250 likes | 459 Views
Introduction to Network Systems Security. Mort Anvari. About the Course. A grad-level seminar course focusing on basics and issues in network security First half will be lectures about elements of network security, cryptography backgrounds, and introduction to network security designs
E N D
Introduction toNetwork Systems Security Mort Anvari
About the Course • A grad-level seminar course focusing on basics and issues in network security • First half will be lectures about elements of network security, cryptography backgrounds, and introduction to network security designs • Second half will be your chance to present what you have learned from key research papers
Why Should You Take This Course • Security is an increasingly important issue • You want to have basic knowledge about network security • You can learn latest attacks and newest skills to counter those attacks • You have a chance to implement the skills learned in the class
Your Best Strategy • Come to every lecture to learn basic security problems and skills to counter them • Keep yourself exposed to articles related to network security to collect project ideas • Read each assigned paper and write good summary for each paper • Do not wait till last minute to prepare for exam or work on project • Enjoy the fun!
What Can Go Wrong… • …when your computer y receive or is waiting for a message m? ? Internet m x y
Message Loss • Adversary A can discard m in its transit A m x y
Message Interception • Adversary A can get a copy of m when m passes by m A m m x y
Message Modification • Adversary A can arbitrarily modify the content of m to become m’ A m m’ x y
Message Insertion • Adversary A can arbitrarily fabricate a message m, pretending that m was sent by x src: x dst: y A m x y
Message Replay • Adversary A can replay a message m that has been sent earlier by x and received by y m A m x y
… … … … … … Denial-of-Service Attack • Adversary A can send huge amount of messages to y to block m from arriving at y A m ????? x y
Passive attacks Traffic analysis Message interception Active attacks Message loss Message modification Message insertion Message replay Denial-of-Service attack Type of Attacks
Confidentiality Integrity Authentication Anti-replay … Availability Access control Non-repudiation Anonymity Network Security Services
Confidentiality • Keep message known only to the receiver and secret to anyone else • Counter message interception
Integrity • When receiver receives message m, receiver can verify m is intact after sent by sender • Counter message modification
Authentication • When receiver receives message m, receiver can verify m is indeed sent by the sender recorded in m • Counter message insertion
Anti-replay • When receiver receives message m, receiver can verify m is not a message that was sent and received before • Counter message replay
Availability • Property of a system or a resource being accessible and usable upon demand by an authorized entity • Counter denial-of-service attack
Access Control • Mechanism to enforce access rights to resources and data • Users can access resources and data to which they have access rights • Users cannot access resources and data to which they don’t have access rights
Non-repudiation • When receiver receives message m, receiver gets proof that sender of m ever sent m • Receiver of m can show proof to third-party so that sender of m cannot repudiate
Anonymity • Identity of sender is hidden from receiver • When receiver receives message m, receiver has no clue about sender of m
Network Security Is Great… • Protect messages from interception in their transit • Detect and discard messages that are modified, inserted, or replayed • Disallow unauthorized access to local system resource and sensitive data
…But Hard To Achieve • Many layers in network architecture • Many different media of network connection • Adversary’s location hard to determine • New attacks keep emerging • Cryptographic overhead
Next Class • Formal specification and verification of network protocols • Network security tools to counter the effects of adversary actions