Top Banner
EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011
64

EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Dec 29, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

EEC4113Data Communication &

Multimedia SystemChapter 9: Session Layer – Network Security

by Muhazam Mustapha, November 2011

Page 2: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Learning Outcome

• By the end of this chapter, students are expected to be able to explain issues related to network security

Page 3: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Chapter Content

• Network Security Issues

• Security Key, Cryptography and Authentication Techniques

• Firewall

• Steganography

Page 4: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Network Security Issues

CO1

Page 5: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Security Requirements

• Confidentiality– Requires that data only be accessible by

authorized party

• Integrity– Requires that data can be modified only by

authorized party– Modification includes writing, changing,

deleting and creating

CO1

Page 6: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Security Requirements

• Availability– Requires that data are available to authorized

parties

• Authenticity– Requires that a host or service be able to

verify the identity of a user

CO1

Page 7: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Types of Attacks

• A useful means of classifying security attacks is in terms of passive attacks and active attacks

• The purpose of attacks are not necessarily to obtain information, but might be just to cause some kind of problem at the target

• 2 types of attacks:– Passive attacks– Active attacks

CO1

Page 8: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Passive Attacks

• Eavesdropping on transmissions to obtain information– Secretly listening to people’s conversation

• Two types:– Release of message contents

• Outsider learns content of transmission

– Traffic analysis• By monitoring frequency and length of messages,

even encrypted, nature of communication can be guessed

CO1

Page 9: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Passive Attacks

• Difficult to detect because do not involve any alteration of the data

• Can be prevented, usually by means of encryption

CO1

Page 10: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Active Attacks

• Involve some modification of the data stream or the creation of a false stream

• 4 types:– Masquerade– Replay– Modification of messages– Denial of service (DoS)

• Easy to detect but hard to prevent

• Goal: Detect and recover from any disruption or delays caused by themCO1

Page 11: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Active Attacks

• Masquerade– Pretending to be a different entity

• Replay– Passive capture of data unit and its

subsequent retransmission to produce an unauthorized effect

• capture a password during an eavesdropping and reusing it to dishonestly access a system

CO1

Page 12: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Active Attacks

• Modification of Messages– Portion of legitimate message is altered into a

content wanted by the attacker

• Denial of Services (DoS)– Disruption of entire network or a server, either

by disabling the network server or by overloading it with messages so as to degrade performance

CO1

Page 13: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Security Key,Cryptography and

Authentication

CO1

Page 14: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Maintaining Confidentiality

• The universal technique for providing confidentiality for transmitted data is symmetric encryption

• Also referred to as conventional encryption or single-key encryption

CO1

Page 15: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Symmetric Encryption

Performs various substitutions &

transformations on the plaintext

Scrambled message, produced as output. Depends

on plaintext & secret key. Different

keys will produce different ciphertext

Input to the encryption algorithm. Exact substitutions & transformation performed

by the algorithm depend on the key

Takes ciphertext & secret key as input

to produce the original plaintext

Original message or data that is fed into

the algorithm as input

CO1

Page 16: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Encryption Requirements

• Strong encryption algorithm– Even if known, should not be able to decrypt

or work out key– Even if a number of cipher texts are available

together with plain texts of them

• Sender and receiver must obtain secret key securely– Once key is known, all communication using

this key is readable

CO1

Page 17: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Attacking Encryption

• There are 2 general approaches to attacking symmetric scheme:– Cryptanalysis

• Rely on nature of algorithm plus some knowledge of general characteristics of plain text

• Attempt to deduce plain text or key

CO1

Page 18: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Attacking Encryption

– Brute force• Try every possible key until plain text is achieved

CO1

Page 19: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Encryption Algorithms

• The most commonly used symmetric encryption algorithm are block ciphers

• Block cipher processes plaintext in fixed block sizes producing block of ciphertext of equal size

CO1

Page 20: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Encryption Algorithms

• Two most important block cipher algorithms:– Data Encryption Standard (DES) – 56-bit key

• Extension of DES - 3DES – 112 / 168-bit key

– Advanced Encryption Standard (AES) – up to 256-bit key

CO1

Page 21: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Location of Encryption Devices

CO1

Page 22: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Link Encryption

• All traffic secure

• High level of security

• Requires lots of encryption devices

• Message must be decrypted at each switch to read address (virtual circuit number)

• Security vulnerable at switches– Particularly on public switched network

CO1

Page 23: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

End-to-End Encryption

• Encryption done at ends of system

• Data in encrypted form crosses network unaltered

• Destination shares key with source to decrypt

• Host can only encrypt user data– Otherwise switching nodes could not read

header or route packet

• Traffic pattern not secureCO1

Page 24: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Secure Hash Functions

• Hash function must have following properties:– Can be applied to any size data block– Produce fixed length output– Easy to compute– Not feasible to reverse– Not feasible to find two message that give the

same hash

CO1

Page 25: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

SHA-1

• Secure Hash Algorithm 1

• Input message less than 264 bits– Processed in 512 bit blocks

• Output 160 bit digest

CO1

Page 26: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

SHA-1 Example

CO1

Page 27: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Public Key Cryptography

• Based on mathematical algorithms

• Asymmetric– Use two separate keys

• Ingredients– Plain text– Encryption algorithm– Public and private key– Cipher text– Decryption algorithm

CO1

Page 28: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Public Key Cryptography: Encryption

CO1

Page 29: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Public Key Cryptography: Authentication

CO1

Page 30: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Public Key Cryptography: Encryption Operation• User generates pair of keys

• User places one key in public domain

• Infeasible to determine decryption key given encryption key and algorithm

• To send a message to user, encrypt using the user’s public key

• User decrypts using his private key• His own public key could NOT decrypt it

CO1

Page 31: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Public Key Cryptography: Authentication Operation• To send an authentication certification to a

receiver, encrypt the certification using the sender’s private key

• Receiver authenticates the certification using the sender’s public key

CO1

Page 32: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

RSA (Rivest, Shamir, Adleman) Algorithm

CO1

Page 33: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

RSA (Rivest, Shamir, Adleman) Algorithm

CO1

Page 34: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

RSA Example

CO1

Page 35: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

SSL Transport Layer Security• Security services for TCP/IP Transport

Layer Security defined in RFC 2246

• SSL (secure socket layer) general-purpose service– Set of protocols that rely on TCP

• Two implementation options– Part of underlying protocol suite

• Transparent to applications

– Embedded in specific packages• E.g. Netscape and Microsoft Explorer and most

Web serversCO1

Page 36: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

SSL Architecture• SSL uses TCP to provide reliable end-to-

end secure service• SSL two layers of protocols• Record Protocol provides basic security

services to various higher-layer protocols– In particular, HTTP can operate on top of SSL

• Three higher-layer protocols – Handshake Protocol– Change Cipher Spec Protocol– Alert Protocol

CO1

Page 37: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

SSL Protocol Stack

CO1

Page 38: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

SSL Record Protocol• The SSL record protocol defines the

format used to transmit data• The SSL record protocols provides two

services for SSL connections:– Confidentiality: The Handshake Protocol

defines a shared secret key that is used for conventional encryption of SSL payloads

– Message Integrity: The Handshake Protocol also defines a shared secret key that is used to form a message authentication code (MAC)

CO1

Page 39: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

SSL Record Protocol

CO1

Page 40: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

SSL HeaderContent Type (8 bits): The higher-layer protocol used to process the enclosed fragment.

Major Version (8 bits): Indicates the major version of SSL in use. E.g. 3

Minor Version (8 bits): e.g. 0

Compressed length (16 bits): The length in bytes of the plain text fragment. The maximum value is 2^14 + 2048

CO1

Page 41: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

SSL Handshake Protocol• The SSL handshake protocol involves using the SSL

record protocol to exchange a series of messages between an SSL-enabled server and an SSL-enabled client when they first establish an SSL connection. This exchange of messages is designed to facilitate the following actions:– Authenticate the server to the client.– Allow the client and server to select the cryptographic

algorithms, or ciphers, that they both support.– Optionally authenticate the client to the server.– Use public-key encryption techniques to generate shared

secrets.– Establish an encrypted SSL connection.

CO1

Page 42: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

SSL Handshake Protocol

CO1

Page 43: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

SSL Change Cipher Spec Protocol• Used to change the keying material in

encryption between the client and server• Keying material is raw data that is used to

create keys for cryptographic use• The CCS sub-protocol consists of a single

message to tell other party in the SSL/TLS session, who is also known is the peer, that the sender wants to change to a new set of keys

CO1

Page 44: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

SSL Alert Protocol• Alert messages are used to indicate a

change in status or an error condition to the peer

• There are a wide variety of alerts to notify the peer of both normal and error conditions defined in RFC 2246:– closure notify– unexpected message– bad record MAC– decompression failure– handshake failure

CO1

Page 45: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Firewall

CO1, CO3

Page 46: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Firewalls• A firewall is a piece of hardware or

software program which protects a computer or network from attacks from intruders and hackers

• Today’s firewalls also include virus scanning, URL screening, and keyword scanners – or the other way around

CO1, CO3

Page 47: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Firewalls

CO1, CO3

Page 48: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Need for FirewallsTo protect for following:

• Loss and Manipulation of Data

• Business Secrets and Confidential Data

• Hijacked Networks

• Loss of Reputation

CO1, CO3

Page 49: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Firewall Operation• Authorize a connection (allow)

• Block a connection (deny)– Based on incoming source– Based on content– Based on outgoing source

• Reject a connection request without informing the issuer (drop)

• Logging of any traffic

CO1, CO3

Page 50: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Level of Operation• Filtration (exceptions) can be done at

various levels

• User/Destination level– certain users or IP address given certain

privileges or can be blocked

• Application level– certain applications given certain privileges

• Service level– certain services (FTP, HTTP, SMTP) on

certain port numbers may or may not be allowed

CO1, CO3

Page 51: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Hardware vs Software Firewall• Advantage of software firewall

– Free or cheap to install– Easy to install– Specialist skills not needed for configuration– Levels of access can be set

• Disadvantage of software firewall– May be heavy and slow down applications– Can be difficult to remove– Requires regular patching to all hosts– No centralized management

CO1, CO3

Page 52: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Hardware vs Software Firewall• Advantage of hardware firewall

– Centralized management possible– Secure– Fast– Less interference

• Disadvantage of hardware firewall– Expensive to purchase– Needs specialist knowledge– Takes up physical space– Hard to upgrade

CO1, CO3

Page 53: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Steganography

CO1

Page 54: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Steganography• Art and science of communicating in a way

that hides the existence of a message– Hidden in plain sight

• Signal or pattern imposed on content

• Not encryption – data is sent in plain text

• Not copy protecting – the copy of data is hardly visible

CO1

Page 55: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Classic Techniques• Invisible ink (1st century AD -

WW II)

• Overwrite select characters in printed type in pencil– look for the gloss

• Pin punctures in type

• Microdots– e.g. microdots to protect

against car theft

CO1

Page 56: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Modern Motivation• Steganography received little attention in

modern computing

• Renewed interest because of industry desire to protect copyrighted digital work– audio, images, video, text

• Detect counterfeiter (plagiarism), unauthorized presentation, embed key, embed author ID

CO1

Page 57: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Some Modern TechniquesNull cipher

• Message hidden in plain sight and plain text

Big rumble in New Guinea.The war oncelebrity acts should end soon.Over fourbig ecstatic elephants replicated.

Bring two cases of beer.

CO1

Page 58: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Some Modern TechniquesImage watermarking

• Involves bit dropping, flipping, color separation, etc

From image of a tree, removing all but the two least significant bits of each color component produces an almost completely black image. Making that image 85 times brighter produces the cat image.

CO1

Page 59: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Some Modern TechniquesUV Watermarking

CO1

Page 60: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Some Modern TechniquesMachine ID Codes in Laser Printers

CO1

Page 61: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Some Modern TechniquesMachine ID Codes in Laser Printers

CO1

Page 62: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Some Modern TechniquesMachine ID Codes in Laser Printers

CO1

Page 63: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Some Modern TechniquesMachine ID Codes in Laser Printers

CO1

Page 64: EEC4113 Data Communication & Multimedia System Chapter 9: Session Layer – Network Security by Muhazam Mustapha, November 2011.

Some Modern TechniquesTypography

• Text lines shifted up/down (40 lines text ⇒ 240 codes)

• word space coding

• character encoding - minor changes to shapes of characters

CO1