471 likes | 723 Views
Data and Computer Communications. Chapter 24 – Computer and Network Security Techniques. Ninth Edition by William Stallings. Computer and Network Security Techniques.
E N D
Data and Computer Communications Chapter 24 – Computer and Network Security Techniques Ninth Edition by William Stallings Data and Computer Communications, Ninth Edition by William Stallings, (c) Pearson Education - Prentice Hall, 2011
Computer and Network Security Techniques To guard against the baneful influence exerted by strangers is therefore an elementary dictate of savage prudence. Hence before strangers are allowed to enter a district, or at least before they are permitted to mingle freely with the inhabitants, certain ceremonies are often performed by the natives of the country for the purpose of disarming the strangers of their magical powers, or of disinfecting, so to speak, the tainted atmosphere by which they are supposed to be surrounded. —The Golden Bough Sir James George Frazer —The Art of War Sun Tzu
Virtual Private Networks and IPSEC • IPSEC provides three main facilities: • an authentication-only function called the Authentication Header (AH) • combined authentication/encryption function called Encapsulating Security Payload (ESP) • key exchange functionality
Transport & Tunnel Modes • ESP supports two modes of use: • Transport • which provides protection for upper-layer protocols • typically used for end-to-end communication between two hosts • Tunnel • which provides protection to the entire IP packet • used when at least one of the two ends is a security gateway
Example of Tunnel Mode Host B Host A IPSEC Processing Needed? Outer IP Header is Stripped
Key Management IPSEC key management involves the determination and distribution of secret keys.
IPSEC and VPNs • there is a driving need for users and organizations to be able to: • secure their networks • receive traffic over the internet while still meeting the need to secure the network
Application layer security • SSL – Secure Socket Layer • general purpose service designed to provide a reliable end-to-end secure service • set of protocols that relies on TCP • could be provided as part of the underlying protocol suite and transparent to applications • can be embedded in specific packages • TLS – Transport Layer Security • RFC 2246 • basically an updated service from SSL that provides reliable end-to-end secure data transfer
SSL Record Protocol MAC= message authentification code
Change Cipher Spec Protocol(see Fig. 24.2 shown previously) Pending • the simplest of the three SSL-specific protocols • makes use of the SSL Record Protocol • consists of a single message, which consists of a single byte with the value 1 • sole purpose is to cause the pending state to be copied into the current state
Alert and Handshake Protocols (see Fig. 24.2 shown previously) • Alert Protocol (ex. Incorrect MAC) • conveys SSL related alerts to the peer entity • compressed and encrypted • Handshake Protocol • most complex part of SSL • allows server and client to authenticate • negotiates encryption and MAC algorithm as well as the keys • used before the transmission of any application data
Wi-Fi Protected Access • Wi-Fi Protected Access is also known as WPA • is the Wi-Fi standard • a set of security mechanisms created to accelerate the introduction of strong security into WLANs
WPA • Based on the IEEE 802.11i standard • addresses 3 main security areas • requires the use of an Authentication Server (AS) • PSK (pre-shared key) does not require an AS • defines a more robust authentication protocol • Supports AES with 128-bit keys and 104-bit RC4 encryption schemes
Privacy with Message Integrity • IEEE 80211i defines two schemes • both add a message integrity code (MIC) to the 802.11 MAC Frame
Intrusion Detection • RFC 2828 • Security Intrusion • a security event, or combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts to gain access to a system without having authorization to do so • Intrusion Detection • a security service that monitors and analyzes system events for the purpose of finding, and providing real-time or near-real-time warning of, attempts to access system resources in an unauthorized manner
Host-Based IDS Techniques • can detect both external and internal intrusions.
Firewalls an integral part of an organization’s defense-in-depth strategy as well as an important complement to an organization’s IDS. typically thought of as perimeter protection “defense in depth”
Firewall Characteristics • all traffic passes through the firewall • only authorized traffic is allowed to pass • the firewall itself is immune to penetration • assumes a hardened system with a secured operating system
Firewall Limitations cannot protect against attacks that bypass the firewall (i.e. a modem pool) may not fully protect against internal threats cannot guard against wireless communications between local systems on different sides of the internal firewall cannot protect against mobile devices that plug directly into the internal network
Packet Filtering Firewalls • Advantages: • its simplicity • transparent to users • very fast • Disadvantages: • cannot prevent attacks to application specific vulnerabilities • do not support advanced user authentication schemes • vulnerable to attacks that take advantage of problems within TCP/IP • susceptible to security breaches caused by improper configurations
Application-Level Gateway • also called an application proxy, acts as a relay of application-level traffic • tend to be more secure than packet filters • easy to log and audit all incoming traffic • Disadvantage: • additional processing overhead on each connection
Circuit-Level Gateway circuit-level proxy stand alone system or function performed by an application-level gateway sets up two TCP connections security function consists of determining which connections will be allowed used where the system administrator trusts the internal users
Malware Defense • Prevention is the primary goal for malware defense. However when prevention is not possible we want to: • Detect • Identify • Remove • Anti-virus software is designed to do all of the above
Anti-Virus Generic Decryption(GD) GD is technology that enables anti-virus programs to detect even the most complex polymorphic viruses.
Behavior-Blocking Software • integrates with the operating system of a host computer and monitors program behavior in real time.
6 Classes of Worm Defense Signature-based scanning & filtering Filter-based containment Payload-classification based worm containment Threshold Random Walk (TRW) scan detection Rate Limiting Rate Halting
Summary • VPNs and IPsec • transport and tunnel modes • SSL and TLS • architecture and protocol • Wi-Fi protected access • access control and privacy • Intrusion detection • Firewalls • characteristics and types • Malware Defense • worm countermeasures