Ch06 Network Security
Ch06 Network Security
Networks
(Chapter 6)
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
1
Networking basics
Wireless Security
- WiFi vulnerabilities
Denial-of-service attacks
Objectives
Network encryption concepts and tools
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
2
2
11/17/2024
Network Baisc
Network Basic
What is a Computer Network?
• A group of two or more devices (like computers, phones, or printers)
connected together to communicate and share resources.
4
11/17/2024
7 – Application 7 – Application
6 – Presentation
5 – Session
6 – Presentation
5 – Session The OSI Model
4 – Transport 4 – Transport
3 – Network 3 – Network Network communications are performed through a virtual
2 – Data Link 2 – Data Link concept called the Open System Interconnection (OSI) model
1 – Physical 1 – Physical
The OSI model, most useful conceptually, describes similar
processes of both the sender and receiver
Packet
◦ Smallest individually addressable data unit transmitted
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
6
6
11/17/2024
Communication
Media
Vulnerability
LAN
Imposter
WAN
Rogue receiver:
sniffer, wiretap
Receiver
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
8
8
11/17/2024
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
9
Security
perimeter
1.Interception
• Security Perimeters
◦ virtual line that encircles a protected set of
computing resources
• Interception occurs when an unauthorized
actor crosses the security perimeters through
◦ Eavesdropping
◦ wiretapping
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
10
10
11/17/2024
Interception - Cont.
Why Network is Vulnerable to Interception?
Network characteristics make it vulnerable because of the following issues
11
Network C Network B
Network A
Host C
Network A Network B
Host A1
Host B3
Network D
Host D
Network E
Unknown Path
Unknown Perimeter
Issues
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
12
12
11/17/2024
2. Modification - 3. Fabrication
Data corruption
◦ May occur during data entry, at rest, in use, in transit, and retrieval Typing
Malicious Program
error
◦ May be intentional or unintentional, malicious or nonmalicious, code
Noise,
error
accident
directed or random Hardware
failure
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
13
13
Replay Attack
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
14
14
11/17/2024
15
5. Port Scanning
Doesn’t fit cleanly into the category of threats
Port scanner is a program that reports which ports
respond to queries
Example
◦ NMAP
◦ Probes a range of ports, testing to see what
services respond
Why port scanning may constitute a threat?
It tells an attacker
1. which ports or services are up & running
2. what OS is installed
3. what applications and versions are present
16
11/17/2024
17
Wireless Networks
Security
Vulnerabilities In Wireless Networks
18
11/17/2024
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
19
19
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
20
20
11/17/2024
21
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
22
22
11/17/2024
WEP Weaknesses
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
23
23
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
24
24
11/17/2024
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
25
25
WPA (cont.)
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
26
26
11/17/2024
Attacks on
Networks
27
28
11/17/2024
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
29
29
Attacker
Attacker sends
broadcast ECHO Victim is saturated
request to network, All network hosts with ECHO replies
with victim’s return address reply to victim from entire network
30
11/17/2024
Victim A Victim B
Echoing what you just sent me DoS Attack
Chargen another packet with echo bit on Example:
Echoing that again
Echo-Chargen
• Works between two hosts
Chargen another packet with echo bit on • Uses ICMP protocol
• Acts like a game of tennis
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
31
31
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
32
32
11/17/2024
30 Teardrop Attack
40
to lock up.
Fragment start = 40 len = 30
Reassembly Buffer
Packet Fragments
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
33
33
7.0.1.1
DoS Attack
207.46.197.32
Example: DNS
User Attacker DNS server
Spoofing
Received too
late; ignored • The attacker acts as the DNS server in order to
redirect the user to malicious sites
• Any server can respond to a DNS lookup
request; the first responder wins
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
34
34
11/17/2024
10.0.0.0 dist 3
20.0.0.0 dist 2
30.0.0.0 dist 1
35
Reset
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
36
36
11/17/2024
Distributed
Denial of
Victim
Service
1. Attacker plants
(DDoS)
Trojan horse in
zombies 2. Zombies attack
victim simultaneously
on command
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
37
37
Attacker Attacker
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
38
38
11/17/2024
Network
Protection
Cryptog raphy
Firewall
Intrusion Detection Systems (IDS)
39
Cryptography
in Network
Security
40
11/17/2024
7 M M 7
6 M M 6
5 M M 5
4 M M 4
3 M 3 M M 3 M 3
2 M 2 M M 2 M 2
1 M 1 M M 1 M 1
Link
Sender Intermediate node Receiver
Encryption
M Encrypted
M Plaintext
41
7 M M 7
6 M M 6
5 M M 5
4 M M 4
3 M 3 M M 3 M 3
2 M 2 M M 2 M 2
1 M 1 M M 1 M 1
End-to-End
Sender Intermediate node Receiver
Encryption
M Encrypted
M Plaintext
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
42
42
11/17/2024
43
44
11/17/2024
45
46
11/17/2024
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
47
47
SSL Session
Established
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
48
48
11/17/2024
SSL
Certificate
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
49
49
Chain of
Certificates
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
50
50
11/17/2024
Onion Routing
Onion routing prevents an eavesdropper from learning
source, destination, or content of data in transit in a network
This is particularly helpful for evading authorities, such as
when users in oppressive countries want to communicate
freely with the outside world
Uses asymmetric cryptography, as well as layers of
intermediate hosts, so that
◦ The intermediate host that sends the message to the ultimate
destination cannot determine the original sender, and
◦ The host that received the message from the original sender
cannot determine the ultimate destination
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
51
51
To other
A1 A2 A3 A4 Virtual Private
sites
Networks (VPN)
Office A
Firewall A A VPN is an encrypted tunnel that
provides confidentiality and
integrity for communication
between two sites over public
networks
B1 B2 B3 B4 The VPN is terminated by firewalls
at both ends
Office B
Firewall B
Encrypted
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
52
52
11/17/2024
To other A1 A2 A3 A4
sites
Office
Firewall A
VPN
(cont.)
Teleworker
Encrypted
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
53
53
Firewalls
54
11/17/2024
Firewalls
A device that filters all traffic between a protected or “inside” network and less trustworthy or
“outside” network
Most firewalls run as dedicated devices
◦ Easier to design correctly and inspect for bugs
◦ Easier to optimize for performance
Firewalls implement security policies, or set of rules that determine what traffic can or cannot
pass through
A firewall is an example of a reference monitor, which means it should have three
characteristics:
◦ Always invoked (cannot be circumvented)
◦ Tamperproof
◦ Small and simple enough for rigorous analysis
55
56
11/17/2024
Types of Firewalls
1. Packet filtering gateways or screening routers
2. Stateful inspection firewalls
3. Application-level gateways, also known as proxies
4. Circuit-level gateways
5. Guards
6. Personal or host-based firewalls
57
Telnet
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
58
58
11/17/2024
Stateful Inspection
10.1.3.1:4® 10.1.3.1:3® 10.1.3.1:2®
10.1.3.1:1
Firewall
It maintains state information from one packet to the
next
10.1.3.1
Further
10.1.3.1:x
traffic
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
59
59
Application Proxy
Filtered
commands It simulates the behavior of an application at OSI
layer 7
Results
• The real application receives only requests
to act properly.
Application proxies can serve several purposes:
• Filtering potentially dangerous application-
Logging layer requests
File
cache
• Log requests/accesses
• Cache results to save bandwidth
The most common form is a web proxy
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
60
60
11/17/2024
100.1.1.x network
Circuit-Level
Circuit
gateway
Gateway
A firewall that allows one network to be an
extension of another.
To Yes
200.1.1.x? It operates at OSI layer 5, the session layer
Encryption
No It functions as a virtual gateway between two
networks.
Main One use is to implement a VPN.
firewall
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
61
61
Guard
A sophisticated firewall that, like an application proxy, can interpret data at the protocol level
and respond
The distinction between a guard and an application proxy can be fuzzy; the more protection
features an application proxy implements, the more it becomes like a guard
Guards may implement any programmable set of rules; for example:
◦ Limit the number of email messages a user can receive
◦ Limit users’ web bandwidth
◦ Filter documents containing the word “Secret”
◦ Pass downloaded files through a virus scanner
62
11/17/2024
Personal Firewalls
• Restrict traffic by source IP and destination port
• Restrict which applications can use the network
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
63
63
Comparison of
Firewall Types
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
64
64
11/17/2024
65
Demilitarized Zone
(DMZ)
A form of network architecture in which a
network enclave is dedicated to services that
DMZ should be somewhat accessible from the
outside.
Firewall Web page server Email server FTP server
Firewall
Database
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
66
66
11/17/2024
Firewalls can protect an environment only if they control the entire perimeter
Firewalls are the most visible part of an installation to the outside, so they are an attractive target
for attack
/
Firewalls must be correctly configured. Configuration must be updated as the environment changes.
Firewall reports must be reviewed periodically for evidence of attempted or successful intrusion
Firewalls exercise only minor control over the content admitted to the inside. Inaccurate or
malicious code must be controlled by means inside the perimeter
67
User host
(internal)
Destination
host (external)
Network Address
Translation (NAT)
192.168.1.35 65.216.161.24 Concealing the true address of the internal host
and prevents the internal host from being
reached directly.
packet
packet
Src: 192.168.1.35:80 ◦ The source firewall converts the source address in
Src: 173.203.129.90:80 the packet into the firewall’s own address.
Firewall
packet
173.203.129.90 Src: 173.203.129.90:80
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
68
68
11/17/2024
DLP is best for preventing accidental incidents, as malicious users will often find ways to
circumvent it
69
Intrusion
Detection
Systems (IDS)
70
11/17/2024
Intrusion Detection
Raw event source
Systems (IDS)
(E)
Events
Ra ev
w en
or t d
• Monitor user and system activity
lo ata
w-
lev
el • Audit system configurations for vulnerabilities and
misconfigurations
(A) (S)
Analysis Storage
in H
ter ig
• Assess integrity of critical system and data files
pr h-l
et ev
ed e
ev l
en
• Recognize known attack patterns in system activity
ts
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
71
71
Detection Signature-based
method
Heuristic
Internal
Types of IDS
Scope Host-based IDS (HIDS)
Capability Passive
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
72
72
11/17/2024
Proxy Servers
SIEM is SW systems that collect security-relevant data from a
variety of HW and SW products to create a unified security
Web Servers/ Switches
Applications
SOC
Analysts dashboard for security operations center personnel
Routers
Email Servers
FROM SECURITY IN COMPUTING, FIFTH EDITION, BY CHARLES P. PFLEEGER, ET AL. (ISBN: 9780134085043). COPYRIGHT 2015 BY
PEARSON EDUCATION, INC. ALL RIGHTS RESERVED.
73
73
Summary
74