Network security Further protocols and issues. Protocols: recap There are a few main protocols that govern the internet: – Internet Protocol: IP – Transmission.

Slides:



Advertisements
Similar presentations
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Advertisements

Denial of Service, Firewalls, and Intrusion Detection
Computer Security and Penetration Testing
CCNA – Network Fundamentals
Are you secured in the network ?: a quick look at the TCP/IP protocols Based on: A look back at “Security Problems in the TCP/IP Protocol Suite” by Steven.
Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
1 Reading Log Files. 2 Segment Format
IP Spoofing Defense On the State of IP Spoofing Defense TOBY EHRENKRANZ and JUN LI University of Oregon 1 IP Spoofing Defense.
Intrusion Detection and Hackers Exploits IP Spoofing Attack Yousef Yahya & Ahmed Alkhamaisa Prepared for Arab Academy for Banking and Financial Sciences.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Firewalls and Intrusion Detection Systems
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
8-1 Internet security threats Mapping: m before attacking: gather information – find out what services are implemented on network  Use ping to determine.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
Securing TCP/IP Chapter 6. Introduction to Transmission Control Protocol/Internet Protocol (TCP/IP) TCP/IP comprises a suite of four protocols The protocols.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
K. Salah1 Security Protocols in the Internet IPSec.
Lecture 15 Denial of Service Attacks
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Introduction to InfoSec – Recitation 12 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
Lecture 22 Page 1 Advanced Network Security Other Types of DDoS Attacks Advanced Network Security Peter Reiher August, 2014.
G53SEC 1 Network Security Hijacking, flooding, spoofing and some honey.
1Federal Network Systems, LLC CIS Network Security Instructor Professor Mort Anvair Notice: Use and Disclosure of Data. Limited Data Rights. This proposal.
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
FIREWALL Mạng máy tính nâng cao-V1.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
IIT Indore © Neminath Hubballi
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
Firewalls. Evil Hackers FirewallYour network Firewalls mitigate risk Block many threats They have vulnerabilities.
Firewalls A note on the use of these ppt slides:
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
MAANAS GODUGUNUR SHASHANK PARAB SAMPADA KARANDIKAR.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
CS426Network Security1 Computer Security CS 426 Network Security (1)
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Lecture 22 Network Security CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini.
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
CS526Topic 18: Network Security1 Information Security CS 526 Network Security (1)
DoS Suite and Raw Socket Programming Group 16 Thomas Losier Paul Obame Group 16 Thomas Losier Paul Obame.
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 25 November 16, 2004.
TCP Security Vulnerabilities Phil Cayton CSE
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Attacking on IPv6 W.lilakiatsakun Ref: ipv6-attack-defense-33904http://
DoS/DDoS attack and defense
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
UDP & TCP Where would we be without them!. UDP User Datagram Protocol.
K. Salah1 Security Protocols in the Internet IPSec.
Lecture 21: Network Primer 7/9/2003 CSCE 590 Summer 2003.
Network Security 1. Overview What is security? Why do we need security? Who is vulnerable? Common security attacks and countermeasures Firewalls & Intrusion.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
Network Security (part 2)
Introduction to Information Security
Outline Basics of network security Definitions Sample attacks
Error and Control Messages in the Internet Protocol
Outline Basics of network security Definitions Sample attacks
Intrusion Detection and Hackers Exploits IP Spoofing Attack
ITIS 6167/8167: Network and Information Security
Session 20 INST 346 Technologies, Infrastructure and Architecture
Outline Basics of network security Definitions Sample attacks
Presentation transcript:

Network security Further protocols and issues

Protocols: recap There are a few main protocols that govern the internet: – Internet Protocol: IP – Transmission Control Protocol: TCP – ICMP – UDP Most of these were designed before security was even an issue, and hence are fundamentally insecure.

IP Spoofing IP protocol doesn’t prevent anyone from lying about the source address. Simple utilities exist to do this – it is also done for testing and other legitimate purposes. Simple packet filtering is the best defense – outside attacker then can’t spoof an inside address. But IP is just inherently insecure!

Ingress filtering Proposal to have every router drop packets with “invalid” IPs Would eliminate spoofing if everyone did it, and is commonly used However: – Source based – No incentives – Everyone must deploy

IPSec Protocol that authenticates and encrypts each IP packet in a communication – Host to host or network to network or host to network, depending on setups Provides data integrity, authentication, data confidentiality, and replay protection by using cryptography and a number of other protocols

IPSec workings Authentication header: – Protects integrity and data origin authentication – Can also defend against replay attacks

IPSec workings Encapsulating security payload – Provides origin authenticity, integrity and confidentiality

IPSec workings Security association – The bundle of algorithms and parameters (such as keys) that is being used to encrypt and authenticate in one direction. (So usually 2 per session.)

ICMP The Internet Control Message Protocol exists to provide error reporting and testing to IP. Primarily used by network devices like routers to send error messages. – Example: When the TTL field reaches 0, a message is sent to source address. Many common utilities are built on this – traceroute, ping, etc. Often blocked except from certain trusted sources.

UDP: User Datagram Protocol UDP builds on top of IP by supporting port routing: – Destination port number gets a UDP data field that adds application process – Source port number provides a return address Minimal guarantees – no acknowledgements, flow control, or anything In a sense, not easy to attack, but not reliable anyway!

TCP: adding reliability TCP preserves order and adds reliability: – Sender breaks data and attaches number – Receiver must acknowledge receipt, so lost packets are resent and packets are reassembled

A bit more complex:

Some attacks on TCP TCP states can be easy to guess – And hence spoofed or fooled TCP connection requires state, which means the server has to remember something – TCP Syn floods can then overrun memory – Denial of service is easy on this protocol! More details…

Force TCP Session Closing Suppose an attacker can guess the sequence number for an existing connection – Then send reset packet to close connection (so DOS) – Can naively guess (1/2 32 chance) – Most systems allow for some window of sequences, however, so much easier This is especially successful against long lived connections (like BGP, etc.), especially combined with packet sniffing

TCP Spoofing Each connection for TCP has some state associated – Client/server IP and port – Sequence numbers Problem: easy to guess this state – Ports are standard – Sequence numbers stored in predictable way

Session Hijacking Need a degree of unpredictability to avoid attacks. If the attacker knows initial sequence number and rough amount of traffic, easier to guess, and can flood with likely numbers. Some vulnerabilities are unavoidable, but simple randomization can make things harder.

SYN flood Attacker sends a ton of syn packets but no acks (or can use falsified IP so response will be ignored) Server must remember all of these connections, so quickly runs out of space

SYN cookies Invented by Dan Bernstein, the idea defeat SYN floods is to use “particular choices of initial TCP sequence numbers”. Essentially, the server doesn’t have to remember the connection, but can instead reconstruct the query from the TCP sequence number. Some restrictions – can’t accept some TCP options, and still some limits, but overall fairly successful.

Denial of service attacks “Any attack that prevents or impairs the authorized use of networks, systems, or applications by exhausting resources such as CPU, memory, bandwidth, or disk space” – Can be local or network based A Distributed DOS attack is a network based attack which uses multiple hosts

DDoS Attacker compromises and uses other machines Can spoof IPs to further complicate Attack network or host resources Long and active history…

DDoS reflector attack Put victims IP as source address in many requests The “reflector” machines then flood the victim Advantages: – Hides source – Amplifies the attack Successfully used many times

Smurf DoS attack Attacker sends ICMP packets on broadcast mode with victim’s address as source. On broadcast mode, everyone will then reply to that IP.

DDoS defenses Packet filtering and monitoring Change defaults – no ICMP broadcast anymore (mostly) Incorporate SYN cookies ISP filtering and traffic scrubbing “Overprovision” servers CAPTCHAs:

Intrusion detection/prevention Deeper analysis and monitoring of network traffic, with content analysis – Network based – Host Based Examples: – Snort – Verisys – Tripwire – Etc.

Detection methods Misuse signature based detection – E.g. SNORT rules Anomaly detection – Port scan detection Combine well with firewalls, but usually more complex – Issues of resources and cost, allocation, separation of resources

Evasion techniques Fragmentation: attack will go “under the radar” and bypass detection Avoid defaults: IDS may expect trojans on particular ports, so configure to use different ports Low bandwidth attacks – e.g. stealth port scanning Address spoofing Pattern change and evasion

Attacks on NIDS Insertion attacks: – NID systems actually keep “bad” packets that everyone else drops – This can actually be a vulnerability!

Attacks on NIDS Evasion attacks: – End system can accept a packet that the NIDS rejects.

Not quite this simple… In reality, it’s not quite this easy, but these simple ideas have been used in a multitude of ways on different systems. Examples: – Bad headers – Unusual IP options – Even MAC addresses in the local network

Next time Higher level protocols and their insecurities: DNS and BGP Worms and Botnets Onion routing and higher level (newish) constructions Homework: read “required reading” section of lab by Thursday!