d - Computer Science and Engineering
Download
Report
Transcript d - Computer Science and Engineering
Chapter 1
Introduction
A note on the use of these ppt slides:
We’re making these slides freely available to all (faculty, students, readers).
They’re in PowerPoint form so you see the animations; and can add, modify,
and delete slides (including this one) and slide content to suit your needs.
They obviously represent a lot of work on our part. In return for use, we only
ask the following:
If you use these slides (e.g., in a class) that you mention their source
(after all, we’d like people to use our book!)
If you post any slides on a www site, that you note that they are adapted
from (or perhaps identical to) our slides, and note our copyright of this
material.
Computer
Networking: A Top
Down Approach
6th edition
Jim Kurose, Keith Ross
Addison-Wesley
March 2012
Thanks and enjoy! JFK/KWR
All material copyright 1996-2012
J.F Kurose and K.W. Ross, All Rights Reserved
Introduction 1-1
University of Nevada – Reno
Computer Science & Engineering Department
Fall 2015
CPE 400 / 600
Computer Communication Networks
Lecture 2
Prof. Shamik Sengupta
Office SEM 204
[email protected]
http://www.cse.unr.edu/~shamik/
Introduction 1-2
Intro to Computer Networking
What is computer network: “nuts and bolts” view
PC
1.
server
wireless
laptop
cellular
handheld
Numerous connected
Mobile network
computing devices: hosts
Global ISP
= end systems
running network apps
2. communication links
fiber, copper,
radio, satellite
transmission rate
= bandwidth
3. routers: forward
packets (chunks of
data)
access
points
wired
links
router
Home network
Regional ISP
Institutional network
1-4
Uses of Computer Networks
•
•
•
1-5
Business Networks
Home Networks
Mobile Networks
Example Network Applications (1)
A network with two clients and one server
(typical client-server connection)
1-6
Example Network Applications (2)
The client-server model involves requests and
replies over the public/private network
Example Network Applications (3)
Peer-to-peer networking: no fixed clients and servers
Example wireless network (4)
network
infrastructure
6-9
wireless hosts
laptop, PDA, IP phone
run applications
may be stationary (nonmobile) or mobile
wireless does not always
mean mobility
Categorization of networks by coverage scale
•
•
•
•
•
1-10
Personal area networks (PAN)
Local area networks (LAN)
Metropolitan area networks (MAN)
Wide are networks (WAN)
The Internet (Global network)
Personal Area Network (PAN)
Bluetooth PAN configuration
Local Area Networks (LAN)
Wireless and wired LANs. (a) 802.11. (b)
Switched Ethernet.
Metropolitan Area Networks (MAN)
A metropolitan area network
Wide Area Networks (WAN)
WAN that connects three branch offices in Australia
Coverage scale (contd.)
Classification of interconnected processors by scale
A different categorization of networks
In terms of communication technology
•
•
•
Unicasting
Broadcasting
Multicasting
What is computer networking: an operational view
Any communication is all about protocol
Hi
Connection req.
Hi
Connection
reply.
Got the
time?
Get http://www.cnn.com/slide.ppt
2:00
human protocol
<file>
time
networking protocol
1-17
What is computer networking: an operational view
human protocols:
… specific msgs sent
… specific actions taken
when msgs received, or
other events
network protocols:
machines rather than
humans
all communication activity
governed by protocols
protocols define format,
order of msgs sent and
received among network
entities, and actions
taken on msg
transmission, receipt
1-18
Protocol “Layers”
Networks are complex!
It is not just two machines communicating!
Millions of components:
hosts
routers
Access networks
Physical links
Numerous functionalities
Question:
How to manage such vast
amount of components?
Soln: Divide functionalities
among multiple layers.
1-19
Layering of airline functionality
ticket (purchase)
ticket (complain)
ticket
baggage (check)
baggage (claim
baggage
gates (load)
gates (unload)
gate
runway (takeoff)
runway (land)
takeoff/landing
airplane routing
airplane routing
airplane routing
departure
airport
airplane routing
airplane routing
intermediate air-traffic
control centers
arrival
airport
Layers: each layer implements a service
via its own internal-layer actions
relying on services provided by layer below and above
1-20
Another example: Postal Service!
What are the adv. of layering?
Network is a huge complex system.
Reduce the design complexity
Ease of updating the system
change of implementation of layer’s service transparent to
rest of system
e.g., Postal service (overnight flight or overnight ground)
Internet protocol stack
application
support host/network applications
Email, FTP, HTTP (HTML)
transport
application
process-process data transfer
TCP, UDP
transport
network
routing of datagrams from src. to destn.
network
IP address, routing protocols
link
physical
data transfer between neighboring
linknetwork elements
Ethernet
bits “on the wire”
physical
(Compare with the Postal System!)
1-22
The TCP/IP Reference Model
1-23
ISO/OSI reference model
presentation: allow applications
to interpret meaning of data,
e.g., encryption, compression,
machine-specific conventions
session: synchronization,
checkpointing, recovery of data
exchange
application
presentation
session
transport
network
link
physical
Introduction 1-24
Messages, Segments, Datagrams and Frames
source
message
segment
M
Ht
M
datagram Hn Ht M
frame Hl Hn Ht M
application
transport
network
link
physical
link
physical
switch
Encapsulation
destination
message
Ht
Hn Ht
Hl Hn Ht
M
M
M
M
application
transport
network
link
physical
Hn Ht
H l Hn Ht
M
M
network
link
physical
Hn Ht
M
router
1-25
University of Nevada – Reno
Computer Science & Engineering Department
Fall 2015
CPE 400 / 600
Computer Communication Networks
Lecture 3
Prof. Shamik Sengupta
Office SEM 204
[email protected]
http://www.cse.unr.edu/~shamik/
Introduction 1-26
Network core
packet switching, circuit switching,
Network structure
Introduction 1-27
The network core
mesh of interconnected
routers
packet-switching: hosts
break application-layer
messages into packets
forward packets from one
router to the next, across
links on path from source
to destination
each packet transmitted at
full link capacity
Introduction 1-28
Packet-switching: store-and-forward
L bits
per packet
source
3 2 1
R bps
takes L/R seconds to
transmit (push out) L-bit
packet into link at R bps
store and forward: entire
packet must arrive at router
before it can be transmitted
on next link
end-end delay = 2L/R
(assuming zero propagation delay)
R bps
destination
one-hop numerical example:
L = 7.5 Mbits
R = 1.5 Mbps
one-hop transmission
delay = 5 sec
more on delay shortly …
Introduction 1-29
Packet Switching: queueing delay, loss
A
C
R = 100 Mb/s
R = 1.5 Mb/s
B
D
E
queue of packets
waiting for output link
queuing and loss:
If arrival rate (in bits) to link exceeds transmission rate of
link for a period of time:
packets will queue, wait to be transmitted on link
packets can be dropped (lost) if memory (buffer) fills up
Introduction 1-30
Alternative core: circuit switching
end-end resources allocated
to, reserved for “call”
between source & dest:
In diagram, each link has four
circuits.
call gets 2nd circuit in top
link and 1st circuit in right
link.
dedicated resources: no sharing
circuit-like (guaranteed)
performance
circuit segment idle if not used
by call (no sharing)
Commonly used in traditional
telephone networks
Introduction 1-31
Circuit switching: FDM versus TDM
Example:
FDM
4 users
frequency
time
TDM
frequency
time
Introduction 1-32
Packet switching versus circuit switching
packet switching allows more users to use network!
example:
1 Mb/s link
each user:
• 100 kb/s when “active”
• active 10% of time
N
users
1 Mbps link
circuit-switching:
10 users
Introduction 1-33
Packet switching versus circuit switching
is packet switching a “clear winner?”
great for bursty data
resource sharing
simpler, no call setup
excessive congestion possible: packet delay and loss
protocols needed for reliable data transfer, congestion
control
Q: How to provide circuit-like behavior?
bandwidth guarantees needed for audio/video apps
still an unsolved problem (will discuss about this more
later…)
Introduction 1-34
Internet structure: network of networks
End systems connect to Internet via access ISPs (Internet
Service Providers)
Residential, company and university ISPs
Access ISPs in turn must be interconnected.
So that any two hosts can send packets to each other
Resulting network of networks is very complex
Evolution was driven by economics and national policies
Let’s take a stepwise approach to describe current Internet
structure
Internet structure: network of networks
Question: given millions of access ISPs, how to connect them
together?
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
Internet structure: network of networks
Option: connect each access ISP to every other access ISP?
access
net
access
net
access
net
access
net
access
net
access
net
access
net
connecting each access ISP
to each other directly doesn’t
scale: O(N2) connections.
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
Internet structure: network of networks
Option: connect each access ISP to a global transit ISP? Customer
and provider ISPs have economic agreement.
access
net
access
net
access
net
access
net
access
net
access
net
access
net
global
ISP
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
Internet structure: network of networks
But if one global ISP is viable business, there will be competitors
….
access
net
access
net
access
net
access
net
access
net
access
net
access
net
ISP A
access
net
access
net
access
net
ISP B
ISP C
access
net
access
net
access
net
access
net
access
net
access
net
Internet structure: network of networks
But if one global ISP is viable business, there will be competitors
…. which must be interconnected
Internet exchange point
access
access
net
net
access
net
access
net
access
net
IXP
access
net
ISP A
IXP
access
net
access
net
access
net
access
net
ISP B
ISP C
access
net
peering link
access
net
access
net
access
net
access
net
access
net
Internet structure: network of networks
… and regional networks may arise to connect access nets to
ISPS
access
net
access
net
access
net
access
net
access
net
IXP
access
net
ISP A
IXP
access
net
access
net
access
net
access
net
ISP B
ISP C
access
net
access
net
regional net
access
net
access
net
access
net
access
net
Internet structure: network of networks
roughly hierarchical
at center: “tier-1” ISPs (e.g., Verizon, Sprint, AT&T, Cable and
Wireless), national/international coverage
treat each other as equals
Tier 1 ISP
Tier 1 ISP
1-42
Tier 1 ISP
Tier-1 ISP: e.g., Sprint
1-43
Internet structure: network of networks
“Tier-2” ISPs: smaller (often regional) ISPs
Connect to one or more tier-1 ISPs, possibly other tier-2 ISPs
Tier-2 ISP pays
tier-1 ISP for
connectivity to
rest of Internet
tier-2 ISP is
customer of
tier-1 provider
Tier-2 ISP
Tier-2 ISP
Tier 1 ISP
Tier 1 ISP
Tier-2 ISP
1-44
Tier 1 ISP
Tier-2 ISP
Tier-2 ISPs
also peer
privately
with each
other.
Tier-2 ISP
Internet structure: network of networks
“Tier-3” ISPs and local ISPs
last hop (“access”) network (closest to end systems)
Local and tier3 ISPs are
customers of
higher tier
ISPs
connecting
them to rest
of Internet
1-45
local
local local
Tier
3
local
ISP
ISP
ISP ISP ISP
Tier-2 ISP
Tier-2 ISP
Tier 1 ISP
Tier 1 ISP
Tier-2 ISP
local
local
ISP
ISP
Tier 1 ISP
Tier-2 ISP
local
ISP
Tier-2 ISP
local
ISP
Internet structure: network of networks
a packet passes through many networks!
local
local local
Tier
3
local
ISP
ISP
ISP ISP ISP
Tier-2 ISP
Tier-2 ISP
Tier 1 ISP
Tier 1 ISP
1-46
Tier-2 ISP
local
local
ISP
ISP
Tier 1 ISP
Tier-2 ISP
local
ISP
Tier-2 ISP
local
ISP
Delay, loss, throughput in networks
Introduction 1-47
How do loss and delay occur?
packets queue in router buffers
packet arrival rate to link (temporarily) exceeds output link
capacity
packets queue, wait for turn
packet being transmitted (delay)
A
B
packets queueing (delay)
free (available) buffers: arriving packets
dropped (loss) if no free buffers
Introduction 1-48
Four sources of packet delay
transmission
A
propagation
B
nodal
processing
queueing
dnodal = dproc + dqueue + dtrans + dprop
dproc: nodal processing
check bit errors
determine output link
typically < msec
dqueue: queueing delay
time waiting at output link
for transmission
depends on congestion
level of router
Introduction 1-49
Four sources of packet delay
transmission
A
propagation
B
nodal
processing
queueing
dnodal = dproc + dqueue + dtrans + dprop
dtrans: transmission delay:
L: packet length (bits)
R: link bandwidth (bps)
dtrans = L/R
dtrans and dprop
very different
dprop: propagation delay:
d: length of physical link
s: propagation speed in medium
(~2x108 m/sec)
dprop = d/s
Introduction 1-50
Packet loss
queue (aka buffer) preceding link in buffer has finite
capacity
packet arriving to full queue dropped (aka lost)
lost packet may be retransmitted by previous node,
by source end system, or not at all
buffer
(waiting area)
A
packet being transmitted
B
packet arriving to
full buffer is lost
Introduction 1-51
Throughput
throughput: rate (bits/time unit) at which bits
transferred between sender/receiver
instantaneous: rate at given point in time
average: rate over longer period of time
server,
withbits
server
sends
file of into
F bitspipe
(fluid)
to send to client
linkpipe
capacity
that can carry
Rs bits/sec
fluid at rate
Rs bits/sec)
linkpipe
capacity
that can carry
Rc bits/sec
fluid at rate
Rc bits/sec)
Introduction 1-52
Throughput: Internet scenario
per-connection endend throughput:
min(Rc,Rs,R/10)
Rs
Rs
Rs
in practice: Rc or Rs
is often bottleneck
R
Rc
Rc
Rc
10 connections (fairly) share
backbone bottleneck link R bits/sec
Introduction 1-53
Metric Units (1)
The principal metric prefixes
1-54
Metric Units (2)
The principal metric prefixes
1-55
University of Nevada – Reno
Computer Science & Engineering Department
Fall 2015
CPE 400 / 600
Computer Communication Networks
Lecture 4
Prof. Shamik Sengupta
Office SEM 204
[email protected]
http://www.cse.unr.edu/~shamik/
Introduction 1-56
Wireshark Quick Overview
Introduction 1-57
With traffic…
HEX Window
Menu Bar
Button Bar
Status Bar
Status Bar
Simple Capture
Capture Interfaces
Capture Options
Networks under attack: security
Introduction 1-70
Security: Definition
Security is a state of well‐being of information and
infrastructures in which the possibility of theft, tampering,
and disruption of information and services is kept low or
tolerable
71
Network security
field of network security:
how bad guys can attack computer networks
how we can defend networks against attacks
how to design architectures that are immune to
attacks
Internet not originally designed with (much)
security in mind
original vision: “a group of mutually trusting users
attached to a transparent network”
Internet protocol designers playing “catch-up”
security considerations in all layers!
Introduction 1-72
The Cast of Characters
Alice and Bob are the good guys
Trudy/Mallory is the bad guy
Trudy is our generic “intruder”
Who might Alice, Bob be?
… well, real-life Alices and Bobs
Web browser/server for electronic transactions
on-line banking client/server
DNS servers
routers exchanging routing table updates
Alice’s Online Bank
Alice opens Alice’s Online Bank (AOB)
AOB must prevent Trudy from learning Bob’s balance
Confidentiality (prevent unauthorized reading of information)
Trudy must not be able to change Bob’s balance
Bob must not be able to improperly change his own
account balance
Integrity (prevent unauthorized writing of information)
AOB’s information must be available when needed
Availability (data is available in a timely manner when needed)
Alice’s Online Bank
How does Bob’s computer know that “Bob” is really
Bob and not Trudy?
When Bob logs into AOB, how does AOB know that
“Bob” is really Bob?
Authentication (assurance that other party is the claimed one)
Bob can’t view someone else’s account info
Bob can’t install new software, etc.
Authorization (allowing access only to permitted resources)
Bob can’t deny a transaction he requested
Non-repudiation (protection against denial by one of the parties in
a communication)
Think Like Trudy/Mallory
Good guys must think like bad guys!
A police detective
Must study and understand criminals
In network security
We must try to think like Trudy
We must study Trudy’s methods
We can admire Trudy’s cleverness
Often, we can’t help but laugh at Alice and Bob’s carelessness
But, we cannot act like Trudy
Terminology: Security Threats and
Attacks
A threat is a potential violation of security
Flaws in design, implementation, and operation
An attack is any action that violates security
Active vs. passive attacks
77
Aspects of Security
Security Attack
Action that compromises the security of information owned
by an organization.
Security Services
Enhance the security of data processing systems and
information transfers of an organization.
• Counter security attacks.
Designed to prevent, detect or recover from a security
attack.
• Provide means for security services
What can the attackers do:
Put malware into hosts via Internet
malware can get in host from:
virus: self-replicating infection by receiving & executing object
(e.g., e-mail attachment)
worm: self-replicating infection by passively receiving object that
gets itself executed
spyware malware can record keystrokes, websites visited,
upload info to collection site
infected host can be enrolled in botnet, used for spam,
DDoS attacks
Introduction 1-79
Bad guys: attack server, network infrastructure
Denial of Service (DoS): attackers make resources
(server, bandwidth) unavailable to legitimate traffic
by overwhelming resource with bogus traffic
1. select target
2. break into hosts around
the network (see botnet)
3. send packets to target from
compromised hosts
target
Introduction 1-80
Bad guys can sniff packets
packet “sniffing”:
broadcast media (shared ethernet, wireless)
promiscuous network interface reads/records all packets
(e.g., including passwords!) passing by
C
A
src:B dest:A
payload
B
wireshark software used for labs is a (free) packetsniffer
Introduction 1-81
Bad guys can use fake addresses
IP spoofing: send packet with false source address
C
A
src:B dest:A
payload
B
… lots more on security (Chapter 8)
Introduction 1-82
What is network security about ?
It is about secure communication
Everything is connected by the Internet
There are eavesdroppers that can listen on the
communication channels
Information is forwarded through packet switches
which can be reprogrammed to listen to or
modify data in transit
Tradeoff between security and performance
Defending Against Network Security
Attacks
Well, those all sound pretty terrible!!
So what do I do to keep my networks safe
from security attacks?
How would I even go about starting to
defend myself and others from variations
of attacks?
84
“Must Have” Characteristics of
Network Defense Solutions
1. Effective
2. Accurate
3. Cost (Cheap?)
4. Deployable
5. Complete
85
1. Effectiveness of Network Defenses
Does it stop the network security attack from
crippling my machine/network?
If so, is it merely pushing the problem upstream?
Or is it fundamentally solving it?
Will it only stop disruptive attacks?
Or will it also stop degrading attacks?
Will it stop future attacks?
Will it stop any attack regardless of its
variations?
86
2. Accuracy of Defenses
Ultimately, defense mechanism usually requires
dropping some packets
That’s great, but . . .
Is it only attack traffic that is getting dropped?
Or is my defense system also dropping some legitimate
traffic?
• Collateral Damage: The term used to describe unintended and
undesirable consequences of a defense mechanism
– Low collateral damage is tolerable
– If the collateral damage is high enough, it’s as bad as the
attack itself
87
2. Accuracy and False alerts
Most nodes aren’t under attack most of the time
If the defense system signals an attack when there is
no attack, there may be a problem
Known as false positives
88
3. Cost of Network Defense Systems
Defense systems must be reasonably inexpensive
Economically, and in performance complexity
Especially when no attacks are going on
Since that will be most of the time
Low cost important even when attacks are ongoing
If defense system eats 95% of your CPU when defending, you would
be rather happy without the defense
89
4. Deployability
How about defense
systems near the
attackers?
Is it good?
How about defense
systems in the core?
90
5. Last but not the least, Completeness
An ideal network defense system should handle all
kinds of attacks or at least a major subset
Systems that only handle ping floods (for example)
are of less value
Ideally, system should easily evolve to handle future
attacks
Currently, we have none.
91
Some network security
mechanisms terminology
Introduction 2-92
Firewalls
Idea: separate local network from the Internet
Trusted hosts and
networks
My
Network
Firewall
Router
Firewall Definitions
A firewall forms a barrier
through which the traffic going
in each direction must pass
A firewall security policy
dictates which traffic is
authorized to pass in each
direction
Analogy:
Moat around a castle
Firewall Characteristics
Four general techniques mostly used
Service Control: Determines the types of Internet
services that can be accessed
Direction control: Determines the direction in
which particular service requests may be initiated
and allowed to flow through the firewall
inbound or outbound
Firewall Characteristics
(contd.)
User control: Controls access to a service
according to which user is attempting to
access it
Typically applied to users inside the firewall
perimeter
Behavior control: Controls how particular
services are used
What one can expect from Firewall
First line of defense: As a single choke point that
keeps unauthorized users out of the protected
network, prohibits potentially vulnerable services
from entering or leaving the network
use of a single choke point simplifies security management
Monitoring, Auditing - not just for security
Logging, Network Forensic
Network address translator
What one may not expect from Firewall
Not an utopia for complete defense - In fact this is just a first line of
defense
May not protect against attacks that bypass the firewall
May not protect against internal threats (internal users)
May not protect against laptop, PDA or portable storage
device infected outside and then attached internally
May not protect against wireless communications between
local systems and outside systems
May not expect maximum network performance
Intrusion Detection System (IDS)
The implementation of IDS and its correctness is
important
Equally important is its placement in the network topology
Depends on what type of activities you want to detect
Internal,
External or
Both
Trusted hosts and
networks
My
Network
Firewall
Router
Intrusion Detection Approaches
Intrusion
normal profile
abnormal
Statistical Anomaly Detection
Attempt to define normal or
expected behavior by using
statistical data and then detect
intrusion
90
80
70
60
50
40
activity 30
measures 20
10
0
CPU
Process
Size
pattern
matching
Rule-Based Detection
Attempt to define proper behavior
by using a set of rules and then
detect intrusion
Intrusion
Patterns
Intrusion
activities
Security: A serious Problem
Firewall
IDS
A Traffic Cop
Detection and Alert
Problems:
Problems:
Internal Threats
False Positives
Virus Laden Programs
False Negatives
The Security Problem
Firewall
IDS
HoneyNets
An additional layer of security
Definition
A honeypot/honeynet is an information system resource
whose value lies in unauthorized or illicit use of that
resource.
• Has no production value; anything going to/from a
honeypot is likely a probe, attack or compromise
• Used for monitoring, detecting and analyzing attacks
• Does not solve a specific problem. Instead, they are
a highly flexible tool with different applications to
security.
History: Did you know?
Introduction 1-104
Internet history
1961-1972: Early packet-switching principles
1961: Kleinrock queueing theory shows
effectiveness of packetswitching
1964: Baran - packetswitching in military nets
1967: ARPAnet
conceived by Advanced
Research Projects
Agency
1969: first ARPAnet
node operational
1972:
ARPAnet public demo
NCP (Network Control
Protocol) first host-host
protocol
first e-mail program
ARPAnet has 15 nodes
Introduction 1-105
Internet history
1972-1980: Internetworking, new and proprietary nets
1970: ALOHAnet satellite
network in Hawaii
1974: Cerf and Kahn architecture for interconnecting
networks
1976: Ethernet at Xerox PARC
late70’s: proprietary
architectures: DECnet, SNA,
XNA
late 70’s: switching fixed length
packets (ATM precursor)
1979: ARPAnet has 200 nodes
Cerf and Kahn’s
internetworking principles:
minimalism, autonomy no internal changes required
to interconnect networks
best effort service model
stateless routers
decentralized control
define today’s Internet
architecture
Introduction 1-106
Internet history
1980-1990: new protocols, a proliferation of networks
1982: smtp e-mail protocol
defined
1983: deployment of TCP/IP
1983: DNS defined for nameto-IP-address translation
1985: ftp protocol defined
1988: TCP congestion
control
new national networks:
Csnet, BITnet, NSFnet,
Minitel
100,000 hosts connected
to confederation of
networks
Introduction 1-107
Internet history
1990, 2000’s: commercialization, the Web, new apps
early
1990’s: ARPAnet
late 1990’s – 2000’s:
decommissioned
more killer apps: instant
1991: NSF lifts restrictions on
messaging, P2P file sharing
commercial use of NSFnet
network security to
(decommissioned, 1995)
forefront
early 1990s: Web
est. 50 million host, 100
hypertext [Bush, Nelson]
million+ users
HTML, HTTP [Berners-Lee] backbone links running at
Gbps
1994: Mosaic, later Netscape
late 1990’s: commercialization
of the Web
Introduction 1-108
Internet history
2005-present
~750 million hosts
Smartphones and tablets
Aggressive deployment of broadband access
Increasing ubiquity of high-speed wireless access
Emergence of online social networks:
Facebook: one billion users
Service providers (Google, Microsoft) create their own
networks
Bypass Internet, providing “instantaneous” access
to search, emai, etc.
E-commerce, universities, enterprises running their
services in “cloud” (eg, Amazon EC2)
Introduction 1-109
Early Hacking – Phreaking
In1957, a blind seven-year old, Joe Engressia Joybubbles,
discovered a whistling tone that resets trunk lines
Blow into receiver – free phone calls
Cap’n Crunch cereal prize
Giveaway whistle produces
2600 MHz tone
The Eighties
Robert Morris worm - 1988
Developed to measure the size of the Internet
• However, a computer could be infected multiple times
Brought down a large fraction of the Internet
• ~ 6K computers
Academic interest in network security
The Nineties
Kevin Mitnick
First hacker on FBI’s Most Wanted list
Hacked into many networks
• including FBI
Stole intellectual property
• including 20K credit card numbers
In 1995, caught 2nd time
• served five years in prison
The Twenties
Code Red worm
Jul 19, 2001: infected more than 359K computers in less than
14 hours
Sapphire worm
Jan 31, 2003: infected more than 75K computers (most in 10
minutes)
DoS attack on sco.com
Dec 11, 2003: SYN flood of 50K packet-per-second
Nyxem/Blackworm virus
Jan 15, 2006: infected about 1M computers within two weeks
Introduction: summary
Covered:
Internet overview
What’s a protocol?
Layering
Network edge, core, access
network
packet-switching versus
circuit-switching
Internet structure
Performance: loss, delay,
throughput
Wireshark Basics
Security
History
you now have:
context, overview, “feel”
of networking
more depth, detail to
follow!
Introduction 1-114