Week 10 - Wednesday.  What did we talk about last time?  Network basics.

Slides:



Advertisements
Similar presentations
Network Security.
Advertisements

Chapter 17: WEB COMPONENTS
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
More on SSL/TLS. Internet security: TLS TLS is one of the more prominent internet security protocols. TLS is one of the more prominent internet security.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Suneeta Chawla Web Security Presentation Topic : IP Spoofing Date : 03/24/04.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Firewalls and Intrusion Detection Systems
7.3 Network Security Controls 1Network Security / G.Steffen.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Securing TCP/IP Chapter 6. Introduction to Transmission Control Protocol/Internet Protocol (TCP/IP) TCP/IP comprises a suite of four protocols The protocols.
Analysis of Attack By Matt Kennedy. Different Type of Attacks o Access Attacks o Modification and Repudiation Attacks o DoS Attacks o DDoS Attacks o Attacks.
Security in Networks— Their design, development, usage… Barbara Endicott-Popovsky CSSE592/491 In collaboration with: Deborah Frincke, Ph.D. Director, Center.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
Chapter Threats in Networks Network Security / G. Steffen.
Copyright © Center for Systems Security and Information Assurance
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Css security in Networks-css-ps2 1 Computer Systems Security Security in Networks (Security Controls) Topic 2 Pirooz Saeidi Source: Pfleeger, Chapter 7.
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Chapter 13 – Network Security
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
CHAPTER 11 Spoofing Attack. INTRODUCTION Definition Spoofing is the act of using one machine in the network communication to impersonate another. The.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Lecture 20 Hacking. Over the Internet Over LAN Locally Offline Theft Deception Modes of Hacker Attack.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
CHAPTER 9 Sniffing.
Security in Computing Security in Networks. I.Threats in networks A. Vulnerabilities 1.Anonymity 2.Shared resources 3.Size (many points of attack) 4.Complexity.
1 Security. 2 Linux is not secure No computer system can ever be "completely secure". –make it increasingly difficult for someone to compromise your system.
Internet Security and Firewall Design Chapter 32.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
Security in Networks Single point of failure Resillence or fault tolerance CS model.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Chapter 14 Network Encryption
DoS/DDoS attack and defense
Security in network Outline Threats in network Network security controls Firewalls Intrusion detection system Secure Networks and Cryptography Example.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
K. Salah1 Security Protocols in the Internet IPSec.
Week 9 - Wednesday.  What did we talk about last time?  Network basics.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Domain 4 – Communication and Network Security
Outline Basics of network security Definitions Sample attacks
Introduction to Networking
What Makes a Network Vulnerable?
Outline Basics of network security Definitions Sample attacks
Outline Basics of network security Definitions Sample attacks
Lecture 36.
Lecture 36.
Presentation transcript:

Week 10 - Wednesday

 What did we talk about last time?  Network basics

Cody Kump

 Eavesdropping means overhearing private information without much effort  Administrators need to periodically monitor network traffic  Wiretapping implies that more effort is being used to overhear information  Passive wiretapping is only listening to information  Active wiretapping means that you may adding or changing information in the stream

 If you are on the same LAN, you can use a packet sniffer to analyze packets  Packets are constantly streaming by, and your computer usually only picks up those destined for it  Passwords are often sent in the clear  Wireshark is a free, popular packet sniffer  Cable modems are filters that give you only the data you need  Sophisticated attackers can tap into a cable network  Data is supposed to be encrypted, but many networks don’t turn encryption on  Inductance is a property that can allow you to measure the signals inside of a wire without a direct physical connection  Using inductance or physically connecting to a wire changes its impedance, which can (but usually is not) measured  Signals are often multiplexed, sharing media with other signals, which can increase the sophistication needed to wiretap

 Wireless networks are easy to disrupt, but attackers usually have little to gain by this  Since they are broadcast, it is not difficult to intercept the signal  Special antennas can receive the signal from a longer distance than usual  Some networks are entirely unencrypted  WEP is almost completely broken  WPA and WPA2 have vulnerabilities that can be exploited in some cases

 Microwave is easy to intercept  Long distance phone can use microwaves  Cell phones can use microwaves  One difficulty with making use of the intercepted signal is that microwave signals are heavily multiplexed, making it hard to untangle individual signals  Satellites are similar (unsecure but heavily multiplexed)  Optical fiber is very difficult to tap  Cutting a single fiber means recalibrating the network  Repeaters and taps that connect the fiber are the best places to attack

 Rather than wiretapping, attackers will more often try to impersonate a legitimate user  Different approaches:  Guess the identity and authentication information  Use other communications or wiretapping to gain such information  Circumvent the authentication mechanism  Use a target that will not be authenticated  Use a target with known authentication data

 Passwords are often easy to guess  Because we’re bad at picking passwords  Because the user may not have realized that the machine would be exposed to network attacks  Passwords are sent in the clear  Bad hashes can give information about the password  Sometimes buffer overflows can crash the authentication system  Sometimes authentication is not needed .rhosts and.rlogin files in Unix  Guest accounts  Default passwords on routers and other devices that never get changed

 Spoofing is when an attacker carries out one end of a networked exchange  A masquerade is spoofing where a host pretends to be another host  URL confusion: someone types hotmale.com (don’t go there!) or gogle.com  Phishing is a form of masquerading  Session hijacking (or sidejacking) is carrying on a session started by someone else  Login is encrypted, the rest of the data often isn’t  Firesheep allows you to log on to other people’s Facebook and Twitter accounts in, say, the same coffeeshop  Man-in-the-middle attacks

 Misdelivery  Data can have bad addresses, occasionally because of computer error  Human error (e.g. James Hughes (student) instead of James Hughes (professor)) is more common)  Exposure of data can happen because of wiretapping or unsecure systems anywhere along the network  Traffic flow analysis  Data might be encrypted  Even so, it is very hard to hide where the data is going to and where it is coming from  Tor and other anonymization networks try to fix this

 Attackers can falsify some or all of a message, using attacks we’ve talked about  Parts of messages can be combined  Messages can be redirected or deleted  Old messages can also be replayed  Noise can degrade the signals  All modern network protocols have error correction built in  Malformed packets can crash systems  Protocols often have vulnerabilities

 Web sites are supposed to be up all the time  They can be studied and attacked over a long period of time  Known vulnerabilities in web servers allow hackers (even unsophisticated ones) to gain control of web sites and deface them  Buffer overflows can crash web applications  URL and SQL injection attacks  If web applications are poorly written, they may blindly execute whatever is passed into the URL  Could point to../../../sensitive.dat, gaining access to files in other directories  Could give SQL to destroy or publicize the contents of the database  Server-side includes can tell the server to do specific things, but they can be manipulated by attackers who cleverly edit the HTTP requests

 Networks are one of the best places to launch an attack on availability  In this setting, these are usually called denial of service (DoS) attacks  Transmission failure can happen because a line is cut or because there is too much noise  Flooding is a common technique  Ask for too many connections  Request too many of some other service

 TCP is built on a three-way handshake  Client requests a connection by sending a SYN packet  The server acknowledges the request by sending a SYN-ACK packet back  The client responds with an ACK, establishing the connection  An attacker can just keep sending SYN packets  The server will allocate some resources, wait for the ACK, and never get it  A clever attacker will spoof at least his own IP so that the SYN- ACK is sent elsewhere  A more sophisticated attacker will spoof many different IP addresses (or have many bots in a botnet) sending all these SYN's

 Echo-chargen  Chargen sets up a stream of packets for testing  Echo packets are supposed to be sent back to the sender  If you can trick a server into sending echo packets to itself, it will respond to its own packets forever  Ping of death  A ping packet requests a reply  If you can send more pings than a server can handle, it goes down  Only works if the attacker has more bandwidth than the victim (DDoS helps)  Smurf  A ping packet is broadcast to everyone, with the victim spoofed as the originator  All the hosts try to ping the victim  The real attacker is hidden  Teardrop  A teardrop attack uses badly formed IP datagrams  They claim to correspond to overlapping sequences of bytes in a packet  There’s no way to put them back together and the system can crash

 Distributed denial of service (DDoS) attacks use many machines to perform a DoS attack  Usually, many targets have been compromised with a Trojan horse making them zombies  These zombie machines are controlled by the attacker, performing flooding or other attacks on a victim  The attacker is hard to trace

 The Domain Name System (DNS) uses Domain Name Servers (also DNS) to convert user readable URLs like google.com to IP addresses  Taking control of a server means that you get to say where google.com is  For efficiency, servers cache results from other servers if they didn’t know the IP  DNS cache poisoning is when an attacker gives a good server a bad IP address

 Cookies  Small files saved by your browser on your disk  Can be per-session or persistent  Intercepted cookies can allow impersonation  Server side scripting  Includes ASP, JSP, and PHP  Again, poorly sanitized inputs can cause arbitrary code to be executed on the server  Active code  Java applets are run in a sandbox, preventing them from accessing most of your system ▪ Some JVM implementations had weaknesses allowing them out  ActiveX is Microsoft’s system for running code in a browser ▪ It has far too much power and can do anything to your system ▪ Usually, you have to click a button to allow the ActiveX control to run

TargetVulnerabilityTargetVulnerability Precursors to attack Port scan Social engineering Reconnaissance OS and application fingerprinting Confidentiality Protocol flaw Eavesdropping Passive wiretap Misdelivery Exposure Traffic flow analysis Authentication failures Impersonation Guessing Eavesdropping Spoofing Session hijacking Man in the middle attack Integrity Protocol flaw Active wiretap Impersonation Falsification Noise Web site defacement DNS attack Programming flaws Buffer overflow Addressing errors Server-side include Malicious Java or ActiveX Worms, viruses, Trojan horses Availability Protocol flaw Transmission failure Flooding DNS attack Traffic redirection DDoS

 Good network architecture can make security better  Segmentation means separating the network into different parts  Web server  Database server  Application servers  Redundancy is important  Multiple servers that check if each other have gone down  Avoid single points of failure

 Encryption is important for network security  Link encryption encrypts data just before going through the physical communication layer  Each link between two hosts could have different encryption  Message are in plaintext within each host  Link encryption is fast and transparent  End-to-end encryption provides security from one end of the transmission to the other  Slower  Responsibility of the user  Better security for the message in transit

 Encryption that allows people in a public network to communicate securely with a private network creates a virtual private network (VPN)  A user’s system negotiates a key with a firewall that guards a private network  Communication takes place in a tunnel

 As we discussed before, the big problem with public keys is making sure you get the right one  Public key infrastructure (PKI) is the solution to this problem  A PKI sets up certificate authorities who certify that keys belong to who they’re supposed to  Their jobs include:  Managing public key certificates  Issuing certificates that connect a user to a key  Scheduling certificate expiration  Publishing certificate revocation lists

 SSH (secure shell) is a protocol for encrypted communication between computers  Designed for Unix/Linux, but available on Windows  Telnet, rlogin, and rsh should be replaced by SSH  Negotiates symmetric key encryption usually using public key encryption, similar to Project 2  SSL (secure sockets layer) or TLS (transport layer security) creates a secure session (golden lock) between a web browser and a web server

 IPSec (IP Security Protocol Suite) is a group of protocols designed to provide security for general IP communication  There is an Authentication Header (AH) mode that provides authentication and integrity by supplying a cryptographic hash of the message and its addresses  There is an Encapsulated Security Payload (ESP) mode that can provide encryption, authentication, or both  In transport mode, IPSec encrypts only the payload of the packet  In tunnel mode, IPSec encrypts the entire packet and puts it inside of another packet, hiding its final destination inside of a private network

 Encryption helps protect integrity from malicious attackers  Error correcting codes (like parity checks) can help prevent non-malicious problems with integrity  Cryptographic checksums (AKA cryptographic hash digests) protect from both malicious and non-malicious threats to integrity

 Who are you talking to? Passwords can be stolen  One-time passwords prevent the problem of stolen passwords  RSA SecurIDs and other password tokens generate one-time passwords  Challenge-response systems serve a similar role  Kerberos is a system designed at MIT  Users interact with an authentication server who authenticates them  They get a ticket to access a file from a ticket granting server  The ticket lets you use a file  Everything is time-stamped

 Routers want to block packet floods from affecting the servers behind the router  We can have ACLs that list all the legal (or all the illegal) hosts that can send (or are not allowed to send) packets into the network  But, checking packets against ACLs slows down the system, making the router easier to flood  Since it is possible to forge source addresses, the ACLs might not correctly block the packets

 A wireless access point has a Service Set Identifier (SSID)  SSIDs are usually broadcast, weakening security  Even non-broadcast SSIDs can be discovered whenever someone connects to them  Wired Equivalent Privacy (WEP) was the old standard for encryption  Tools like WEPCrack and AirSnort can break WEP in minutes because of flaws in the RC4 encryption algorithm  WiFi Protected Access (WPA) and later WPA2 have better security  Encryption keys change for each packet  Several authentication mechanisms are allowed  WPA2 can use AES  There are still flaws in some implementations, as discussed by Mark Yorgey

 A firewall filters traffic between an inside network and an outside network  The inside is more trusted and needs to be protected from the outside  Kinds of firewalls:  Packet filtering gateway or screening routers  Stateful inspection firewalls  Application proxies  Guards  Personal firewalls

 Packet filtering gateways are simple  They only allow certain packets to get by  Based on source or destination address  Based on protocol (HTTP on port 80, for example)  A packet filter can be used in combination with other firewalls  The packet filter can remove a lot of traffic so that a more complex firewall has to worry about checking fewer packets  Packet filters ignore the data inside the packets  They only use the addresses and port numbers

 A stateful inspection firewall keeps track of data inside of packets  For example, if a host inside the firewall initiates a TCP connection with a host outside, a stateful inspection firewall can remember this and let only that particular outside host’s packets in

 An application proxy gateway (or bastion host) appears to function like a host running a particular application  The outside world sends date to the application proxy’s IP address  The application proxy changes the addresses and forwards the data on to the real server  Only appropriate requests and responses are allowed through  All accesses can also be logged  A guard is really the same thing, just with more functionality  For example, a guard might reassemble a file and run it trhough a virus scanner

 A personal firewall is software that runs on a workstation  These firewalls can give additional protection  The user and OS can have very fine grained control over what kind of connections can be made and what kind of applications can send and receive data

 Finish firewalls  Intrusion detection  Secure  Review for Exam 2  Andrew Sandridge presents

 Read Sections 7.3 through 7.6  Finish Assignment 4  Due on Friday  Study for Exam 2  Next Monday