530 likes | 674 Views
An Overview of Computer and Network Security. CS535, TE/CS 536 Network Security Spring 2005 – Lecture 2. A Motivating Example. Requirements of an e-Commerce site Performance # of current transactions Usability Easy to follow GUIs, convenience Security
E N D
An Overview of Computer and Network Security CS535, TE/CS 536 Network Security Spring 2005 – Lecture 2
A Motivating Example • Requirements of an e-Commerce site • Performance • # of current transactions • Usability • Easy to follow GUIs, convenience • Security • Secure transmission and storage of customer financial/personal data • Protect the Web servers and the enterprise network from illegitimate access • Provide continuous/uninterrupted services
OSI of ISO Internet Stack Application Presentation Application Layer Session Transport Transport Network Internet Data Link Data Link Physical Physical The Internet
Protocols • Application layer • HTTP, FTP, Telnet, SMTP, DNS • Transport layer • TCP, UDP • Internetworking layer • IP, ICMP, ARP, RARP • Network interface (data link) layer • Ethernet, PPP • Physical layer
Layered Store-and-forward User A User B Application Transport Network Link
Problems in implementing security • Vulnerabilities arise from– • weak design (of system or protocols) • compromised entity • Heterogeneous networking technologies add to security complexity • Higher-speed communication puts more information at risk in given time period
The Definition • Security the possibility of successful yet undetected theft, tampering, and disruption of information and services is kept low or tolerable
Basic Security Services • Authentication assurance that the communicating entity genuine • Data Confidentiality protection of data from unauthorized access • Data Integrity trustworthiness of data or resources (no modification or replay) • Availability ability to use the information or resource upon demand by an authorized entity • Non-repudiation protection against denial by sending or receiving entities of having communication
Security Threats and Attacks • A threat is a potential violation of security. • Flaws in design, implementation, and operation. • An attack is any action that violates security. • An adversary • Passive and active attacks
Eavesdropping - Message Interception (Attack on Confidentiality) • Unauthorized access to information • Packet sniffers and wiretappers • Illicit copying of files and programs R S Eavesdropper
Integrity Attack - Tampering With Messages • Stop the flow of the message • Delay and optionally modify the message • Release the message again (replay) R S Perpetrator
Authenticity Attack - Fabrication • Unauthorized assumption of other’s identity • Generate and distribute objects under this identity R S Masquerader: from S
R S Attack on Availability • Destroy hardware (cutting fiber) or software • Modify software in a subtle way • Corrupt packets in transit • Blatant denial of service (DoS): • Crashing the server • Overwhelm the server (use up its resource)
Impact of Attacks • Theft of confidential information • Unauthorized use of • Network bandwidth • Computing resource • Spread of false information • Disruption of legitimate services All attacks can be related and are dangerous!
Close-knit Attack Family Active Attacks Passive attacks re-target jam/cut it sniff for content capture & modify re-target traffic analysis - who is talking pretend
Security Models of organizations • No security or security through obscurity • Host security • Application level • Problem: many hosts • Network security • Control access to hosts and services Organizations can be Targets of opportunity (TOO) or Targets of choice (TOC)
Security Policy and Mechanisms • Policy: a statement of what is/is not allowed. • Mechanism: a procedure, tool, or method of enforcing a policy. Implements functions that help prevent, detect, and respond to recovery from security attacks. • Security functions are typically made available to users as a set of security servicesthrough APIs or integrated interfaces.
Parameters of security policy(Operational Issues) • Cost-Benefit Analysis • Risk Analysis • Laws and Custom • People issues: e.g. change password every month? • Security architecture ; e.g. a layered approach.
Security Threats and Vulnerabilities TE/CS 536 Network Security Dr. Haroon Atique Babri, UMT Spring 2005 – Lecture 3 Adapted from Dr. Wenke Lee, Georgia Tech
The Security Life-Cycle • Threats • Policy • Specification • Design • Implementation • Operation and Maintenance
Taxonomy of Threats • Viruses and Worms • Web features, e.g. cookies (see text) • IP layer attacks • TCP layer attacks
Viruses • A small piece of software that attaches itself to a program (e.g. a spreadsheet) or document. • Each time the program runs, the virus runs. • When a virus runs, it looks for other any executable files in any directory and infects them and/or does something bad.
Virus – what does it look like Start of original code … X-1 X jump to Y X+1 … end of original code … Y first statement of virus code … statement X in original code Y+n jump to X+1
The Rise of Viruses • The spread of PCs in late 1980s • Use of modem accessible computer bulletin boards to down load programs (or Trojan horses), e.g. games, spreadsheets. • Floppy disks
Types of Viruses • Executable • Infection phase: (1)Designed to get executed first when the host program runs. (2) Looks into memory, and if it finds another program on the disk, it adds its code to it. (3) The virus then launches the host program • Attack phase: activated by some sort of trigger, e.g. date, does something bad.
Types of Viruses • Boot sector viruses • Boot sector is a small program that tells the computer how to load the rest of OS. • Transmitted through floppies • Good news: Huge sizes of today’s programs require CDs + Today’s OS protect the boot sector. • Bad news: with CD-RW becoming common, viruses now can spread across CDs
E-mail Viruses • Moves around in e-mail messages, replicate by automatically mailing itself to people in the victim’s e-mail address book. • Melissa (3/99): spread as a Word doc uploaded to an Internet newsgroup. • ILOVEYOU (5/00): code as an attachment; double clicking allowed it to execute; took advantage of VBA built in Microsoft Word.
Worms • A small piece of software that normally uses computer networks and security holes to replicate itself. • A copy of the worm scans the network for another machine that has a specific security hole, e.g. buffer overflow. • It copies itself to the new machine using the security hole and …
Worm – how it spreads (1) • Log into another machine by guessing passwords. • Account name/passwords might be stored in script files to allow a naïve user to access remote resources remotely.
Worm – how it spreads (2) • A copy of the worm scans the network for another machine that has a specific security hole, e.g. buffer overflow. • It copies itself to the new machine using the security hole and …
Famous Worms • Code Red: each copy scanned the Internet for Win NT or Win 2000 servers without the MS security patch installed, and copied itself to the server. Code Red was designed to do 3 things: • Replicate itself for first 20 days of each month • Replace Web pages on servers with a page: “Hacked by Chinese” • Launch attack on www.whitehouse.gov • Slammer: see handout
What to do • Virus checkers • check all files for the instruction sequences of known viruses • Polymorphic virus: changes order of instructions, or changes to functionally similar instructions each time it copies itself. • Take a snapshot of disk storage by recording file lengths or taking message digests of files • Virus can compress the program and then add itself to maintain original length.
What to do • Use security features provided by a language • Java sandbox • MS security patches ?
IP packet attacks (1) • Packet sniffing or snooping • Prevention: data encryption • link to link • source to destination.
IP Packet Attacks (2) - • IP Spoofing • A common first step to many threats. • Source IP address cannot be trusted! SRC: source DST: destination IP Header IP Payload SRC: 128.59.10.8 DST: 130.207.7.237 Is it really from Columbia University?
From: XYZ Lahore To: ABC Sialkot Similar to Mail (or E-mail) Mail maybe better in the sense that there is a stamp put on the envelope at the location (e.g., town) of collection...
Most Routers Only Care About Destination Address src:128.59.10.8 dst:130.207.7.237 128.59.10.xx Rtr Columbia 130.207.xx.xx Rtr Georgia Tech 36.190.0.xx Rtr src:128.59.10.8 dst:130.207.7.237 Stanford
IP Attacks (3) • Attack packets with spoofed IP address help hide the attacking source. • A smurfattack launched with your host IP address could bring your host and network to their knees. • Higher protocol layers (e.g., TCP) help to protect applications from direct harm, but not enough.
Current IPv4 Infrastructure • No authentication for the source • Various approaches exist to address the problem: • Router/firewall filtering • TCP handshake
Router Filtering • Decide whether this packet, with certain source IP address, should come from this side of network. • Not standard - local policy. Hey, you shouldn’t be here! Rtr 36.190.0.xx src:128.59.10.8 dst:130.207.7.237 Stanford
Router Filtering • Very effective for some networks (ISP should always do that!) • At least be sure that this packet is from some particular subnet • Problems: • Hard to handle frequent add/delete hosts/subnets or mobileIP • Upsets customers should legitimate packets get discarded • Need to trust other routers
TCP Handshake server client SYN seq=x SYN seq=y, ACK x+1 ACK y+1 connection established
TCP Handshake seq=y, ACK x+1 128.59.10.xx Rtr Columbia 130.207.xx.xx Rtr Georgia Tech 36.190.0.xx Rtr x The handshake prevents the attacker from establishing a TCP connection pretending to be 128.59.10.8 src:128.59.10.8 dst:130.207.7.237 Stanford
TCP Handshake • Very effective for stopping most such attacks but vulnerable • Problems: • The attacker can succeed if “y” can be predicted • Other DoS attacks are still possible (e.g., TCP SYN-flood)
IP Spoofing & SYN Flood • IP spoofing: X sends SYN message to victim R using S’s IP • R sends an acknowledgment (SYN-ACK) to client S but does not received the ACK message (half-open connection). • Half-open connections data structure on the victim server R eventually fills. R unable to accept new connections until the table is emptied out. • Normally a timeout for half-open connections allows R to recover. However, X can continue sending IP-spoofed packets requesting new connections faster than R can expire the pending connections.
icmp echo request icmp echo reply icmp echo request to a broadcast address: from victim attacker icmp echo request from all hosts to victim victim ping smurf
Smurf Attack • Generate ping stream (ICMP echo request) to a network broadcast address with a spoofedsource IP set to a victim host • Every host on the ping target network will generate a ping reply (ICMP echo reply) stream, all towards the victim host • Amplified ping reply stream can easily overwhelm the victim’s network connection