Security. Security Threats  Impersonation  Pretend to be someone else to gain access to information or services  Lack of secrecy  Eavesdrop on data.

Slides:



Advertisements
Similar presentations
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Advertisements

Computer Security and Penetration Testing
Denial of Service & Session Hijacking.  Rendering a system unusable to those who deserve it  Consume bandwidth or disk space  Overwhelming amount of.
Suneeta Chawla Web Security Presentation Topic : IP Spoofing Date : 03/24/04.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Firewalls and Intrusion Detection Systems
Slide 1 Attacks on TCP/IP. slide 2 Security Issues in TCP/IP uNetwork packets pass by untrusted hosts Eavesdropping (packet sniffing) uIP addresses are.
SYN Flooding: A Denial of Service Attack Shivani Hashia CS265.
Analysis of Attack By Matt Kennedy. Different Type of Attacks o Access Attacks o Modification and Repudiation Attacks o DoS Attacks o DDoS Attacks o Attacks.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 7: Denial-of-Service Attacks.
TCP/IP Basics A review for firewall configuration.
Attack Profiles CS-480b Dick Steflik Attack Categories Denial-of-Service Exploitation Attacks Information Gathering Attacks Disinformation Attacks.
Lecture 15 Denial of Service Attacks
Introduction to Network Security
ECE Prof. John A. Copeland fax Office: Klaus 3362.
Introduction to InfoSec – Recitation 12 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
CS426Fall 2010/Lecture 331 Computer Security CS 426 Lecture 33 Network Security (1)
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
FIREWALL Mạng máy tính nâng cao-V1.
TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS.
January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.
Firewalls. Evil Hackers FirewallYour network Firewalls mitigate risk Block many threats They have vulnerabilities.
Network security Further protocols and issues. Protocols: recap There are a few main protocols that govern the internet: – Internet Protocol: IP – Transmission.
By Anonymous Student. Outline  Security vulnerabilities  Denial-of-Service (DoS) and Distributed-Denial-of- Service (D-DoS)  Firewalls  Intrusion.
CS 640: Introduction to Computer Networks Aditya Akella Lecture 25 – Network Security.
CHAPTER 10 Session Hijacking. INTRODUCTION The act of taking over a connection of some sort, for examples, network connection, a modem connection or other.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
TCP/IP Vulnerabilities
CS426Network Security1 Computer Security CS 426 Network Security (1)
Lecture 20 Hacking. Over the Internet Over LAN Locally Offline Theft Deception Modes of Hacker Attack.
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
Lecture 22 Network Security CS 450/650 Fundamentals of Integrated Computer Security Slides are modified from Hesham El-Rewini.
CS526Topic 18: Network Security1 Information Security CS 526 Network Security (1)
DoS Suite and Raw Socket Programming Group 16 Thomas Losier Paul Obame Group 16 Thomas Losier Paul Obame.
Denial of Service Attacks
Chapter 7 Denial-of-Service Attacks Denial-of-Service (DoS) Attack The NIST Computer Security Incident Handling Guide defines a DoS attack as: “An action.
Lesson 7: Network Security and Attacks. Computer Security Operational Model Protection = Prevention+ (Detection + Response) Access Controls Encryption.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 25 November 16, 2004.
TCP Security Vulnerabilities Phil Cayton CSE
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Attacking on IPv6 W.lilakiatsakun Ref: ipv6-attack-defense-33904http://
1 Figure 3-13: Internet Protocol (IP) IP Addresses and Security  IP address spoofing: Sending a message with a false IP address (Figure 3-17)  Gives.
DoS/DDoS attack and defense
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
Web Security Firewalls, Buffer overflows and proxy servers.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
or call for office visit,
Lecture 17 Page 1 Advanced Network Security Network Denial of Service Attacks Advanced Network Security Peter Reiher August, 2014.
ITP 457 Network Security Networking Technologies III IP, Subnets & NAT.
Lecture 21: Network Primer 7/9/2003 CSCE 590 Summer 2003.
Denial of Service A comparison of DoS schemes Kevin LaMantia COSC 316.
Computer Network Security Dr. X. OSI stack… again.
1 Lecture A.2: Security Problems in TCP/IP r Reference: Security Problems in the TCP/IP Protocol Suite : by Steve Bellovin r R-services r Source-routing.
Introduction to Information Security
DDoS Attacks on Financial Institutions Presentation
or call for office visit, or call Kathy Cheek,
or call for office visit,
Domain 4 – Communication and Network Security
Outline Basics of network security Definitions Sample attacks
Introduction to Network Security
Error and Control Messages in the Internet Protocol
TCP/IP Internetworking
TCP/IP Internetworking
Threats in Networks Jagdish S. Gangolly School of Business
46 to 1500 bytes TYPE CODE CHECKSUM IDENTIFIER SEQUENCE NUMBER OPTIONAL DATA ICMP Echo message.
Session 20 INST 346 Technologies, Infrastructure and Architecture
Outline Basics of network security Definitions Sample attacks
Presentation transcript:

Security

Security Threats  Impersonation  Pretend to be someone else to gain access to information or services  Lack of secrecy  Eavesdrop on data over network  Corruption  Modify data over network  Break-ins  Take advantage of implementation bugs  Denial of Service  Flood resource to deny use from legitimate users

Security Vulnerabilities  Security Problems in the TCP/IP Protocol Suite – Steve Bellovin - 89  Attacks on Different Layers  IP Attacks  ICMP Attacks  Routing Attacks  TCP Attacks  Application Layer Attacks These are, today, the most common But today we’ll be (mostly) focusing on vulnerabilities that are inherent to the network, not just enabled by it

Three Levels of Defense  Firewalls  Filtering “dangerous” traffic at a middle point in the network  Network level security (e.g. IPsec)  Host-to-host encryption and authentication  Can provide security without application knowledge  Application level security  True end-to-end security  Requires extra effort per application  Libraries help, like SSL/TLS

Who is the enemy?  The Troubled Genius  Has a deep understanding of systems  Capable of finding obscure vulnerabilities in OS’s, apps, and protocols, and exploiting them  Extremely skilled at evading countermeasures  Can dynamically adapt to new environments  The Idiot  Little or no true understanding of systems  Blindly downloads & runs code written by T.G.  Can usually be stopped by calling his mother Who do you think causes more damage? Mitnick Simpson

Application Vulnerabilities  Getting a network service to do something the designers didn’t want  The network isn’t the fundamental weakness  Buffer overflows (unchecked input length) Expecting 100 bytes, send lots more  SQL injection attacks  Open FTP servers that execute code  Many, many more…

buffer overflows on the stack func_1() { int a, b; func_2(); } a, b c, d func_2() { int c, d; func_3(); } func 1’s address buf func_3() { char buf[100]; read_user_input(buf); } func 2’s address

buffer overflows on the stack func_1() { int a, b; func_2(); } a, b c, d func_2() { int c, d; func_3(); } func 1’s address buf func_3() { char buf[100]; read_user_input(buf); } func 2’s address evil_assembly_code() buf’s address Attacker is supplying input to buf… so buf gets a very carefully constructed string containing assembly code, and overwriting func 2’s address with buf’s address. When func3 returns, it will branch to buf instead of func2.

SQL Injection  Imagine a web site that takes your name, looks up info about you in a database  You might write code that says something like “select * from table where name=‘$NAME’  What if $NAME is: Joe’; update table set BankAccount=

XKCD #327

Security Flaws in IP  The IP addresses are filled in by the originating host  Address spoofing  Using source address for authentication  r-utilities (rlogin, rsh, rhosts etc..) Internet C A B S Can A claim it is B to the server S? ARP Spoofing Can C claim it is B to the server S? Source Routing

Firewalls  Originally, fairly basic: intent was to do per-packet inspection to block unused ports, for example  Make sure we know exactly what’s getting into the network and carefully think about their security  Problem: a bug in your HTTP server (or its configuration) won’t be caught by a basic firewall!  Later firewalls became smarter – they’d reconstruct the flow. Keep per-flow state (previously impossible)  Deny, for example, a HTTP request that contains “bobby tables”.

Reconstructing Flows  Let’s say you want to search for the text “USER root”. Is it enough to just search the data portion of TCP segments you see? USER root HDR USER TCP: HDR root HDR US HDR ER HDR ro HDR ot IP: (Uh oh… we have to reassemble frags and resequence segs)

Fun with Fragments HDR US HDR ER HDR ro HDR ot Think of the entire campus as being a massively parallel computer. That supercomputer is solving the flow-reconstruction problem. Now we’re asking a single host to try to solve that same problem ,000,000 unrelated fragments Imagine an attacker sends:

More Fragment Fun HDR US HDR ER HDR ro HDR ot Should we consider 3a part of the data stream “USER root”? Or is 3b part of the data stream? “USER foot”! If the OS makes a different decision than the monitor: Bad. Even worse: Different OS’s have different protocol interpretations, so it’s impossible for a firewall to agree with all of them b. 4. Imagine an attacker sends: HDR fo 3a. Seq. # Time

Trickery  Non-standard parts of standards  IP fragment overlap behavior  TCP sequence number overlap behavior  Invalid combinations of TCP options  Other ways to force a disparity between the monitor and the end-station  TTL  Checksum  Overflowing monitor buffers See for detailed examples

Security Flaws in IP  Source IP address can be forged  Leads to the “Smurf Attack”  Protocols that require no handshake (UDP) can be tricked if they do IP-based authentication  IP fragmentation attack  End hosts need to keep the fragments till all the fragments arrive  Denial of service

Ping Flood: The Smurf Attack evil ICMP_ECHO_REQ Source: victim Dest: big (broadcast addr) big victim ICMP_ECHO_RPL Source: big Dest: victim Typically: evil has slow link (modem) victim has fast link (T1) bighas very fast link (T3+)

ICMP Attacks  No authentication  ICMP redirect message  Can cause the host to switch gateways  Benefit of doing this? Man in the middle attack, sniffing  ICMP destination unreachable  Can cause the host to drop connection  ICMP echo request/reply  Many more… 

TCP Attacks Client Server SYN xSYN y | ACK x+1 ACK y+1

TCP Layer Attacks  TCP SYN Flooding  Exploit state allocated at server after initial SYN packet  Send a SYN and don’t reply with ACK  Server will wait for 511 seconds for ACK  Finite queue size for incomplete connections (1024)  Once the queue is full it doesn’t accept requests  Solution: “Syn Cookies”  Construct a special sequence number that has connection info “encrypted”  Client sends it back with the ACK; re-encrypt and make sure it matches

TCP Layer Attacks  TCP Session Hijack  When is a TCP packet valid? Address/Port/Sequence Number in window  How to get sequence number? Sniff traffic Guess it –Many earlier systems had predictable initial sequence number  Inject arbitrary data to the connection

TCP Layer Attacks  TCP Session Poisoning  Send RST packet Will tear down connection  Do you have to guess the exact sequence number? Anywhere in window is fine For 64k window it takes 64k packets to reset About 15 seconds for a T1  Can reset BGP connections

DNS Attacks  Cache poisoning:  Ask for EVILHOST.COM (say, because of spam)  EvilHost.com’s DNS server complies, but also “just happens” to tell you the IP of BankOfAmerica.com  DNS client puts it in cache. Fun!  Once this bug was found, DNS clients stopped accepting info they didn’t request

Routing Attacks  Distance Vector Routing  Announce 0 distance to all other nodes Blackhole traffic Eavesdrop  Link State Routing  Can claim direct link to any other routers  A bit harder to attack than DV  BGP  ASes can announce arbitrary prefix  ASes can alter path  Today, these are generally just solved through reputation: don’t accept updates from people you haven’t arranged for in advance.

Denial of Service  Objective  make a service unusable by overloading  Consume host resources  TCP SYN floods  ICMP ECHO (ping) floods  Consume bandwidth  UDP floods  ICMP floods  Crashing the victim  Ping-of-Death  TCP options (unused, or used incorrectly)  Forcing more computation on routers  Taking long path in processing of packets

Summary  The Internet is dangerous  Many of the original trust assumptions no longer hold  Network security needs to be addressed at different levels  Better protocols, better routers, better application level features, etc.  The root cause of security problems? Classes like this one. Security should be integral to everything, not tacked on at the end.