Network Security
Network Security
Anonymity.-: An attacker can mount an attack from thousands of miles away and never
come into direct contact with the system, its administrators, or users. The potential
attacker is thus safe behind an electronic shield.
Many points of attackboth targets and origins-:A simple computing system is a self-
contained unit. Access controls on one machine preserve the confidentiality of data on
that processor. However, when a file is stored in a network host remote from the user, the
data or the file itself may pass through many hosts to get to the user. One host's
administrator may enforce rigorous security policies, but that administrator has no control
over other hosts in the network. Thus, the user must depend on the access control
mechanisms in each of these systems. An attack can come from any host to any host, so
that a large network offers many points of vulnerability.
Sharing-:Because networks enable resource and workload sharing, more users have the
potential to access networked systems than on single computers.
Complexity of system.-: A network combines two or more possibly dissimilar operating
systems. Therefore, a network operating/control system is likely to be more complex than
an operating system for a single computing system. the ordinary desktop computer today
has greater computing power than did many office computers in the last two decades. The
attacker can use this power to advantage by causing the victim's computer to perform part
of the attack's computation. And because an average computer is so powerful, most users
do not know what their computers are really doing at any moment: What processes are
active in the background while you are playing Invaders from Mars? This complexity
diminishes confidence in the network's security.
Unknown perimeter-:A network's expandability also implies uncertainty about the
network boundary. One host may be a node on two different networks, so resources on
one network are accessible to the users of the other network as well. Although wide
accessibility is an advantage, this unknown or uncontrolled group of possibly malicious
users is a security disadvantage.
Unknown path-:illustrates that there may be many paths from one host to another.
Suppose that a user on host A1 wants to send a message to a user on host B3. That
message might be routed through hosts C or D before arriving at host B3. Host C may
provide acceptable security, but not D. Network users seldom have control over the
routing of their messages
Most reconnaissance techniques require little training and minimal investment of time. If
an attacker has targeted a particular organization, spending a little time to
collect background information yields a big payoff.
Operating System and Application Fingerprinting-:The port scan supplies the attacker
with very specific information. For instance, an attacker can use one to find out
that port 80 is open and supports HTTP, the protocol for transmitting web
pages. But the attacker is likely to have many related questions, such as which
commercial server application is running, what version, and what the
underlying operating system and version are. Once armed with this additional
information, the attacker can consult a list of specific software's known
vulnerabilities to determine which particular weaknesses to try to exploit.
Bulletin Boards and Chats-:The Internet is probably the greatest tool for sharing
knowledge. probably also the most dangerous tool for sharing knowledge.
Numerous underground bulletin boards and chat rooms support exchange of information.
Attackers can post their latest exploits and techniques, read what others have
done, and search for additional information on systems, applications, or sites.
Remember that, as with everything on the Internet, anyone can post anything,
so there is no guarantee that the information is reliable or accurate. And you
never know who is reading from the Internet.
A network has many different vulnerabilities, but all derive from an underlying model of
computer, communications, and information systems security. Threats are raised against
the key aspects of security: confidentiality, integrity, and availability, as shown in Table
Target Vulnerability
Target Vulnerability
Social engineering
Reconnaissance
Authentication Impersonation
failures
Guessing
Eavesdropping
Spoofing
Session hijacking
Man-in-the-middle attack
Addressing errors
Server-side include
Cookie
Eavesdropping
Table ---- Network Vulnerabilities.
Target Vulnerability
Passive wiretap
Misdelivery
Cookie
Active wiretap
Impersonation
Falsification of message
Noise
DNS attack
DNS attack
Traffic redirection
inserting communications
impersonating a user
Listing the following activities which can be segmented to avoid damage ,corruption .
Single Points of Failure-:The architecture should at least make sure that the system
tolerates failure in an acceptable way (such as slowing down but not stopping
processing, or recovering and restarting incomplete transactions).
single points of failure that is we should ask if there is a single point in the network
that, if it were to fail, could deny access to all or a significant part of the
network. Good network design eliminates single points of failure. Distributing
the databaseplacing copies of it on different network segments, perhaps even
in different physical locationscan reduce the risk of serious harm from a
failure at any one point.
Link encryption is invisible to the user. The encryption becomes a transmission service
performed by a low-level network protocol layer, just like message routing or
transmission error detection.
Virtual Private Networks-:Link encryption can be used to give a network's users the
sense that they are on a private network, even when it is part of a public network.
Typically, physical security and administrative security are strong enough to protect
transmission inside the perimeter of a network. Thus, the greatest exposure for a user is
between the user's workstation or client and the perimeter of the host network or server
Many firewalls can be used to implement a VPN. When a user first establishes a
communication with the firewall, the user can request a VPN session with the firewall.
The user's client and the firewall negotiate a session encryption key, and the firewall and
the client subsequently use that key to encrypt all traffic between the two. In this way, the
larger network is restricted only to those given special access by the VPN. In other words,
it feels to the user that the network is private, even though it is not. With the VPN, we say
that the communication passes through an encrypted tunnel or tunnel.
Virtual private networks are created when the firewall interacts with an authentication
service inside the perimeter. The firewall may pass user authentication data to the
authentication server and, upon confirmation of the authenticated identity, the firewall
provides the user with appropriate security privileges. As shown in the following fig
PKI and Certificates-:public key infrastructure, or PKI, is a process created to enable
users to implement public key cryptography, usually in a large (and frequently,
distributed) setting. PKI offers each user a set of services, related to identification and
access control the following list is provided.
invalidate certificates for users who no longer are allowed access or whose private
key has been exposed
PKI is often considered to be a standard, but in fact it is a set of policies, products, and
procedures that leave some room for interpretation. The policies define the rules under
which the cryptographic systems should operate.
PKI sets up entities, called certificate authorities, that implement the PKI policy on
certificates.
SSH Encryption-:SSH (secure shell) is a pair of protocols (versions 1 and 2), originally
defined for Unix but also available under Windows 2000, that provides an authenticated
and encrypted path to the shell or operating system command interpreter. Both SSH
versions replace Unix utilities such as Telnet, rlogin, and rsh for remote access. SSH
protects against spoofing attacks and modification of data in communication.
The SSH protocol involves negotiation between local and remote sites for encryption
algorithm (for example, DES, IDEA, AES) and authentication (including public key and
Kerberos).
SSL Encryption-:The SSL (Secure Sockets Layer) protocol was originally designed by
Netscape to protect communication between a web browser and server. It is also known
now as TLS, for transport layer security. SSL interfaces between applications (such as
browsers) and the TCP/IP protocols to provide server authentication, optional client
authentication, and an encrypted communications channel between client and server.
Client and server negotiate a mutually supported suite of encryption for session
encryption and hashing. To use SSL, the client requests an SSL session. The server
responds with its public key certificate so that the client can determine the authenticity of
the server. The client returns part of a symmetric session key encrypted under the server's
public key. Both the server and client compute the session key, and then they switch to
encrypted communication, using the shared session key.
The basis of IPSec is what is called a security association, which is essentially the set of
security parameters for a secured communication channel. It is roughly comparable to an
SSL session. A security association includes
encryption algorithm and mode (for example, DES in block chaining mode)
encryption key
Signed Code-:As we have seen, someone can place malicious active code on a web site
to be downloaded by unsuspecting users. Running with the privilege of
whoever downloads it, such active code can do serious damage, from deleting
files to sending e-mail messages to fetching Trojan horses to performing subtle
and hard-to-detect mischief. Today's trend is to allow applications and updates
to be downloaded from central sites, so the risk of downloading something
malicious is growing.
Encrypted E-Mail-:No one can change encrypted data in a meaningful way without
breaking the encryption. An electronic mail message is much like the back of a
post card. The mail carrier (and everyone in the postal system through whose
hands the card passes) can read not just the address but also everything in the
message field. To protect the privacy of the message and routing information,
we can use encryption to protect the confidentiality of the message and perhaps
its integrity.
Error Correcting Codes-:We can use error detection and error correction codes to
guard against modification in a transmission. The codes work as their names
imply: Error detection codes detect when an error has occurred, and error
correction codes can actually correct errors without requiring retransmission of
the original message. The error code is transmitted along with the original data,
so the recipient can recompute the error code and check whether the received
result matches the expected value.
A and B can establish a private channel by one of them choosing an encryption key (for a
secret key algorithm) and sending it to the other in the authenticating message. Once the
authentication is complete, all communication under that secret key can be assumed to be
as secure as was the original dual public key exchange. To protect the privacy of the
channel
The first step in using Kerberos is to establish a session with the Kerberos server, as
shown in Figure . A user's workstation sends the user's identity to the Kerberos server
when a user logs in. The Kerberos server verifies that the user is authorized. The
Kerberos server sends two messages:
Limited period of validity. Each ticket is issued for a limited time period; the
ticket contains a timestamp with which a receiving server will determine the
ticket's validity. In this way, certain long-term attacks, such as brute force
cryptanalysis, will usually be neutralized because the attacker will not have time
to complete the attack.
ACLs on Routers-:Routers perform the major task of directing network traffic either to
subnetworks they control or to other routers for subsequent delivery to other
subnetworks. Routers convert external IP addresses into internal MAC addresses of hosts
on a local subnetwork.
Suppose a host is being spammed (flooded) with packets from a malicious rogue host.
Routers can be configured with access control lists to deny access to particular hosts from
particular hosts. So, a router could delete all packets with a source address of the rogue
host and a destination address of the target host
Alarms and Alerts-:The logical view of network protection looks like Figure , in which
both a router and a firewall provide layers of protection for the internal network as shown
in figure.
An intrusion detection system is a device that is placed inside a protected network to
monitor what occurs within the network. If an attacker is able to pass through the router
and pass through the firewall, an intrusion detection system offers the opportunity to
detect the attack at the beginning, in progress, or after it has occurred. Intrusion detection
systems activate an alarm, which can take defensive action
Honeypots-:How do you catch a mouse? You set a trap with bait (food the mouse finds
attractive) and catch the mouse after it is lured into the trap. You can catch a computer
attacker the same way. attracting and monitoring the actions of an attacker
to watch what attackers do, in order to learn about new attacks (so that you can
strengthen your defenses against these new attacks)
to lure an attacker to a place in which you may be able to learn enough to identify
and stop the attacker
to provide an attractive but diversionary playground, hoping that the attacker will
leave your real system alone
Traffic Flow Security-:A more sophisticated approach to traffic flow security is called
onion routing . Consider a message that is covered in multiple layers, like the layers of an
onion. A wants to send a message to B but doesn't want anyone in or intercepting traffic
on the network to know A is communicating with B. So A takes the message to B, wraps
it in a package for D to send to B. Then, A wraps that package in another package for C to
send to D. Finally, A sends this package to C. This process is shown in Figure . The
internal wrappings are all encrypted under a key appropriate for the intermediate recipient
Receiving the package, C knows it came from A, although C does not know if A is the
originator or an intermediate point. C then unwraps the outer layer and sees it should be
sent to D. At this point, C cannot know if D is the final recipient or merely an
intermediary. C sends the message to D, who unwraps the next layer. D knows neither
where the package originally came from nor where its final destination is. D forwards the
package to B, its ultimate recipient. With this scheme, any intermediate recipientsthose
other than the original sender and ultimate receiverknow neither where the package
originated nor where it will end up. This scheme provides confidentiality of content,
source, destination, and routing
Firewalls
firewall is a device that filters all traffic between a protected or "inside" network and a
less trustworthy or "outside" network. Usually a firewall runs on a dedicated
device; because it is a single point through which traffic is channeled,
performance is important, which means nonfirewall functions should not be
done on the same machine. Because a firewall is executable code, the attacker
could compromise that code and execute from the firewall's device. Thus, the
fewer pieces of code on the device, the fewer tools the attacker would have by
compromising the firewall. Firewall code usually runs on a proprietary or
carefully minimized operating system. The purpose of a firewall is to keep
"bad" things outside a protected environment. To accomplish that, firewalls
implement a security policy that is specifically designed to address what bad
things might happen.
application proxies
guards
personal firewalls
One classic approach used by attackers is breaking an attack into multiple packets by
forcing some packets to have very short lengths so that a firewall will not be able to
detect the signature of an attack split across two or more packets. (Remember that with
the TCP protocols, packets can arrive in any order, and the protocol suite is responsible
for reassembling the packet stream in proper order before passing it along to the
application.) A stateful inspection firewall would track the sequence of packets and
conditions from one packet to another to thwart such an attack.
Sees only Can see either Sees full data Sees full text of Can see full data
addresses and addresses or data portion of communication portion of packet
service protocol packet
type
Secure E-Mail