Network Security File - e

Download Report

Transcript Network Security File - e

Network Security
The Problem of Network Security
2
 The Internet allows an attacker to attack from
anywhere in the world from their home desk.
 They just need to find one vulnerability: a security
analyst need to close every vulnerability.
Network characteristics
3
 Anonymity
 ‘On the Internet, nobody knows you are a dog’
 Automation
 Done by machines, sometimes only have minimal human
supervision
 Distance
 What is far really? Hard to tell.
 Opaqueness
 Are you in Skudai? KL? Bukit Kayu Hitam? USA?
 School? Company? Adam’s basement?
 Routing diversity
 >1 way to get a packet somewhere
Advantages of Computing Networks
4
 Several advantages over single-processor systems:




Resource sharing.
Distributing the workload.
Increased reliability.
Expandability.
 The network must ensure data integrity and
secrecy, and availability of service.
Threats In Networks
5
 Generic threats aimed to compromise confidentiality,
integrity, or availability,
 applied against data, software and hardware
 by nature, accidents, non-malicious humans and
malicious attackers.
What Makes a Network Vulnerable?
6
 Anonymity. (distributed authentication problems)
 Many points of attack – both targets and origins.




(attack can come from any host with unknown way)
Sharing. (access control for single system may be
inadequate in networks.)
Complexity of system. (diminish confidence in
network security)
Unknown perimeter. (unclear network boundaries)
Unknown path. (uncertain message routing in network)
Who Attacks Networks?
7
 3 necessary components of an attack

method, opportunity and motive.
 4 important motives:

challenge or power, fame, money and
ideology.
 What is an attackers’ profile? What is he/she like?
Motives
8
Challenge
 Can I defeat this network?
 What would happen if I
tried this approach or that
technique?
 Network attackers enjoy
the intellectual
stimulation of defeating
the supposedly
undefeatable.
Fame
 Some people enjoy the
personal thrill of seeing
their attacks written up in
the news media.
Motives
9
Money and
Espionage
 Financial reward
motivates attackers.
 Attack in industrial
espionage, seeking
information on a
company’s products,
clients, or long-range
plans.
Ideology
 Hacktivism
 Hacking activity to bring
attention to political and
social change  e.g. free
speech, wikileaks
 Cyberterrorism
 “politically motivated
hacking operations
intended to cause grave
harm or economic
damage.”
Threat Precursors: what to do b4
10

Port Scan
 Know standard
ports/services running &
responding
 Know OS is installed
 Know application type &
versions are present
 Social Engineering



Know certain internal
details.
Using social skills and
personal interaction to get
someone to reveal
security-relevant info
Persuade victim to be
helpful
 Reconnaissance


Gather discrete bits of info
from various sources and
putting them together like
the pieces of puzzle
Example : “dumpster
diving” , eavesdropping
 Bulletin Boards and Chats


exchange of info
Attackers post their latest
exploits and techniques,
read what others have
done and search for
additional info
Threats in Transit: from here to there
11
 Usual way: Listen
 Listening can be
 Effortless  eavesdrop


Eavesdrop just listens or monitor traffic
With some effort  wiretap
Passive and active
 Passive is much like eavesdropping
 Active means ‘doing’ something to the communication (add,
append, replace, delete)
 Depends on communication medium used : cable, microwave,
satellite, wireless etc

More threats
13
 Spoofing
 Message confidentiality threats
 Message integrity threats
 Website defacement
 Denial of service (DOS)
 Distributed DOS (DDOS)
 Threats to active and mobile code
Spoofing
14
 Falsely carries on one end of a networked
interchange
 Examples
Masquerading
 Session hijacking
 Man-in-the-middle attack

Masquerade
15
 One host pretends to be another
URL confusion
 Confused domain names
 xyz.com, xyz.org, xyz.net
 Names with or without hyphen
 Cola-cola.com vs cocacola.com
 Easily mistyped names
 10pht.com vs lopth.com
 Exploits flaw in victim’s web server
 overwrite web page
 Build false site that resemble real one (part of phishing)

Session Hijacking
16
 Intercepting and carrying a session begun by another
entity
 Example
Wiretap to intercept the packet between buyers and
eCommerce site
 Intrude in the telnet session to gain control over system

Man-in-the-Middle Attack
17
 Similar to session hijacking, but usually participates
from the start of the session
 Would be foiled with public keys
10.1.1.1
10.1.1.3
(2) Login
(1) Login
(4) Password
(3) Password
10.1.1.2
Denial of Service
21
 Transmission failure
 Due to line is cut, network noise, hw/ sw problem, electronic attacks
 Connection flooding
 Attackers sends you more data than the system can handle to
overload system
 Use Internet Control Message Protocols (ICMP) to attack system
 Eg Echo-Chargen, Ping of Death, Smurf
 Syn flood
 Traffic redirection
 Attacker corrupt the routing, all packets routes to a router, router
become flooded
 DNS attacks
Syn Flood
23
3 way TCP handshake
1. SYN
2. ACK + SYN
3. ACK
Source
Destination
Syn flood…
24
1. SYN
2. ACK + SYN
Source
Destination
maintains
a queue SYN_RECV
1. SYN
2. ACK + SYN
Tracking
items
and start
timer
3. ACK
Source
Destination
Syn flood…
25
SYN(1)
SYN(2)
SYN(n)
Attacker
Victim
 Send SYN request every few seconds
 Choose different and unique source
address
Threats to Active Code
26
 Is also called mobile code
 General name for code that is pushed to the client for
execution
Cookies
 Takes up disk space
 Scripts
 Eg. Escape-character attack
 Active code
 JavaScript, ActiveX, Auto Exec by Type

Network security controls
So what’s next?
28
 We have seen the possible threats to network, what
about control?
Architecture
 Encryption
 Strong authentication
 Access controls
 Alarms and alerts
 Honeypots
 Traffic flow security

Architecture
29
 Building-in security into plan
 Some ways include
 Segmentation
 Reduces number of threats
 Limits amount of damage from a single vulnerability
 Don’t put all your eggs in one basket
 Separate servers/segments  least privilege and encapsulation
 Redundancy
 2 web servers are better than 1
 Each checks the other is active (failover mode), if not, it carries the
burden
 Single points of failure
 System can tolerate failure in acceptable way
 Eliminate all single points of failure  the ‘jugular’ of the system,
that would bring the whole system down
Strong authentication
33
 Knowing and being assured of the accuracy of an identity
 Ways include:
One-time password
 Challenge-response systems
 Kerberos
 Ticket with user name and services he is allowed to
obtain
 Tickets are un-forgeable, non-replayable,
authenticated, time-stamped, encrypted

Intrusion detection
system (IDS)
Access control
34
 Router and firewall
 provide layers of
protection for the internal
network
 place inside the network
to monitor events in the
network
 detect the attack
 at the beginning
 while in progress or
 after it has occurred
(when attacker able to
pass through the router
and firewall)
 the IDS activates alarm 
defensive action taken
Honeypot
35
 A computer system or network segment with
servers, devices and data; with the objective of
luring the attacker.
 Reasons for it:
 Watch
 Learn
attackers and learn about new attacks
enough to identify and stop attacker
 Provide
a place where attackers can go, in hopes
they’ll leave the real systems alone
Firewalls
Firewall
38
 Firewall is a device that filters all traffic between a
protected (‘inside’) network and a less trustworthy
(‘outside’) network.
 inserted between the premises network and the Internet
 Best practice: non-firewall functions should not be
done on the same machine
 Firewalls know what is ‘bad’ by adhering to a security
policy
 2 major school of thought regarding default behavior:


Default deny
Default allow/permit
Firewall: Aim
 to protect the premises network from Internet-based
attacks and
 to provide a single choke point where security and audit
can be imposed.
Firewall: Capabilities & Limits
 Capabilities:
 defines a single choke point
 provides a location for monitoring security events
 Limitations:
 cannot protect against attacks bypassing firewall
 may not protect fully against internal threats
 laptop, PDA, portable storage device infected outside
then used inside
Types of
Firewalls
Types of firewall
42
 Packet filtering gateway (screening routers)
 Stateful inspection firewalls
 Application level Firewall
 Circuit level firewall
 Which firewall?
 Depends on what are the threats that need to be countered?
terminal
host
firewall
A
A
terminal
host
firewall
A
A
A
Router Packet Filtering:
Packet header is inspected
Single packet attacks caught
Very little overhead in firewall: very quick
High volume filter
Stateful Inspection
State retained in firewall memory
Most multi-packet attacks caught
More fields in packet header inspected
Little overhead in firewall: quick
terminal
host
firewall
A
B
A B
terminal
host
firewall
A
B
A B
Circuit-Level Firewall:
Packet session terminated and recreated
via a Proxy Server
All multi-packet attacks caught
Packet header completely inspected
High overhead in firewall: slow
Application-Level Firewall
Packet session terminated and recreated
via a Proxy Server
Packet header completely inspected
Most or all of application inspected
Highest overhead: slow & low volume
What can firewall block?
47
 Can protect environment if it controls entire
perimeter
 Do not protect outside the perimeter
 Prone to attacks  having different layers help
 Must be correctly configured, kept updated to
succeed
Intrusion Detection System
(IDS)
48
Security Intrusion & Detection
Security Intrusion
a security event, or combination of multiple security
events, that constitutes a security incident in which an
intruder gains, or attempts to gain, access to a system
(or system resource) without having authorization to do
so.
Intrusion Detection
a security service that monitors and analyzes system
events for the purpose of finding, and providing realtime or near real-time warning of attempts to access
system resources in an unauthorized manner.
IDS
 Classification:
 Host-based
IDS: monitor single host activity
 Network-based IDS: monitor network traffic
 logical components:
 sensors - collect data
 analyzers - determine if intrusion has occurred
 user interface - manage / direct / view IDS
IDS
 2 types of approaches: signature based and heuristic
Signature based IDS: does pattern matching and reports
pattern corresponding to known attack type
 Heuristic (anomaly based): flags behaviour not in line
with acceptable behaviour.
 False results
 False positive: raising alarm when not really an attack
 False negative: not raising alarm for real attack

IDS vs IPS
52
 The difference between and IDS and IPS is that :
The IDS reports on something but does not filter it.
 An IDS may react to an attack by sending disconnect
packets for a connection.
 The IPS filters and prevents attacks.
 While IPS definitely sounds better, the implementation
may be difficult.

Summary
53
 We have looked at:
 Threats
 Possible controls
 But this is NOT exhaustive  there are MORE.
 Please do more exploring on your own
Class Assignment
54
 In your usual groups:
 Part 1 : Where best to place firewall(s) (in an
organization) to provide maximum security?
 Part 2: Research and review
Unified Threat Management
 Find out:



What it is
How it is implemented – what are the services provided
What are the issues