Internet Security: A CleanSlate View - PowerPoint PPT Presentation

1 / 9
About This Presentation
Title:

Internet Security: A CleanSlate View

Description:

Attackers can take over machines -- bot nets. Launch distributed attacks while remaining hidden. ... Anti bot-net research (??) Crypto research: making crypto ... – PowerPoint PPT presentation

Number of Views:22
Avg rating:3.0/5.0
Slides: 10
Provided by: danb2
Category:

less

Transcript and Presenter's Notes

Title: Internet Security: A CleanSlate View


1
Internet Security A Clean-Slate View   
Dan Boneh
2
High level Goals
  • Redsign the Internet so that
  • Current attacks are harder to mount,
  • Recovery from attack is easier,
  • Law enforcement has better tools to identify
    attackers, and
  • Preserve Internet properties that made it so
    successful.

3
Some Current Internet Weaknesses
  • Weak source authentication (IP, email) (WSA)
  • No reliable packet traceback mechanism.
  • Difficult to determine peer ID, especially if
    truesource is hiding behind proxy (or proxies).
  • Weak quarantine capabilities. (WQC)
  • Full connectivity ?Y X ? Y (FC)
  • Very often not needed.
  • Vulnerable endhost software. (VES)
  • Weak user authentication pwd based. (WUA)

4
Sample Attacks
5
The basic problem
  • Two fold
  • User machines managed by inexperienced users.
  • Servers running vulnerable software or scripts.
  • As a result
  • Attackers can take over machines -- bot nets
  • Launch distributed attacks while remaining
    hidden.
  • Majority of Internet attacks are due to endhost
    compromise.
  • Will not focus on infrastructure attacks here.

6
A Centralized Approach
  • Draconian redesign (e.g. WebTV,
    minitel)
  • Force endhosts to become dumb when connected
    to the network. Limited end-to-end.
  • The method trusted computing everywhere.
  • Infrastructure only forwards packets if endhost
    attests that source is a known and unmodified
    application.
  • Prevents a majority of persistent malware and
    viruses.
  • but makes it difficult to design and deploy
    new applications or application add-ons (e.g.
    browser toolbars, server scripts, )

7
Decentralized Control
  • Goal 1 Block malware from spreading
  • Limit network connectivity.
  • Digital cash tokens limit packet floods.
  • Goal 2 Identify compromised hosts.
  • Source authentication (accountability)
  • Add non-repudiation tokens to packets.
  • Sites can collect evidence of attacks against
    them.
  • Goal 3 Quarantine attacks. (automated?)
  • Evidence submitted to service to block offending
    hosts.

8
1. Limit Network Connectivity
  • Goal make it harder for compromised hosts to
    reach uncompromised hosts.
  • Full network connectivity often not needed.
  • Hosts declare from who they accept connections.
  • Today done using firewalls.
  • Often configured by inexperienced users.
  • Should this be a network service?
  • Provided by ISPs?

9
Current Interests
  • Anti-phishing research
  • Browser-based solutions.
  • Improved Internet user authentication.
  • Anti-crimeware (keylogging) research
  • Better desktop/laptop management using VMs.
  • Anti bot-net research (??)
  • Crypto research making crypto easier to use.
Write a Comment
User Comments (0)
About PowerShow.com