Title: Network and Information Security Lecture 2
1Network and Information SecurityLecture 2
2Layout
- Look at possible network connections and
information security concerns - Discuss general network and information security
model and the trade-off between security and
services - Study computer networks and communications models
(you need to know computer network structure to
understand network security) - Discuss network and information security issues
- Authentication, Access control, confidentiality,
integrity, non-repudiation and availability - Discuss network security approaches to resolve
the above issues - Which part of network structure can we enforce
security? - How can we do it efficiently?
3Model for information and network security
Trusted Third party
Principal
Principal
Message
Gate Keeper
Message
Information channel
Secret Info.
Secret Info.
Opponent security threads and possible attacks
Borrowed from Stallings
4Security Business Services
1
Security -------------------------------------
Convenience (Services)
5Services and security
- How do you secure computer networks with
- Web servers
- Email servers
- FTP servers
- Web and email servers
- Web, email and FTP servers
- Modem servers
- Web, email, FTP and modem servers
- Web, email, file servers
- Etc.
6Possible networks and information security issues
- How do you secure
- A computer connected to the internet via ISP
(using modem or leased cable) - A client machine
- A server machine
- An Intranet connected to the Internet via ISP
(using leased cable) - A LAN connected to the Internet
- A computer or a network connected to a company
computer system - Multiple LANS and WANS connected to the Internet
- A wireless LAN connected to a wired network that
connected to the internet
7Possible connections Security?
Wired Stranger
Firewall (optional)
Wireless Stranger
8Possible connections Security?
Your systems
Wired stranger
firewall
Production Servers
Wireless stranger
9Possible connections Security?
Your systems
Wired stranger
firewall
Production Servers
10Possible connections Security?
Lan/ Wan
Web Servers
Lan/ Wan
Lan/ Wan
firewall
Back end Data Servers
Lan/ Wan
11Possible connections Security?
Lan/ Wan
Web Servers
Business Integration systems
firewall
Lan /Wan
Back end Data Servers
Business Applications
Mobile users
12What are the main security concerns?
- How can authentication be done?
- Do you allow all possible connections?
- How can information be secured during
transmission? - What can happen to your information during
transmission? - How can stored data be secured before it can be
retrieved? - How can authorisation be enforced?
- Who can access to what objects?
- How do you make sure either the sender or
receiver not to deny a transmitted message? - Can the system be attacked from outside even if
you have firewalls? - Who can compromise your system from outside and
inside? - Etc.
13Network CommunicationOSI Reference Model
Application programs that use the network
Application related services
Application (7)
Standardise data rep. to application layer
Presentation(6)
Manage sessions between applications
Session(5)
Provide end-to-end error detection and correction
Transport(4)
Network related services
Network(3)
Manage connections across network
Data Link(2)
Provide reliable delivery across physical links
Physical(1)
Define characteristics of media
14Generic Message Format
Recipient Identity
Message Length
Sender Identify
Message Data
15Internet TCP/IP Model
Programs X window, mobile agents, Web
applications, Email
Application
Sockets
Table of addresses, data and algorithms to
perform reliable check
Transport (TCP, UDP)
Table of addresses and algorithms for handling
the routing of data
Network (IP)
Data Link
Packets of some length algorithms
Physical
Digital signal (0,1)
16Network Layer IP Datagram format (for reference)
4-bit 4-bit 8 bit
16-bit
Version header length type of
service Total Length
16 bit
3 bit
13 bit
Identification
flags fragment offset
8-bit 8-bit
16-bit
time to live protocol
header checksum
17TCP segment (for reference)
16-bit
16-bit
Source port number
Destination port number
32-bit Sequence number
32 bit acknowledgement number
4-bit 6-bit 6-bit
16-bit Header
length Reserved Flags
Window Size
16-bit
16-bit TCP
Checksum
Urgent pointer
Options(if any) and padding
Data (variable length)
18UDP datagram (for reference)
16- bit
16-bit Source Port Number
Destination Port Number
16-bit
16-bit Length
Checksum
Data (variable length, if any)
19Protocol enveloping
- To allow communications, two systems must follow
the same protocol. - Each layer in a protocol stack of a system uses a
unique and well-defined message format for
communicating with its peer layer on other
system. - As message gets passed down from one layer to the
next, it is enveloped inside of another message.
A new envelop is added at each step. - After transmission across the network, the
protocol layers on the receiving system strip off
their respective envelopes (among other tasks). - The original message is passed to the highest
layer.
20TCP/IP (e.g)
- To communicate with a particular service using
TCP/IP, - e.g telnet, at some machine at IP address X, we
know that telnet uses TCP, is always assigned to
port 23. - So in the IP header youd specify X as the
destination address, and 6 which means TCP- as
the protocol type. - In the TCP header, youd specify port 23 as
destination port (Your process on your machine
would be at a dynamically assigned port ) -
21TCP Connection abstraction (e.g)
TCP uses the connection as its fundamental
abstraction connections are identified by a pair
of endpoints
(123.23.4.99, 2343)
(128.34.2.1, 80)
Connection 1
IP - port
server
Clients
Connection 2
(130.194.3.99, 3333)
Because TCP identifies a connection by a pair of
endpoints, a given TCP port number can be shared
by multiple connections on the same host
22Network Security Issues
- Authentication How can we make sure that a
communication is authentic? - Access Control make sure that provided objects
are accessed by authorized entities. How? - Confidentiality Protect data from passive
attack or traffic analysis. How? - Integrity Assure messages are received as sent.
How? - Non-repudiation Prevent either sender or
receiver from denying a transmitted message. How? - Availability Keep services continually
operational. How?
23Network security issues (e.g)
- Authentication
- Who are you? Provide your username password
- Where are you from? MARS? VENUS? Is your machine
allowed to talk to mine? Your IP, please! - Access control
- Who can access what objects/services?
- Sorry! I cannot let your Java applets vandalize
my site - Sorry! This ftp site is for read only
- Sorry! You do not have privilege to run this
program - Sorry! You cannot read the shadow file
- How are objects be accessed? Remotely/locally
- Which parts of the systems need more restrict
access?
24Network security issues (e.g)
- Integrity A message or file that traverses the
network at risk of having data added, removed, or
modified along the way. - Consider the following message
- From root_at_temple.csse.monsah.edu.au To
root_at_beast.csse.monash.edu.au,
root_at_pluto.csse.monash.edu.au Subject
hackers temple.csse has been hacked by
intruders. I am working to resolve this
problem. Please check your systems for possible
intrusion. - As a by-product of this email message, the
attacker of temple.csse has also compromised an
email server at this site and can modify the
message, access other machines, etc.
25Network security issues (e.g)
- Confidentiality
- You might not really care if a few postal
employees read a postcard or two, but would you
care if every piece of mail you received were
paraded in plain view past each person that lives
between post office and your home? - On internetworking, email, data transfer via FTP
and www requests may be handled by intervening
networks and devices and anyone with access to
them, authorized or not, can read the
data/messages.
26Network security issues (e.g)
- Non-repudiation
- Hey, why did you charge me this?
- Did you send me this order?
- No! No! absolutely not! I am not silly to order
that stuff! - Is this your digital signature?
- OhMaybe it is mine!!
27Network security issues (e.g)
- Availability
- Call ISP Hey, I will not use your ISP from next
month! I am sick of it! - ISP reply Would you kindly tell me why?
- People cannot access my webpage, it has good
stuff!! - Check.. CheckIt is O.K, I can access it now.
- You can access it now, but I tried it heaps of
times yesterday and always got timeout! - OhSorry! Our system got Ping of Dead
yesterday! Please do stay with us, I promise it
wont happen again.
28Where should we start?
- Many network functionalities are built in the OS
- The TCP and lower are implemented in the OS
- Others above TCP are implemented in user
processes - When you are using your computer, you are
interacting with the OS and most applications are
running as user processes on the top of TCP - The traditional network model was not created
with good security - E.g the IP layer was only able to tell the
application what IP address it is talking to, but
not what user is on the other side - Should we modify the OS and not change
applications to enhance security? OR - Should we change the already-built applications
to enhance security and not change the OS?
29TCP/IP Possible Security Enhancement
Kerboros, HTTPS, SMINE, PGP
SSL, TLS
IP Sec
Encrypting packets
Physical
Hardware chip for Encryption
30Why deploy Security at IP Layer?
- Security at the IP layer is related to the
layers function of end-to-end datagram delivery. - The security weakness are
- Network snoofing e.g one machine can
masquerade as another machine temporarily - Message replay
- Authentication issues
- Etc.
- Benefit? Implementing IP security within the OS
automatically causes all applications to be
protected do not have to change the applications
31Aside - IP
- Internet Control Message Protocol (ICMP)
influences and somewhat controls the behavior of
the IP layer, while actually using IP services to
perform its tasks. - ICMP monitors and communicates network control
information between network participants. - The IP layer also is impacted by special routing
protocols like Routing Information Protocol
(RIP), Internet Group Management Protocol (IGMP),
Open Shortest Path First (OSPF) and Border
Gateway Protocol (BGP).
32Why deploy security at Transport Layer?
- Applications at higher layers are normally based
on socket communications, therefore security can
be achieved with - SSL (Secure Socket Layer)
- TLS (Transport Layer Security)
- Benefit? No need to change OS.
33Can we also implement security at Application
Layer?
- There are many different applications at The
Application Layer -gt need different ways to
secure each type of applications - Secure Mobile Agents
- Secure Email (PGP, S/MINE),
- Secure Web (HTTPS)
- Security with Kerboros
34What else can we do?
- Beside SSL and security enhancement at the
Application Layer - What else can we do to secure computer systems
without having to change the OS? - How about building a wrapper for a software to
make it behave the way we want? - Discuss more later if you wish to!