IS 302: Information Security and Trust Week 9: User Authentication (part II) and Introduction to Internet Security 2012.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Unifying the conceptual levels of network security through use of patterns Ph.D Dissertation Proposal Candidate: Ajoy Kumar, Advisor: Dr Eduardo B. Fernandez.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
Working Connection Computer and Network Security - SSL, IPsec, Firewalls – (Chapter 17, 18, 19, and 23)
CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
More on SSL/TLS. Internet security: TLS TLS is one of the more prominent internet security protocols. TLS is one of the more prominent internet security.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Secure communications Week 10 – Lecture 2. To summarise yesterday Security is a system issue Technology and security specialists are part of the system.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
IEEE Wireless Local Area Networks (WLAN’s).
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
Department Of Computer Engineering
Strong Password Protocols
Announcement Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed. 1.
CSCI 6962: Server-side Design and Programming
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
8: Network Security8-1 Security in the layers. 8: Network Security8-2 Secure sockets layer (SSL) r Transport layer security to any TCP- based app using.
1/28/2010 Network Plus Security Review Identify and Describe Security Risks People –Phishing –Passwords Transmissions –Man in middle –Packet sniffing.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
IS 302: Information Security and Trust Week 7: User Authentication (part I) 2012.
Secure Socket Layer (SSL)
May 2002Patroklos Argyroudis1 A crash course in cryptography and network security Patroklos Argyroudis CITY Liberal Studies.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Windows 7 Firewall.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Chapter 21 Distributed System Security Copyright © 2008.
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 3: Securing TCP.
SSL/TLS How to send your credit card number securely over the internet.
Digital Signatures, Message Digest and Authentication Week-9.
14.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 14 Entity Authentication.
Networks Management and Security Lecture 4.
Chapter 32 Internet Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
TCP/IP Protocol Suite 1 Chapter 30 Security Credit: most slides from Forouzan, TCP/IP protocol suit.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 10: Planning and Managing IP Security.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
 authenticated transmission  secure tunnel over insecure public channel  host to host transmission is typical  service independent WHAT IS NEEDED?
KERBEROS SYSTEM Kumar Madugula.
IS 4506 Windows NTFS and IIS Security Features.  Overview Windows NTFS Server security Internet Information Server security features Securing communication.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Cryptography CSS 329 Lecture 13:SSL.
Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke1 Database architecture and security Workshop 4.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
IT443 – Network Security Administration Instructor: Bo Sheng
Secure Sockets Layer (SSL)
Securing the Network Perimeter with ISA 2004
The University of Adelaide, School of Computer Science
Introduction to Network Security
Advanced Computer Networks
Presentation transcript:

IS 302: Information Security and Trust Week 9: User Authentication (part II) and Introduction to Internet Security 2012

© Yingjiu Li Review Review of weak pwd authentication Unix pwd Windows password (LM and NT hashes) Attacks (dictionary and brute-force)

© Yingjiu Li Strong Password Authentication I.Lamport scheme II.Challenge response III.Time stamp To address eavesdropping and replay attacks in communications

© Yingjiu Li I. Lamport Scheme Registration phase –H: one way hash function –Bob: choose a secret s; compute and send w0=H^100(s) to Alice in a secure manner Bob Alice Mallory s H^100(s) Bob, w0=H^100(s)

© Yingjiu Li Lamport scheme: first-time authentication –Bob sends one-time password w1=H^99(s) to Alice –Alice authenticates Bob by checking if H(w1)=w0 –If match, Alice replaces w0 with w1=H^99(s) Bob Alice Mallory s w1=H^99(s) Bob, w0=H^100(s)

© Yingjiu Li Lamport scheme: second time authentication –Bob sends one-time password w2=H^98(s) to Alice Alice authenticates Bob by checking if H(w2)=w1 If match, Alice replaces w1 with w2=H^98(s) Bob Alice Mallory s w2=H^98(s) Bob, w1=H^99(s)

© Yingjiu Li Discussion Why is Lamport scheme secure against eavesdropping and replay attacks? How many times can Alice authenticate Bob in Lamport scheme? After that?

© Yingjiu Li II. Challenge Response Scheme Alice and Bob share a pwd or pwd hash S Upon receiving Bob’s id and authentication request, Alice sends Bob a non-repeating challenge C Bob responses with R=E(S,C) or H(S,C) Bob Alice Mallory Bob id SS Non-repeating challenge C Response R=E(S,C) or H(S,C)

© Yingjiu Li Discussion Why is challenge response scheme secure against eavesdropping and replay attacks? What is the difference between challenge response scheme and Lamport’s scheme?

© Yingjiu Li Case Study: MS Authentication Protocol (NTLM) Windows 2000, NT, XP, Vista, Windows 7 clientserver Type 1 msg: a set of flags (enc key sizes, req for mutual auth) clientserver Type 2 msg: a set of flags + random challenge (8 bytes) clientserver Type 3 msg: server response = MD4/MD5 hashing or DES enc (server challenge + client pwd hash)

© Yingjiu Li NTLMv1 and NTLMv2 LM-hash of pw: 16 bytes (DES+DES) NT-hash of pw: 16 bytes (MD4) C= 8-byte server challenge, random K1 | K2 | K3 = NT-hash | 5 bytes-0 R1 = DES(K1,C) | DES(K2,C) | DES(K3,C) K1 | K2 | K3 = LM-hash | 5 bytes-0 R2 = DES(K1,C) | DES(K2,C) | DES(K3,C) Response = R1 | R2 CS= 8-byte server challenge, random CC=8-byte client challenge, random CC* =8-byte client information (X, time, CC, domain name) v2-Hash = HMAC-MD5(NT-hash, user name, domain name) LMv2 = HMAC-MD5(v2-hash, CS, CC) NTv2=HMAC-MD5(v2-hash, CS, CC*) Response = LMv2 | CC | NTv2 | CC*

© Yingjiu Li III. Time Stamp Scheme Alice and Bob keep synchronized clocks –Time T is used as one-time “challenge” –Bob sends Alice his id, and R=E(S,T) or H(S,T) –Alice verifies R=? E(S,T) or H(S,T) on Bob’s pwd (or pwd hash) S and her current time T Bob Alice Mallory Bob id, R=E(S,T) or H(S,T) SS

© Yingjiu Li Discussion Why is time stamp secure against eavesdropping and replay attacks? How do you compare time stamp scheme with challenge response scheme and Lamport scheme?

© Yingjiu Li Break

© Yingjiu Li Introduction to Internet Security I.Secure Socket Layer (SSL) II.Firewall (FW) III.Intrusion Detection System (IDS)

© Yingjiu Li I. SSL Secure socket layer (SSL) or transport layer security (TLS) Secure communications between clients and server in internet TCP  SSL  web applications Application protocol SMTP,HTTP,FTP… TCP IP Network Interface TCP/IP Protocol Stack SSL

© Yingjiu Li SSL functionalities –Server authentication with certificate –Optional client authentication –Encrypted channel between server and client

© Yingjiu Li SSL HandShake Protocol Web client Web server 1.SSL Request 2.Server public key certificate 3. random number R encrypted using server public key 4. Both compute session key based on R and switch to encrypted tunnel (https)

© Yingjiu Li Typical Applications with SSL E-commerce VPN

© Yingjiu Li II. FW Filter and audit traffic between internal and external network Prevent unauthorized access to a private network Internal network External network Firewall

© Yingjiu Li FW Policies Close policy: Default deny, allow (white list) firewall (p: packet) { if (allow(p)) forward(p); else drop(p); } Open policy: Default permit, deny (black list) firewall (p: packet) { if (deny(p)) drop(p); else forward(p); }

© Yingjiu Li Close Policy Example boolean allow(packet p){ if (match(p.srcIP, *.*) and match (p.dstPort, 25)) return true; elseif (match(p.srcIP, *.*) and match (p.dstPort, 80)) return true; else return false; }

© Yingjiu Li Open Policy Example boolean deny(packet p){ if (match(p.srcIP, *.*) and match (p.dstPort, 25)) return true; elseif (match(p.srcIP, *.*) and match (p.dstPort, 80)) return true; else return false; }

© Yingjiu Li Windows FW –start  cmd  firewall.cpl  advanced settings Inbound rules Outbound rules

© Yingjiu Li Limitation of FW Internal network External network Firewall

© Yingjiu Li III. Intrusion Detection System (IDS) IDS should alert an attack in progress –With high accuracy –In real time manner –With complete diagnosis –With effective recommendations on how to react

© Yingjiu Li Accuracy of IDS False positive (alarm) rate –#false-alerts/#alerts False negative (miss) rate –#missed-attacks/#attacks

© Yingjiu Li Signature-Based Vs Anomaly-Based Signature based IDS –Signature: DB of known attack patterns –IDS reports situations that match signatures –Good: Low false alarm rates, instantaneous detection –Bad: Cannot detect new attacks Anomaly based IDS –Profile: model of normal behaviors –IDS reports situations that deviate from profiles –Good: Can detect some new attacks –Bad: High false alarm rates, high complexity

© Yingjiu Li 2007INFT 865 Ravi Sandhu Why false alarm rate is high in anomaly-based detection Analogy –Test for a disease is 99% accurate 100 disease-free people tested, 99 test negative 100 diseased people tested, 99 test positive –Prevalence of disease is 1 in 10,000 –Alice tests positive –What is probability Alice has the disease? 1 in 101 (101=1*99%+9,999*1%) –False alarm rate: 100 in % Now assume that test is 99.98% accurate –What is the false alarm rate?

© Yingjiu Li IDS Summary Advantages –Complement firewall –Continues to improve Disadvantages –False alarms –Miss some new attacks –Require security personnel to handle alarms and monitor track records

© Yingjiu Li Review How long is NTLM (v1) response message? 1.64 bits bits bits Which of the following must have a cert in SSL? 1.Client 2.Server 3.Both To detect new attacks, you need to choose 1.Firewall 2.Signature-based IDS 3.Anomaly-based IDS