CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Security attacks. - confidentiality: only authorized parties have read access to information - integrity: only authorized parties have write access to.
PROTOCOL VERIFICATION & PROTOCOL VALIDATION. Protocol Verification Communication Protocols should be checked for correctness, robustness and performance,
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Luu Anh Tuan. Security protocol Intruder Intruder behaviors Overhead and intercept any messages being passed in the system Decrypt messages that are.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Chapter 1 This book focuses on two broad areas: cryptographic algorithms and protocols, which have a broad range of applications; and network and Internet.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
15-1 Last time Internet Application Security and Privacy Public-key encryption Integrity.
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
CSCE 790: Computer Network Security Chin-Tser Huang University of South Carolina.
Applied Cryptography for Network Security
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Introduction (Pendahuluan)  Information Security.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 515: Computer Network Programming Chin-Tser Huang University of South Carolina.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Cryptography and Network Security
Information Security Principles (ESGD4222)
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Cryptography, Authentication and Digital Signatures
Formal Analysis of Security Protocols Dr. Changyu Dong
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Information Security By:-H.M.Patel. Information security There are three aspects of information security Security service Security mechanism Security.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
. 1. Computer Security Concepts 2. The OSI Security Architecture 3. Security Attacks 4. Security Services 5. Security Mechanisms 6. A Model for Network.
Csci5233 computer security & integrity 1 Cryptography: an overview.
Lecture 16: Security CDK4: Chapter 7 CDK5: Chapter 11 TvS: Chapter 9.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Network Protocols Network Systems Security Mort Anvari.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Presented by: Dr. Munam Ali Shah
Network Security Introduction
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Introduction to Network Systems Security Mort Anvari.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
1 Computer Security Instructor: Dr. Bo Sun. 2 Course Objectives Understand basic issues, concepts, principles, and mechanisms in computer network security.
Introduction to AP Notation So far we have discussed the Internet Protocol informally Now, we need to learn about a formal notation, called the Abstract.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
CSCE 715: Network Systems Security
Cryptographic Hash Function
Information and Network Security
Mumtaz Ali Rajput +92 – INFORMATION SECURITY – WEEK 2 Mumtaz Ali Rajput +92 – 301-
Cryptography and Network Security
CSCE 715: Network Systems Security
CSCE 715: Network Systems Security
CSCE 715: Network Systems Security
CSCE 715: Network Systems Security
Cryptography and Network Security
Presentation transcript:

CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina

8/29/2006(C) 2006 Chin-Tser Huang2 Attacks, Mechanisms, and Services Security attack: any action that compromises security of information owned by an organization Security mechanism: a mechanism designed to detect, prevent, or recover from a security attack Security service: a service that enhances security of data processing systems and information transfers of an organization Security service uses one or more security mechanisms to counter security attack

8/29/2006(C) 2006 Chin-Tser Huang3 Type of Attacks Passive attacks Traffic analysis Message interception Active attacks Message loss Message modification Message insertion Message replay Denial-of-Service attack

8/29/2006(C) 2006 Chin-Tser Huang4 Network Security Services Confidentiality Integrity Authentication Anti-replay … Availability Access control Non-repudiation Anonymity

8/29/2006(C) 2006 Chin-Tser Huang5 Confidentiality Keep message known only to the receiver and secret to anyone else Counter message interception

8/29/2006(C) 2006 Chin-Tser Huang6 Integrity When receiver receives message m, receiver can verify m is intact after sent by sender Counter message modification

8/29/2006(C) 2006 Chin-Tser Huang7 Authentication When receiver receives message m, receiver can verify m is indeed sent by the sender recorded in m Counter message insertion

8/29/2006(C) 2006 Chin-Tser Huang8 Anti-replay When receiver receives message m, receiver can verify m is not a message that was sent and received before Counter message replay

8/29/2006(C) 2006 Chin-Tser Huang9 Availability Property of a system or a resource being accessible and usable upon demand by an authorized entity Counter denial-of-service attack

8/29/2006(C) 2006 Chin-Tser Huang10 Access Control Mechanism to enforce access rights to resources and data Users can access resources and data to which they have access rights Users cannot access resources and data to which they don’t have access rights

8/29/2006(C) 2006 Chin-Tser Huang11 Non-repudiation Sender non-repudiation: When receiver receives message m, receiver gets proof that sender of m ever sent m Receiver of m can show proof to third- party so that sender of m cannot repudiate

8/29/2006(C) 2006 Chin-Tser Huang12 Non-repudiation Receiver non-repudiation: When receiver receives message m, sender gets proof that receiver of m ever receives m Sender of m can show proof to third- party so that receiver of m cannot repudiate

8/29/2006(C) 2006 Chin-Tser Huang13 Anonymity Identity of sender is hidden from receiver When receiver receives message m, receiver has no clue about sender of m

8/29/2006(C) 2006 Chin-Tser Huang14 Network Protocols Abstractions of communication between two processes over a network Define message formats Define legitimate sequence of messages Take care of physical details of different network hardware and machines Separate tasks in complex communication networks For example, FTP and ARP

8/29/2006(C) 2006 Chin-Tser Huang15 Protocol Layering Many problems need to be solved in a communication network These problems can be divided into smaller sets and different protocols are designed for each set of problem Protocols can be organized into layers to keep them easy to manage

8/29/2006(C) 2006 Chin-Tser Huang16 Properties of Protocol Layer Functions of each layer are independent of functions of other layers Thus each layer is like a module and can be developed independently Each layer builds on services provided by lower layers Thus no need to worry about details of lower layers -- transparent to this layer

8/29/2006(C) 2006 Chin-Tser Huang17 Protocol Stack: OSI Model Application Presentation Session Transport Network Data link Physical

8/29/2006(C) 2006 Chin-Tser Huang18 Communicating End Hosts Application Presentation Session Transport Network Data link Physical Application Presentation Session Transport Network Data link Physical Network Data link Physical Host Router

8/29/2006(C) 2006 Chin-Tser Huang19 Verification of Network Protocols Many complex protocols perform multiple functions with multiple messages It is desirable to verify that a protocol can correctly perform functions that it was designed for Particularly important for security protocols

8/29/2006(C) 2006 Chin-Tser Huang20 Traditional Ways of Network Protocol Specification Plain English Time charts Programming languages

8/29/2006(C) 2006 Chin-Tser Huang21 Shortcomings of Plain English Ambiguity Different words can have similar meanings process p sends message m to process q process p transmits message m to process q process p forwards message m to process q process p delivers message m to process q Same word can have different meanings process p sends message m to process q process p sends file f to process q

8/29/2006(C) 2006 Chin-Tser Huang22 Shortcoming of Time Chart Not scalable Many legitimate sequences of messages Cannot list all possible legitimate sequences when the number of sequences grows exponentially

8/29/2006(C) 2006 Chin-Tser Huang23 Shortcoming of Using Programming Language Hard to prove correctness of protocol specification For example, protocol specified in C language may involve overlap, and may involve transmission delay

8/29/2006(C) 2006 Chin-Tser Huang24 Formal Ways of Network Protocol Specification BAN logic Abstract Protocol Notation

8/29/2006(C) 2006 Chin-Tser Huang25 BAN Logic Invented by Burrows, Abadi, and Needham Use logical constructs and postulates to analyze authentication protocols and uncover various protocol weaknesses

8/29/2006(C) 2006 Chin-Tser Huang26 Logical Constructs Assume P and Q are network agents, X is a message, and K is an encryption key P believes X: P acts as if X is true, and may assert X in other messages P has jurisdiction over X: P's beliefs about X should be trusted P said X: At one time, P transmitted (and believed) message X, although P might no longer believe X P sees X: P receives message X, and can read and repeat X {X} K : X is encrypted with key K fresh(X): X was sent recently key(K, P Q): P and Q may communicate with shared key K

8/29/2006(C) 2006 Chin-Tser Huang27 Examples of Postulates If P believes key(K, P Q), and P sees {X} K, then P believes (Q said X) If P believes (Q said X) and P believes fresh(X), then P believes (Q believes X) If P believes (Q has jurisdiction over X) and P believes (Q believes X), then P believes X If P believes that Q said, the concatenation of X and Y, then P also believes that Q said X, and P also believes that Q said Y

8/29/2006(C) 2006 Chin-Tser Huang28 Shortcomings of BAN Logic High level of abstraction Need for a protocol idealization step, in which user is required to transform each message in a protocol into formulas Can only verify a round every time

8/29/2006(C) 2006 Chin-Tser Huang29 Abstract Protocol Notation Presented by Mohamed Gouda in the book Elements of Network Protocol Design Formal and scalable Proof of correctness of protocol specification can be easily done using state transition diagram

8/29/2006(C) 2006 Chin-Tser Huang30 Communication Model A network of processes and two unbounded FIFO channels between every two processes process p … process q … Set of messages

8/29/2006(C) 2006 Chin-Tser Huang31 Process Specification Each process in a protocol is specified as follows process px inp : … : var : … : begin [] … [] end

8/29/2006(C) 2006 Chin-Tser Huang32 Action Execution Specified as  Satisfy three conditions Atomic: actions in the whole protocol are executed one at a time; one action cannot start while another action execution is in progress Non-deterministic: an action is executed only when its guard is true Fair: if guard of an action is continuously true, then the action is eventually executed

8/29/2006(C) 2006 Chin-Tser Huang33 State Transition Diagram Define semantic of a protocol State is defined by a value for each variable in protocol and by a message set for each channel in protocol Transition is movement from current state to next state triggered by an action execution

8/29/2006(C) 2006 Chin-Tser Huang34 An Example Protocol process p var ready: boolean {init. ready=true} txt, t: integer begin ready  txt := any; send rqst(txt) to q; ready := false []rcv rply(t) from q  {use text t in received message} ready := true end process q var t: integer begin rcv rqst(t) from p  t := any; send rply(t) to p end

8/29/2006(C) 2006 Chin-Tser Huang35 State Transition Diagram of Example Protocol T.0 :ready  ch.p.q =  ch.q.p = T.1 :~ready  ch.p.q =  ch.q.p = T.2 :~ready  ch.p.q =  ch.q.p =

8/29/2006(C) 2006 Chin-Tser Huang36 Adversary Model Adversary can change contents of protocol channels by executing the following actions a finite number of times Message loss: lose an original message Message modification: modify the field of an original message to cause a modified message Message replay: replace an original message by another original message to cause a replayed message Message insertion: add to a channel a finite number of arbitrary messages

8/29/2006(C) 2006 Chin-Tser Huang37 Prove Correctness of Secure Protocol Execution of adversary actions may lead the protocol to a bad state Protocol is said to be correct if it converges to its good cycle in a finite number of steps after adversary finishes executing its actions

8/29/2006(C) 2006 Chin-Tser Huang38 Next Class Network security tools to counter the effects of adversary actions Cryptography backgrounds of network security tools Read Ch. 2