 – Connecting to the Network Jeopardy Review Darren Shaver – Kubasaki High School – Okinawa,
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 8 Address Resolution Protocol.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 Kyung Hee University Chapter 8 ARP(Address Resolution Protocol)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Ethernet Network Fundamentals – Chapter 9.
CSIT 220 (Blum)1 ARP Based on Computer Networks and Internets (Comer)
Configuring VLAN Chapter 14 powered by DJ 1. Chapter Objectives At the end of this Chapter you will be able to:  Understand basic concept of VLAN  Configure.
Mapping IP Addresses to Hardware Addresses Chapter 5.
Ethernet Network Systems Security Mort Anvari. 9/28/20042 Ethernet Most widely used LAN technology Low cost and high flexibility Versions of different.
Address Resolution Protocol (ARP). Internet and Data Link Layer Addresses Each host and router on a subnet needs a data link layer address to specify.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
ADDRESS MAPPING ADDRESS MAPPING The delivery of a packet to a host or a router requires two levels of addressing: logical and physical. We need to be able.
Address Resolution Protocol Yasir Jan 20 th March 2008 Future Internet.
1 Address Resolution Protocol (ARP). 2 Overview 3 Need for Address Translation Note: –The Internet is based on IP addresses –Local area networks use.
Behrouz A. Forouzan TCP/IP Protocol Suite, 3rd Ed.
An Introduction To ARP Spoofing & Other Attacks
Address Resolution Protocol (ARP)
Address Resolution Protocol (ARP)
Chapter 8 ARP(Address Resolution Protocol)
ARP and RARP Objectives Chapter 7 Upon completion you will be able to:
Address Resolution Protocol
Computer Networks 9/17/2018 Computer Networks.
Net 323: NETWORK Protocols
Address Resolution Protocol (ARP)
CSCE 715: Network Systems Security
Ethernet Network Systems Security
Address Resolution Protocol (ARP)
1 ADDRESS RESOLUTION PROTOCOL (ARP) & REVERSE ADDRESS RESOLUTION PROTOCOL ( RARP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University,
Ch 17 - Binding Protocol Addresses
Computer Networks ARP and RARP
Presentation transcript:

CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina

9/23/20032 Ethernet Most widely used LAN technology Low cost and high flexibility Versions of different speed: 10Mbps, 100Mbps, Gigabit Use globally unique media access control (MAC) address (hardware address) for every interface card

9/23/20033 Use of Hardware Address Need an address to send a message to receiver on same Ethernet IP address is not usable because network layer does not listen to wire Use hardware address to identify receiver’s interface Need to resolve receiver’s hardware address from receiver’s IP address

9/23/20034 Address Resolution Protocol Protocol maps each IP address to corresponding hardware address in subnetwork For computer i to get hardware address of computer j, i broadcasts a rqst message with IP address of j to the subnetwork Internet i j r default router switch rqst(ipa.j)

9/23/20035 Address Resolution If j sees a rqst message from i with its IP address, j sends a rply message with its IP address and hardware address to i Internet i j r default router switch rply(ipa.j,hda.j)

9/23/20036 Functions of ARP Three functions of ARP Resolving IP addresses Supporting dynamic assignment of addresses Detecting destination failures

9/23/20037 ARP Spoofing Attack To stop traffic from i to j, an adversary sends to i a spoofed rply message with IP address of j and a non-existent hardware address Internet i j A r default router switch rply(ipa.j,hda.x)

9/23/20038 Another ARP Spoofing Attack To stop traffic from i to default router r, an adversary sends to i a spoofed rply message with IP address of r and its own hardware address Internet i j A r default router switch rply(ipa.r,hda.A)

9/23/20039 Countering ARP Spoofing Attacks Proposed solutions include ARPWATCH and static ARP caches Insufficiencies of proposed solutions ARPWATCH does not support dynamic assignment of IP addresses Static ARP caches does not support dynamic assignment of IP addresses and detection of destination failures

9/23/ Need for Secure Address Resolution When a computer receives a message m, it needs to determine whether m was indeed sent by claimed source, or was inserted, modified, or replayed by an adversary Use secure address resolution protocol between each computer and a secure server

9/23/ Architecture of Secure Address Resolution Protocol

9/23/ Adversary The adversary can perform three types of actions to disrupt communication between server s and any computer h[i] on the Ethernet Message loss Message modification Message replay

9/23/ Secure Address Resolution Protocol Use three mechanisms to counter adversary actions timeouts to counter message loss shared secrets to counter message modification nonces to counter message replay

9/23/ Invite-Accept Protocol Periodically, server s sends out an invt message to every computer on Ethernet Every up computer is required to send back an acpt message including its IP address and hardware address s updates its address database according to received acpt messages

9/23/ Request-Reply Protocol When a computer needs to resolve a destination’s hardware address, it sends a rqst message to server s If destination’s hardware address is still valid, s sends back a rply message with address information If destination’s hardware address is not valid anymore, s sends back a rply message with no address information

9/23/ Extensions Four extensions of secure address resolution protocol Insecure address resolution Backup server System diagnosis Address resolution across multiple Ethernets

9/23/ Next Class IPsec Authentication Header (AH) Encapsulation Security Payload (ESP) key management Read Chapter 16