0% found this document useful (0 votes)
13 views24 pages

eSEC01 NetSec

The document outlines the fundamentals of network security, covering key topics such as the goals of information security, various types of attacks, and essential security measures like access control and cryptography. It emphasizes the importance of protecting data and maintaining secure communications through technologies like VPNs and IPSec. Additionally, it discusses the role of security management and the Whois database in maintaining network integrity and accountability.

Uploaded by

645hxhp5rs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views24 pages

eSEC01 NetSec

The document outlines the fundamentals of network security, covering key topics such as the goals of information security, various types of attacks, and essential security measures like access control and cryptography. It emphasizes the importance of protecting data and maintaining secure communications through technologies like VPNs and IPSec. Additionally, it discusses the role of security management and the Whois database in maintaining network integrity and accountability.

Uploaded by

645hxhp5rs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

APNIC eLearning:

Network Security
Fundamentals

Contact: training@apnic.net

eSEC01_v1.0
Overview
• Goals of Information Security
• Attacks on Different Layers
• Attack Examples
• Trusted Network
• Access Control
• Cryptography
• Public Key Infrastructure
• VPN and IPSec
• Security Management
• Whois Database
1
Goals of Information Security

SECURITY
Confidentiality Integrity Availability

prevents safeguards the authorized


unauthorized accuracy and users have
use or completeness reliable and
disclosure of of information timely access
information to information
Why Security?
• The Internet was initially designed for connectivity
– Trust assumed
– We do more with the Internet nowadays
– Security protocols are added on top of the TCP/IP
• Fundamental aspects of information must be protected
– Confidential data
– Employee information
– Business models
– Protect identity and resources
• We can’t keep ourselves isolated from the Internet
– Most business communications are done online
– We provide online services
– We get services from third-party organizations online
Attacks on Different Layers
Application Layer 7: DNS, DHCP, HTTP, FTP, IMAP,
Application
LDAP, NTP, Radius, SSH, SMTP, SNMP,
Telnet, TFTP
DNS Poisoning, Phishing,
Presentation SQL injection, Spam/Scam

Session Layer 5: SMB, NFS, Socks


Transport
Transport Layer 4: TCP, UDP TCP attacks, Routing
attack, SYN flooding,
Sniffing
Network Internet
Layer 3: IPv4, IPv6, ICMP, IPSec
Ping/ICMP Flood

Data Link Layer 2: PPTP, Token Ring


ARP spoofing, MAC
Network Access
flooding
Physical
OSI Reference Model TCP/IP Model
TCP Attacks
• Exploits the TCP 3-way handshake
• Attacker sends a series of SYN packets without replying
with the ACK packet
• Finite queue size for incomplete connections

SYN

SYN+ACK

ACK
Server
CONNECTION ESTABLISHED
TCP Attacks
• Exploits the TCP 3-way handshake
• Attacker sends a series of SYN packets without replying
with the ACK packet
• Finite queue size for incomplete connections
SYN

SYN+ACK

Attacker Server
(Victim)

ACK? OPEN CONNECTIONS


DNS Cache Poisoning

3
1
www.example.com 192.168.1.99
I want to access
www.example.com QID=64569
QID=64570 (pretending to be
the authoritative
QID=64571 match!
zone)
2
QID=64571
Client DNS Caching Root/GTLD
Server

QID=64571
3
www.example.com 192.168.1.1

Webserver
(192.168.1.1) ns.example.com
1
Common Types of Attack
• Ping sweeps and port scans - reconnaissance
• Sniffing – capture packet as they travel through the network
• Man-in-the-middle attack – intercept messages that are
intended for a valid device
• Spoofing - set up a fake device and trick others to send
messages to it
• Hijacking – take control of a session
• Denial of Service (DoS) and Distributed DoS (DDoS)
Trusted Network
• Standard defensive-oriented technologies
– Firewall – first line of defense
– Intrusion Detection

• Build TRUST on top of the TCP/IP infrastructure


– Strong authentication
• Two-factor authentication
• something you have + something you know
– Public Key Infrastructure (PKI)
Access Control
• Access control - ability to permit or deny the use of an
object by a subject.
• It provides 3 essential services (known as AAA):
– Authentication (who can login)
– Authorization (what authorized users can do)
– Accountability (identifies what a user did)
Cryptography
• Has evolved into a complex science in the field of
information security
• Encryption – process of transforming plaintext to ciphertext
using a cryptographic key
• Symmetric key cryptography – uses a single key to encrypt
and decrypt information. Also known as private key.
– Includes DES, 3DES, AES, IDEA, RC5

• Asymmetric key cryptography – separate keys for


encryption and decryption (public and private key pairs)
– Includes RSA, Diffie-Hellman, El Gamal
2
Cryptography

ENCRYPTION DECRYPTION
ALGORITHM ALGORITHM
Plaintext Ciphertext Plaintext

Encryption Key Decryption Key

Symmetric Key
Cryptography Shared Key Shared Key

Asymmetric Key
Cryptography Public Key Private Key
Public Key Infrastructure
• Combines public key cryptography and digital signatures to
ensure confidentiality, integrity, authentication, non-
repudiation, and access control
• Digital certificate – basic element of PKI; secure credential
that identifies the owner
• Basic Components:
– Certificate Authority (CA)
– Registration Authority (RA)
– Repository
– Archive
Security on Different Layers

Application Layer 7: DNS, DHCP, HTTP, FTP, IMAP,


LDAP, NTP, Radius, SSH, SMTP, SNMP,
Telnet, TFTP
Presentation DNS HTTPS, DNSSEC,
Poisoning, PGP,SQL
Phishing, SMIME
injection,
Session Layer 5:Spam/Scam
SMB, NFS, Socks

Transport Layer 4: TCP, UDP TCP attacks,


TLS, SSL, SSH attack,
Routing
SYN flooding, Sniffing

Network Layer 3: IPv4, IPv6, ICMP, IPSec


IPSecFlood
Ping/ICMP

Data Link Layer 2: VTP, PPTP, Token Ring


ARP 802.1X,
IEEE PPP
spoofing, & PPTP
MAC flooding
Physical
Virtual Private Network
• Creates a secure tunnel over a public network
– Client-to-firewall, router-to-router, firewall-to-firewall

• VPN Protocol Standards


– PPTP (Point-to-Point tunneling Protocol)
– L2F (Layer 2 Forwarding Protocol)
– L2TP (Layer 2 Tunneling Protocol)
– IPSec (Internet Protocol Security)
Different Layers of Encryption
Application Layer – SSL, PGP, SSH, HTTPS

Source Destination
Network Layer - IPSec

Link Layer Encryption


IPSec
• Provides Layer 3 security
• Tunnel or Transport mode
– Tunnel mode – entire IP packet is encrypted
– Transport mode – IPSec header is inserted in to the packet

• Combines different components:


– Security associations, Authentication headers (AH), Encapsulating
security payload (ESP), Internet Key Exchange (IKE)

• A security context for the VPN tunnel is established via the


ISAKMP
Internet Security Protocols
• Layer 4 security: TLS, SSL, SSH
• SSL/TLS (Secure Socket Layer / Transport Layer Security)
– Session-based encryption and authentication for secure
communication (prevent eavesdropping)
– TLS is the IETF standard succeeding SSL
– Uses RSA asymmetric key system

• Secure Shell (SSH2) – secure channel between devices,


replaces telnet and rsh
Security Management
• Network security is a part of a bigger information security
plan
• Policies vs. Standards vs. Guidelines
• Must develop and implement comprehensive security policy
– Minimum password length, frequency of password change
– Access of devices, host firewalls
– User creation/deletion process
– Data signing/encryption
– Encrypting all communication (remote access)
– Use of digital certificates

• Disaster Recovery and Attack Mitigation Plan


Whois Database
• Public network management database
• Tracks network resources
– IP addreses, ASNs, reverse domains, routing

• Records administrative info


– Contacts (person/role), authorization (maintainer)

• All Members must register their resources in the Whois


database
• Must keep records up to date at all times
Questions
• Please remember to fill out the
feedback form
– <survey-link>
• Slide handouts will be available
after completing the survey
APNIC Helpdesk Chat
Thank You!
End of Session

You might also like