ITIS 6167/8167: Network and Information Security Weichao Wang.

Slides:



Advertisements
Similar presentations
© N. Ganesan, All rights reserved. Chapter IP Addressing Format.
Advertisements

An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
L0. Introduction Rocky K. C. Chang, January 2013.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Firewalls and Intrusion Detection Systems
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
Security (Part 2) School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 13, Thursday 4/5/2007)
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
8-1 Internet security threats Mapping: m before attacking: gather information – find out what services are implemented on network  Use ping to determine.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
ITIS 6200/8200. time-stamping services Difficult to verify the creation date and accurate contents of a digital file Required properties of time-stamping.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
ITIS 6200/8200: Principles of Information Security and Privacy Dr. Weichao Wang.
1 Chap 1: Introduction Some background –The message is usually represented as M or P (plaintext), the encryption result is usually represented as C (ciphertext).
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Network Security. Contents Security Requirements and Attacks Confidentiality with Conventional Encryption Message Authentication and Hash Functions Public-Key.
DNSSEC Cryptography Review Track 2 Workshop July 3, 2010 American Samoa Hervey Allen.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Cryptography, Authentication and Digital Signatures
Final Exam Review Knowledge questions True or false statement (explain why) Protocol Calculation Cover the second half contents.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Network Security David Lazăr.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 28 (last) November 30, 2004.
Lecture 2: Introduction to Cryptography
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Attacking on IPv6 W.lilakiatsakun Ref: ipv6-attack-defense-33904http://
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
IT443 – Network Security Administration Instructor: Bo Sheng
Crypto in information security
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Managing Secure Network Systems
ITIS 6200/8200: HCIP 6200 Principles of Information Security and Privacy Dr. Weichao Wang.
Firewalls Routers, Switches, Hubs VPNs
Session 20 INST 346 Technologies, Infrastructure and Architecture
Lecture 36.
Lecture 36.
Presentation transcript:

ITIS 6167/8167: Network and Information Security Weichao Wang

2 Security overview Risks –Computers have controlled our lives Medical, ATM, banking, business Air traffic control –Why there are risks Adversaries –Smart and dedicated –Many of them –Hiding in the dark –From fun to profit (worm  self-changing  botnet)

3 Examples in real life Attack on Twitter –Hack into the victim’s account –DDoS to paralyze Twitter, facebook, etc Data mining attacks on public database –In Tenn, a newspaper generates a database about all residents that have CCW permits. –In CA, there is a webpage listing all people that donate to Proposition 8 ballot measure

4 Security overview Physical security is not enough (can you be sure that your physical security methods are sound and enough?) Networked computers can be accessed remotely

5 Security overview Defending methods –Prevention Prevent (password, salt, private salt, searching) Deter: raising the bar (password guessing, login slow) Deflect: making other target more attractive Diversify –Detection Monitoring (who, what, and how) Intrusion detection (signature based, anomaly based) IP telephony track

6 Security Overview Recovery –Recover data (check point) –Identify the damage –Forensics –Containment Tolerance –Maintain a decent service quality –Automatically degrade video quality while reserving bandwidth for voice

7 Security overview How prevention works –Policies –Encryption Digital cash, time-stamp, secure multiparty computation, e-voting, e-bidding –Access control and authorization Hardware control (interaction free authentication) Software control (RFID credit card) Information disclosure (write prevention)

8 Security overview What can go wrong with prevention –Design, implement, configuration –Mal-code transfer (enterprise level security) –Attackers are smart and dedicated –Uncle Tom wants it to be safe against terrorists, but not to him

9 Security overview Some additional methods to improve security –Least privilege –Writing good code –Security testing –Embed security from beginning instead of as a patch

10

11 Network security overview The features causing security problems –Sharing: access control for a single system is not enough –Complexity of systems –Undefined boundary: one host may be on multiple networks –Multiple-node path before data reaches you: anonymity of attacker and hard to traceback: the South Bell example

12 A typical NFS operation and its security features: –A read from B: confidentiality –A write to B: Integrity and confidentiality –Forge communication from A to B: integrity –Block traffic b/w A and B: availability –Impersonation

13 Security problems in network protocols: –ARP: cache poisoning –IP: spoofing, fragmentation –ICMP: –UDP: –TCP: session hijacking, SYN flood, DoS –DNS systems –Buffer overflow

14 Security methods –Hiding: OS configuration, port, –Encryption: IPSec –Port protection: telnet, ftp, etc –Authentication –Data integrity: digital signature, checksum –Firewall: block unwanted traffic –IDS –Forensics –Proof of possession

15

16 Review of networks Network consists of –Hosts –Network devices –Links –Software The view of Internet –Users’ view –Real topology

17 How routers work –Look at the destination address of the packet –Look up in the local routing table –Determine the exit interface –The next router will do the same –Default router –Route based on sub-network instead of IP address

18 IP address classes –Class A to C –Class A can have: million addresses –Class B can have: addresses –Class C can have: 256 address –A decent cooperation needs one to many class B addresses (Purdue’s joke)

19 Special address: – : local broadcast – : this host – : loopback –CIDR: classless inter-domain routing What about IPv6 addresses

20

21 Review of Cryptography Two kinds of cryptographic algorithms –Keep the method secret Good: safe for low security requirement Bad: update, proof of correctness, how to communicate with outsider –Make the algorithm public but keep the key secret Safety depends on the key only Good: safety analysis can be conducted

22 Introduction (cnt’d) Symmetric algorithms –The encryption and decryption key can be calculated from each other easily (most of the time the same). –Block algorithms and stream algorithms Cipher text is same of longer in length: Why?? –Good: efficient and fast, easy to deploy –Bad: key distribution, scalability, broadcast or multicast

23 Introduction (cnt’d) Public-key encryption –First appear in 1970’s –Two keys: public key and private key –Private key cannot be derived from public key –Everyone can send a packet to Alice –Only Alice has the private key to recover the packet –If Alice uses the private key to encrypt a message, can be viewed as digital signature –Strong, scalable, easy for broadcast and multicast, but very slow

24 Introduction (cnt’d) Attack to encryption system –Cipher-text only attack The amount of traffic matters –Known plaintext attack –Chosen plaintext attack Key point –Keep the cost to break the system higher than the gain of the information

25 Introduction (cnt’d) Can you always break an encryption system? –One time pad –Brute-force attack: Try every possible key

26 Introduction (cnt’d) Several old fashion encryption algorithms –Substitution ciphers Replace a character in the plaintext with another character Example: Caesar cipher –Transposition ciphers Shuffle the order of characters The frequency of characters does not change –XOR and one-time pad: If the random bits repeat in cycle, it is bad Synchronization at both side is always a problem

27

28 One way functions One way function is easy to calculate in one direction, but not the other. –Given x, easy to get f(x) –Given f(x), even f() is known, still not easy to get a x Trap door one way function –Given x, easy to calculate f(x) –Given f(x), difficult to get x –Given f(x) and a secret y, easy to get x

29 One way hash function Map a variable-length input string to a fixed length string: fingerprint the file –Easy to get Hash(x) when giving x –Almost impossible to find a x that satisfies Hash(x) –Almost impossible to find two files x and x’ to have the same hash value –Minor change in x, large changes in Hash(x) Since the hash value is shorter, we have conflict: –We can easily rule out files, but not guarantee this is the origin file –Still good enough in courts, like DNA tests

30 One way hash function Usage of hash function –Timestamp a file and prove that you are the creator (can be used to timestamp the homework) –Verify the integrity of the files in a file system Security problems: how and where to save the hash values Hash(x, k) to prevent change on the computer