Top Banner
TNW 2023 COMPUTER NETWORK CHAPTER 14 NETWORK SECURITY Aidid Ya’kob Syahrizan Syakir Nurul Huda
29

Chapter 14 Network Security - Computer Network

Apr 05, 2015

Download

Documents

yabaidullah

Chapter 14 Network Security - Computer Network Presentation [DCSN] KPTMAS
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Chapter 14 Network Security - Computer Network

TNW 2023COMPUTER NETWORK

CHAPTER 14NETWORK SECURITY

AididYa’kobSyahrizanSyakirNurul Huda

Page 2: Chapter 14 Network Security - Computer Network

NETWORK SECURITY

Introduction Security Threats

Structured Threats Unstructured Threats Internal Threats External Threats

Example of Attacks Network Reconnaissance Packet Sniffing Man-in-the-Middle Attacks IP Spoofing DoS

Network Security Methodology

Page 3: Chapter 14 Network Security - Computer Network

INTRODUCTION TO THREATS

“Possibility or potential to cause harm”

Page 4: Chapter 14 Network Security - Computer Network

TECHNIQUES FOR DETECTING ATTACKS Device logs Intrusion Detection System - IDS Human diligence

Page 5: Chapter 14 Network Security - Computer Network

This figure shows a log from a MikroTik Router via WinBox application.The router had experienced access attempts attacks.

Device logs

Page 6: Chapter 14 Network Security - Computer Network

By analyzing device log we can learn the method of operation & also allowing us to identify the early sign of attack.

Device logs

These explain the type of attack is dictionary attack at ssh service

Page 7: Chapter 14 Network Security - Computer Network

IDS

By using IDS, it will recognizes pattern of activity (signatures) that reflect known attacks.

Two type of IDS NIDS HIDS

Page 8: Chapter 14 Network Security - Computer Network

NIDS

HIDS HOST BASED

INTRUSION DETECTION

SYSTEMUnlike NIDS, Host Based Intrusion System reside on the machine itself.

IDS

Page 9: Chapter 14 Network Security - Computer Network

Reviewing Operating System logs is a scary thing to do. It may take youThe whole day to analyze it manually.

SYSTEM LOGS

Page 10: Chapter 14 Network Security - Computer Network

Example of NIDS application ; viewing logs with summarize report is really easy.

NIDS

akob
dfgsdfg
Page 11: Chapter 14 Network Security - Computer Network

This is an example of subscription service with preprogrammed patterns To review logs with current pattern for HIDS by OSSEC.

HIDS

Page 12: Chapter 14 Network Security - Computer Network

Log-based Intrusion Detection (LIDS), Host-based Intrusion Detection (HIDS), and Network-based Intrusion Detection (NIDS) combined with a Security Information Management (SIM) tool ; these combination of security information will really ease Security monitoring work.

COMBINATION OF IDS

Page 13: Chapter 14 Network Security - Computer Network

EXAMPLE OF HIDS ALARM

Page 14: Chapter 14 Network Security - Computer Network

HUMAN DILIGENCE

Human diligence also is necessary to thwart new attacks as well as technological efforts by IDSs. Subscribing to mailing lists and checking various security sites must be a daily routine. Common sources for security information are : Bugtraq http://www.securityfocus.com CERT http://www.cert.org SAN http://www.sans.org

Page 15: Chapter 14 Network Security - Computer Network

SECURITY THREATS

Network are subjected to a wide variety of attacks. These attacks include privilege escalation, access attempts, and many others. All of these attacks are defined as network threats and can be categorized according to two classifications : Structured vs Unstructured Internal vs External

Using these classifications is helpful to better understand the threats themselves and how to deal with them.

Page 16: Chapter 14 Network Security - Computer Network

STRUCTURED THREATS Hackers perform ST are highly motivated and technically

competent. Act alone or in small groups to understand, develop, and

use sophisticated hacking techniques to bypass all security measures to penetrate unsuspecting enterprises.

Involved with major fraud and theft cases reported to law enforcement agencies.

Hired by organized crime, industry competitors, or state-sponsored intelligence-collection organizations.

In IT world attackers who perform S.T. is also known as hacktivists; hackers who are motivated by seeking out a venue to express their political point of view.

Structured threats represent the greatest danger to an organization or enterprise.

Page 17: Chapter 14 Network Security - Computer Network

UNSTRUCTURED THREATS

Unstructured threats consist primarily of random using various common tools such as malicious shell scripts , password crackers , credit number generators and dealer daemon

If the security of the network is too strong for them to gain access , they may fall back to using Dos as a last resort at saving face

Rarely are the individuals who fall into the category anything more than what is commonly termed a script kiddie

These types of attempts represent the bulk of internet-based attack

Page 18: Chapter 14 Network Security - Computer Network

INTERNAL THREATS

Internal threats are typically from disgruntled former or current employees

Can be structured or unstructured Structured internal threats represent an

extreme danger to enterprise network because the attacker already has access to the network

Although internal threats may seem more ominous than threats from external source, security measures are available for mitigating the threats and responding when attack occur

Page 19: Chapter 14 Network Security - Computer Network

EXTERNAL THREATS

Consists structured and unstructured threats originating from external source

Can have malicious and destructive intent such as denial of service(DoS) , data theft or distribute denial of service(DDoS)

Also can simply be errors that generate unexpected network behavior such as misconfiguration of the enterprise’s Domain Name System (DNS) which result of e-mail being delayed or returned to sender

Page 20: Chapter 14 Network Security - Computer Network

EXAMPLE OF NETWORK ATTACK

Network Reconnaissance Packet Sniffing Man-In-The-Middle Attacks IP Spoofing DoS(Denial of Service)

Page 21: Chapter 14 Network Security - Computer Network

NETWORK RECONNAISSANCE

Refers to learning information about a target network using publicly available information and application such Domain Name System(DNS) queries, ping sweeps and port scans.

IDSs at the network and host levels can usually notify an administrator when reconnaissance attack in underway

Allows the administrator to better prepare for coming attack or to notify the ISP that is hosting the system that is launching the reconnaissance attack

Page 22: Chapter 14 Network Security - Computer Network

PACKET SNIFFING

Useful network tools can become threats in the hands of hacker

Provides an example of how someone can exploit a tool used to capture all packets on physical wire (promiscuous mode)

A packet sniffer application is common tool for traffic analysis and troubleshooting by capturing and decoding packets

You can use packet sniffers to capture and inspect all unencrypted data(clear text)

Page 23: Chapter 14 Network Security - Computer Network

PACKET SNIFFING (CONTINUE…)

Some way to prevent packet sniffing attack :

Authentication – methods such as two factor authentication which is used in conjunction with a user which use one-time password

Cryptography – is the most common and effective method if securing data against sniffer because it scrambles the clear text

Segmenting – the network using switches can help to localize the sniffer activity

Page 24: Chapter 14 Network Security - Computer Network

MAN-IN-THE-MIDDLE ATTACK

By using packet sniffers or type products , it is possible to captured information as it is transferred from one network to another network

Requires access to network media or devices between the source and destination

Wireless LAN are susceptible to this kind of attack

Attacker use the information captured to launch another attack, for example deny the service or corrupt data store

Use strong encryption so that if packets are sniffed , they are useless to attacker

Page 25: Chapter 14 Network Security - Computer Network
Page 26: Chapter 14 Network Security - Computer Network

IP SPOOFING

Technique in which the attacker sends packets with source IP address modified to match that of trusted host

Also disguise the source of packets launched as part of DoS attack

There are 2 way to prevent IP spoofing Authentication – Prevent access to systems based

solely on IP address Filtering – Preventing any outbound traffic on your

network that does not have a source address in your IP range

Page 27: Chapter 14 Network Security - Computer Network

DOS (DENIAL OF SERVICE)

DoS attacks deny legitimate users access to services

DoS attacks can be characterized by• Disrupting connectivity between devices• Preventing access to specific services• Halting processes on devices by sending bad packets• Flooding networks

How to prevent DoS attack?• Configure firewall• Prevent spoofing• Prevent traffic rates from getting out of control

Page 28: Chapter 14 Network Security - Computer Network
Page 29: Chapter 14 Network Security - Computer Network

NETWORK SECURITY METHODOLOGY

SAFE BLUEPRINT OVERVIEW

Cisco developed a security methodology called SAFE SAFE use as guide to design and implement network

security Cisco describe SAFE as a defense-in-depth approach Defense-in-depth means that a system has multiple

security measures in place The SAFE blueprint discourage having only one

device performing a security function Security capabilities can be hosted on dedicated

appliances ,such as firewall The blueprint guidelines encourage you to make

security decisions based on the dangers to be avoided