CNS 4,5,6
CNS 4,5,6
Network Security-II
IPSec Architecture
IP Security is a mechanism, which includes various components how they interact with each other the
protocols in the IPSec family and the modes these operation
Three components
1. IPSec Document
2. IPSec Services
3. Security Association
IPSec Documents
IPSec can be defined by using a number of documents. These feature are mandatory for the next
generation IPV6 and optional for IPV4.
The head that is used for encryption is called the authentication header (AH) that for encryption is called
the ESP header.
IPSec Service:
IPSec provides security service at the network layer by enabling a system to select the required security
protocol. IPSec architecture makes use of two major protocols (ESP & AH Protocol)
IPSec Services:
Integrity
Access control
Confidentiality
Authentication
Security Association is one way relationship between a sender and a receiver security association is a
complex connection. That affords security service to the traffic carried sender and receiver work only one
direction at a time. So two security associations are needed for a bidirectional communication one for
each direction.
3 Essential parameters of SA
The authentication header is a protocol and a port of IP Sec suite which authenticaites the origin
of IP Packet data grams and generates the integrity of data. It aim is to provide support for
integrity and authentication of IP Packets. It also used to present the IP Spoofing
ESP Stands for Encapsulating security payload. Encrypt and authenticate each packet. Encrypt is
applies to packet payload.Authentication is applied to data in the IP Sec header as well as the
data contained as payload after encryption is applied. Provides message content confidentiality &
limited traffic flow confidentiality can optionally provide the same authentication services as AH
supports range of ciphers, modes, padding
Audit record is used to record information about the action of users. In information or
communications security, information audit means a chronological record of system activities to
enable the reconstruction and examination of the sequence of events and/or changes in an event.
IP Spoofing
A technique used to gain unauthorized access to computer where by the intruder sender message
to a computer with an IP address indicating that the message is coming from a trusted host. To
engage in IP Spoofing a hacker must first use a variety of technique to find an IP Address of a
trusted host and then modify the packet headers so that it appear that the packets are coming
from that host
HIDS
HIDS stands for Host based Intrusion detection system. HIDS is monitor a computer system a
which it is installed to detect on intrusion and/or misuse and responds by lagging the activity and
notifying the designed authority. Monitoring dynamic behavior
Monitoring state
Technique
Providing the HIPDS
Tunnel Mode:
Used when one or both ends of a security association (SA) are a security gateway.
defines procedures and packet formats to establish, negotiate, modify, & delete SAs