Download presentation
Presentation is loading. Please wait.
1
© MMII JW RyderCS 428 Computer Networking1 Basic Internet Security Concepts
2
© MMII JW RyderCS 428 Computer Networking2 Purpose Some ideas on Internet Security Classes of mischief on Internet, definitions Tools to fight mischief Combinations of these tools
3
© MMII JW RyderCS 428 Computer Networking3 Purpose continued Very high level Good starting point for further study about General networking & strategies Cryptography Key Management Algorithm Analysis
4
© MMII JW RyderCS 428 Computer Networking4 Introduction The Internet is a vast wilderness, an infinite world of opportunity Exploring, e-mail, free software, chat, video, e-business, information, games Explored by humans
5
© MMII JW RyderCS 428 Computer Networking5 Internet Security Concepts Introduction of several basic security concepts General mechanisms for protection
6
© MMII JW RyderCS 428 Computer Networking6 Sniffing and Spoofing [1] Sniffing The ability to inspect IP Datagrams which are not destined for the current host. Spoofing After sniffing, create malicious havoc on the internet
7
© MMII JW RyderCS 428 Computer Networking7 Unprotected Internet node Private Network node Secure Gateway node A Guy Gabrielle Poirot (C) Sears Bank (I) A Guy’s Swiss Bank Wall Street (N) Steve Burns (C) Ramon Sanchez (A) 1
8
© MMII JW RyderCS 428 Computer Networking8 A Guy has no Integrity Swiss Bank Scam Integrity - The guarantee that, upon receipt of a datagram from the network, the receiver will be able to determine if the data was changed in transit
9
© MMII JW RyderCS 428 Computer Networking9 Ramon springs for sound Sears solid state stereos Authentication - The guarantee that, upon receipt of a datagram from the network, the receiver will be able to determine if the stated sender of the datagram is, in fact, the sender
10
© MMII JW RyderCS 428 Computer Networking10 A guy sniffs success Gabrielle and Steve almost strike it rich Confidentiality - Ensure that each party, which is supposed to see the data, sees the data and ensure that those who should not see the data, never see the data.
11
© MMII JW RyderCS 428 Computer Networking11 Wall Street Woes A guy spots a hot stock tip Non-repudiation - Once a host has sent a datagram, ensure that that same host cannot later claim that they did not send the datagram
12
© MMII JW RyderCS 428 Computer Networking12 A guy becomes desperate Bring Wall St. to its knees Denial of Service Attack - Flood a given IP Address (Host) with packets so that it spends the majority of its processing time denying service
13
© MMII JW RyderCS 428 Computer Networking13 Physical Adapter IP In Comm. Stack One Way Hash Functions (MD5,SHA1) Crypto Functions (DES, CDMF, 3DES) Key Mgmt. Functions Application 2
14
© MMII JW RyderCS 428 Computer Networking14 Protocol Flow [2, 3] Through layers, each layer has a collection of responsibilities ISO OSI Reference Model - (Open Systems Interconnection) IP Datagram
15
© MMII JW RyderCS 428 Computer Networking15 IP Hdr.Data IP Datagram DataMAC FnDigest MAC Function IP Hdr.DataDigest Integrity 3
16
© MMII JW RyderCS 428 Computer Networking16 Keys Bit values fed into cryptographic algorithms and one way hashing functions which provide help provide confidentiality, integrity, and authentication The longer the better - 40, 48, 56, 128 Brute force attacks can win with small keys
17
© MMII JW RyderCS 428 Computer Networking17 Symmetric Keys Have qualities such as life times, refresh rates, etc. Symmetric - Keys that are shared secrets on N cooperating, trusted hosts
18
© MMII JW RyderCS 428 Computer Networking18 Asymmetric Public / Private key pairs Public key lists kept on well known public key servers Public key is no secret. If it is, the strategy will not work. Public and Private keys inverse functional values Private key is only known to you and must remain secret
19
© MMII JW RyderCS 428 Computer Networking19 Concept Sender encrypts data with private key Receiver decrypts data with public key Receiver replies after encrypting with public key Sender receives response and decrypts with private key
20
© MMII JW RyderCS 428 Computer Networking20 Data Encryption Function IP Hdr. Key Crypto Fn.Encrypted Data Encrypted Data Confidentiality 4
21
© MMII JW RyderCS 428 Computer Networking21 Decryption Function Data Key Crypto Fn. Encrypted Data Confidentiality Data 5
22
© MMII JW RyderCS 428 Computer Networking22 MACs Message Authentication Codes, One Way Hashing Functions A function, easy to compute but computationally infeasible to find 2 messages M1 and M2 such that h (M1) = h (M2) MD5 (Rivest, Shamir, Adleman) RSA ; SHA1 (NIST) MD5 yields a 128 bit digest [3]
23
© MMII JW RyderCS 428 Computer Networking23 DES Data Encryption Standard U.S. Govt. Standard 56 bit key - originally 128 bits Absolute elimination of exhaustive search of key space U.S. Security Agency Request - Reduce to 56 bits Export CDMF (40 bits) Keys are secrets to algorithms, not algorithms themselves [4, 5]
24
© MMII JW RyderCS 428 Computer Networking24 IP Hdr. Encrypted Data Confidentiality, Integrity, & Authentication IP Hdr. Encrypted Data Digest Digital Signature (Encrypted Digest) Confidentiality & Integrity
25
© MMII JW RyderCS 428 Computer Networking25 Data EM KeyMAC CF DS Digest Keyed Digest MAC_Time < CF _Time Why would a guy prefer a Digital Signature over a Keyed Digest? Why not? What types of Security are provided with EM, DS, Digest, Keyed Digest?
26
© MMII JW RyderCS 428 Computer Networking26 Msg EM Msg MD DS KD No Security Integrity Confidentiality Conf. & Integrity Integrity & Auth. Conf., Int., & Auth. Integrity & Auth. Conf., Int., & Auth.
27
© MMII JW RyderCS 428 Computer Networking27 Post Presentation Results You should be familiar with concepts & terms such as Integrity, Authentication, Non-repudiation, Confidentiality Keys, MACs, Cryptography, Digest, Digital Certificates, Datagram High level understanding of some methods to combat some the above types of Internet mischief
28
© MMII JW RyderCS 428 Computer Networking28 One-Way Hashing Function Demo Show MD5 example
29
© MMII JW RyderCS 428 Computer Networking29 Sniffers Threads comment Show Sniffer.java
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.