Presentation is loading. Please wait.

Presentation is loading. Please wait.

EN Lecture Notes Spring 2016

Similar presentations


Presentation on theme: "EN Lecture Notes Spring 2016"— Presentation transcript:

1 EN.600.424 Lecture Notes Spring 2016
Secure Network Design EN Lecture Notes Spring 2016

2 Security! But How? Everyone wants a secure network. But how?
“Whoever thinks his problem can be solved using cryptography, doesn’t understand his problem and doesn’t understand cryptography. — Attributed by Roger Needham and Butler Lampson to Each Other Let’s start our discussion by finding “vectors” Remember, Delivery/Vector Payload

3 How Are Networks Attacked?
Automated attack vectors: Servers, services on TCP/UDP ports Vulnerabilities Misconfiguration Mobile code Compromised local machines Compromised third-party code/servers (e.g., Google hacking, DNS, update) Human attack vectors: Honeypot websites/downloads

4 Attacks On Local Networks
Eavesdropping Many local protocols are still “in the clear” Masquerade as a machine with higher privileges Abuse shared resources The common problem is we generally have to assume trust locally Can’t be so “secure” that work doesn’t get done.

5 Protocol Attacks (Remote)
Syn Flooding Principle: Perverse Incentives (see, e.g., spam) Smurfing (Fixed in 2007) Send packet to broadcast domain from target address Principle: Force Multiplier DDoS Principle: Brute Force? Spam (especially malicious/malware) TCP hijacking

6 Malware Attacks Virus, Worm, Trojan Horse
Fred Cohen: Viruses can’t be stopped (Halting problem) Viruses work by corrupting real executables Virus polymorphism Worms spread using a known vulnerability Trojan horses look “useful” but aren’t Rootkit Especially used for botnets, etc Spyware and Adware

7 Approaches to Network Defenses
Management Filtering Intrusion Detection Encryption (at rest and in motion) and protocols

8 Configuration Management
Patches Updates Misc, such as disabling unsafe defaults, etc Disable unnecessary services Topology, architecture, network defense programs, etc Operational security: Training

9 Filtering Firewalls Only allow traffic that you know you need
Packet Filters Application Firewalls (mostly obsolete) Deperimeterism Spam Filters Censoreware Don’t allow secrets out Wiretaps Maintain logs

10 AntiVirus/Malware Defenses
Scanners Static Heuristics Emulation Checksummers System hardening Only allow writes to specific directories Block driver modifications, etc Anti-keylogging

11 Host/Network Deployments
Antivirus can run on hosts Can also run on the network Mail server, especially Firewall, if it does content scanning Nowadays: Cloud See also Intrusion Detection Software (host-based, network based)

12 Intrusion Detection Use rules, heuristics to detect “anomalies”
Generally, detects after the fact! Useful for generating subsequent signatures Often combined into firewalls now

13 Limitations for IDS Internet is “noisy”, see also, halting problem
Too few attacks Software/version specific Encrypted, tunneled traffic Intelligent design

14 Cryptography SSH WiFi As you all know, WEP is broken. You should try it some time WPA is fairly safe in the right mode with the right config Homeplug (I used this…) IPSec TLS PKI Biggest problem with all of these? KEY MANAGEMENT

15 Side Bar: Data In Motion
Protecting data as it moves from one node to another. Generally, this is done with network protocols, but can be “in the mail” Assumption is that the endpoints are secure Biggest issue is generally key management and authentication (of people and data)

16 Side Bar: Data At Rest Data stored at an endpoint, or in a temporary location Interesting issues with third parties: Insiders? Reliability/Availability Secure Fail? (fail open or fail closed?) Long term keys, passwords? Survivorship of access?


Download ppt "EN Lecture Notes Spring 2016"

Similar presentations


Ads by Google