Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2015.

Slides:



Advertisements
Similar presentations
CSE 461: IP/ICMP and the Network Layer. Next Topic  Focus:  How do we build large networks?  Introduction to the Network layer  Internetworks  Service.
Advertisements

Internet Control Protocols Savera Tanwir. Internet Control Protocols ICMP ARP RARP DHCP.
The Network Layer Chapter 5. The IP Protocol The IPv4 (Internet Protocol) header.
Chapter 5 The Network Layer.
Foundations of Network and Computer Security J J ohn Black Lecture #19 Oct 14 th 2009 CSCI 6268/TLEN 5550, Fall 2009.
Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke.
ITIS 6167/8167: Network and Information Security Weichao Wang.
Foundations of Network and Computer Security J J ohn Black Lecture #10 Sep 23 rd 2004 CSCI 6268/TLEN 5831, Fall 2004.
Chapter 23: ARP, ICMP, DHCP IS333 Spring 2015.
Prepared By E.Musa Alyaman1 Networking Theory Chapter 1.
Foundations of Network and Computer Security J J ohn Black Lecture #20 Oct 17 th 2007 CSCI 6268/TLEN 5831, Fall 2007.
Defining Network Protocols Application Protocols –Application Layer –Presentation Layer –Session Layer Transport Protocols –Transport Layer Network Protocols.
Introduction to InfoSec – Recitation 12 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
CS 356 Systems Security Spring Dr. Indrajit Ray
Lecture 8 Modeling & Simulation of Communication Networks.
Wireshark and TCP/IP Basics ACM SIG-Security Lance Pendergrass.
IST 228\Ch3\IP Addressing1 TCP/IP and DoD Model (TCP/IP Model)
Support Protocols and Technologies. Topics Filling in the gaps we need to make for IP forwarding work in practice – Getting IP addresses (DHCP) – Mapping.
OSI Model Routing Connection-oriented/Connectionless Network Services.
Internetworking. What internetworks are u Start with lots of little networks u Many different types –ethernet, dedicated leased lines, dialup, ATM, Frame.
Network Technologies essentials Week 4: Internetworking Compilation made by Tim Moors, UNSW Australia Original slides by David Wetherall, University of.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 03_a
Chapter 9.
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
CS 453 Computer Networks Lecture 21 Layer 3 Network Layer Network Layer of the Internet.
Introduction to InfoSec – Recitation 11 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
NUS.SOC.CS2105 Ooi Wei Tsang Application Transport Network Link Physical you are here.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
Suez Canal University – Faculty of Computers & Informatics - Cisco Local Academy Network Fundamentals.
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
Chapter 22 Q and A Victor Norman IS333 Spring 2015.
1 TCP/IP Internetting ä Subnet layer ä Links stations on same subnet ä Often IEEE LAN standards ä PPP for telephone connections ä TCP/IP specifies.
CS426Network Security1 Computer Security CS 426 Network Security (1)
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
Internetworking Internet: A network among networks, or a network of networks Allows accommodation of multiple network technologies Universal Service Routers.
TCP/IP Honolulu Community College Cisco Academy Training Center Semester 2 Version 2.1.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 21.
1 CS 4396 Computer Networks Lab TCP/IP Networking An Example.
CSCI 3335: C OMPUTER N ETWORKS A DAY IN THE LIFE OF A WEB REQUEST Vamsi Paruchuri University of Central Arkansas
Internet 1) Internet basic concepts 2) The IP protocol stack 3) The IP datagram header (IPv4 and IPv6) 4) Addressing and routing 5) Example: downloading.
1 Network Layer Lecture 16 Imran Ahmed University of Management & Technology.
Data Communications and Networks
TCP/IP (Transmission Control Protocol / Internet Protocol)
Internet Protocols. ICMP ICMP – Internet Control Message Protocol Each ICMP message is encapsulated in an IP packet – Treated like any other datagram,
1 Bus topology network. 2 Data is sent to all computers, but only the destination computer accepts 02608c
Slide #1 CIT 380: Securing Computer Systems TCP/IP.
Networking 101. OSI Reference Model Data Header Header Header.
CTC 228 – Computer Networks Fall 2015 Instructor: Robert Spengler.
1 Internetworking: IP Packet Switching Reading: (except Implementation; pp )
ITP 457 Network Security Networking Technologies III IP, Subnets & NAT.
TCP/IP Protocol Suite and IP Addressing Presented By : Dupien AMS.
Ch. 23, 25 Q and A (NAT and UDP) Victor Norman IS333 Spring 2015.
Network Devices and Firewalls Lesson 14. It applies to our class…
CPS110: Networks Landon Cox March 25, Network hardware reality  Lots of different network interface cards (NICs)  3Com/Intel, Ethernet/802.11x.
IP - Internet Protocol No. 1  Seattle Pacific University IP: The Internet Protocol Kevin Bolding Electrical Engineering Seattle Pacific University.
Chapter 22 Q and A Victor Norman IS333 Spring 2016.
NAT – Network Address Translation
Scaling the Network: The Internet Protocol
Course Review 2015 Computer networks 赵振刚
Domain 4 – Communication and Network Security
MAC Addresses and ARP 32-bit IP address:
ICMP ICMP – Internet Control Message Protocol
Chapter 22 Q and A Victor Norman CS332 Fall 2017.
CS 457 – Lecture 10 Internetworking and IP
Topic 5: Communication and the Internet
Scaling the Network: The Internet Protocol
Networking Essentials For Firewall-1 Administrators
ITIS 6167/8167: Network and Information Security
Presentation transcript:

Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5550, Spring 2015

The Big (Partial) Picture Primitives Block Ciphers Hash Functions Hard Problems Stream Ciphers First-Level Protocols Symmetric Encryption Digital Signatures MAC Schemes Asymmetric Encryption Second-Level Protocols SSH, SSL/TLS, IPSec Electronic Cash, Electronic Voting (Can do proofs) (No one knows how to prove security; make assumptions)

Network Security Haven’t we already been talking about network security?! –Kind of… cryptography is a central part of it –Cryptography is nice because it’s a neatly packaged science; but we’re done for now –Network security itself is a vast area with fuzzy borders –Research tends to be more ad hoc How do we stop attack A, how do we prevent bug B, how do we detect or tolerate intrusions, etc.

Crypto …. Good The easiest way to break into a computer is usually not by breaking the crypto –We’ve said this a number of times in this class before; there are usually easier ways Let’s suppose we want to break into a friend’s account on CSEL –What kind of friend are you?? –Ok, give me methods… simple methods

Ok, Breaking into a “Friend’s” Acct Fake Login Screen Shoulder Surfing Password Cracker –MD5 hashes publicly available on web Social engineering –Hard to trick CSOps though –Might be easy to impersonate CSOps! Key loggers –Software and hardware versions Keystroke analysis –Ok, getting obscure

Networking Refresher For some of you this will be boring… sorry The basic model: ISP Backbone (not a single line) LAN Eth user1 user2

Basic Networking Suppose user1 sends a UDP packet to user2, what happens? –What’s UDP? User Datagram Protocol Just like IP but with ports –Well, first we need an IP address! What’s an IP address For IPv4, it’s a “dotted quad” of bytes –Ex, –32 bits For IPv6, it’s 128 bits –16 bytes in hex separated by colons

Running out of IP addresses 2 32 is a lot, but we’ve run out –A lot of hosts out there –The class A, B, C scheme is wasteful Though subnetting helps A lot of NAT Boxing “helps” Since we’re getting by, it means a slower migration to IPv6

Sending a UDP packet Assume IPv4 –Get IP address via DNS Domain Name Service Distributed database mapping textual names to IP addresses Insecure –DNS spoofing –More on this later –Ok, so we have an IP address –And we presumably have a port #

Pack it Up! Message UDP Header Src IP, Dest IP, Len, Chksm, TTL Src Port, Dest Port, Len, Chksm Eth Header IP Header Src addr, Dest addr, Chksm Ethernet addresses are called “MAC addresses” Ethernet checksum is actually appended to end of packet Ethernet MTU is 1500 bytes

Routing on a Network Usually done via OSPF or LSP for LANs –Open Shortest Path First, Link-State Protocol –These protocols assume “modest sized” networks –A routing protocol decides how to forward packets based on routing tables BGP is used on backbone –Border Gateway Protocol –Routes using incomplete information

Local Routing Table Our local routing table (on host of user1) is not going to have a route to IP of user2 –Routing table will therefore send our packet to the gateway –Gateway is the machine/router on the “edge” of the network responsible for processing all incoming/outgoing traffic from/to the LAN NAT boxing, firewalling, and other stuff is usually done here as well

Getting to the Gateway How to we route to the IP address of the gateway on our local Ethernet? –ARP (Address Resolution Protocol) Translates IP addresses into MAC addresses Caches old lookups, so we probably already have the MAC address of the gateway If not, we send an ARP Request to the LAN, including the IP address whose MAC we seek Owner (ie, the gateway) sends ARP Reply with his MAC address and we cache it –Usually, all other machines who hear the ARP Reply cache it as well –Leads to attacks… more later

Sending to the Gateway Now we have the MAC address of the gateway –Send our packet to the gateway via the Ethernet protocol –This is usually done with a hardware device (network card) which often puts the Eth header on your packet for you, computes checksums, etc. Broadcasts packet, detects collisions Exponential backoff Promiscuous mode – Sniffers use this –Works through hubs, but doesn’t work through switches on a switched Ethernet –You can often fool switches

Gateway Receives Eth Packet Strips Eth header and again tries to route the resulting IP packet –Looks in routing table, sends to ISP –ISP probably routes using BGP –Reaches other ISP Note that we’re using other Ethernets and similar physical-layer protocols for each hop! –Other ISP routes to other LAN’s gateway Gateway sees IP is in its range and does ARP to route to user2

User2 Receives Packet User2 receives the IP packet –Removes IP header No one else (is supposed to) look inside packet until user2 receives it NAT boxes break this rule Firewalls break this rule –See it’s a UDP packet and “sends” to proper port –Ports are mapped to applications via listento() Application receives message and processes it

Other Protocols We didn’t even talk about SLIP or PPP ATM, FDDI, Wireless What about DHCP? –Dynamic IP addresses There is also ICMP –Internet Control Message Protocol –Echo (ping), traceroute Application Layer Protocols –SNMP – Network Management –SMTP – Sendmail –POP/IMAP – Mail protocols

MTU – Maximum Transmission Unit MTU for Ethernet is 1500 bytes –If MTU is exceeded, packet is “fragmented” –IP has support for packet fragmentation and reassembly –A packet is broken into as many pieces as necessary to comply with MTU –Fragments routed as regular IP datagrams, independent of each other –Reassembly done at host only

IP – Best Effort Datagrams IP is “best effort” –There is no tracking of packets –If something is dropped… oh well –If one fragment is dropped, many transport layer protocols (like TCP) will consider the whole thing lost and not ACK –This seems bad, but it’s one of the biggest successes of IP –UDP is IP with ports, so it too is “best effort”

TCP – Transmission Control Protocol Stateful connections –Runs over IP just like UDP, but adds more than just ports –Establish a connection with listen() and connect() IP and UDP were “stateless” protocols –Reliable delivery Unlike best-effort, this protocol guarantees delivery of packets, in proper order Uses sequence numbers, sliding windows, ACKs every transmission

Crypto on a Network How do we do crypto on a network? –We’ve seen application-layer examples SSL/TLS, SSH This is called “end-to-end” cryptography, meaning between hosts The routers don’t care if the innermost part of each packet (the “payload”) is ciphertext or plaintext –IPSec IPSec does crypto at the network layer (the IP layer) Extremely well-engineered; hardly used We won’t study IPSec in this course

Network Security: The Biggest Challenges What are the biggest problems now, today, on the Internet –What are the most common types of attacks? Viruses, worms Break-ins via software vulnerabilities Denial of Service attacks (DoS) –And Distributes Denial of Service (DDoS) –What about keyloggers, spyware, rootkits? Not as relevant to network security More likely to be end-results of other break-ins –A recent virus was found to install a keylogger