8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.

Slides:



Advertisements
Similar presentations
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs A note on the use of these ppt slides: Were making these slides freely available to all (faculty, students,
Advertisements

8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July A note on the use.
Application Layer 2-1 Chapter 2 Application Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012.
Firewalls and Intrusion Detection Systems
Network Layer4-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley,
Chapter 8 Network Security Computer Networking: A Top Down Approach, 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, April 2009.
8: Network Security – Integrity, Firewalls.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
1 Computer System Evolution Central Data Processing System: - with directly attached peripherals (card reader, magnetic tapes, line printer). Local Area.
CS 325 Computer Networks Sami Rollins Fall 2003.
Network Layer4-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley,
1 Day 01 - The Internet. 2 Chapter 1 Introduction Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Introduction1-1 CS 325 Computer Networks Sami Rollins Fall 2005.
12 – NAT, ICMP, IPv6 Network Layer4-1. Network Layer4-2 Chapter 4 Network Layer Computer Networking: A Top Down Approach Featuring the Internet, 3 rd.
Transport Layer Transport Layer. Transport Layer 3-2 Chapter 3 Transport Layer Computer Networking: A Top Down Approach Featuring the Internet,
Dr. Philip Cannata 1 Principles of Network Applications.
Chapter 1 Introduction Computer Networking: A Top Down Approach 6th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
24-1 Last time □ Message Integrity □ Authentication □ Key distribution and certification.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
FIREWALL Mạng máy tính nâng cao-V1.
Domain Name System (DNS)
Network Security7-1 Today r Collect Ch6 HW r Assign Ch7 HW m Ch7 #2,3,4,5,7,9,10,12 m Due Wednesday Nov 19 r Continue with Chapter 7 (Security)
Introduction Chapter 1 Introduction Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley,
Chapter 6: Packet Filtering
Part 2  Access Control 1 CAPTCHA Part 2  Access Control 2 Turing Test Proposed by Alan Turing in 1950 Human asks questions to another human and a computer,
Network Security7-1 Chapter 7 Network Security Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose, Keith Ross Addison-Wesley,
Firewalls A note on the use of these ppt slides:
1 WEP Design Goals r Symmetric key crypto m Confidentiality m Station authorization m Data integrity r Self synchronizing: each packet separately encrypted.
Chapter 8 Network Security A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students, readers). They’re.
8: Network Management1 Firewalls. 8: Network Management2 Firewalls Two firewall types: m packet filter m application gateways To prevent denial of service.
ICT 6621 : Advanced NetworkingKhaled Mahbub, IICT, BUET, 2008 Lecture 12 Network Security (2)
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Chapter 3 Transport Layer
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Transport Layer 3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A.
Transport Layer3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose, Keith Ross Addison-Wesley,
Introduction1-1 Chapter 1 Computer Networks and the Internet Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition. Jim Kurose,
Firewall Tutorial Hyukjae Jang Nc lab, CS dept, Kaist.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 5: Mobile security,
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Introduction1-1 Data Communications and Computer Networks Chapter 1 CS 3830 Lecture 1 Omar Meqdadi Department of Computer Science and Software Engineering.
Transport Layer3-1 Chapter 3 Transport Layer Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July A.
8: Network Security 8-1 IPsec: Network Layer Security r network-layer secrecy: m sending host encrypts the data in IP datagram m TCP and UDP segments;
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright
Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
8: Network Security8-1 Chapter 8 Network Security A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students,
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Last time Message Integrity Authentication
Chapter 3 Transport Layer
Chapter 3 Transport Layer
Security in the layers 8: Network Security.
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Chapter 3 Transport Layer
TCP/IP Protocol Suite1 Lecturer 8. TCP/IP Protocol Suite2 INTRODUCTION We are living in the information age. We need to keep information about every aspect.
Chapter 6 Network Security
Firewalls By conventional definition, a firewall is a partition made
Session 20 INST 346 Technologies, Infrastructure and Architecture
Chapter 4 Network Layer A note on the use of these ppt slides:
Presentation transcript:

8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these ppt slides: We’re making these slides freely available to all (faculty, students, readers). They’re in PowerPoint form so you see the animations; and can add, modify, and delete slides (including this one) and slide content to suit your needs. They obviously represent a lot of work on our part. In return for use, we only ask the following:  If you use these slides (e.g., in a class) that you mention their source (after all, we’d like people to use our book!)  If you post any slides on a www site, that you note that they are adapted from (or perhaps identical to) our slides, and note our copyright of this material. Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved

8-2Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 8.4 Securing 8.5 Securing TCP connections: SSL 8.6 Network layer security: IPsec 8.7 Securing wireless LANs 8.8 Operational security: firewalls and IDS

8-3Network Security Firewalls isolates organization’s internal net from larger Internet, allowing some packets to pass, blocking others firewall administered network public Inter net firewall trusted “good guys” untrusted “bad guys”

8-4Network Security Firewalls: why prevent denial of service attacks:  SYN flooding: attacker establishes many bogus TCP connections, no resources left for “real” connections prevent illegal modification/access of internal data  e.g., attacker replaces CIA’s homepage with something else allow only authorized access to inside network  set of authenticated users/hosts three types of firewalls:  stateless packet filters  stateful packet filters  application gateways

8-5 Network Security Stateless packet filtering  internal network connected to Internet via router firewall  router filters packet-by-packet, decision to forward/drop packet based on:  source IP address, destination IP address  TCP/UDP source and destination port numbers  ICMP message type  TCP SYN and ACK bits Should arriving packet be allowed in? Departing packet let out?

8-6 Stateless packet filtering: example Network Security  example 1: block incoming and outgoing datagrams with IP protocol field = 17 and with either source or dest port = 23  result: all incoming, outgoing UDP flows and telnet connections are blocked  example 2: block inbound TCP segments with ACK=0.  result: prevents external clients from making TCP connections with internal clients, but allows internal clients to connect to outside.

8-7Network Security PolicyFirewall Setting No outside Web access. Drop all outgoing packets to any IP address, port 80 No incoming TCP connections, except those for institution’s public Web server only. Drop all incoming TCP SYN packets to any IP except , port 80 Prevent Web-radios from eating up the available bandwidth. Drop all incoming UDP packets - except DNS and router broadcasts. Prevent your network from being used for a smurf DoS attack. Drop all ICMP packets going to a “broadcast” address (e.g ). Prevent your network from being tracerouted Drop all outgoing ICMP TTL expired traffic Stateless packet filtering : more examples

8-8Network Security action source address dest address protocol source port dest port flag bit allow222.22/16 outside of /16 TCP> any allowoutside of /16 TCP80> 1023ACK allow222.22/16 outside of /16 UDP> allowoutside of /16 UDP53> denyall Access Control Lists  ACL: table of rules, applied top to bottom to incoming packets: (action, condition) pairs

8-9Network Security Stateful packet filtering  stateless packet filter: heavy handed tool  admits packets that “make no sense,” e.g., dest port = 80, ACK bit set, even though no TCP connection established: action source address dest address protocol source port dest port flag bit allowoutside of /16 TCP80> 1023ACK  stateful packet filter: track status of every TCP connection  track connection setup (SYN), teardown (FIN): determine whether incoming, outgoing packets “makes sense”  timeout inactive connections at firewall: no longer admit packets

8-10Network Security action source address dest address proto source port dest port flag bit check conxion allow222.22/16 outside of /16 TCP> any allowoutside of /16 TCP80> 1023ACK x allow222.22/16 outside of /16 UDP> allowoutside of /16 UDP53> x denyall Stateful packet filtering  ACL augmented to indicate need to check connection state table before admitting packet

8-11Network Security Application gateways  filter packets on application data as well as on IP/TCP/UDP fields.  example: allow select internal users to telnet outside 1. require all telnet users to telnet through gateway. 2. for authorized users, gateway sets up telnet connection to dest host. Gateway relays data between 2 connections 3. router filter blocks all telnet connections not originating from gateway. application gateway host-to-gateway telnet session router and filter gateway-to-remote host telnet session

8-12Network Security Limitations of firewalls, gateways  IP spoofing: router can’t know if data “really” comes from claimed source  if multiple app’s. need special treatment, each has own app. gateway  client software must know how to contact gateway.  e.g., must set IP address of proxy in Web browser  filters often use all or nothing policy for UDP  tradeoff: degree of communication with outside world, level of security  many highly protected sites still suffer from attacks

8-13Network Security Intrusion detection systems  packet filtering:  operates on TCP/IP headers only  no correlation check among sessions  IDS: intrusion detection system  deep packet inspection: look at packet contents (e.g., check character strings in packet against database of known virus, attack strings)  examine correlation among multiple packets port scanning network mapping DoS attack

8-14Network Security Web server FTP server DNS server Internet demilitarized zone firewall IDS sensors Intrusion detection systems  multiple IDSs: different types of checking at different locations internal network

8-15Network Security IDS limitations  Q: Why not just use an IDS if it is superior to a firewall?  A: Chance of missed packets  IDSs analyzes Layer-7  Computationally-expensive  If overloaded, IDSs will let packets pass without analysis

8-16 Tradespace: Thoroughness vs. Speed Network Security Stateful/Stateless Firewall Layer 4 Inspects all packets IDS Layer 7 Skips packets if overloaded Application Gateway Layer 7 Inspects all packets belonging to one application

8-17Network Security Intrusion prevention systems  IPS is like a combination IDS plus Firewall:  Analyzes up to Layer-7, like an IDS  Can drop packets like a Firewall

8-18Network Security Comparison  IPS is like a combination IDS plus Firewall:  Analyzes up to Layer-7, like an IDS  Can drop packets like a Firewall FirewallIDSIPS Layer-3 filters (IP)Yes Layer-4 filters (port)Yes Layer-7 filters (app)Yes Drop packets on match?Yes Skip packets if overloaded?Yes