Network Security
Download
Report
Transcript Network Security
Internet Security
CS457 Seminar
Zhao Cheng
Security attacks
• interruption, interception, modification,
fabrication
• passive attack, active attack
Security services
•
•
•
•
Confidentiality
Authentication
Integrity
Nonrepudiation
IPSec services
SA(Security Association): one way relationship, identified by
• SPI(Security Parameter Index).
• IP Destination Address.
• Security Protocol Identifier:
AH(authentication Header)
ESP(Encapsulation Security Payload)
Two modes
• Transport mode: protection for upper layer
protocol.
• Tunnel mode: protection to entire IP packet.
Authentication header
• Header definition.
• Anti-Replay service
• Integrity check value
Encapsulating Security Payload
• Format.
• Encryption and authentication.
Key management
• Manual: configured by system
administrator with its own keys and keys of
other systems.
• Automated: on demand creation of keys for
SAs, ISAKMP(Internet Security
Association and Key Management Protocol)
by default.
Benefit of IPSec
• Strong and easy security for group behind
firewall.
• Transparent to applications.
• Transparent to end users.
• Security for individual users can be
provided.
TLS(transport layer security)
• Object: reliable end to end security over
TCP.
• Construction: two layers of protocols.
SSL Record Protocol
• Record Protocol Operation and format.
SSL Handshake Protocol
Phases:
1. Establish Security Capabilities.
2. Server Authentication and Key Exchange.
3. Client Authentication and Key Exchange.
4. Finish.
Example on handshake protocol
Services of TSL
1. Integrity: by cryptographic checksums.
2. Confidentiality: by encryption on SSL
payloads.
3. Authentication: by handshake protocol.
Summary
• Attacks on network security and
corresponding security services.
• IPSec: Services approaches on IP layer.
• TLS: Services approaches on transport
layer.