EE 122: Network Security Kevin Lai December 2, 2002.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Internet Threats Denial Of Service Attacks “The wonderful thing about the Internet is that you’re connected to everyone else. The terrible thing about.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Intrusion Detection and Hackers Exploits IP Spoofing Attack Yousef Yahya & Ahmed Alkhamaisa Prepared for Arab Academy for Banking and Financial Sciences.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Introduction to Security Computer Networks Computer Networks Term B10.
Intruder Trends Tom Longstaff CERT Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA Sponsored by.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Privacy - not readable Permanent - not alterable (can't edit, delete) Reliable - (changes detectable) But the data must be accessible to persons authorized.
Web server security Dr Jim Briggs WEBP security1.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
Lecture 15 Denial of Service Attacks
Denial of Service Attacks: Methods, Tools, and Defenses Authors: Milutinovic, Veljko, Savic, Milan, Milic, Bratislav,
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Lecture 25: Network security Slides used with permissions.
T. S. Eugene Ngeugeneng at cs.rice.edu Rice University1 COMP/ELEC 429 Introduction to Computer Networks Network security Some slides used with permissions.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Introduction to Honeypot, Botnet, and Security Measurement
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
Data Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
CMSC 414 Computer (and Network) Security Lecture 14 Jonathan Katz.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Jozef Goetz, Application Layer PART VI Jozef Goetz, Position of application layer The application layer enables the user, whether human.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Denial-of-Service Attacks Justin Steele Definition “A "denial-of-service" attack is characterized by an explicit attempt by attackers to prevent legitimate.
--Harish Reddy Vemula Distributed Denial of Service.
EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Security News Source Courtesy:
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
1 Firewalls G53ACC Chris Greenhalgh. 2 Contents l Attacks l Principles l Simple filters l Full firewall l Books: Comer ch
CS162 Discussion Section 11. Administrivia Project 4 Initial Design Due next Tuesday, April 29 at 11:59 pm Midterm 2 April 28 th 4-5:30 pm in 245 LKS.
(c) University of Technology, Sydney Firewall Architectures.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Denial of Service Sharmistha Roy Adversarial challenges in Web Based Services.
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Topic 5: Basic Security.
4061 Session 26 (4/19). Today Network security Sockets: building a server.
DoS/DDoS attack and defense
Web Security Firewalls, Buffer overflows and proxy servers.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
Role Of Network IDS in Network Perimeter Defense.
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
CS162 Operating Systems and Systems Programming Lecture 18 Security (II) October 31, 2011 Anthony D. Joseph and Ion Stoica
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
EECS 122: Introduction to Computer Networks Network Security
DDoS Attacks on Financial Institutions Presentation
Instructor Materials Chapter 7 Network Security
Firewalls.
November 3, 2003 (last updated: 11/3/2003, 5:45pm)
Presentation transcript:

EE 122: Network Security Kevin Lai December 2, 2002

Motivation  Internet currently used for important services -financial transactions, medical records  Could be used in the future for critical services -911, surgical operations, energy system control, transportation system control  Networks more open than ever before -global, ubiquitous Internet, wireless  Malicious Users -selfish users: want more network resources than you -malicious users: would hurt you even if it doesn’t get them more network resources

Network Security Problems  Host Compromise -attacker gains control of a host  Denial-of-Service -attacker prevents legitimate users from gaining service  Attack can be both -e.g., host compromise that provides resources for denial-of-service  Other forms of attack -less common today because these two are so easy

Other Forms of Security  Prevent malicious users from -reading transmitted data (privacy) -pretending to be someone else (authentication) -doing something without permission (authorization) -modifying transmitted data (integrity) -claiming they did not send a message (nonrepudiation)  Detect -a compromise by a malicious user (intrusion detection)

Host Compromise  One of earliest major Internet security incidents -Internet Worm (1988): compromised almost every BSD- derived machine on Internet  Today: estimated that a single worm could compromise 10M hosts in < 15 min  Attacker gains control of a host -reads data -erases data -compromises another host -launches denial-of-service attack on another host

Definitions  Trojan -relies on user interaction to activate -usually relies on user exploitation  Worm -replicates itself -usually relies on stack smash attack  Virus -worm that attaches itself to another program

Host Compromise: Stack Smash  typical code has many bugs because those bugs are not triggered by common input  network code is vulnerable because it accepts input from the network  network code that runs with high privileges (i.e., as root) is especially dangerous -e.g., web server

Example  what is wrong here: // Copy a variable length user name from a packet #define MAXNAMELEN 64 char username[MAXNAMELEN]; int offset = OFFSET_USERNAME; int name_len; name_len = packet[offset]; memcpy(&username, packet[offset + 1], name_len);

Effect of Stack Smash  Write into part of the stack or heap -write arbitrary code to part of memory -cause program execution to jump to arbitrary code  Stack Smashing Worm -probes host for vulnerable software -sends bogus input -attacker can do anything that the privileges of the buggy program allows launches copy of itself on compromised host -rinse, repeat at exponential rate -10M hosts in < 15 minutes

Hall of Shame  Software that have had many stack smash bugs: -BIND (most popular DNS server) -RPC (Remote Procedure Call, used for NFS) NFS (Network File System), widely used at UCB -sendmail (most popular UNIX mail delivery software) -IIS (Windows web server) -SNMP (Simple Network Management Protocol, used to manage routers and other network devices)

Solution  Don’t write buggy software -it’s not like people try to write buggy software  Type-safe Languages -unrestricted memory access of C/C++ contributes to problem -use Java, Perl, or Python instead  OS architecture -compartmentalize programs better, so one compromise doesn’t compromise the entire system -e.g., DNS server doesn’t need total system access -e.g., web server probably doesn’t need to complete write access  Firewalls

Firewalls  Gateway machine that blocks out certain data, e.g., -any external packets not for port 80 -any external packets with an internal IP address ingress filtering -any with an attachment  Properties -easier to deploy firewall than secure all internal hosts -doesn’t prevent user exploitation -tradeoff between availability of services (firewall passes more ports on more machines) and security if firewall is too restrictive, users will find way around it, thus compromising security e.g., have all services use port 80

Host Compromise: User Exploitation  Some security architectures rely on the user to decide if a potentially dangerous action should be taken, e.g., -run code downloaded from the Internet “Do you accept content from Microsoft?” -run code attached to “subject: You’ve got to see this!” -allow a macro in a data file to be run “Here is the latest version of the document.”

User Exploitation  Users are not good at making this decision -Which of the following is the real name Microsoft uses when you download code from them? Microsoft Microsoft, Inc. Microsoft Corporation  Typical attack -Attacker sends to some initial victims -Reading the / running its attachment / viewing its attachment opens the hole -Worm/trojan/virus mails itself to everyone in address book

Solutions  OS architecture  Don’t ask the users questions which they don’t know how to answer anyway  Separate code and data -viewing data should not launch attack  Be very careful about installing new software

Denial of Service  Huge problem in current Internet -Yahoo!, Amazon, eBay, CNN, Microsoft attacked in ,000 attacks on 2,000 organizations in 3 weeks -some more that 600,000 packets/second more than 192Mb/s -almost all attacks launched from compromised hosts  General Form -prevent legitimate users from gaining service by overloading or crashing a server -e.g., spam, SYN attack

SYN Attack  Compromised hosts send TCP SYN packets to target -sent at max rate with random spoofed source address spoofing: use a different source IP address than own random spoofing allows one host to pretend to be many  Victim receives many SYN packets -sends SYN+ACK back to spoofed IP addresses -holds some memory until 3-way handshake completes usually never, so victim times out after long period (e.g., 2 minutes)

Affect on Victim  buggy implementations allow unfinished connections to eat all memory, leading to crash  better implementations limit the number of unfinished connections -once limit reached, new SYNs are dropped  victim’s network connection also saturated  affect on victim’s users -users can’t access the targeted service on the victim because the unfinished connection queue is full -users can’t access the other services in victim’s network because connection is saturated

Other Denial-of-Service Attacks  SYN attack is simple  more sophisticated attacks possible -attack DNS, BGP -reflection cause one non-compromised host to attack another e.g., host A sends DNS request with source B to server C. C sends reply to B.

Dealing with Attack  distinguish attack from flash crowd  prevent damage -distinguish attack traffic from legitimate traffic -rate limit attack traffic  stop attack -identify attacking machines -shutdown attacking machines -usually done manually, requires cooperation of ISPs, other users  identify attacker -very difficult, except -usually brags/gloats about attack on IRC -also done manually, requires cooperation of ISPs, other users

Incomplete Solutions  Quality of Service -Fair queueing, Integrated Services, Differentiated Services, RSVP -prevent a user from sending at 10Mb/s and hurting a user sending at 1Mb/s -does not prevent 10 users from sending at 1Mb/s and hurting a user sending a 1Mb/s

Identifying Attacking Machines  Defeat spoofed source addresses  Does not stop or slow attack  Egress filtering -a domain’s border router drop outgoing packets which do not have a valid source address for that domain -if universal, could abolish spoofing (why isn’t it universal?)  IP Traceback -routers probabilistically tag packets with an identifier -destination can infer path to true source after receiving enough packets

Summary  Network security is possibly the Internet’s biggest problem -preventing Internet from expanding into critical applications  Host Compromise -poorly written software -Solutions: better OS security architecture, type-safe languages, firewalls  Denial-of-Service -no clear solution