Chapter 4 Copyright Pearson Prentice Hall 2013.  Describe the goals of creating secure networks.  Explain how denial-of-service attacks work.  Explain.

Slides:



Advertisements
Similar presentations
Media Access Control (MAC) addresses in the network access layer ▫ Associated w/ network interface card (NIC) ▫ 48 bits or 64 bits IP addresses for the.
Advertisements

Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
How To Not Make a Secure Protocol WEP Dan Petro.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Security Awareness: Applying Practical Security in Your World
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Subnetting.
WIRELESS NETWORK SECURITY. Hackers Ad-hoc networks War Driving Man-in-the-Middle Caffe Latte attack.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
Marwan Al-Namari Week 10. RTS: Ready-to-Send. CTS: Clear-to- Send. ACK: Acknowledgment.NAV: network allocation vector (channel access, expected time to.
Chapter 4 Copyright Pearson Prentice Hall  Describe the goals of creating secure networks.  Explain how denial-of-service attacks work.  Explain.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: Implementing VLAN Security Routing And Switching.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
Copyright © 2015 Pearson Education, Inc. Chapter 4 Chapter 4.
Being an Intermediary for Another Attack Prepared By : Muhammad Majali Supervised By : Dr. Lo’ai Tawalbeh New York Institute of Technology (winter 2007)
Chapter 6: Packet Filtering
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
Cisco – Chapter 11 Routers All You Ever Wanted To Know But Were Afraid to Ask.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Chapter 4. Copyright Pearson Prentice-Hall 2010  Chapter 3 introduces cryptographic elements that may be needed in a dialogue  Chapter 4 focuses on.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Network Security1 – Chapter 5 – Secure LAN Switching Layer 2 security –Port security –IP permit lists –Protocol filtering –Controlling LAN floods (using.
Chapter 4.  Chapter 3 introduces cryptographic elements that may be needed in a dialogue  Chapter 4 focuses on important cryptographic system standards,
1 Figure 2-11: Wireless LAN (WLAN) Security Wireless LAN Family of Standards Basic Operation (Figure 2-12 on next slide)  Main wired network.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Done By : Ahmad Al-Asmar Wireless LAN Security Risks and Solutions.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Chapter 4 Copyright Pearson Prentice Hall  Describe the goals of creating secure networks.  Explain how denial-of-service attacks work.  Explain.
WEP Protocol Weaknesses and Vulnerabilities
ARP Spoofing Attacks Dr. Neminath Hubballi IIT Indore © Neminath Hubballi.
NETWORK ATTACKS Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Attacking on IPv6 W.lilakiatsakun Ref: ipv6-attack-defense-33904http://
DoS/DDoS attack and defense
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 3: VLANs Routing & Switching.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
Networking Components Assignment 3 Corbin Watkins.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Chapter 5. An IP address is simply a series of binary bits (ones and zeros). How many binary bits are used? 32.
Address Resolution Protocol Yasir Jan 20 th March 2008 Future Internet.
By Billy Ripple.  Security requirements  Authentication  Integrity  Privacy  Security concerns  Security techniques  WEP  WPA/WPA2  Conclusion.
© 2015 Pearson Education Ltd. Chapter 4 Chapter 4.
Tightening Wireless Networks By Andrew Cohen. Question Why more and more businesses aren’t converting their wired networks into wireless networks?
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
Presentation on ip spoofing BY
An Introduction To ARP Spoofing & Other Attacks
Instructor Materials Chapter 6 Building a Home Network
Wireless Protocols WEP, WPA & WPA2.
Instructor Materials Chapter 5: Ethernet
Outline Basics of network security Definitions Sample attacks
Wireless LAN Security 4.3 Wireless LAN Security.
Outline Basics of network security Definitions Sample attacks
Presentation transcript:

Chapter 4 Copyright Pearson Prentice Hall 2013

 Describe the goals of creating secure networks.  Explain how denial-of-service attacks work.  Explain how ARP poisoning works.  Know why access controls are important for networks.  Explain how to secure Ethernet networks.  Describe wireless (WLAN) security standards.  Describe potential attacks against wireless networks. 2 Copyright Pearson Prentice Hall 2013

3

 Chapter 3 looked at how cryptography can protect data being sent across networks  Chapter 4 looks at how networks themselves are attacked  We will look at how attackers can gain unauthorized access to networks  We will also look at how attackers can alter the normal operation of a network  We will look at both wired (LAN) and wireless (WLAN) networks 4 Copyright Pearson Prentice Hall 2013

4.1 Introduction 4.2 Denial-of-Service (DoS) Attacks 4.3 ARP Poisoning 4.4 Access Control for Networks 4.5 Ethernet Security 4.6 Wireless Security 5 Copyright Pearson Prentice Hall 2013

 Cryptography provides confidentiality, authenticity, and message integrity for messages but…  Modern networks have additional vulnerabilities ◦ The means of delivering the messages could be stopped, slowed, or altered  DOS, DDOS ◦ The route the messages take can be altered  ARP poisoning, MITM, etc. ◦ Messages could be redirected to false recipients  ARP, MITM, DNS attacks ◦ Attackers could gain access to communication channels that were previously considered closed and confidential  Death of the perimeter 6 Copyright Pearson Prentice Hall 2013

Goals of Creating Secure Networks 1.Availability—users have access to information services and network resources 2.Confidentiality—prevent unauthorized users from gaining information about  Network Structure  Network Protocols  Packet Headers  Data  Collectively known as Fingerprinting 3.Functionality—preventing attackers from altering the capabilities, or normal operation of the network  Proper routing of packets  Correctly resolving hostnames (DNS)  Excluding unapproved protocols (RC4)  Correctly Assigning IP Addresses 4.Access control—keep attackers, or unauthorized employees, from accessing internal resources 7 Copyright Pearson Prentice Hall 2013

 The “castle” model ◦ Good guys on the inside, attackers on the outside, and a well-guarded point of entry  Death of the Perimeter ◦ It is impractical, if not impossible, to force all information in an organization through a single point in the network ◦ New means of attacking networks (i.e. smart phones) are constantly emerging ◦ Lines between “good guys” and “bad guys” has become blurred 8 Copyright Pearson Prentice Hall 2013

 The “city” model ◦ No distinct perimeter, and there are multiple ways of entering the network ◦ Like a real city, who you are will determine which buildings you will be able to access ◦ Greater need for:  Internal intrusion detection  Virtual LANs  Central authentication servers  Encrypted internal traffic 9 Copyright Pearson Prentice Hall 2013

4.1 Introduction 4.2 Denial-of-Service (DoS) Attacks 4.3 ARP Poisoning 4.4 Access Control for Networks 4.5 Ethernet Security 4.6 Wireless Security 10 Copyright Pearson Prentice Hall 2013

11 Copyright Pearson Prentice Hall 2013

4.1 Introduction 4.2 Denial-of-Service (DoS) Attacks 4.3 ARP Poisoning 4.4 Access Control for Networks 4.5 Ethernet Security 4.6 Wireless Security 12 Copyright Pearson Prentice Hall 2013

 Used to Authenticate Users connecting to wired-LAN ◦ By definition they are “in the building”  User connects to a Workgroup Switch vs. Core Switch (Review Module A) ◦ Specifically User connects to a port on the workgroup switch  Port is in Unauthorized status  Switches after supplicant is verified; Access Granted  Verification provided by Authentication Server (RADIUS) Copyright Pearson Prentice-Hall

1. Supplicant 2. Workgroup Switch (Authenticator) 3. Authentication Server Copyright Pearson Prentice-Hall

15 Copyright Pearson Prentice Hall 2013

 Cost Savings ◦ Processing Power at one point not every switch  Consistency ◦ Checking Credentials is done the same way every time  Immediate Changes ◦ Any changes can be made at Central server vs. many switches Copyright Pearson Prentice-Hall

1. Workgroup switch senses a port connection 2. Sends EAP Start 3. Authentication Server sends EAP Request to client ◦ Specifies expected credentials ◦ If client doesn’t have credentials EAP Response of negative acknowledgement sent back to server 4. Client EAP Response with correct credentials 5. EAP Success if supplicant authenticated or 6. EAP Failure if suppliant is not Copyright Pearson Prentice-Hall

18 Copyright Pearson Prentice Hall 2013

4.1 Introduction 4.2 Denial-of-Service (DoS) Attacks 4.3 ARP Poisoning 4.4 Access Control for Networks 4.5 Ethernet Security 4.6 Wireless Security 19 Copyright Pearson Prentice Hall 2013

20 Copyright Pearson Prentice Hall 2013

 Open networks can be legally accessed by anyone ◦ Found in public places like cafes, coffee shops, universities, etc.  Private networks that do not allow access unless specifically authorized  Secured networks have security protocols enabled ◦ Users are authenticated and wireless traffic is encrypted 21 Copyright Pearson Prentice Hall 2013

22 Copyright Pearson Prentice Hall 2013

23 Copyright Pearson Prentice Hall 2013

24 Copyright Pearson Prentice Hall 2013

25 Copyright Pearson Prentice Hall 2013

Copyright Pearson Prentice-Hall

 802.1X can’t be used for Wireless connections  EAP assumes secure connection between supplicant and Authenticator ◦ UTP has low interception rate (need to tap line) ◦ Wireless has high interception rate ◦ EAP messages need to be secured – i Copyright Pearson Prentice-Hall

28 Copyright Pearson Prentice Hall 2013

29 Copyright Pearson Prentice Hall 2013

 Origin of WEP ◦ Original core security standard in , created in 1997  Uses a Shared Key ◦ Each station using the access point uses the same (shared) key ◦ The key is supposed to be secret, so knowing it “authenticates” the user ◦ All encryption uses this key 30 Copyright Pearson Prentice Hall 2013

 Problem with Shared Keys ◦ If the shared key is learned, an attacker near an access point can read all traffic ◦ Shared keys should at least be changed frequently  But WEP had no way to do automatic rekeying  Manual rekeying is expensive if there are many users  Manual rekeying is operationally next to impossible if many or all stations use the same shared key because of the work involved in rekeying many or all corporate clients 31 Copyright Pearson Prentice Hall 2013

 Problem with Shared Keys ◦ Because “everybody knows” the key, employees often give it out to strangers ◦ If a dangerous employee is fired, the necessary rekeying may be impossible or close to it 32 Copyright Pearson Prentice Hall 2013

 RC4 Initialization Vectors (IV) ◦ WEP uses RC4 for fast and therefore cheap encryption ◦ But if two frames are encrypted with the same RC4 key are compared, the attacker can learn the key ◦ To solve this, WEP encrypts with a per-frame key that is the shared WEP key plus an initialization vector (IV) ◦ However, many frames “leak” a few bits of the key ◦ With high traffic, an attacker using readily available software can crack a shared key in 2 or 3 minutes ◦ (WPA uses RC4 but with a 48-bit IV that makes key bit leakage negligible) 33 Copyright Pearson Prentice Hall 2013

 Conclusion ◦ Corporations should never use WEP for security 34 Copyright Pearson Prentice Hall 2013

 WPA ◦ WPA extends the security of RC4 primarily by increasing the IV from 24 bits to 48 bits ◦ This extension vastly reduces leakage and so makes RC4 much harder to crack  WPA2 (802.11i) ◦ Working Group completed the i standard (WPA2) in 2002 ◦ Uses stronger security methods 35 Copyright Pearson Prentice Hall 2013

36 Cryptographic Characteristic WEPWPA802.11i (WPA2) Cipher for Confidentiality RC4 with a flawed implementation RC4 with 48-bit initialization vector (IV) AES with 128- bit keys Automatic Rekeying NoneTemporal Key Integrity Protocol (TKIP), which has been partially cracked AES-CCMP Mode Overall Cryptographic Strength NegligibleWeaker but no complete crack to date Extremely strong Copyright Pearson Prentice Hall 2013

37 Cryptographic Characteristic WEPWPA802.11i (WPA2) Operates in 802.1X (Enterprise) Mode? NoYes Operates in Pre- Shared Key (Personal) Mode? NoYes Copyright Pearson Prentice Hall 2013

38 Copyright Pearson Prentice Hall 2013

39 Copyright Pearson Prentice Hall 2013

 Spread Spectrum Operation and Security ◦ Signal is spread over a wide range of frequencies ◦ NOT done for security, as in military spread spectrum transmission 40 Copyright Pearson Prentice Hall 2013

 Turning Off SSID Broadcasting ◦ Service set identifier (SSID) is an identifier for an access point ◦ Users must know the SSID to use the access point ◦ Drive-by hacker needs to know the SSID to break in ◦ Access points frequently broadcast their SSIDs 41 Copyright Pearson Prentice Hall 2013

 Turning off SSID Broadcasting ◦ Some writers favor turning off of this broadcasting ◦ But turning off SSID broadcasting can make access more difficult for ordinary users ◦ Will not deter the attacker because he or she can read the SSID,  which is transmitted in the clear in each transmitted frame 42 Copyright Pearson Prentice Hall 2013

 MAC Access Control Lists ◦ Access points can be configured with MAC access control lists ◦ Only permit access by stations with NICs having MAC addresses on the list ◦ But MAC addresses are sent in the clear in frames, so attackers can learn them ◦ Attacker can then spoof one of these addresses 43 Copyright Pearson Prentice Hall 2013

 Perspective ◦ These “false” methods, however, may be sufficient to keep out nosy neighbors ◦ But drive-by hackers hit even residential users ◦ Simply applying WPA or i provides much stronger security and is easier to do 44 Copyright Pearson Prentice Hall 2013

4.1 Introduction 4.2 Denial-of-Service (DoS) Attacks 4.3 ARP Poisoning 4.4 Access Control for Networks 4.5 Ethernet Security 4.6 Wireless Security 45 Copyright Pearson Prentice Hall 2013

 What is a DoS attack? ◦ An attempt to make a server or network unavailable to legitimate users by flooding it with attack packets  What is NOT a DoS attack? ◦ Faulty coding that causes a system to fail ◦ Referrals from large websites that overwhelm smaller websites 46 Copyright Pearson Prentice Hall 2013

 Ultimate goal of DoS attacks is to cause harm ◦ Harm includes: losses related to online sales, industry reputation, employee productivity, customer loyalty, etc.  The two primary means of causing harm via DoS attacks include: 1.Stopping critical services 2.Slowly degrading services 47 Copyright Pearson Prentice Hall 2013

 Direct DoS Attack ◦ An attacker tries to flood a victim with a stream of packets directly from the attacker’s computer  Indirect DoS Attack ◦ The attacker’s IP address is spoofed (i.e., faked) and the attack appears to come from another computer  Intermediary ◦ DDOS (Bots), P2P redirection  Reflected ◦ Uses spoofed IP address to have legitimate hosts flood victim  Malformed Packets ◦ Sending IP packets that do not correspond to expected fields 48 Copyright Pearson Prentice Hall 2013

49 Copyright Pearson Prentice Hall 2013

 Types of packets sent: 50 Copyright Pearson Prentice Hall 2013

 Bots ◦ Updatable attack programs ◦ Botmaster can update the software to change the type of attack the bot can do  May sell or lease the botnet to other criminals ◦ Botmaster can update the bot to fix bugs  Botmaster can control bots via a handler ◦ Handlers are an additional layer of compromised hosts that are used to manage large groups of bots 51 Copyright Pearson Prentice Hall 2013

52 Copyright Pearson Prentice Hall 2013

 Peer-to-peer (P2P) redirect DoS attack ◦ Uses many hosts to overwhelm a victim using normal P2P traffic ◦ Attacker doesn’t have to control the hosts, just redirect their legitimate P2P traffic 53 Copyright Pearson Prentice Hall 2013

54 Copyright Pearson Prentice Hall 2013

 Reflected DoS attack ◦ Responses from legitimate services flood a victim ◦ The attacker sends spoofed requests to existing legitimate servers (Step 1) ◦ Servers then send all responses to the victim (Step 2) ◦ There is no redirection of traffic 55 Copyright Pearson Prentice Hall 2013

56 Copyright Pearson Prentice Hall 2013

 Smurf Flood ◦ The attacker sends a spoofed ICMP echo request to an incorrectly configured network device (router) ◦ Broadcasting enabled to all internal hosts ◦ The network device forwards the echo request to all internal hosts (multiplier effect) 57 Copyright Pearson Prentice Hall 2013

58 Copyright Pearson Prentice Hall 2013

 Black holing ◦ Drop all IP packets from an attacker ◦ Not a good long-term strategy because attackers can quickly change source IP addresses ◦ An attacker may knowingly try to get a trusted corporate partner black holed 59 Copyright Pearson Prentice Hall 2013

 Validating the handshake ◦ Whenever a SYN segment arrives, the firewall itself sends back a SYN/ACK segment, without passing the SYN segment on to the target server (false opening) ◦ When the firewall gets back a legitimate ACK the firewall send the original SYN segment on to the intended server  Rate limiting ◦ Used to reduce a certain type of traffic to a reasonable amount ◦ Can frustrate attackers, and legitimate users 60 Copyright Pearson Prentice Hall 2013

61 Copyright Pearson Prentice Hall 2013

4.1 Introduction 4.2 Denial-of-Service (DoS) Attacks 4.3 ARP Poisoning 4.4 Access Control for Networks 4.5 Ethernet Security 4.6 Wireless Security 62 Copyright Pearson Prentice Hall 2013

 Address Resolution Protocol (ARP) ◦ Used to resolve 32-bit IP addresses (e.g., ) into 48-bit local MAC addresses (e.g., 01-1C-23-0E-1D-41) ◦ ARP tables store resolved addresses (below) 63 Copyright Pearson Prentice Hall 2013

64 Copyright Pearson Prentice Hall 2013

 Address Resolution Protocol Poisoning ◦ Network attack that manipulates host ARP tables to reroute local-area network (LAN) traffic ◦ Possible man-in-the-middle attack ◦ Requires an attacker to have a computer (or control of a computer) on the local network ◦ An attack on both the functionality and confidentiality of a network 65 Copyright Pearson Prentice Hall 2013

 The problem: ARP requests and replies do NOT require authentication or verification ◦ All hosts trust all ARP replies ◦ ARP spoofing uses false ARP replies to map any IP address to any MAC address ◦ An attacker can manipulate ARP tables on all LAN hosts ◦ The attacker must send a continuous stream of unsolicited ARP replies 66 Copyright Pearson Prentice Hall 2013

67 Copyright Pearson Prentice Hall 2013

 ARP DoS Attack ◦ Attacker sends all internal hosts a continuous stream of unsolicited spoofed ARP replies saying the gateway ( ) is at E5-E5-E5-E5-E5-E5 (Step 1) ◦ Hosts record the gateway’s IP address and nonexistent MAC address (Step 2) ◦ The switch receives packets from internal hosts addressed to E5-E5-E5-E5-E5-E5 but cannot deliver them because the host does not exist ◦ Packets addressed to E5-E5-E5-E5-E5-E5 are dropped 68 Copyright Pearson Prentice Hall 2013

69 Copyright Pearson Prentice Hall 2013

 Preventing ARP Poisoning ◦ Static ARP tables are manually set  Most organizations are too large, change too quickly, and lack the experience to effectively manage static IP and ARP tables ◦ Limit Local Access  Foreign hosts must be kept off the LAN 70 Copyright Pearson Prentice Hall 2013

 Stateless Address Auto Configuration (SLAAC) attack ◦ An attack on the functionality and confidentiality of a network ◦ This attack occurs when a rogue IPv6 router is introduced to an IPv4 network ◦ All traffic is automatically rerouted through the IPv6 router, creating the potential for a MITM attack 71 Copyright Pearson Prentice Hall 2013

72 Copyright Pearson Prentice Hall 2013

73 Copyright Pearson Prentice Hall 2013

Copyright Pearson Prentice-Hall

75

Copyright © 2013 Pearson Education, Inc. Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall