Network Security Slide File - e

Download Report

Transcript Network Security Slide File - e

Computer Security:
Chapter 8
Network Security
Network characteristics

Anonymity
 ‘On

the Internet, nobody knows you are a dog’
Automation
 Done
by machines, sometimes only have minimal
human supervision

Distance
 What

is far really? Hard to tell.
Opaqueness
 Are you in Skudai? KL? Bukit Kayu Hitam?
 School? Company? Adam’s basement?

USA?
Routing diversity
 >1
way to get a packet somewhere
2
Advantages of Computing Networks


Several advantages over single-processor
systems:
 Resource sharing.
 Distributing the workload.
 Increased reliability.
 Expandability.
The network must ensure data integrity and
secrecy, and availability of service.
3
Threats In Networks

Generic threats aimed to compromise
confidentiality, integrity, or availability,
 applied against data, software and
hardware
 by nature, accidents, non-malicious
humans. And malicious attackers.
4
What Makes a Network Vulnerable?






Anonymity. (distributed authentication problems)
Many points of attack – both targets and origins.
(attack can come from any host with unknown way)
Sharing. (access control for single system may be
inadequate in networks.)
Complexity of system. (diminish confidence in
network security)
Unknown perimeter. (unclear network boundaries)
Unknown path. (uncertain message routing in
network)
5
Who Attacks Networks?
3 necessary components of an attack
 method, opportunity and motive.
 4 important motives:
 challenge or power, fame, money and
ideology.
 What is an attackers’ profile? What is he/she
like?

6
Challenge

Question:
 Can I defeat this network?
 What would happen if I tried this
approach or that technique?

Network attackers enjoy the intellectual
stimulation of defeating the supposedly
undefeatable.
7
Fame

For those enjoy the personal thrill of seeing their
attacks written up in the news media.
Money and Espionage
Financial reward motivates attackers.
 Attack in industrial espionage, seeking
information on a company’s products,
clients, or long-range plans.

8
Ideology

Hactivism – involves “operations that use
hacking techniques against a target’s
network with disrupting normal operations
but not causing serious damage.”

Cyberterrorism – more dangerous than
hactivism – “politically motivated hacking
operations intended to cause grave harm
or economic damage.”
9
Threat Precursors: what to do b4

Port Scan
 Know standard ports/services running & responding
 Know OS is installed
 Know application type & versions are present

Social Engineering
 Know certain internal details.
 Using social skills and personal interaction to get someone to
reveal security-relevant info
 Persuade victim to be helpful

Reconnaissance
 Gather discrete bits of info from various sources and putting
them together like the pieces of puzzle
 Example : “dumpster diving” (Get info from recycling boxes) and
eavesdropping (what is the gossip?).
10

OS & Application Fingerprinting
 Consult
a list of specific software’s known
vulnerabilities to determine which particular weakness


try to exploit
Bulletin Boards and Chats
 exchange


of info
Attackers post their latest exploits and techniques, read what
others have done and search for additional info
Availability of Documentation
 Vendors
may distribute info that is useful to an
attacker

Example : Microsoft produces a resource kit and that toolkit
may use by attacker for investigate a product
11
Threats in Transit: from here to there


Usual way: Listen
Listening can be
 Effortless

Eavesdrop just listens or monitor traffic
 With




 eavesdrop
some effort  wiretap
Passive and active
Passive is much like eavesdropping
Active means ‘doing’ something to the communication (add,
append, replace, delete)
Depends on communication medium used : cable,
microwave, satellite, wireless etc
12

Cable





All signal in Ethernet or other LAN are available to intercept
Each LAN connector have a unique address and it takes packets
addressed to its host
A process called inductance can tap a wire and read radiated
signals without making physical contact with the cable
Attacker can direct cut cable, insert in a secondary cable and
receive a copy of all signal along the primary cable
Microwave



Broadcast through the air
Weakness : wide swath
Someone can pick up an entire transmission
13
More threats
Impersonation
 Spoofing
 Message confidentiality threats
 Message integrity threats
 Website defacement
 Denial of service (DOS)
 Distributed DOS (DDOS)
 Threats to active and mobile code

17
Impersonation



Be someone else
Falsely represents a valid entity in a communication
Some attack methods
 Guess the identity and authentication
 Default passwords ADMIN, GUEST
details of target
 Pick
up the identity and authentication details of target
from previous communication/wiretapping
 Circumvent or disable authentication mechanism at
target computer  thru known weaknesses
 Use a target that will not be authenticated

check first time then lets user go on/’guest’ search for all, type
anything
 Use
a target whose authentication data is known
18
Guessing

How? Through
 Easy-to-guess
password
 Default password
 Dead account
19
Nonexistent Authentication
Computer-to-computer connection
exploited
 “Guest” or “anonymous” accounts
exploited

22
Well-known Authentication

Convenience of well-known authentication
scheme usurps the protection
 E.g.
same/default password use in remote
hardware maintenance
23
Trusted Authentication

Identification delegated to other trusted
source can be potential threat
 Useful
but great care is needed.
24
Spoofing
Falsely carries on one end of a networked
interchange
 Examples

 Masquerading
 Session
hijacking
 Man-in-the-middle attack
25
Masquerade

One host pretends to be another
 URL

Confused domain names


xyz.com, xyz.org, xyz.net
Names with or without hyphen


confusion
Cola-cola.com vs cocacola.com
Easily mistyped names

10pht.com vs lopth.com
 Exploits
flaw in victim’s web server
overwrite web page
 Build false site that resemble real one

26
Session Hijacking
Intercepting and carrying a session begun
by another entity
 Example

 Wiretap
to intercept the packet between
buyers and eCommerce site
 Intrude in the telnet session to gain control
over system
27
Man-in-the-Middle Attack
Similar to session hijacking, but usually
participates from the start of the session
 Would be foiled with public keys

Key
distributor
Malicious
interceptor
Key Interception
User 1
User 2
28
Denial of Service

Transmission failure


Connection flooding





Attackers sends you more data than the system can handle to
overload system
Use Internet Control Message Protocols (ICMP) to attack system
Eg Echo-Chargen, Ping of Death, Smurf
Syn flood
Traffic redirection


Due to line is cut, network noise, hw/ sw problem, electronic
attacks
Attacker corrupt the routing, all packets routes to a router, router
become flooded
DNS attacks
32
Connection Flooding


Eg. Echo-Chargen, Ping of Death
Echo-Chargen




Ping of Death



A sends a flood of echo packet to B
B returns data for every echo packet
An endless loop between A and B
A sends a flood of pings to B
B replies every ping request
Smurf


A broadcast echo packets to network, with B return address
All network hosts reply to B
33
Syn Flood
3 way TCP handshake
1. SYN
2. ACK + SYN
3. ACK
Source
Destination
34
Syn flood…
1. SYN
2. ACK + SYN
Source
Destination
maintains
a queue SYN_RECV
1. SYN
2. ACK + SYN
Tracking
items
and start
timer
3. ACK
Source
Destination
35
Syn flood…
SYN(1)
SYN(2)
SYN(n)
Attacker
Victim

Send SYN request every few seconds

Choose different and unique source
address
36
DNS Attacks
Domain name server – a table that
converts domain name into network
address
 Attacker redirect the routing of any traffic
to cause DOS

37
Threats to Active Code
Is also called mobile code
 General name for code that is pushed to
the client for execution
 Cookies

 Takes

Scripts
 Eg.

up disk space
Escape-character attack
Active code
 JavaScript,
ActiveX, Auto Exec by Type
38
Complex Attacks

Script kiddies
 Let
people perform attacks even if they do not
understand what the attack is or how it is
performed
 Download and run attack scripts

Building blocks
 Let
people combine components of an attack
39
Network security
controls
So what’s next?

We have seen the possible threats to network,
what about control?
 Architecture
 Encryption
 Strong
authentication
 Access controls
 Alarms and alerts
 Honeypots
 Traffic flow security
41

Architecture
 Building-in
security into plan
 Some ways include

Segmentation





Redundancy



Reduces number of threats
Limits amount of damage from a single vulnerability
Don’t put all your eggs in one basket
Separate servers/segments  least privilege and
encapsulation
2 web servers are better than 1
Each checks the other is active (failover mode), if not, it carries
the burden
Single points of failure


System can tolerate failure in acceptable way
Eliminate all single points of failure  the ‘jugular’ of the
system, that would bring the whole system down
42

Encryption
 Used
in combination with controls
 Applied

Link encryption
Between 2 host
 All host in between must have cryptographic facility, else
message is still exposed
 Adv. : faster, easier for user, uses fewer keys


End-to-end encryption
Between applications
 Keys increase rapidly with increase in users, n * (n -1)/2
for n users [when single encryption used)
 Adv.: more flexible, can be used selectively, can be
integrated with the application

43
Link encryption
Sender
Receiver
message
exposed
Encrypted
message
44
End-to-end encryption
Sender
Receiver
Intermediate
Host
Encrypted
message
45

Strong authentication
 Knowing
and being assured of the accuracy of an
identity
 Ways include:



One-time password
Challenge-response systems
Kerberos



Ticket with user name and services he is allowed to obtain
Tickets are un-forgeable, non-replayable, authenticated, timestamped, encrypted
Access control

Router and firewall

provide layers of protection for the internal network
46
Alarms and alerts

Intrusion detection system (IDS)
 another layer of defense
 place inside the network to monitor events in the
network
 detect the attack



at the beginning
while in progress or
after it has occurred (when attacker able to pass through
the router and firewall)
 the
IDS activates alarm  defensive action taken
47
2
types: signature based and heuristic
Signature based IDS: does pattern matching and
reports pattern corresponding to known attack type
 Heuristic (anomaly based): flags behaviour not in
line with acceptable behaviour.
 http://www.stevespace.net/ids/types.html

 False
results
False positive: raising alarm when not really an
attack
 False negative: not raising alarm for real attack

48

Honeypot
A
computer system or network segment with
servers, devices and data; with the objective
of luring the attacker.
 Reasons
for it:

Watch attackers and learn about new attacks

Learn enough to identify and stop attacker

Provide a place where attackers can go, in hopes
they’ll leave the real systems alone
49

Check out control review: table 7-7
Pfleeger pg 454
50
Firewalls
Firewall
Primary
Routers
Examine the entire packet’s
content including data portion
Concern only source and
destination Address
Filtering
Addressing
function
52




Firewall is a device that filters all traffic between
a protected (‘inside’) network and a less
trustworthy (‘outside’) network.
Best practice: non-firewall functions should not
be done on the same machine
Firewalls know what is ‘bad’ by adhering to a
security policy
2 major school of thought regarding default
behavior:
 Default
deny
 Default allow/permit
53

Types of firewall
 Packet

filtering gateway (screening routers)
Simple policy
 Stateful
inspection firewalls
 Application proxies
Richer set of
choices for
 Guards
policy
 Personal firewalls

Which firewall?
 Depends
on what are the threats that need to
be countered?
54

Packet filtering gateway (screening routers)
 Controls


Packet address (source/destination)
Specific transport protocol (e.g. HTTP)
 Just

access to packets based on
see nametag but not ID
Only IP but not packet content
 Cannot
choose between allowable TELNET and nonallowable ones
 But it can block packets from ‘outside’ trying to
disguise to be one from ‘inside’ trying to forge an IP
address
55

Stateful inspection firewalls
 Maintains
state information between packets in an
input stream
 Can be used to thwart attacks that are split across 2
or more packets

Application proxies
 a.k.a.
bastion host
 It checks the content of a packet and only allows
actions that are in the given guidelines


Cannot use ‘put’ but ‘get’ is OK
Caching popular sites for easy retrieval
 Proxies
can be tailored to specific requirements, like
logging details of access
56

Guards
 Sort of a twin of proxy firewall
 Add functionality to a proxy firewall until it starts to look like a
guard
 Receives protocol data, interprets them and passes through

Personal firewalls
 An
application program that runs on a workstation to
block unwanted traffic
 A sensible approach to guarding 1 unit of w/station
 The user decides who to trust and who not to
 Firewall runs on same machine so vulnerable to
attack

**check out firewall types comparison Pfleeger
pg 465
57
What can firewall block?
Can protect environment if it controls
entire perimeter
 Do not protect outside the perimeter
 Prone to attacks  having different layers
help
 Must be correctly configured, kept updated
to succeed

58
Aside:
Network security is a large topic, but time
is of essence.
 Reading the book will help immensely.

59