Chapter 5
Chapter 5
Network Security
1
Chapter 6: Network Security
Chapter goals:
Understand principles of network security:
Cryptography and its many uses beyond
“confidentiality”.
Authentication.
Message integrity and non-repudiation.
Availability and access control.
Key distribution.
Security in practice:
Firewalls and intrusion detection systems.
Security and protocols in application, transport,
network, and link layers.
2
Chapter 6 roadmap
3
What is Network Security?
7
Security Planning, Policies, and
Mechanisms
Security policies that are developed must
ensure appropriate levels of security for the
activities performed in the network by:
Making it clear what is protected and why.
Clearly stating responsibility for providing
that protection.
Making it clear what users are allowed to do,
and what they must or must not do.
Providing grounds on how to interpret and
resolve conflicts in policies later on.
8
Security Planning, Policies, and
Mechanisms
Security mechanisms are employed to ensure
that security policies are being adequately
enforced.
Mechanisms can be based on people,
software, hardware, or other physical means
(for example, cameras, locks, cabling, and so
on).
Choosing the right mechanisms can be
difficult.
Can these mechanisms be trusted?
Determining if the mechanisms fully
9
A Security Example: Alice, Bob,
Trudy
Alice and Bob want to communicate “securely”.
Trudy (intruder) may intercept, delete, add
messages, and so on to disrupt their
communications.
Alice Bob
data, control
channel
messages
Trudy
10
Who Might Alice and Bob Be?
11
Security Threats
Q: What could Trudy do in this case?
A: Unfortunately, a lot!
interruption: somehow disrupt the service
being provided by the network to Alice and
Bob
interception: eavesdrop on communication
meant to be private or confidential
modification: tamper with information or
network resources
fabrication: counterfeit information or
network resources or services are inserted
into the network
12
Security Threats: Interruption
In an interruption attack, a network service
is made degraded or unavailable for
legitimate use.
Interruption attacks are attacks against the
availability of the network.
These attacks can take the form of:
Overloading a server host so that it cannot
respond.
Blocking access to a service by overloading an
intermediate network or network device.
Redirecting requests to invalid destinations.
Vandalizing software or hardware involved.
13
Security Threats: Interruption
Alice Bob
data, control
channel
messages
Trudy
15
Security Threats: Interception
Alice Bob
data, control
channel
messages
Trudy
16
Security Threats: Modification
In a modification attack, an unauthorized
individual not only gains access to, but
tampers with information, resources, or
services.
Modification attacks are attacks against the
integrity of the network.
These attacks can take the form of:
Modifying the contents of messages in the
network.
Changing information stored in data files.
Altering programs so they perform differently.
Reconfiguring system hardware or network
17
Security Threats: Modification
Alice Bob
data, control
channel
messages
different
data sender receive data
r
Trudy
18
Security Threats: Fabrication
In a fabrication attack, an individual inserts
counterfeit information, resources, or
services into the network.
Fabrication attacks are attacks against the
authentication, access control, and
authorization capabilities of the network.
These attacks can take the form of:
Inserting messages into the network using the
identity of another individual.
Replaying previously intercepted messages.
Spoofing a web site or other network service.
Taking the address of another host or service,
essentially becoming that host or service.
Also called “masquerading” attacks. 19
Security Threats: Fabrication
Alice
Trudy
data sender
Bob
Trudy
receive data
r
20
Security Threats: Methods of Execution
Attacks on security can be carried out using
software or hardware tools, or by some other
physical means.
Common software examples include:
Tools and toolkits: programs that automatically
probe for security weaknesses or attack systems.
Back doors and trap doors: openings (in code,
firewalls, and so on) intentionally left open to
grant access to individuals without going through
normal methods of authentication and
authorization.
Logic bombs: code embedded in software that
lies dormant until some event triggers them to 21
Security Threats: Methods of Execution
Additional common software examples:
Viruses: executable code inserted into other code
or data that is executed when the other code or
data is used, and launches an attack.
Worms: relatively independent programs that
travel from machine to machine across network
connections to carry out attacks.
Trojan horses: programs that appear to have one
function but actually perform a hidden function
that attacks the system.
Bacteria or rabbit programs: programs that do no
damage other than replicate themselves
exponentially to overwhelm network resources.
Sometimes, these can work together too.
22
Security Provisioning
How can we protect ourselves from these
attacks?
Interruption attacks:
Firewalls,
replication, backups, hardware
appliances
Interception attacks:
Encryption, traffic padding
Modification attacks:
Encryption, traffic padding, backups, messaging
techniques (checksums, sequence numbers,
digests, authentication codes)
Fabrication attacks:
Authentication and authorization, firewalls,
23
digital signatures
Security Principles To Follow
A 100% secure environment is a myth.
Expect the unexpected.
The more you know about someone else, the better
you can defend yourself from them.
The more someone knows about you, the better
they can exploit you.
Do unto yourself before someone does unto you.
Never assume that all security risks are from the
outside, and not the inside.
Never assume that your users know what they are
doing.
Security is only as good as the weakest link in the
chain. 24
Security Principles To Follow
Do not forget about the simple aspects of
physical security.
Security through obscurity doesn’t work.
26
Security Principles To Follow
Sometimes, things aren’t always black and
white. Consider the following …
The Six Dumbest Ideas in Computer
Security?
Default permit
• This makes sense … default deny is safer.
Enumerating badness
• Some people like to stop the badness by identifying it,
and then making sure you can detect it and stop it.
• The problem is there is a lot more badness than
goodness. Why not just track the goodness and allow
nothing else?
• This could solve a lot of problems, like viruses,
spyware, and so on. (Just think how anti-virus, anti-
spyware, and anti-phishing works: you download the27
Security Principles To Follow
The Six Dumbest Ideas in Computer
Security?
Penetrate and patch
• Instead of making things better by design, we are
toughening them by trial and error.
• We will never be able to get real security this way.
• But, what choice do we have at the moment?
Hacking is cool
• Like it or not, this is a common perception in the
information technology industry.
• Unfortunately, it only encourages bad behaviour and
reinforces other bad ideas, like the penetrate and patch
approach to security. (What do hackers do? Exploit
existing weaknesses in systems. Once the weakness is
patched, they moved on. If only systems were 28
Security Principles To Follow
The Six Dumbest Ideas in Computer
Security?
Educating users
• If it was going to work, it would have worked by now,
right?
• The real question to ask is not “can we educate our
users to be better at security?” it is “why do we need
to educate our users at all?”
• A well designed security system could tolerate the
most uneducated of users!
Action is better than inaction
• If you can either by an “early adopter” or a “pause and
thinker”, it is safer to be a “pause and thinker”.
• Remember: “It is often easier to not do something
dumb than it is to do something smart.” 29
Security Principles To Follow
Other dumb ideas:
We’re not a target …
• Yes, you are
Everyone would be secure if they all just ran
<security-flavour-of-the-month>
• No, switching flavours is often a bad idea
We don't need a firewall, we have good host
security
• No, you still need to secure the data packets on the
network
We don't need host security, we have a good
firewall
• No, what about internal attacks or packets past the
firewall?
Let's go production with it now and we can secure
it later on down the road 30