Title: Week 1:
1Week 1 Introduction Symmetric Cryptographic
2Technology and applications play a big role on
community services and security aspects
3Consumer Market
First, Let us look at the Evolution of
Communications
Extracted from Next Generation Home Networks
Driving a New Society?
480-90s A New World Called Internet
Consumer Market
- The start of the Internet for masses using
dial-up - Phone line is shared between the PC and the phone
- Emergence of the ISP concept with AOL,
- New concept
- Content available to everybody
- First Internet boom
- New economy concept
Extracted from Next Generation Home Networks
Driving a New Society?
52000 2003 The Beginning of the Always-On
Concept
Consumer Market
- Emergence of the ADSL technology
- Higher bandwidth than dial-up typically 64k to
384kbps - Always on concept i.e., no busy signal
- Device per service
- One phone
- One PC
ADSL 64 384 kbps
Extracted from Next Generation Home Networks
Driving a New Society?
62003 2005 Emergence of Basic Home Networks and
Triple Play Services
Consumer Market
- Emergence of the new DSL and xPON technologies
- Higher bandwidth than ADSL typically 20Mbps per
home - First signs of home networks with the
digitalization of the Home - Digital Camera, Camcorder, Playstation, DVD, iPOD
xDSL 20 Mbps
Extracted from Next Generation Home Networks
Driving a New Society?
72005 2015 The Digital Connected Home
Consumer Market
- Many multi-service devices in the home
- All using IP as a foundation
- Virtualization of Content
- Access content anywhere/anytime, whether it is
home-based (Personal) or network-based (Public) - Communications and Entertainment
Extracted from Next Generation Home Networks
Driving a New Society?
8Example of Network Infrastructure
BTU
Residential Gateway (RG)
Broadband Termination Unit (BTU)
9Example of Network Infrastructure
10Applications over Network
11Services
DATA (D)
VOICE (V)
DV
IMAGE (I)
DIV
DI
IV
12Services
13What are we facing?
14Unwanted visitors
- Safeguarding assets is responsibility of users
- Threat agent may also place value on the asset
- Such vulnerability may be exploited by threat
agent - Countermeasures are imposed to reduce
vulnerability
Countermeasures
User
Threat Agents
Assets
14
15Multiple Attack
Countermeasures
User
Threat Agents
Assets
15
16Objectives
Outdoor
Office
Home
Security Policy Level
16
17Security mechanism is embedded on
technology. Security use in daily basis.
18Security use in daily basis 1 - biometric
19Security use in daily basis 2 - Business
20Security use in daily basis 3 Voice
Communication
21Security use in daily basis 4 Integration
Operation
22Security use in daily basis 5 Operating System
23Security use in daily basis 6 WEB
24Let me share with you on OSI layers and
Internet layers
25Seventh layers OSI Model
26Five Layers TCP/IP Model
27Hexadecimal dump of the Packet
- Hexadecimal Dump of the Packet
- 0 00e0 f726 3fe9 0800 2086 354b 0800
4500 ..?... .5K..E. - 16 0028 08b9 4000 ff06 999a 8b85 d96e
8b85 .(.._at_........n.. - 32 e902 9005 0017 7214 f115 9431 1028
5010 ......r....1.(P. - 48 2238 1c80 0000
"8....
28Packet Decode
- ETHER ----- Ether Header -----
- ETHER
- ETHER Packet 5 arrived at 173723.94
- ETHER Packet size 54 bytes
- ETHER Destination 0e0f7263fe9, CISCO
Router - ETHER Source 802086354b, Sun
- ETHER Ethertype 0800 (IP)
- ETHER
29Packet Decode
- IP ----- IP Header -----
- IP
- IP Version 4
- IP Header length 20 bytes
- IP Type of service 0x00 (normal)
- IP Total length 40 bytes
- IP Identification 2233
- IP Flags 0x4
- IP .1.. .... do not fragment
- IP ..0. .... last fragment
- IP Fragment offset 0 bytes
- IP Time to live 255 seconds/hops
- IP Protocol 6 (TCP)
- IP Header checksum 999a
- IP Source address 139.133.217.110, client
- IP Destination address 139.133.233.2,
server.abdn.ac.uk - IP No options
- IP
30Packet Decode
- TCP ----- TCP Header -----
- TCP
- TCP Source port 36869
- TCP Destination port 23 (TELNET)
- TCP Sequence number 1913975061
- TCP Acknowledgement number 2486243368
- TCP Data offset 20 bytes
- TCP Flags 0x10
- TCP ..0. .... No urgent pointer
- TCP ...1 .... Acknowledgement
- TCP .... 0... No push
- TCP .... .0.. No reset
- TCP .... ..0. No Syn
- TCP .... ...0 No Fin
- TCP Window 8760
- TCP Checksum 0x1c80
- TCP Urgent pointer 0
- TCP No options
31Five Layers TCP/IP Model
TCP/IP Fundamentals Connection-oriented and
connectionless services The TCP/IP
layers Differences between OSI and TCP/IP models
32Connection-Oriented Services
- Connection-oriented service modeled after the
telephone system - To talk to someone, pick up a phone, dial the
number, talk and disconnect - Similarly, in a network, the service user will
- Establish a connection
- Use the connection
- Release the connection
- The sender, receiver and the network may conduct
a negotiation about data transfer speed, maximum
message size, etc
33Connection-Oriented Services
- Connection-oriented service is used when
reliability is important - E.g., for file transfer, we want that all bits
arrive correctly and in the order they were sent
34Connectionless Services
- Connectionless service modeled after the postal
system - Each message (letter) carries the full
destination address - Each message is routed through the system
independent of all others - If two messages are sent to the same destination,
normally the first one to be sent should arrive
first. But it is possible that the second message
arrives first
35TCP/IP Protocol Suite
- TCP / IP Transmission Control Protocol /
Internet Protocol - Developed prior to the OSI model
- Layers of TCP/IP do not match exactly with those
in the OSI model - Used in the Internet
- Ability to connect multiple networks in a
seamless way was one of the major design goals
which led to development of TCP / IP
36TCP/IP Protocol Suite
- TCP / IP refers to a collection of data
communication protocols - This name TCP/IP is misleading because TCP and IP
are only two of the many protocols that compose
the suite - TCP / IP has its origins in the work done by the
US Department of Defense.
37TCP / IP Suite
- The TCP / IP suite does not define any specific
protocols at the data link and physical layers
38Application Layer
- The Application layer is equivalent to the
combined OSI Session, Presentation, and
Application layers - All the functions handled by these 3 layers in
the OSI model are handled by the Application
layer in TCP / IP model
39Application Layer
- This layer contains all the higher-level
protocols - FTP File Transfer Protocol basic file
transfer between hosts (computers) - SMTP Simple Mail Transfer Protocol (for email)
- HTTP Hyper Text Transfer Protocol (for web
browsing) - Data unit created at this layer is called a
message
40Encapsulation of Data
- TCP/IP protocol suite encapsulates data units at
various layers of the model - At the Application layer, the data unit created
is called a message. - The Transport layer adds a header to form either
a segment with TCP. - The Network (or Internet) layer adds another
header to form a datagram
41Encapsulation of Data
- Datagram A self-contained message unit which
contains sufficient information to allow it to be
routed from the source to the destination - The protocol used at the data link layer
encapsulates the datagram into a frame and this
is transmitted across the transmission medium.
42Transport Layer - UDP
- This layer is represented by two protocols TCP
and UDP - TCP Transmission Control Protocol
- UDP User Datagram Protocol
- UDP is simpler but is used when reliability and
security are less important than size and speed
such as speech, video - Since security and reliability are essential for
most applications, TCP is used more often
43Transport Layer - TCP
- TCP is a reliable connection-oriented protocol
- Allows error-free transmission
- Incoming byte stream is fragmented into a number
of shorter messages and these are passed on to
the next layer - At the receiving end the TCP reassembles the
messages into an output stream - TCP also handles flow control to control data
transfer rate
44Transport Layer - TCP
- A connection must be established between the
sender and the receiver before transmission
begins - TCP creates a circuit between sender and receiver
for the duration of the transmission - TCP begins each transmission by alerting the
receiver that segments are on their way
(connection establishment). - Each transmission is ended with connection
termination
45Transport Layer - TCP
- Each segment created by TCP includes
- A sequencing number for re-ordering after
receipt. - An acknowledgement ID number
- Source address
- Destination address
- Checksum for error detection
- Data
- And other fields
46Internetwork or Network Layer
- Also referred to as Network Layer or Internetwork
Layer - Internetwork Protocol (IP) is an unreliable and
connectionless protocol - It offers a besteffort delivery service
- No error checking
- IP does its best to get a transmission through to
its destination but with no guarantees - Noise can cause bit errors during transmission
- Datagrams maybe discarded due to timeout errors
- Example of best-effort delivery service is
post-office
47Internetwork or Network Layer
- IP transports data in packets called datagrams
- Each datagram is transported separately
- Datagrams can be of variable lengths (up to 64
KB) - Datagrams may travel along different routes and
may arrive out of sequence - IP does not keep track of the routes
- IP does not have the facility to reorder
datagrams once they arrive - A datagram contains a header and data
- The header contains a number of fields including
source and destination address
48Comparison of OSI and TCP/IP Models
- The OSI model makes a clear distinction between
services, interfaces and protocols - Each layer performs some service for the layer
above it - A layers interface tells the processes above it
how to access it. It specifies what the
parameters are and what results to expect
(somewhat like a function declaration) - The protocols used in a layer are used to get the
job done.
49Comparison of OSI and TCP/IP Models
- The OSI model has 7 layers while the TCP/ IP
model has 5 layers - Both have network, transport, and application
layers, but the other layers are different - OSI model supports both connectionless and
connection-oriented communication - TCP/IP supports only connectionless communication
50Before I explain to you on security layer Let
review back the slides that presenting on
security use in daily basis
51What is behind of these applications?
What is a mechanism that make it secure?
52Security Flows
Cryptography
Algorithm Symmetric, Asymmetric (i.e.Cipher,
DES, AES)
This approach is totally under my knowledge and
experience, is not a standard, just to understand
the layer concept.
53Security versus OSI TCP/IP Model
OSI
TCP/IP
Security
Application
Application
Application
Applications
Presentation
Presentation
Session
Transport
Transport
Protocol
Network
Internet
Data Link
Data Link
Physical
Physical
Cryptography
54Concept
Why we want security?
Let review back the slides that presenting on
security use in daily basis
55Intruder
56Hacking - 1
57Hacking - 2
58Objectives
Outdoor
Office
Home
Security Policy Level
58
59Type of Attacks
Passive
Passive attacks are in the nature of
eavesdropping on, or monitoring of,
transmissions. The goal of the opponent is to
obtain information that is being transmitted. Two
types of passive attacks are release of message
contents and traffic analysis.
Active
Active attacks involve some modification of the
data stream or the creation of a false stream
and can be subdivided into four categories
masquerade, replay, modification of messages,
and denial of service.
60Passive Attack
61Active Attack - 1
Masquerade
Replay
Capture message from Bob to Alice later replay
message to Alice
Message from Hacker that appears to be from Bob
An attack in which a service already authorized
and completed is forged by another "duplicate
request" in an attempt to repeat authorized
commands.
62Active Attack - 2
Modification of messages
Denial of Service
Modifies message from Bob to Alice
disrupts service provided by server
63Could you explain to me why we need security?
64Why We Need Security
Privacy
The protection of data from unauthorized
disclosure.
Integrity
The assurance that data received are exactly as
sent by an authorized entity (i.e., contain no
modification, insertion, deletion.
Authentication
The assurance that the communicating entity is
the one that it claims to be.
Nonrepudation
Provides protection against denial by one of the
entities involved in a communication of having
participated in all or part of the communication.
65International Standards
Development
Management
ISO/IEC 15408
Common Criteria for Information Technology
Security Evaluation. Part 1-3.
ISO/IEC 13335
Information technology - Guidelines for the
management of IT Security - Part 1-5
ISO/IEC 15446
Information technology - Security techniques -
Guide for the production of protection profiles
and security targets.
ISO/IEC 17799
Information technology - Code of practice for
information security management (ISO/IEC 27002)
ISO/IEC 19791
Information technology Security techniques.
Security assessment of operational systems.
FIPS 140-2
Federal Information Processing standards
publication. FIPS 140-2. Security Requirements
for Cryptographic Modules.
NIST SP 800-57
NIST Special Publication 800-57, Recommendation
for Key Management .
Move to
FIPS 140-3
Federal Information Processing standards
publication. FIPS 140-3. Security Requirements
for Cryptographic Modules.
66International Standards
We are focus on X.800 security services
67X.800 Services
- X.800 defines a security service as a service
provided by a protocol layer of communicating
open systems, which ensures adequate security of
the systems or of data transfers. - A clearer definition is found in RFC 2828, which
provides the following definition - a processing or communication service that is
provided by a system to give a specific kind of
protection to system resources - security services implement security policies and
are implemented by security mechanisms.
68X.800 Services
Five Categories
Fourteen Specific Services
- Authentication
- Access Control
- The assurance that the communicating entity is
the one that it claims to be. - Peer Entity Authentication
- Used in association with a logical connection to
provide confidence in the identity of the
entities connected. - Data Origin Authentication
- In a connectionless transfer, provides assurance
that the source of received data is as claimed. - The prevention of unauthorized use of a resource
(i.e., this service controls who can have access
to a resource, under what conditions access can
occur, and what those accessing the resource are
allowed to do).
69X.800 Services
Five Categories
Fourteen Specific Services
- The protection of data from unauthorized
disclosure. - Connection Confidentiality
- The protection of all user data on a
connection. - Connectionless Confidentiality
- The protection of all user data in a single
data block. - Selective-Field Confidentiality
- The confidentiality of selected fields within
the user data on a connection or in a single data
block. - Traffic Flow Confidentiality
- The protection of the information that might be
derived from observation of traffic flows. -
70X.800 Services
Five Categories
Fourteen Specific Services
- The assurance that data received are exactly as
sent by an authorized entity (i.e., contain no
modification, insertion, deletion, or replay). - Connection Integrity with Recovery
- Provides for the integrity of all user data on
a connection and detects any modification,
insertion, deletion, or replay of any data within
an entire data sequence, with recovery attempted. - Connection Integrity without Recovery
- As above, but provides only detection without
recovery. - Selective-Field Connectionless Integrity
- Provides for the integrity of selected fields
within a single connectionless data block takes
the form of determination of whether the selected
fields have been modified.
71X.800 Services
Five Categories
Fourteen Specific Services
- Selective-Field Connection Integrity
- Provides for the integrity of selected fields
within the user data of a data block transferred
over a connection and takes the form of
determination of whether the selected fields have
been modified, inserted, deleted, or replayed. -
- Connectionless Integrity
- Provides for the integrity of a single
connectionless data block and may take the form
of detection of data modification. Additionally,
a limited form of replay detection may be
provided. -
72X.800 Services
Five Categories
Fourteen Specific Services
- Provides protection against denial by one of the
entities involved in a communication of having
participated in all or part of the communication. - Nonrepudiation, Origin
- Proof that the message was sent by the specified
party. -
- Nonrepudiation, Destination
- Proof that the message was received by the
specified party. -
73Example Goal Setting
X.800
Authentication
74Example Goal Setting
X.800
Non-repudiation
75Example Goal Setting
X.800
What It Means
Example (WEB)
Confidentiality
A way to assure communication with application
cannot be on by another person.
The HTTPS part of interaction with a
web application provides pretty good
confidentiality. It does a decent job of making
your web traffic with the web app from being
publicly readable.