SlideShare a Scribd company logo
1 of 83
Download to read offline
18CS2005 Cryptography and
Network Security
Module 6
IP and System Security
IP security overview-IP security policy-Encapsulating Security payload-
intruders-intrusion detection virus/worms-countermeasure-need for firewalls
firewall characteristics-types of fires
Dr.A.Kathirvel, Professor,
DCSE, KITS
kathirvel@karunya.edu
IP Security
• have a range of application specific
security mechanisms
– eg. S/MIME, PGP, Kerberos, SSL/HTTPS
• however there are security concerns that
cut across protocol layers
• would like security implemented by the
network for all applications
2
IP Security
• general IP Security mechanisms
• provides
– authentication
– confidentiality
– key management
• applicable to use over LANs, across public
& private WANs, & for the Internet
• need identified in 1994 report
– need authentication, encryption in IPv4 & IPv6
3
IPSec Document Overview
4
IP Security Uses
5
Benefits of IPSec
• in a firewall/router provides strong security
to all traffic crossing the perimeter
• in a firewall/router is resistant to bypass
• is below transport layer, hence transparent
to applications
• can be transparent to end users
• can provide security for individual users
• secures routing architecture
6
IP Security Specification
The IPSec specification has become quite complex. key management. The totality of the
IPsec specification is scattered across dozens of RFCs and draft IETF documents,
making this the most complex and difficult to grasp of all IETF specifications. The
best way to keep track of and get a handle on this body of work is to consult the
latest version of the IPsec document roadmap. The documents can be categorized
into the following groups:
• Architecture: Covers the general concepts, security requirements, definitions, and
mechanisms defining IPsec technology, RFC 4301, Security Architecture for the
Internet Protocol.
• Authentication Header (AH): AH is an extension header for message authentication,
now deprecated.
• Encapsulating Security Payload (ESP): ESP consists of an encapsulating header
and trailer used to provide encryption or combined encryption/authentication. .
• Internet Key Exchange (IKE): a collection of documents describing the key
management schemes for use with IPsec
• Cryptographic algorithms: a large set of documents that define and describe
cryptographic algorithms for encryption, message authentication, pseudorandom
functions (PRFs), and cryptographic key exchange.
• Other: There are a variety of other IPsec-related RFCs, including those dealing with
security policy and management information base (MIB) content.
7
IPSec Services
• Access control
• Connectionless integrity
• Data origin authentication
• Rejection of replayed packets
– a form of partial sequence integrity
• Confidentiality (encryption)
• Limited traffic flow confidentiality
8
Transport and Tunnel Modes
• Transport Mode
– to encrypt & optionally authenticate IP data
– can do traffic analysis but is efficient
– good for ESP host to host traffic
• Tunnel Mode
– encrypts entire IP packet
– add new header for next hop
– no routers on way can examine inner IP header
– good for VPNs, gateway to gateway security
9
Transport
and
Tunnel
Modes
10
Transport
and
Tunnel
Mode
Protocols
Security Associations
• a one-way relationship between sender &
receiver that affords security for traffic flow
• defined by 3 parameters:
– Security Parameters Index (SPI)
– IP Destination Address
– Security Protocol Identifier
• has a number of other parameters
– seq no, AH & EH info, lifetime etc
• have a database of Security Associations
12
Security Policy Database
• relates IP traffic to specific SAs
– match subset of IP traffic to relevant SA
– use selectors to filter outgoing traffic to map
– based on: local & remote IP addresses, next layer
protocol, name, local & remote ports
13
Transport Mode SA Tunnel Mode SA
AH Authenticates IP payload
and selected portions of IP
header and IPv6 extension
headers
Authenticates entire inner
IP packet plus selected
portions of outer IP header
ESP Encrypts IP payload and any
IPv6 extesion header
Encrypts inner IP packet
ESP with
authentication
Encrypts IP payload and any
IPv6 extesion header.
Authenticates IP payload
but no IP header
Encrypts inner IP packet.
Authenticates inner IP
packet.
14
Before
applying AH
Transport Mode
(AH
Authentication)
15
Tunnel Mode
(AH
Authentication)
Encapsulating Security Payload (ESP)
• provides message content confidentiality, data origin
authentication, connectionless integrity, an anti-
replay service, limited traffic flow confidentiality
• services depend on options selected when establish
Security Association (SA), net location
• can use a variety of encryption & authentication
algorithms 16
Encapsulating Security Payload
17
Encryption & Authentication
Algorithms & Padding
• ESP can encrypt payload data, padding,
pad length, and next header fields
– if needed have IV at start of payload data
• ESP can have optional ICV for integrity
– is computed after encryption is performed
• ESP uses padding
– to expand plaintext to required length
– to align pad length and next header fields
– to provide partial traffic flow confidentiality
18
Anti-Replay Service
• replay is when attacker resends a copy of an
authenticated packet
• use sequence number to thwart this attack
• sender initializes sequence number to 0
when a new SA is established
– increment for each packet
– must not exceed limit of 232 – 1
• receiver then accepts packets with seq no
within window of (N –W+1)
19
Combining Security Associations
• SA’s can implement either AH or ESP
• to implement both need to combine SA’s
– form a security association bundle
– may terminate at different or same endpoints
– combined by
• transport adjacency
• iterated tunneling
• combining authentication & encryption
– ESP with authentication, bundled inner ESP &
outer AH, bundled inner transport & outer ESP
20
Combining Security Associations
21
IPSec Key Management
• handles key generation & distribution
• typically need 2 pairs of keys
– 2 per direction for AH & ESP
• manual key management
– Sys-admin manually configures every system
• automated key management
– automated system for on demand creation of
keys for SA’s in large systems
– has Oakley & ISAKMP elements
22
Oakley
• a key exchange protocol
• based on Diffie-Hellman key exchange
• adds features to address weaknesses
– no info on parties, man-in-middle attack, cost
– so adds cookies, groups (global params),
nonces, DH key exchange with authentication
• can use arithmetic in prime fields or elliptic
curve fields
23
ISAKMP
• Internet Security Association and Key
Management Protocol
• provides framework for key management
• defines procedures and packet formats to
establish, negotiate, modify, & delete SAs
• independent of key exchange protocol,
encryption alg, & authentication method
• IKEv2 no longer uses Oakley & ISAKMP
terms, but basic functionality is same
24
IKEV2 Exchanges
25
• The IKEv2 protocol involves the exchange of messages in pairs.
• The first two pairs of exchanges are referred to as the initial
exchanges). In the first exchange the two peers exchange
information concerning cryptographic algorithms and other security
parameters they are willing to use along with nonces and Diffie-
Hellman (DH) values. The result of this exchange is to set up a
special SA called the IKE SA
• This SA defines parameters for a secure channel between the
peers over which subsequent message exchanges take place.
Thus, all subsequent IKE message exchanges are protected by
encryption and message authentication. In the second exchange,
the two parties authenticate one another and set up a first IPsec
SA to be placed in the SADB and used for protecting ordinary (i.e.
non-IKE) communications between the peers.
• Thus four messages are needed to establish the first SA for
general use. The CREATE_CHILD_SA exchange can be used to
establish further SAs for protecting traffic. The informational
exchange is used to exchange management information, IKEv2
error messages, and other notifications.
ISAKMP
27
• An ISAKMP message consists of an ISAKMP header followed by one or more
payloads, carried in a transport protocol (UDP by default).
• Figure1 shows the header format for an ISAKMP message, which includes the
fields:
• Initiator SPI (64 bits): chosen by the initiator to identify a unique SA
• Responder Cookie (64 bits): chosen by responder to identify unique IKE SA
• Next Payload (8 bits): type of the first payload in the message.
• Major/Minor Version (4 bits): Indicates major/minor version of IKE in use
• Exchange Type (8 bits): type of exchange.
• Flags (8 bits): specific options set for this IKE exchange.
• Message ID (32 bits): control retransmission, matching of requests /responses.
• Length (32 bits): of total message (header plus all payloads) in octets.
All ISAKMP payloads begin with the same generic payload header shown in Figure
2. The Next Payload field has a value of 0 if this is the last payload in the
message; otherwise its value is the type of the next payload. The Payload
Length field indicates the length in octets of this payload, including the generic
payload header. The critical bit is zero if the sender wants the recipient to skip
this payload if it does not understand the payload type code in the Next Payload
field of the previous payload. It is set to one if the sender wants the recipient to
reject this entire message if it does not understand the payload type.
IKE Payloads & Exchanges
• have a number of ISAKMP payload types:
– Security Association, Key Exchange,
Identification, Certificate, Certificate Request,
Authentication, Nonce, Notify, Delete, Vendor
ID, Traffic Selector, Encrypted, Configuration,
Extensible Authentication Protocol
• payload has complex hierarchical structure
• may contain multiple proposals, with
multiple protocols & multiple transforms
29
Secure Electronic Transactions
(SET)
• open encryption & security specification
• to protect Internet credit card transactions
• developed in 1996 by Mastercard, Visa etc
• not a payment system
• rather a set of security protocols & formats
– secure communications amongst parties
– trust from use of X.509v3 certificates
– privacy by restricted info to those who need it
SET Components
SET Transaction
1. customer opens account
2. customer receives a certificate
3. merchants have their own certificates
4. customer places an order
5. merchant is verified
6. order and payment are sent
7. merchant requests payment authorization
8. merchant confirms order
9. merchant provides goods or service
10.merchant requests payment
Dual Signature
• customer creates dual messages
– order information (OI) for merchant
– payment information (PI) for bank
• neither party needs details of other
• but must know they are linked
• use a dual signature for this
– signed concatenated hashes of OI & PI
Purchase Request – Customer
Purchase Request – Merchant
Purchase Request – Merchant
1. verifies cardholder certificates using CA sigs
2. verifies dual signature using customer's public
signature key to ensure order has not been
tampered with in transit & that it was signed
using cardholder's private signature key
3. processes order and forwards the payment
information to the payment gateway for
authorization (described later)
4. sends a purchase response to cardholder
Payment Gateway Authorization
1. verifies all certificates
2. decrypts digital envelope of authorization block to obtain
symmetric key & then decrypts authorization block
3. verifies merchant's signature on authorization block
4. decrypts digital envelope of payment block to obtain
symmetric key & then decrypts payment block
5. verifies dual signature on payment block
6. verifies that transaction ID received from merchant
matches that in PI received (indirectly) from customer
7. requests & receives an authorization from issuer
8. sends authorization response back to merchant
Payment Capture
• merchant sends payment gateway a
payment capture request
• gateway checks request
• then causes funds to be transferred to
merchants account
• notifies merchant using capture response
Chapter 18 – Intruders
They agreed that Graham should set the test for
Charles Mabledene. It was neither more nor less
than that Dragon should get Stern's code. If he
had the 'in' at Utting which he claimed to have
this should be possible, only loyalty to Moscow
Centre would prevent it. If he got the key to the
code he would prove his loyalty to London
Central beyond a doubt.
—Talking to Strange Men, Ruth Rendell
Intruders
• significant issue for networked systems is
hostile or unwanted access
• either via network or local
• can identify classes of intruders:
– masquerader
– misfeasor
– clandestine user
• varying levels of competence
Intruders
• clearly a growing publicized problem
– from “Wily Hacker” in 1986/87
– to clearly escalating CERT stats
• may seem benign, but still cost resources
• may use compromised system to launch
other attacks
Intrusion Techniques
• aim to increase privileges on system
• basic attack methodology
– target acquisition and information gathering
– initial access
– privilege escalation
– covering tracks
• key goal often is to acquire passwords
• so then exercise access rights of owner
Password Guessing
• one of the most common attacks
• attacker knows a login (from email/web page etc)
• then attempts to guess password for it
– try default passwords shipped with systems
– try all short passwords
– then try by searching dictionaries of common words
– intelligent searches try passwords associated with the user
(variations on names, birthday, phone, common words/interests)
– before exhaustively searching all possible passwords
• check by login attempt or against stolen password file
• success depends on password chosen by user
• surveys show many users choose poorly
Password Capture
• another attack involves password capture
– watching over shoulder as password is entered
– using a trojan horse program to collect
– monitoring an insecure network login (eg. telnet, FTP,
web, email)
– extracting recorded info after successful login (web
history/cache, last number dialed etc)
• using valid login/password can impersonate user
• users need to be educated to use suitable
precautions/countermeasures
Intrusion Detection
• inevitably will have security failures
• so need also to detect intrusions so can
– block if detected quickly
– act as deterrent
– collect info to improve security
• assume intruder will behave differently to a
legitimate user
– but will have imperfect distinction between
Approaches to Intrusion Detection
• statistical anomaly detection
– threshold
– profile based
• rule-based detection
– anomaly
– penetration identification
Audit Records
• fundamental tool for intrusion detection
• native audit records
– part of all common multi-user O/S
– already present for use
– may not have info wanted in desired form
• detection-specific audit records
– created specifically to collect wanted info
– at cost of additional overhead on system
Statistical Anomaly Detection
• threshold detection
– count occurrences of specific event over time
– if exceed reasonable value assume intrusion
– alone is a crude & ineffective detector
• profile based
– characterize past behavior of users
– detect significant deviations from this
– profile usually multi-parameter
Audit Record Analysis
• foundation of statistical approaches
• analyze records to get metrics over time
– counter, gauge, interval timer, resource use
• use various tests on these to determine if
current behavior is acceptable
– mean & standard deviation, multivariate,
markov process, time series, operational
• key advantage is no prior knowledge used
Rule-Based Intrusion Detection
• observe events on system & apply rules to
decide if activity is suspicious or not
• rule-based anomaly detection
– analyze historical audit records to identify
usage patterns & auto-generate rules for them
– then observe current behavior & match
against rules to see if conforms
– like statistical anomaly detection does not
require prior knowledge of security flaws
Rule-Based Intrusion Detection
• rule-based penetration identification
– uses expert systems technology
– with rules identifying known penetration,
weakness patterns, or suspicious behavior
– rules usually machine & O/S specific
– rules are generated by experts who interview
& codify knowledge of security admins
– quality depends on how well this is done
– compare audit records or states against rules
Base-Rate Fallacy
• practically an intrusion detection system
needs to detect a substantial percentage
of intrusions with few false alarms
– if too few intrusions detected -> false security
– if too many false alarms -> ignore / waste time
• this is very hard to do
• existing systems seem not to have a good
record
Distributed Intrusion Detection
• traditional focus is on single systems
• but typically have networked systems
• more effective defense has these working
together to detect intrusions
• issues
– dealing with varying audit record formats
– integrity & confidentiality of networked data
– centralized or decentralized architecture
Distributed Intrusion Detection -
Architecture
Distributed Intrusion Detection –
Agent Implementation
Honeypots
• decoy systems to lure attackers
– away from accessing critical systems
– to collect information of their activities
– to encourage attacker to stay on system so
administrator can respond
• are filled with fabricated information
• instrumented to collect detailed information on
attackers activities
• may be single or multiple networked systems
Password Management
• front-line defense against intruders
• users supply both:
– login – determines privileges of that user
– password – to identify them
• passwords often stored encrypted
– Unix uses multiple DES (variant with salt)
– more recent systems use crypto hash function
Managing Passwords
• need policies and good user education
• ensure every account has a default password
• ensure users change the default passwords to
something they can remember
• protect password file from general access
• set technical policies to enforce good passwords
– minimum length (>6)
– require a mix of upper & lower case letters, numbers,
punctuation
– block know dictionary words
Managing Passwords
• may reactively run password guessing tools
– note that good dictionaries exist for almost any
language/interest group
• may enforce periodic changing of passwords
• have system monitor failed login attempts, &
lockout account if see too many in a short period
• do need to educate users and get support
• balance requirements with user acceptance
• be aware of social engineering attacks
Proactive Password Checking
• most promising approach to improving
password security
• allow users to select own password
• but have system verify it is acceptable
– simple rule enforcement (see previous slide)
– compare against dictionary of bad passwords
– use algorithmic (markov model or bloom filter)
to detect poor choices
Chapter 20 – Firewalls
The function of a strong position is to make
the forces holding it practically
unassailable
—On War, Carl Von Clausewitz
Introduction
• seen evolution of information systems
• now everyone want to be on the Internet
• and to interconnect networks
• has persistent security concerns
– can’t easily secure every system in org
• need "harm minimisation"
• a Firewall usually part of this
What is a Firewall?
• a choke point of control and monitoring
• interconnects networks with differing trust
• imposes restrictions on network services
– only authorized traffic is allowed
• auditing and controlling access
– can implement alarms for abnormal behavior
• is itself immune to penetration
• provides perimeter defence
Firewall Limitations
• cannot protect from attacks bypassing it
– eg sneaker net, utility modems, trusted
organisations, trusted services (eg SSL/SSH)
• cannot protect against internal threats
– eg disgruntled employee
• cannot protect against transfer of all virus
infected programs or files
– because of huge range of O/S & file types
Firewalls – Packet Filters
Firewalls – Packet Filters
• simplest of components
• foundation of any firewall system
• examine each IP packet (no context) and
permit or deny according to rules
• hence restrict access to services (ports)
• possible default policies
– that not expressly permitted is prohibited
– that not expressly prohibited is permitted
Firewalls – Packet Filters
Attacks on Packet Filters
• IP address spoofing
– fake source address to be trusted
– add filters on router to block
• source routing attacks
– attacker sets a route other than default
– block source routed packets
• tiny fragment attacks
– split header info over several tiny packets
– either discard or reassemble before check
Firewalls – Stateful Packet Filters
• examine each IP packet in context
– keeps tracks of client-server sessions
– checks each packet validly belongs to one
• better able to detect bogus packets out of
context
Firewalls - Application Level
Gateway (or Proxy)
Firewalls - Application Level
Gateway (or Proxy)
• use an application specific gateway / proxy
• has full access to protocol
– user requests service from proxy
– proxy validates request as legal
– then actions request and returns result to user
• need separate proxies for each service
– some services naturally support proxying
– others are more problematic
– custom services generally not supported
Firewalls - Circuit Level Gateway
Firewalls - Circuit Level Gateway
• relays two TCP connections
• imposes security by limiting which such
connections are allowed
• once created usually relays traffic without
examining contents
• typically used when trust internal users by
allowing general outbound connections
• SOCKS commonly used for this
Bastion Host
• highly secure host system
• potentially exposed to "hostile" elements
• hence is secured to withstand this
• may support 2 or more net connections
• may be trusted to enforce trusted
separation between network connections
• runs circuit / application level gateways
• or provides externally accessible services
Firewall Configurations
Firewall Configurations
Firewall Configurations
Access Control
• given system has identified a user
• determine what resources they can access
• general model is that of access matrix with
– subject - active entity (user, process)
– object - passive entity (file or resource)
– access right – way object can be accessed
• can decompose by
– columns as access control lists
– rows as capability tickets
Access Control Matrix
Trusted Computer Systems
• information security is increasingly important
• have varying degrees of sensitivity of information
– cf military info classifications: confidential, secret etc
• subjects (people or programs) have varying
rights of access to objects (information)
• want to consider ways of increasing confidence
in systems to enforce these rights
• known as multilevel security
– subjects have maximum & current security level
– objects have a fixed security level classification
Bell LaPadula (BLP) Model
• one of the most famous security models
• implemented as mandatory policies on system
• has two key policies:
• no read up (simple security property)
– a subject can only read/write an object if the current
security level of the subject dominates (>=) the
classification of the object
• no write down (*-property)
– a subject can only append/write to an object if the
current security level of the subject is dominated by
(<=) the classification of the object
Reference Monitor
Evaluated Computer Systems
• governments can evaluate IT systems
• against a range of standards:
– TCSEC, IPSEC and now Common Criteria
• define a number of “levels” of evaluation
with increasingly stringent checking
• have published lists of evaluated products
– though aimed at government/defense use
– can be useful in industry also

More Related Content

What's hot

Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
Mohd Arif
 
CISSP Week 21
CISSP Week 21CISSP Week 21
CISSP Week 21
jemtallon
 
Key Distribution Problem in advanced operating system
Key Distribution Problem in advanced operating systemKey Distribution Problem in advanced operating system
Key Distribution Problem in advanced operating system
Merlin Florrence
 
Ip security in i psec
Ip security in i psecIp security in i psec
Ip security in i psec
Mohd Arif
 

What's hot (20)

Seminar on ECommerce
Seminar on ECommerce Seminar on ECommerce
Seminar on ECommerce
 
S/MIME
S/MIMES/MIME
S/MIME
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
 
Key management
Key managementKey management
Key management
 
Wpa2 psk security measure
Wpa2 psk security measureWpa2 psk security measure
Wpa2 psk security measure
 
Lecture 9 key distribution and user authentication
Lecture 9 key distribution and user authentication Lecture 9 key distribution and user authentication
Lecture 9 key distribution and user authentication
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
CISSP Week 21
CISSP Week 21CISSP Week 21
CISSP Week 21
 
Key Distribution Problem in advanced operating system
Key Distribution Problem in advanced operating systemKey Distribution Problem in advanced operating system
Key Distribution Problem in advanced operating system
 
Security
SecuritySecurity
Security
 
Ip security in i psec
Ip security in i psecIp security in i psec
Ip security in i psec
 
Unit08
Unit08Unit08
Unit08
 
WPA2
WPA2WPA2
WPA2
 
SSL & TLS Architecture short
SSL & TLS Architecture shortSSL & TLS Architecture short
SSL & TLS Architecture short
 
CISSP Week 7
CISSP Week 7CISSP Week 7
CISSP Week 7
 
ip security
ip securityip security
ip security
 
Key management and distribution
Key management and distributionKey management and distribution
Key management and distribution
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic tools
 

Similar to 18CS2005 Cryptography and Network Security

BAIT1103 Chapter 6
BAIT1103 Chapter 6BAIT1103 Chapter 6
BAIT1103 Chapter 6
limsh
 
[removed]Cryptography and Network Security Principles a.docx
[removed]Cryptography and Network Security Principles a.docx[removed]Cryptography and Network Security Principles a.docx
[removed]Cryptography and Network Security Principles a.docx
hanneloremccaffery
 

Similar to 18CS2005 Cryptography and Network Security (20)

IP SEC.ptx
IP SEC.ptxIP SEC.ptx
IP SEC.ptx
 
IPsec for IMS
IPsec for IMSIPsec for IMS
IPsec for IMS
 
The Security layer
The Security layerThe Security layer
The Security layer
 
IS Unit-4 .ppt
IS Unit-4 .pptIS Unit-4 .ppt
IS Unit-4 .ppt
 
Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8
 
BAIT1103 Chapter 6
BAIT1103 Chapter 6BAIT1103 Chapter 6
BAIT1103 Chapter 6
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Ip sec
Ip secIp sec
Ip sec
 
Unit 5.ppt
Unit 5.pptUnit 5.ppt
Unit 5.ppt
 
IP Security
IP SecurityIP Security
IP Security
 
[removed]Cryptography and Network Security Principles a.docx
[removed]Cryptography and Network Security Principles a.docx[removed]Cryptography and Network Security Principles a.docx
[removed]Cryptography and Network Security Principles a.docx
 
Ip sec
Ip secIp sec
Ip sec
 
Lecture14..pdf
Lecture14..pdfLecture14..pdf
Lecture14..pdf
 
Ip sec talk
Ip sec talkIp sec talk
Ip sec talk
 
Network Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. ShivashankarNetwork Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. Shivashankar
 
Ip security
Ip security Ip security
Ip security
 
IP security Part 1
IP security   Part 1IP security   Part 1
IP security Part 1
 
Ch16
Ch16Ch16
Ch16
 
Ipsecurity
IpsecurityIpsecurity
Ipsecurity
 

More from Kathirvel Ayyaswamy

More from Kathirvel Ayyaswamy (20)

22CS201 COA
22CS201 COA22CS201 COA
22CS201 COA
 
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
22cs201 COMPUTER ORGANIZATION AND ARCHITECTURE
 
22CS201 COA
22CS201 COA22CS201 COA
22CS201 COA
 
18CS3040_Distributed Systems
18CS3040_Distributed Systems18CS3040_Distributed Systems
18CS3040_Distributed Systems
 
20CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 220CS2021-Distributed Computing module 2
20CS2021-Distributed Computing module 2
 
18CS3040 Distributed System
18CS3040 Distributed System	18CS3040 Distributed System
18CS3040 Distributed System
 
20CS2021 Distributed Computing
20CS2021 Distributed Computing 20CS2021 Distributed Computing
20CS2021 Distributed Computing
 
20CS2021 DISTRIBUTED COMPUTING
20CS2021 DISTRIBUTED COMPUTING20CS2021 DISTRIBUTED COMPUTING
20CS2021 DISTRIBUTED COMPUTING
 
18CS3040 DISTRIBUTED SYSTEMS
18CS3040 DISTRIBUTED SYSTEMS18CS3040 DISTRIBUTED SYSTEMS
18CS3040 DISTRIBUTED SYSTEMS
 
Recent Trends in IoT and Sustainability
Recent Trends in IoT and SustainabilityRecent Trends in IoT and Sustainability
Recent Trends in IoT and Sustainability
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security 18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
20CS2008 Computer Networks
20CS2008 Computer Networks20CS2008 Computer Networks
20CS2008 Computer Networks
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 
20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology20CS024 Ethics in Information Technology
20CS024 Ethics in Information Technology
 
20cs2024 Ethics in Information Technology
20cs2024 Ethics in Information Technology20cs2024 Ethics in Information Technology
20cs2024 Ethics in Information Technology
 
20CS2024 Ethics in Information Technology
20CS2024 Ethics in Information Technology20CS2024 Ethics in Information Technology
20CS2024 Ethics in Information Technology
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 

Recently uploaded

Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 

Recently uploaded (20)

Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata Model
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 

18CS2005 Cryptography and Network Security

  • 1. 18CS2005 Cryptography and Network Security Module 6 IP and System Security IP security overview-IP security policy-Encapsulating Security payload- intruders-intrusion detection virus/worms-countermeasure-need for firewalls firewall characteristics-types of fires Dr.A.Kathirvel, Professor, DCSE, KITS kathirvel@karunya.edu
  • 2. IP Security • have a range of application specific security mechanisms – eg. S/MIME, PGP, Kerberos, SSL/HTTPS • however there are security concerns that cut across protocol layers • would like security implemented by the network for all applications 2
  • 3. IP Security • general IP Security mechanisms • provides – authentication – confidentiality – key management • applicable to use over LANs, across public & private WANs, & for the Internet • need identified in 1994 report – need authentication, encryption in IPv4 & IPv6 3
  • 6. Benefits of IPSec • in a firewall/router provides strong security to all traffic crossing the perimeter • in a firewall/router is resistant to bypass • is below transport layer, hence transparent to applications • can be transparent to end users • can provide security for individual users • secures routing architecture 6
  • 7. IP Security Specification The IPSec specification has become quite complex. key management. The totality of the IPsec specification is scattered across dozens of RFCs and draft IETF documents, making this the most complex and difficult to grasp of all IETF specifications. The best way to keep track of and get a handle on this body of work is to consult the latest version of the IPsec document roadmap. The documents can be categorized into the following groups: • Architecture: Covers the general concepts, security requirements, definitions, and mechanisms defining IPsec technology, RFC 4301, Security Architecture for the Internet Protocol. • Authentication Header (AH): AH is an extension header for message authentication, now deprecated. • Encapsulating Security Payload (ESP): ESP consists of an encapsulating header and trailer used to provide encryption or combined encryption/authentication. . • Internet Key Exchange (IKE): a collection of documents describing the key management schemes for use with IPsec • Cryptographic algorithms: a large set of documents that define and describe cryptographic algorithms for encryption, message authentication, pseudorandom functions (PRFs), and cryptographic key exchange. • Other: There are a variety of other IPsec-related RFCs, including those dealing with security policy and management information base (MIB) content. 7
  • 8. IPSec Services • Access control • Connectionless integrity • Data origin authentication • Rejection of replayed packets – a form of partial sequence integrity • Confidentiality (encryption) • Limited traffic flow confidentiality 8
  • 9. Transport and Tunnel Modes • Transport Mode – to encrypt & optionally authenticate IP data – can do traffic analysis but is efficient – good for ESP host to host traffic • Tunnel Mode – encrypts entire IP packet – add new header for next hop – no routers on way can examine inner IP header – good for VPNs, gateway to gateway security 9
  • 12. Security Associations • a one-way relationship between sender & receiver that affords security for traffic flow • defined by 3 parameters: – Security Parameters Index (SPI) – IP Destination Address – Security Protocol Identifier • has a number of other parameters – seq no, AH & EH info, lifetime etc • have a database of Security Associations 12
  • 13. Security Policy Database • relates IP traffic to specific SAs – match subset of IP traffic to relevant SA – use selectors to filter outgoing traffic to map – based on: local & remote IP addresses, next layer protocol, name, local & remote ports 13
  • 14. Transport Mode SA Tunnel Mode SA AH Authenticates IP payload and selected portions of IP header and IPv6 extension headers Authenticates entire inner IP packet plus selected portions of outer IP header ESP Encrypts IP payload and any IPv6 extesion header Encrypts inner IP packet ESP with authentication Encrypts IP payload and any IPv6 extesion header. Authenticates IP payload but no IP header Encrypts inner IP packet. Authenticates inner IP packet. 14
  • 16. Tunnel Mode (AH Authentication) Encapsulating Security Payload (ESP) • provides message content confidentiality, data origin authentication, connectionless integrity, an anti- replay service, limited traffic flow confidentiality • services depend on options selected when establish Security Association (SA), net location • can use a variety of encryption & authentication algorithms 16
  • 18. Encryption & Authentication Algorithms & Padding • ESP can encrypt payload data, padding, pad length, and next header fields – if needed have IV at start of payload data • ESP can have optional ICV for integrity – is computed after encryption is performed • ESP uses padding – to expand plaintext to required length – to align pad length and next header fields – to provide partial traffic flow confidentiality 18
  • 19. Anti-Replay Service • replay is when attacker resends a copy of an authenticated packet • use sequence number to thwart this attack • sender initializes sequence number to 0 when a new SA is established – increment for each packet – must not exceed limit of 232 – 1 • receiver then accepts packets with seq no within window of (N –W+1) 19
  • 20. Combining Security Associations • SA’s can implement either AH or ESP • to implement both need to combine SA’s – form a security association bundle – may terminate at different or same endpoints – combined by • transport adjacency • iterated tunneling • combining authentication & encryption – ESP with authentication, bundled inner ESP & outer AH, bundled inner transport & outer ESP 20
  • 22. IPSec Key Management • handles key generation & distribution • typically need 2 pairs of keys – 2 per direction for AH & ESP • manual key management – Sys-admin manually configures every system • automated key management – automated system for on demand creation of keys for SA’s in large systems – has Oakley & ISAKMP elements 22
  • 23. Oakley • a key exchange protocol • based on Diffie-Hellman key exchange • adds features to address weaknesses – no info on parties, man-in-middle attack, cost – so adds cookies, groups (global params), nonces, DH key exchange with authentication • can use arithmetic in prime fields or elliptic curve fields 23
  • 24. ISAKMP • Internet Security Association and Key Management Protocol • provides framework for key management • defines procedures and packet formats to establish, negotiate, modify, & delete SAs • independent of key exchange protocol, encryption alg, & authentication method • IKEv2 no longer uses Oakley & ISAKMP terms, but basic functionality is same 24
  • 26. • The IKEv2 protocol involves the exchange of messages in pairs. • The first two pairs of exchanges are referred to as the initial exchanges). In the first exchange the two peers exchange information concerning cryptographic algorithms and other security parameters they are willing to use along with nonces and Diffie- Hellman (DH) values. The result of this exchange is to set up a special SA called the IKE SA • This SA defines parameters for a secure channel between the peers over which subsequent message exchanges take place. Thus, all subsequent IKE message exchanges are protected by encryption and message authentication. In the second exchange, the two parties authenticate one another and set up a first IPsec SA to be placed in the SADB and used for protecting ordinary (i.e. non-IKE) communications between the peers. • Thus four messages are needed to establish the first SA for general use. The CREATE_CHILD_SA exchange can be used to establish further SAs for protecting traffic. The informational exchange is used to exchange management information, IKEv2 error messages, and other notifications.
  • 28. • An ISAKMP message consists of an ISAKMP header followed by one or more payloads, carried in a transport protocol (UDP by default). • Figure1 shows the header format for an ISAKMP message, which includes the fields: • Initiator SPI (64 bits): chosen by the initiator to identify a unique SA • Responder Cookie (64 bits): chosen by responder to identify unique IKE SA • Next Payload (8 bits): type of the first payload in the message. • Major/Minor Version (4 bits): Indicates major/minor version of IKE in use • Exchange Type (8 bits): type of exchange. • Flags (8 bits): specific options set for this IKE exchange. • Message ID (32 bits): control retransmission, matching of requests /responses. • Length (32 bits): of total message (header plus all payloads) in octets. All ISAKMP payloads begin with the same generic payload header shown in Figure 2. The Next Payload field has a value of 0 if this is the last payload in the message; otherwise its value is the type of the next payload. The Payload Length field indicates the length in octets of this payload, including the generic payload header. The critical bit is zero if the sender wants the recipient to skip this payload if it does not understand the payload type code in the Next Payload field of the previous payload. It is set to one if the sender wants the recipient to reject this entire message if it does not understand the payload type.
  • 29. IKE Payloads & Exchanges • have a number of ISAKMP payload types: – Security Association, Key Exchange, Identification, Certificate, Certificate Request, Authentication, Nonce, Notify, Delete, Vendor ID, Traffic Selector, Encrypted, Configuration, Extensible Authentication Protocol • payload has complex hierarchical structure • may contain multiple proposals, with multiple protocols & multiple transforms 29
  • 30. Secure Electronic Transactions (SET) • open encryption & security specification • to protect Internet credit card transactions • developed in 1996 by Mastercard, Visa etc • not a payment system • rather a set of security protocols & formats – secure communications amongst parties – trust from use of X.509v3 certificates – privacy by restricted info to those who need it
  • 32. SET Transaction 1. customer opens account 2. customer receives a certificate 3. merchants have their own certificates 4. customer places an order 5. merchant is verified 6. order and payment are sent 7. merchant requests payment authorization 8. merchant confirms order 9. merchant provides goods or service 10.merchant requests payment
  • 33. Dual Signature • customer creates dual messages – order information (OI) for merchant – payment information (PI) for bank • neither party needs details of other • but must know they are linked • use a dual signature for this – signed concatenated hashes of OI & PI
  • 36. Purchase Request – Merchant 1. verifies cardholder certificates using CA sigs 2. verifies dual signature using customer's public signature key to ensure order has not been tampered with in transit & that it was signed using cardholder's private signature key 3. processes order and forwards the payment information to the payment gateway for authorization (described later) 4. sends a purchase response to cardholder
  • 37. Payment Gateway Authorization 1. verifies all certificates 2. decrypts digital envelope of authorization block to obtain symmetric key & then decrypts authorization block 3. verifies merchant's signature on authorization block 4. decrypts digital envelope of payment block to obtain symmetric key & then decrypts payment block 5. verifies dual signature on payment block 6. verifies that transaction ID received from merchant matches that in PI received (indirectly) from customer 7. requests & receives an authorization from issuer 8. sends authorization response back to merchant
  • 38. Payment Capture • merchant sends payment gateway a payment capture request • gateway checks request • then causes funds to be transferred to merchants account • notifies merchant using capture response
  • 39. Chapter 18 – Intruders They agreed that Graham should set the test for Charles Mabledene. It was neither more nor less than that Dragon should get Stern's code. If he had the 'in' at Utting which he claimed to have this should be possible, only loyalty to Moscow Centre would prevent it. If he got the key to the code he would prove his loyalty to London Central beyond a doubt. —Talking to Strange Men, Ruth Rendell
  • 40. Intruders • significant issue for networked systems is hostile or unwanted access • either via network or local • can identify classes of intruders: – masquerader – misfeasor – clandestine user • varying levels of competence
  • 41. Intruders • clearly a growing publicized problem – from “Wily Hacker” in 1986/87 – to clearly escalating CERT stats • may seem benign, but still cost resources • may use compromised system to launch other attacks
  • 42. Intrusion Techniques • aim to increase privileges on system • basic attack methodology – target acquisition and information gathering – initial access – privilege escalation – covering tracks • key goal often is to acquire passwords • so then exercise access rights of owner
  • 43. Password Guessing • one of the most common attacks • attacker knows a login (from email/web page etc) • then attempts to guess password for it – try default passwords shipped with systems – try all short passwords – then try by searching dictionaries of common words – intelligent searches try passwords associated with the user (variations on names, birthday, phone, common words/interests) – before exhaustively searching all possible passwords • check by login attempt or against stolen password file • success depends on password chosen by user • surveys show many users choose poorly
  • 44. Password Capture • another attack involves password capture – watching over shoulder as password is entered – using a trojan horse program to collect – monitoring an insecure network login (eg. telnet, FTP, web, email) – extracting recorded info after successful login (web history/cache, last number dialed etc) • using valid login/password can impersonate user • users need to be educated to use suitable precautions/countermeasures
  • 45. Intrusion Detection • inevitably will have security failures • so need also to detect intrusions so can – block if detected quickly – act as deterrent – collect info to improve security • assume intruder will behave differently to a legitimate user – but will have imperfect distinction between
  • 46. Approaches to Intrusion Detection • statistical anomaly detection – threshold – profile based • rule-based detection – anomaly – penetration identification
  • 47. Audit Records • fundamental tool for intrusion detection • native audit records – part of all common multi-user O/S – already present for use – may not have info wanted in desired form • detection-specific audit records – created specifically to collect wanted info – at cost of additional overhead on system
  • 48. Statistical Anomaly Detection • threshold detection – count occurrences of specific event over time – if exceed reasonable value assume intrusion – alone is a crude & ineffective detector • profile based – characterize past behavior of users – detect significant deviations from this – profile usually multi-parameter
  • 49. Audit Record Analysis • foundation of statistical approaches • analyze records to get metrics over time – counter, gauge, interval timer, resource use • use various tests on these to determine if current behavior is acceptable – mean & standard deviation, multivariate, markov process, time series, operational • key advantage is no prior knowledge used
  • 50. Rule-Based Intrusion Detection • observe events on system & apply rules to decide if activity is suspicious or not • rule-based anomaly detection – analyze historical audit records to identify usage patterns & auto-generate rules for them – then observe current behavior & match against rules to see if conforms – like statistical anomaly detection does not require prior knowledge of security flaws
  • 51. Rule-Based Intrusion Detection • rule-based penetration identification – uses expert systems technology – with rules identifying known penetration, weakness patterns, or suspicious behavior – rules usually machine & O/S specific – rules are generated by experts who interview & codify knowledge of security admins – quality depends on how well this is done – compare audit records or states against rules
  • 52. Base-Rate Fallacy • practically an intrusion detection system needs to detect a substantial percentage of intrusions with few false alarms – if too few intrusions detected -> false security – if too many false alarms -> ignore / waste time • this is very hard to do • existing systems seem not to have a good record
  • 53. Distributed Intrusion Detection • traditional focus is on single systems • but typically have networked systems • more effective defense has these working together to detect intrusions • issues – dealing with varying audit record formats – integrity & confidentiality of networked data – centralized or decentralized architecture
  • 55. Distributed Intrusion Detection – Agent Implementation
  • 56. Honeypots • decoy systems to lure attackers – away from accessing critical systems – to collect information of their activities – to encourage attacker to stay on system so administrator can respond • are filled with fabricated information • instrumented to collect detailed information on attackers activities • may be single or multiple networked systems
  • 57. Password Management • front-line defense against intruders • users supply both: – login – determines privileges of that user – password – to identify them • passwords often stored encrypted – Unix uses multiple DES (variant with salt) – more recent systems use crypto hash function
  • 58. Managing Passwords • need policies and good user education • ensure every account has a default password • ensure users change the default passwords to something they can remember • protect password file from general access • set technical policies to enforce good passwords – minimum length (>6) – require a mix of upper & lower case letters, numbers, punctuation – block know dictionary words
  • 59. Managing Passwords • may reactively run password guessing tools – note that good dictionaries exist for almost any language/interest group • may enforce periodic changing of passwords • have system monitor failed login attempts, & lockout account if see too many in a short period • do need to educate users and get support • balance requirements with user acceptance • be aware of social engineering attacks
  • 60. Proactive Password Checking • most promising approach to improving password security • allow users to select own password • but have system verify it is acceptable – simple rule enforcement (see previous slide) – compare against dictionary of bad passwords – use algorithmic (markov model or bloom filter) to detect poor choices
  • 61. Chapter 20 – Firewalls The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz
  • 62. Introduction • seen evolution of information systems • now everyone want to be on the Internet • and to interconnect networks • has persistent security concerns – can’t easily secure every system in org • need "harm minimisation" • a Firewall usually part of this
  • 63. What is a Firewall? • a choke point of control and monitoring • interconnects networks with differing trust • imposes restrictions on network services – only authorized traffic is allowed • auditing and controlling access – can implement alarms for abnormal behavior • is itself immune to penetration • provides perimeter defence
  • 64. Firewall Limitations • cannot protect from attacks bypassing it – eg sneaker net, utility modems, trusted organisations, trusted services (eg SSL/SSH) • cannot protect against internal threats – eg disgruntled employee • cannot protect against transfer of all virus infected programs or files – because of huge range of O/S & file types
  • 66. Firewalls – Packet Filters • simplest of components • foundation of any firewall system • examine each IP packet (no context) and permit or deny according to rules • hence restrict access to services (ports) • possible default policies – that not expressly permitted is prohibited – that not expressly prohibited is permitted
  • 68. Attacks on Packet Filters • IP address spoofing – fake source address to be trusted – add filters on router to block • source routing attacks – attacker sets a route other than default – block source routed packets • tiny fragment attacks – split header info over several tiny packets – either discard or reassemble before check
  • 69. Firewalls – Stateful Packet Filters • examine each IP packet in context – keeps tracks of client-server sessions – checks each packet validly belongs to one • better able to detect bogus packets out of context
  • 70. Firewalls - Application Level Gateway (or Proxy)
  • 71. Firewalls - Application Level Gateway (or Proxy) • use an application specific gateway / proxy • has full access to protocol – user requests service from proxy – proxy validates request as legal – then actions request and returns result to user • need separate proxies for each service – some services naturally support proxying – others are more problematic – custom services generally not supported
  • 72. Firewalls - Circuit Level Gateway
  • 73. Firewalls - Circuit Level Gateway • relays two TCP connections • imposes security by limiting which such connections are allowed • once created usually relays traffic without examining contents • typically used when trust internal users by allowing general outbound connections • SOCKS commonly used for this
  • 74. Bastion Host • highly secure host system • potentially exposed to "hostile" elements • hence is secured to withstand this • may support 2 or more net connections • may be trusted to enforce trusted separation between network connections • runs circuit / application level gateways • or provides externally accessible services
  • 78. Access Control • given system has identified a user • determine what resources they can access • general model is that of access matrix with – subject - active entity (user, process) – object - passive entity (file or resource) – access right – way object can be accessed • can decompose by – columns as access control lists – rows as capability tickets
  • 80. Trusted Computer Systems • information security is increasingly important • have varying degrees of sensitivity of information – cf military info classifications: confidential, secret etc • subjects (people or programs) have varying rights of access to objects (information) • want to consider ways of increasing confidence in systems to enforce these rights • known as multilevel security – subjects have maximum & current security level – objects have a fixed security level classification
  • 81. Bell LaPadula (BLP) Model • one of the most famous security models • implemented as mandatory policies on system • has two key policies: • no read up (simple security property) – a subject can only read/write an object if the current security level of the subject dominates (>=) the classification of the object • no write down (*-property) – a subject can only append/write to an object if the current security level of the subject is dominated by (<=) the classification of the object
  • 83. Evaluated Computer Systems • governments can evaluate IT systems • against a range of standards: – TCSEC, IPSEC and now Common Criteria • define a number of “levels” of evaluation with increasingly stringent checking • have published lists of evaluated products – though aimed at government/defense use – can be useful in industry also