Top Banner
NETWORK SECURITY Source: Wired
51

NETWORK SECURITY

Jan 23, 2016

Download

Documents

Shane Gallagher

NETWORK SECURITY. Source: Wired. Computer and Network Attack Taxonomy. Time. Source: Dissertation of John D. Howard, CMU, 1997. Group Task. Get together on groups of 3-5 people Discuss an attack that one of your group members have experienced or heard about - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: NETWORK SECURITY

NETWORK SECURITY

Source: Wired

Page 2: NETWORK SECURITY

Computer and Network Attack Taxonomy

Attackers Tools Access Results Objectives

Hackers User Command

Implementation Vulnerability

Unauthorized Access

Process Files Corruption of

Information

Challenge, Status

Spies Script or Program

Design Vulnerability

Unauthorized Use

Data in Progress

Disclosure of

Information

Political Gain

Terrorists Autonomous Agent

Configuration Vulnerability

Theft of Service

Financial Gain

Corporate Raiders

Toolkit Denial-of-Service

Damage

Professional Criminals

Distributed Tool

Vandals Data Tap

Source: Dissertation of John D. Howard, CMU, 1997

Time

Page 3: NETWORK SECURITY

Group Task

• Get together on groups of 3-5 people

• Discuss an attack that one of your group members have experienced or heard about

• For that attack, mark within which cells the attack belongs

• Five minutes

Page 4: NETWORK SECURITY

Securing Resources

Page 5: NETWORK SECURITY

Threats to Security• Physical security• Access Security

– Unauthorized access into a computer– Tapping into a data communications line

• Personnel– Misuse by authorized personnel

• Natural Disaster• Computer Viruses, Worms, Logic Bombs.• Denial of Service Attacks

Page 6: NETWORK SECURITY

Security concepts/terminology

Need to address following issues:• Secrecy/Privacy: guarantee that information

given will not be misused• Authenticity: data provided to user must be

authentic (i.e., is it really coming from X?)• Integrity: data stored in system must not be

corrupted.• Non-repudiation: A mechanism which prevents a

user from denying a legitimate, billable charge.

Page 7: NETWORK SECURITY

Phishing

Page 8: NETWORK SECURITY

Which one would YOU trust?

Page 9: NETWORK SECURITY

User Identification and Authorization• Passwords

– kept in encrypted file

– should be changed frequently

– automatic expiration

• Ultra-sensitive applications

– layered IDs (passwords at several levels)

– user profiles (restrictions on who can do what)

– access levels (read, write, execute, purge)

– combining menus and user profiles (let user see only those options available to her)

Page 10: NETWORK SECURITY

Time and Location Restrictions• Establish time intervals during which

transaction is allowed• Certain transactions can run only from

certain locations– attach applications to terminals– maintain terminal profile

• Additional precautions on switched ports with dial-in access– call-back unit– restricted hours– safeguard telephone numbers– manual authentication in high

security installations

Page 11: NETWORK SECURITY

Other Methods

• Recognizing unauthorized access attempts

– after 3 failed attempts disallow log-in for 5 minutes

– permit fake log-in after several failed attempts

• Automatic log-off

– log off anybody with no activity for 10 minutes

– authentication for every transaction

• Transaction logs

– every log-in is logged (date, time user id, unsuccessful attempts, terminal id, location)

No method is foolproof. These are delaying tactics.

Page 12: NETWORK SECURITY

Securing Communications

Setting: EuropeTime: 1940-45

How?

Page 13: NETWORK SECURITY

Data Encryption

• Symmetric Key Cryptography– Data encryption standard (DES), Bureau of standards

(based on symmetric key)• 56-bit encryption key (now available in longer keys)• uses 16 iterations of rearrangement and substitution

combinations• Its 72-quadrillion combinations were broken in 1997 by a

group using distributed computing (14,000 computers) – lead by Colorado programmer Rocke Verser

• Public Key cryptography – (the other approach, covered later)

Page 14: NETWORK SECURITY

31798603996994715581310583186337934867429744958612

Page 15: NETWORK SECURITY

How much is? 1 Billion

30 bits(9 zeros)

Source: http://www.kokogiak.com/megapenny/default.asp

Page 16: NETWORK SECURITY

How much is? 10 Billion

40 bits(12 zeros)

Page 17: NETWORK SECURITY

How much is? 1 Quadrillion

50 bits(15 zeros)

Page 18: NETWORK SECURITY

How much is? 1 Quintillion

60 bits(18 zeros)

Page 19: NETWORK SECURITY

How much is? 1 Octillion

128 bits(38 zeros)

Previous collection(enlarged for your benefit)

Page 20: NETWORK SECURITY

How much is?

Number of pennies that can fit inside the Universe 300 bits

(90 zeros)

Thanks to Alexander Voronovich for help with calculation

Page 21: NETWORK SECURITY

“RSA Laboratories currently recommends key sizes of 1024 bits for corporate use and

2048 bits for extremely valuable keys like the root key pair used by a certifying authority “

Source: http://www.rsasecurity.com/rsalabs/node.asp?id=2218 Downloaded 04/06/06

2048 bits(616 zeros)

Page 22: NETWORK SECURITY

Symmetric Key Encryption

Encrypted message: DSPEZHKE

Page 23: NETWORK SECURITY

Data encryption based on symmetric key (A very old method)

• Divide plain text into groups of 8 characters. Pad with blanks at end (if necessary)

• Select an 8-character key• Rearrange plain text by interchanging adjacent characters

(first with second, third with fourth)• Translate each character into a number (A-1, B-2, C-3, ....., Z-

26, blank-0)• Add the numbers of the key (Step 2) to the results of above

step.

Page 24: NETWORK SECURITY

Data encryption based on symmetric key(contd.)

• Divide each sum by 27 and keep remainder

• Translate remainder back into character to yield the cipher text.

At the receiving end

• Perform the reverse operation (i.e., the same set of steps in reverse order) to restore the original text.

Page 25: NETWORK SECURITY

Example

• DATA _COM

• ADATC_MO rearrange characters

• 01 04 01 20 03 00 13 15 translate

16 18 15 20 15 03 15 12 key vals.

17 22 16 40 18 03 28 27 sum

17 22 16 13 18 03 01 00 mod 27

• Q V P M R C A _ result

Page 26: NETWORK SECURITY

PAP: Direct Password(Password authentication protocol)

• Simple password access• Vulnerable to snooping

(Source: Ascend Corp)

“It’s me, andhere’s my

PASSWORD.”

AccessEquipment

Remote LANAccess Server

LAN

CarrierServices

GOT IT!(That was easy)

Page 27: NETWORK SECURITY

CHAP: Secured Password Exchange(Challenge authentication protocol)

• Uses challenge-based encrypted password• Makes snooping much less effective

(Source: Ascend Corp)

AccessEquipment

Remote LANAccess Server

LAN

CarrierServices

2. “Here’s your

unique challenge

Luigi”2

3. “Here’s my

password

encrypted into

your challenge:

XYQWZY.”

3

1. “It’s me, Luigi”

?

Page 28: NETWORK SECURITY

password

• Several types of token systems

•Token generates exclusive one-time password

•Requires possession of token device and PIN

3. Token device generates one- time password

Token Device

2. User enters PIN and challenge into token

4. user enters password at prompt

5. Password sent to central site

Challenge:

XYZ123

Enterpassword:

1. Challenge received from central site

Token

Source: Ascend Corp.

Page 29: NETWORK SECURITY

Public Key Cryptography (A brilliant idea proposed in 1976)

Page 30: NETWORK SECURITY

Generating Keys

Public Key

Private Key

Page 31: NETWORK SECURITY

Example Public Key:-----BEGIN PGP PUBLIC KEY BLOCK-----Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com>

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w3hs-----END PGP PUBLIC KEY BLOCK-----

Priv

ate

key

look

s si

mila

r, b

ut w

ith d

iffe

rent

info

rmat

ion

Page 32: NETWORK SECURITY
Page 33: NETWORK SECURITY

Imagine a chest with two locksPublic

KeyholePrivateKeyhole

…now Imagine that you have the ability to generate such chests at will, and that they all react the same way to the keys belonging to it…as long as you have ONE key (either public or private, you can generate the chest…)

Page 34: NETWORK SECURITY

So, you want to send a secret text to your friend, Billy-Bob?

You Billy-BobSend chest with secret text to Billy-Bob

Billy-Bob opens chest using his secret key

Generate chest using B-B’s Public Key + insert secret text!

Download Billy-Bob’s Public Key

Page 35: NETWORK SECURITY

Public Key Cryptography

•Sender encrypts message M into E(M) by applying public key or encryption key (E) of receiver

•Receiver decrypts E(M) by applying her private key or decryption key (D):

i.e, D(E(M)) = M

Based on one-way (or trap door) functions which are easy to compute in one direction but not in the other.

– E: Encryption or public key

– D: Decryption or private key

Page 36: NETWORK SECURITY

But how do you prove to your friend, Billy-Bob that you are YOU?

(you already have his public key)

You Billy-BobGenerate another chest using B-B’s public Key

Use your own Private Key to generate an empty chest

Insert your chest inside “his” chest!

Send chest(s) to Billy-Bob

Billy-Bob opens chest using his secret key

Billy-Bob downloads YOUR public key

Billy-Bob tries YOUR public key in the lock of the chest – if the chest opens, it can only be from YOU!

Page 37: NETWORK SECURITY

Electronic signatures(Another brilliant idea!)

• How do you convince your bank that you are indeed the sender of a message?

• Say Alice (A) is sending message to Bank (B):– Alice applies her decryption key– Alice applies bank’s encryption key– Sends message to bank

– Bank applies its decryption key first :

– Bank applies Alice’s encryption key• Based on the idea that keys are commutative, ie.

)(MDA

))(()))(( MEDMDE AAAA

))(( MDE AB

)()))((( MDMDED AABB MMDE AA )))((

Page 38: NETWORK SECURITY

PGP (Pretty Good Privacy)(a.k.a. Phil’s pretty good software)

http://www.pgp.com

• Software written by Phil Zimmerman (of Boulder fame!)• Implements public key cryptography• Available in public domain (on most Unix systems)Basic commandspgp -h (for help)pgp -kg (to create your key)pgp -e text_file her_user_id (to encrypt with recipient’s

public key)pgp ciphertextfile (to decrypt ciphertextfile)pgp -ka keyfile ( to add contents of a key file to your key

ring)

Page 39: NETWORK SECURITY

Aircraft Downing in China• “The airplane is basically a

really big flying tape recorder”

• “Virtually anything transmitted through the air would be within reach”

• “…dozens of sensitive antennae pick up signals from radar, radio, cell phones, perhaps even e-mail”

Source: The Daily Camera, April 4th, 2001

EP-3E Source: NYT, April 4th, 2001

Page 40: NETWORK SECURITY

FIREWALLS

A firewall is a mechanism used to protect a trusted network from an untrusted network. It implements the site's security policy and is the single point in your network through which all communications between the trusted and untrusted network must pass.

INTERNET

INTERNET

Page 41: NETWORK SECURITY

Filter Action Internal Port External Port Comment Rule Host Host

1 block * * HACKER * deny access to

2 allow Mail 25 * * connect to mail gateway

-- Generally anything not expressly permitted is prohibited.

Packet Filtering Firewalls-- Incorporate packet filters in the router software-- Reject/accept packets based on rules

Page 42: NETWORK SECURITY

Application-Level Gateways(or Proxy Servers)

-- Use software applications to filter traffic for various services.

-- Program acts like a gateway (or proxy server), and

-- Logs traffic and forwards only the legitimate traffic.

-- Do not need rules as with packet level filters, but

-- Need a specialized program for each service (e.g. mail proxy, http proxy, etc.).

-- Operates at higher layer of OSI protocol.

-- Weakness:Runs on top of OS and subject to holes in OS.

Page 43: NETWORK SECURITY

Internet Security Protocols

S-MIME: Secure Multipurpose Internet Mail Extensions.

SSL: Secure Socket Layer. SSL is a protocol for transmitting encrypted data over TCP/IP networks.

S-HTTP: Secure HTTP. Security extension to HTTP to protect individual transaction requests and responses.

SET: Secure Electronic Transaction. Developed by Visa and MasterCard to support bank card payments involving multiple parties (card holder, merchant, acquirer, issuer).

Page 44: NETWORK SECURITY

Secure Web TransactionsSymmetric algorithms are faster than public key algorithms, but public key algorithms are required to maintain privacy during the exchange of the faster symmetric keys. To preserve both efficiency and privacy, secure Web transactions begin with a public key exchange, followed by the exchange of a session key that follows a faster, symmetric algorithm.

Page 45: NETWORK SECURITY

Digital CertificateIs the cyberspace equivalent of a driver’s license. Way of authenticating yourself to other party.

SSL authentication is done by X.509 certificates. Certificates are issued by certification authorities (CAs), e.g. Verisign, GTE Cybertrust,etc., which act as trusted third parties. Each certificate contains: • information about the certificate's format.

• a unique serial number.• information about the algorithm used to sign the certificate.• the name of the CA which issued the certificate.• the validity period of the certificate.• identifying information about the "subject," or the entity to whom the

certificate belongs,the subject's public key, and the issuer’s signature.

Page 46: NETWORK SECURITY

Customer

Merchant

Acquiring Bank

Card Issuer

How SECURE ELECTRONICTRANSACTIONS (SET) WORK

1. Customer Initiates transaction with Order-form + Signed + Encrypted authorization

2. Bank decrypts authorization and checks signature

3. Bank checks card4. Card Issuer authorizes transaction

5. Bank authorizes transaction

6. Customer gets goods + receipt

7. Merchant asks to “capture” transaction and get money

8. Merchant gets paid

9. Customer gets monthly bill

Page 47: NETWORK SECURITY

Problems with Encryption

• The Battle of Leyte Gulf (October 23-26 1944)

– American navy forces split into two, each steaming to meet separate Japanese forces (located far away from each other)

• Task Force 38 and Task Force 34 (commanded by Admiral Halsey)

– Admiral Nimitz (in Pearl Harbor) was wondering about Task Force 34’s position, sent message: “Where is Task Force 34?”

– Cryptographer stuffed message, and sent it as: • “Turkey trots to water XX Where repeat where is Task Force 34 XX

The world wonders.”

– Halsey’s cryptographer, forgetting to remove all the stuffing, sent the following message to the bridge:

• “Where repeat where is Task Force 34 XX The world wonders.”

Page 48: NETWORK SECURITY

Tennyson’s The Charge of the Light Brigade

Half a league, half a league, Half a league onward,

All in the valley of Death Rode the six hundred.

"Forward, the Light Brigade!"Charge for the guns!" he said:

Into the valley of Death Rode the six hundred.

Page 49: NETWORK SECURITY

Tennyson’s The Charge of the Light Brigade

Flash'd all their sabres bare,Flash'd as they turn'd in air,Sabring the gunners there,Charging an army, while All the world wonder'd:

…Then they rode back, but not

Not the six hundred.

Page 50: NETWORK SECURITY

Key Security Points

High-level security consists of multiple system components:User identificationAccess verificationSecurity administration

Combine multiple security mechanisms for desired level of

security Both dial-up security and backbone security are important. Individual responsibility is essential!

Source: Ascend Corp.

Page 51: NETWORK SECURITY

Security Resources• CERT: Computer Emergency Response Team

• CSI: Computer Security Institute

• ISSA: Information Systems Security Association

• TruSecure Corporation (formerly National Computer Security Association)

• FIRST Forum of Incident Response and Security Teams

http://www.cert.org/ 1-412-268-7090

http//www.gocsi.com 1-415-905-2626 http://www.issa-intl.org/ 1-708-699-6441 http://www.trusecure.com 1-717-258-1816

http//www.first.org

Source: Ascend Corp.