Title: Security Network Architecture
1- Security Network Architecture Design
2Domain Objectives
- Discuss the concepts of network security
- Understand security risks
- Provide the business context for network security
3Information Security TRIAD
4Domain Agenda
- Basic Concepts
- OSI Framework
5Network Telecommunications
- Network Security
- Network Structures
- Transmission Methods
- Transport Formats
- Security Measures
- Network Security is the cornerstone for business
operations
6Network Models
- Models
- OSI Reference Model
- TCP/IP Model
7OSI Reference Model
- Layer 1 Physical Layer
- Layer 2 Data Link Layer
- Layer 3 Network Layer
- Layer 4 Transport Layer
- Layer 5 Session Layer
- Layer 6 Presentation Layer
- Layer 7 Application Layer
8OSI Reference Model
9OSI Model Layer 1 Physical Layer
- Bits are converted into signals
- All signal processing
- Physical Topologies
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link Layer
Physical Layer
10OSI Model Layer 2 Data Link Layer
- Connects layer 1 and 3
- Converts information
- Transmits frames to devices
- Link Layer encryption
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link Layer
Physical Layer
Physical Layer
Physical Layer
11OSI Model Layer 3 Network Layer
- Moves information between two hosts that are not
physically connected - Uses logical addressing
- Internet Protocol (IP)
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link Layer
Physical Layer
Physical Layer
Physical Layer
12OSI Model Layer 4 Transport Layer
- End-to-end Transport between Peer Hosts
- Connection Oriented and Connectionless Protocols
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link Layer
Physical Layer
Physical Layer
Physical Layer
13OSI Model Layer 5 Session Layer
- Manages logical persistent connection
- Three Modes
- Full Duplex
- Half Duplex
- Simplex
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link Layer
Physical Layer
Physical Layer
Physical Layer
14OSI Model Layer 6 Presentation Layer
- Ensures a common format to data
- Services for encryption and compression
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link Layer
Physical Layer
Physical Layer
Physical Layer
15OSI Model Layer 7 Application Layer
- The application layer is not the application
- Performs communication between peer applications
- Least control of network security
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data Link Layer
Physical Layer
Physical Layer
Physical Layer
16TCP/IP Model
- Originated by the U.S. Department of Defense
- Functions like the OSI Model
- Supports the TCP/IP Protocol
- Application layer is unique
17TCP/IP Model
18TCP/IP Protocol Stack
Application
TCP, UDP
IP, IGMP, ICMP
ARP, Hardware Interface, PPP
Network Connection
19Network Security and Risks
- Network is the key asset in many organizations
- Network Attacks
20Network-based Attacks
- Network as a Channel for Attacks
- Network as the Target of Attack
21Network as a Bastion of Defense
- Security controls built around social,
organizational, procedural and technical
activities - Based on the organization's security policy
22Network Security Objectives and Attacks
- Business Risk versus Security Solutions
- Attacks Scenarios
- Network Entry Point - in Both Directions
- Outside-in
- Inside-out
23Methodology of an Attack
- Attack Trees
- Path of Least Resistance
Methodology of an Attack
2
3
4
1
Target Acquisition
Target Analysis
Target Access
Target Appropriation
24Target Acquisition
1
- Attacks start by intelligence gathering
- Means of intelligence gathering
- Countermeasures
- Limit information on a network
- Distract an attacker
25Target Analysis
2
- Analyze identified target for security weaknesses
- Tools available
- Target analysis
26Target Access
3
- Obtain access to the system
- Manage user privileges
- Monitor access
27Target Appropriation
4
- Escalate privileges
- Attacker may seek sustained control of the system
- Countermeasures against privilege escalation
28Network Security Tools
- Tools automate processes
- Network security is more than just technical
implementations
29Network Scanners
- Discovery Scanning
- Compliance Scanning
- Vulnerability Scanning
30Domain Agenda
- Basic Concepts
- OSI Framework
- Layer 1 Physical Layer
31Layer 1 Physical Layer
- Basic Concepts
- Communications Technology
- Network Topology
- Technology and Implementation
32Communication Technology
- Analog and Digital Communications
- Digital communication brings quantitative and
qualitative enhancements
33Analog Communication
- Analog signals use electronic properties
- Transmitted on wires or with wireless devices
34Digital Communication
- Uses two electronic states
- Can be transmitted over most media
- Integrity of digital communication less difficult
35Layer 1 Physical Layer
- Basic Concepts
- Communications Technology
- Network Topology
- Technology and Implementation
36Network Topology
- Even small networks are complex
- Network topology and layout affects scalability
and security - Wireless networks have a topology
37Bus
- LAN with a central cable to which all nodes
connect - Advantages
- Scalable
- Permits node failure
- Disadvantages
- Bus failure
38Tree
- Devices connect to a branch on the network
- Advantages
- Scalable
- Permits node failure
- Disadvantages
- Failures will split the network
39Ring
- Closed-loop Topology
- Advantages
- Deterministic
- Disadvantages
- Single Point of Failure
40Mesh
- All nodes are connected with each other
- Advantages
- Redundancy
- Disadvantages
- Expensive
- Complex
- Scalability
41Star
- All of the nodes connected to a central device
- Advantages
- Permits node/cable failure
- Scalable
- Disadvantages
- Single point of failure
42Security Perimeter
- The first line of defense between trusted and
un-trusted networks - No direct physical connection between trusted and
untrusted networks
- Security perimeter most widely used
implementation of network partitioning
43Layer 1 Physical Layer
- Basic Concepts
- Communications Technology
- Network Topology
- Technology and Implementation
44Technology and Implementation
- Physical networks employ a wide variety of
cabling technologies and components - Wireless networks use frequency ranges and
encryption/authentication
45Cable
- Cable Selection Considerations
- Throughput
- Distance between Devices
- Data Sensitivity
- Environment
Cable
Twisted Pair
Coaxial Cable
Fiber Optics
Patch Panels
Modems
46Twisted Pair
- One of the Simplest and Cheapest Cabling
Technologies - Unshielded (UTP) or Shielded (STP)
47Unshielded Twisted Pair (UTP)
Category Transmission Rate Use
Category 1 lt 1 Mbps Analog voice and basic interface rate (BRI) in Integrated Services Digital Network (ISDN)
Category 2 lt 4Mbps 4 Mbps IBM Token Ring LAN
Category 3 16 Mbps 10Base-T Ethernet
Category 4 20 Mbps 16 Mbps Token Ring
Category 5 100 Mbps 100 Base-TX and Asynchronous Transfer Mode (ATM)
Category 5e 1000 Mbps 1000 Base-T Ethernet
Category 6 1000 Mbps 1000 Base-T Ethernet
48Coaxial Cable (Coax)
- Conducting wire is thicker than twisted pair
- Bandwidth
- Length
- Expensive and physically stiff
49Fiber Optics
- Three Components
- Light Source
- Optical Fiber Cable
- Light Detector
- Advantages
- Disadvantages
50Patch Panels
- Provides physical cross-connect point for devices
- Alternative to directly connecting devices
- Centralized management
51Modem
- Converts a digital signal to analog
- Provides little security
- Unauthorized modems
52Wireless Transmission Technologies
- Include WLANs, Bluetooth and Mobile Telephony
53Wireless Transmission Technologies
54Wireless Multiplexing Technologies
Technology Principle Objective
Direct Sequence Spread Spectrum (DSSS) Spread transmission over a wider frequency band Signal less susceptible to noise
Frequency Hopping Spread Spectrum (FHSS) Spread signal over rapidly changing frequencies Interference at one frequency will only have short term effect
Orthogonal Frequency Division Multiplexing (OFDM) Signal is subdivided into sub frequencies bands Split high bandwidth transmission into low BW transmissions
55Other Multiplexing Technologies
Technology Principle Objective
Frequency Division Multiple Access (FDMA) Divide Frequency into sub bands Open several low bandwidth channels
Time Division Multiple Access (TDMA) Split transmission by time slices Multiplexing between participants
Code Division Multiple Access (CDMA) Multiplex several signals into one signal Multiplexing is performed on a digital level
56Mobile Telephony
- Mobile telephony is undergoing a rapid
development - Most common mobile phone technology is still GSM
Global Service for Mobile Communications (GSM)
Mobile Telephony
57Domain Agenda
- Basic Concepts
- OSI Framework
- Layer 2 Data Link Layer
58Layer 2 Data Link Layer
- Concerned with sending frames to the next link
- Determines network transmission format
59Synchronous/Asynchronous Communications
- Synchronous
- Timing mechanism synchronizes data transmission
- Robust Error Checking
- Practical for High-speed, High-volume Data
- Asynchronous
- Clocking mechanism is not used
- Surrounds each byte with bits that mark the
beginning and end of transmission
60Unicast, Multicast, and Broadcast Transmissions
- Multicasts
- Broadcasts
- Do not use reliable sessions
- Unicast
61Circuit-switched vs. Packet-switched Networks
- Circuit-switched
- Dedicated circuit between endpoints
- Endpoints have exclusive use of the circuit and
its bandwidth - Packet-switched
- Data is divided into packets and transmitted on a
shared network - Each packet can be independently routed on the
network
62Switched vs. Permanent Virtual Circuits
- Permanent Virtual Circuits
- Switched Virtual Circuits
63Carrier Sense Multiple Access
- Only one device may transmit at a time
- There are two variations
- Carrier Sense Multiple Access with Collision
Avoidance (CSMA/CA) - Carrier Sense Multiple Access with Collision
Detection (CSMA/CD)
64Polling
- Slave device needs permission from a master
device - Used mostly in Mainframe Protocols
- Optional Function of the IEEE 802.11 Standard
65Token Passing
- Special frame circulates through the ring
- Device must possess the token to transmit
- Token passing is used in Token Ring (IEEE 802.5)
and FDDI
66Ethernet (IEEE 802.3)
- Most Popular LAN Architecture
- Supports bus, star, and point-to-point topologies
- Currently supports speeds up to 1000Mbps
67Hubs and Repeaters
- Hubs
- Used to implement a physical star topology
- All devices can read and potentially modify the
traffic of other devices - Repeaters
- Allows longer distances
68Bridges
- Layer 2 Devices that filter traffic between
segments based on MAC addresses - Can connect LANs with unlike media types
- Simple bridges do not reformat frames
69Switches
- Multi-port devices to connect LAN hosts
- Forwards frames only to the specified MAC address
- Becoming more sophisticated
70Wireless Local Area Networks
- Allows mobile users to remain connected
- Extends LANs beyond physical boundaries
71Access Points
- Access Point Placement
- Do not count on hiding Access Points
- Rogue Access Points
72Authentication
- Paramount to the Security of Wireless LANs
- Open Systems Authentication
- Shared Key Authentication
- MAC Address Filtering
- Extensible Authentication Protocol
73Wireless Encryption
- Wired Equivalent Privacy (WEP)
- WiFi Protected Access (WPA)
- WiFi Protected Access 2 (WPA2)
74Wireless Encryption
802.1x Dynamic WEP Wi-Fi Protected Access Wi-Fi Protected Access 2
Access Control 802.1X 802.1X or Pre-Shared Key 802.1X or Pre-Shared Key
Authentication EAP methods EAP methods or Pre-Shared Key EAP methods or Pre-Shared Key
Encryption WEP TKIP (RC4) CCMP (AES Counter Mode)
Integrity None Michael MIC CCMP (AES CBC-MAC)
75Wireless Standards
- IEEE 802.11b
- IEEE 802.11a
- IEEE 802.11g
- Bluetooth
76Address Resolution Protocol (ARP) / RARP
77Password Authentication Protocol (PAP)
- Identification and Authentication of Remote
Entity - Uses a clear text, reusable (static) password
- Supported by most network devices
78Challenge Handshake Authentication Protocol (CHAP)
- Periodically re-validates users
- Standard password database is unencrypted
- Password is sent as a one-way hash
79Domain Agenda
- Basic Concepts
- OSI Framework
- Layer 3 Network Layer
80Layer 3 Network Layer
- Architectures Classified by Scale (size)
- TCP/IP at the Network Layer
81Local Area Network (LAN)
- LANs service a relatively small area
- Most LANs have connectivity to other networks
- VLANs are software based LAN segments implemented
by switching technology
82Wide Area Network (WAN) Description
- A WAN is a network connecting local networks or
access points - Connections are often shared and tunneled through
other connections
83Public Switched Telephone Network (PSTN)
- PSTN is a circuit switched network
- The PSTN may be subject to attacks
84Integrated Services Digital Network (ISDN)
- Uses two types of channels
- Comes in two varieties
B (Bearer) Channel 64kBit/s
D (Delta) Channel 16kBit/s
BRI (Basic Rate Interface) 2B1D 144kBit/s
PRI (Primary Rate Interface) North America 23B1D 1.55MBit/s (T1)
PRI Europe and Australia 30B1D 2MBit/s (E1)
85T Carrier
Channel Multiplex Ratio Bandwidth
T1 1xT1 1.544 Mbps
T2 4xT1 6.312 Mbps
T3 7xT2 28xT1 44.736 Mbps
T4 6xT3 168xT2 274.176 Mbps
86E Carrier
Channel Multiplex Ratio Bandwidth
E1 1xE1 2.048 Mbps
E2 4xE1 8.848 Mbps
E3 4xE2 16xE1 34.304 Mbps
E4 4xE3 64xE2 139.264 Mbps
87Digital Subscriber Lines (DSL)
- Uses CAT-3 cables and the local loop
- Asymmetric Digital Subscriber Line (ADSL)
- Rate-adaptive DSL (RADSL)
- Symmetric Digital Subscriber Line (SDSL)
- Very High Bit-rate DSL (VDSL)
88Cable Modem
- PC Ethernet NIC connects to a cable modem
- The modem and head-end exchange cryptographic
keys - Cable modems increase the requirement to observe
good security practices
89X.25
- Protocol developed for unreliable networks
- Has a strong focus on error correction
- Users and hosts connect through a packet-switched
network
90Frame Relay
- FR network cloud of switches
- FR customers share resources
- Customers are charged for used bandwidth only
91Asynchronous Transfer Mode (ATM)
- ATM is a connection-oriented protocol
- Uses virtual circuits
- Guarantees QoS but not the delivery of cells
92Multi-Protocol Label Switching (MPLS)
- Permits traffic engineering
- Provides quality of service (QoS) and defense
against network attacks - Operates at Layer 2 and 3
93Broadband Wireless
- WiMAX allows the implementation of wireless
Metropolitan Area Networks (MANs) - Improved access when a base station and user are
not in line of sight - Security is based on AES and EAP
94Wireless Optics
- Two laser transceivers communicate at speeds
comparable to SONET - Wireless optics transmissions are hard to
intercept - Wireless optics can be unreliable during
inclement weather
95Global Area Network (GAN)
- Intranet
- Extranet
- Granting access to external organizations
- Internet
96TCP/IP at the Network Layer
- TCP/IP protocol suite is the de-facto standard
- Need to provide private communications services
over public networks
97Internet Protocol (IP)
- Internet Protocol (IP) is responsible for sending
packets over a network - Unreliable Protocol
- IP will subdivide packets
- IPv4 Address Structure
98Internet Protocol (IP)
- Internet Protocol Address Structure
Class Range of First Octet Number of Octets for Network Number Number of Hosts in Network
A 1-127 1 16777216
B 128-191 2 65536
C 192-223 3 256
D 224-239 Multicast Multicast
E 240-255 Reserved Reserved
99Risks and Attacks
- Key shortcoming in IP is its lack of
authentication - Shortcomings in implementation
100IP Fragmentation Attacks
- Teardrop Attack
- Overlapping Fragment Attacks
101IP Addressing Spoofing
- Packets are sent with a bogus source address
- SYN Flood
- Takes advantage of a protocol flaw
102Source Routing Exploitation
- IP allows the sender to specify the path
- Attacker can abuse source routing
- Could allow an external attacker access to an
internal network
103Smurf and Fraggle Attacks
- Smurf attack mis-uses the ICMP Echo Request
- Fraggle attack uses UDP instead of ICMP
- Ping of Death
104IPv6
- A larger IP address field
- Improved security
- A more concise IP packet header
- Improved quality of service
105Routers
- Routers forward packets to other networks
- Routers can be used to interconnect different
technologies
106Firewalls
- Enforce administrative security policies
- Separate trusted networks from untrusted networks
- Firewalls should be placed between security
domains
107Firewalls
- Filtering
- Filtering by Address
- Filtering by Service
- Static Packet Filtering
- Stateful Inspection or Dynamic Packet Filtering
- Personal Firewalls
108Network Address Translation / Port Address
Translation
Network and Port Address Translation
Source IP 199.53.72.2 Destination IP
206.121.73.5 Source Port 1058 Destination Port
- 80
Source IP 192.168.1.50 Destination IP
206.121.73.5 Source Port 1037 Destination Port
- 80
109Proxy Firewalls
- Circuit Level Proxy
- Application Level Proxy
110Firewalls
Firewall Type OSI Model Layer Characteristics
Packet Filtering Network layer Routers using ACLs dictate acceptable access to a network Looks at destination and source addresses, ports and services requested
Application-level Proxy Application layer Deconstructs packets and makes granular access control decisions Requires one proxy per service
111Firewalls
Firewall Type OSI Model Layer Characteristics
Circuit-level Proxy Session layer Deconstructs packets Protects wider range of protocols and services than app-level proxy, but not as detailed as a level of control
Stateful Network layer Keeps track of each conversation using a state table Looks at state and context of packets
112Network Partitioning
- Boundary Routers
- Dual-homed Host
113Network Partitioning
- Bastion Host
- Demilitarized Zone (DMZ)
114Network Partitioning
115End Systems
- Servers and Mainframes
- Operating Systems
- Notebooks
- Workstations
- Smart Phones
- Personal Digital Assistants
116Virtual Private Network (VPN)
- Remote access through VPN
- LAN to LAN configuration
117Virtual Private Network (VPN)
- Secure Shell (SSH)
- IPSEC Authentication and Confidentiality for VPNs
- SSL/TLS VPNs
- SOCKS
118IPSEC Authentication Confidentiality for VPNs
- Authentication Header (AH)
- Encapsulating Security Payload (ESP)
- Security Associations
- Transport Mode / Tunnel Mode
- Internet Key Exchange (IKE)
119Tunneling
- Point-to-Point Tunneling Protocol (PPTP)
- Layer 2 Tunneling Protocol (L2TP)
120Dynamic Host Configuration Protocol (DHCP)
- Dynamically assigns IP addresses to hosts
- Client does not request a new lease every time
121Internet Control Message Protocols (ICMP)
- ICMP Redirect Attacks
- Ping of Death
- Traceroute Exploitation
- Ping Scanning
122Internet Group Management Protocol (IGMP)
- Used for Multicast Messages
- Sets up Multicast Groups
123Routing Protocols
- Routing Information Protocol (RIP)
- Virtual Router Redundancy Protocol (VRRP)
124Domain Agenda
- Basic Concepts
- OSI Framework
- Layer 4 Transport Layer
- Layer 5 Session Layer
125Layer 4 Transport Layer
- Transmission Control Protocol (TCP)
- Well-known Ports
- Registered Ports
- Dynamic and/or Private Ports
- User Datagram Protocol (UDP)
126Transmission Control Protocol (TCP) Session
127Technology and Implementation
- Port Scanning
- FIN, NULL and XMAS Scanning
- SYN Scanning
- TCP Sequence Number Attacks
- Session Hijacking
- Denial of Service
128Transport Layer Security (TLS)
- Functions of TLS
- Mutual authentication
- Encryption
129Layer 5 Session Layer
130Directory Services
- Domain Name Service (DNS)
- Lightweight Directory Access Protocol (LDAP)
- Network Basic Input Output System (NetBios)
- Network Information Service (NIS)/NIS
131Access Services
- Common Internet File System (CIFS)/Server Message
Block (SMB) - Network File System (NFS)
- Secure NFS (SNFS)
132Domain Agenda
- Basic Concepts
- OSI Framework
- Layer 7 Application Layer
133Data Exchange (World Wide Web)
- Trivial File Transfer Protocol (TFTP)
- File Transfer Protocol (FTP)
- Hypertext Transfer Protocol (HTTP)
- HTTP over TLS (HTTPS)
- Secure Hypertext Transfer Protocol (S-HTTP)
- Passive and Active Content (HTML, ActiveX, Java,
JavaScript) - Peer-to-peer Applications and Protocols
134Messaging Services
- Instant Messaging
- Asynchronous Messaging
- Email Spoofing
- Open Mail Relay Servers
- Spam
- Post Office Protocol (POP)
- Internet Message Access Protocol (IMAP)
- Network News Transfer Protocol (NNTP)
- Internet Relay Chat (IRC)
- Spam over Instant Messaging (SPIM)
135Administrative Services
- Remote Authentication Dial-In User Service
(RADIUS) - Simple Network Management Protocol (SNMP)
136Remote Authentication Dial-In User Service
(RADIUS)
- Network Access Server sends authentication
requests to the Centralized Authentication Server.
137Remote Access Services
- TCP/IP Terminal Emulation Protocol (TELNET)
- Remote Login (RLOGIN), Remote Shell (RSH), Remote
Copy (RCP) - X Window System (X11)
138Information Services
- Finger User Information Protocol
- Network Time Protocol (NTP)
139Traditional Telephony and Network Layouts
140Voice over IP (VoIP)
- Session Initiation Protocol (SIP)
- Proprietary Applications and Services
141Voice over IP (VoIP)
- IP Telephony Network Issues
- IP Telephony Vulnerabilities
142Voice over IP (VoIP)
143Voice over IP (VoIP)
144Voice over IP (VoIP)
145Domain Summary
- Provides the foundation for IT security
- OSI TCP/IP Models
- Ports and Protocols
- Network Devices
146Domain Summary
- Discuss the concepts of network security
- Understand security risks
- Provide a business context on network security
147Security
Transcends
Technology