Network Security Lectures
Network Security Lectures
ON
NETWORK SECURITY
POSSIBLE ATTACKS ON COMPUTERS
INTRODUCTION:
➢ Computer data often travels from one computer to another, leaving the safety of its
protected physical surroundings.
➢ Once the data is out of hand, people with bad intention could modify or forge your data,
either for enjoyment or for their own benefit.
➢ Cryptography can reformat and transform our data, making it safer on its trip between
computers.
➢ The technology is based on the secret codes, modern mathematics that protects our data
in powerful ways.
➢ Computer Security - generic name for the collection of tools designed to protect data
and to prevent hackers.
➢ Network Security - measures to protect data during their transmission.
➢ Internet Security - measures to protect data during their transmission over a collection
of interconnected networks.
Computer security basically is the protection of computer systems and information from harm,
theft, and unauthorized use. It is the process of preventing and detecting unauthorized use of
your computer system. Cyber security is defined as protecting computer systems, which
communicate over the computer networks.
➢ Security attack – Any action that compromises the security of information owned by an
organization.
➢ Security mechanism – A mechanism that is designed to detect, prevent or recover from a
security attack.
➢ Security service – A service that enhances the security of the data processing systems and
1
the information transfers of an organization. The services are intended to counter security
attacks and they make use of one or more security mechanisms to provide the service.
➢ Security mechanisms have been defined by ITU-T (X 800). They used to implement
security services. Some of the security mechanisms defined by ITU-T (X 800) are shown
in the figure.
Encipherment: This refers to the transformation of the message or data with the help of
mathematical algorithms. The main aim of this mechanism is to provide confidentiality.
The two techniques that are used for encipherment are cryptography and steganography.
Data integrity: This refers to the method of ensuring the integrity of data. For this, the
sender computes a check value by applying some process over the data being sent, and
then appends this value to the data. On receiving the data, the receiver again computes the
check value by applying the same process over the received data. If the newly computed
check value is same as the received one, then it means that the integrity of data is
preserved.
Digital signature: This refers to the method of electronic signing of data by the sender
and electronic verification of the signature by the receiver. It provides information about
the author, date and time of the signature, so that the receiver can prove the sender's
identity.
Authentication exchange: This refers to the exchange of some information between two
communicating parties to prove their identity to each other.
Traffic padding: This refers to the insertion of extra bits into the stream of data traffic to
prevent traffic analysis attempts by attackers.
2
Routing control: This refers to the selection of a physically secured route for data
transfer. It also allows changing of route if there is any possibility of eavesdropping on a
certain route.
Notarization: This refers to the selection of a trusted third party for ensuring secure
communication between two communicating parties.
Access control: It refers to the methods used to ensure that a user has the right to access
the data or resource.
➢ The principle of confidentiality specifies that only the sender and the intended
recipient(s) should be able to access the contents of a message.
➢ Confidentiality gets compromised if an unauthorized person is able to access a
message.
➢ Unauthorized party could be a person, a program or a computer.
➢ Example: Suppose a confidential email message sent by user A to user B, which is
accessed by user C without the permission or knowledge of A and B. This type of
attack is called interception.
➢ Interception causes loss of message confidentiality.
Authentication
➢ Authentication mechanism helps to establish proof of identities.
➢ The authentication process ensures that the origin of a electronic message or
document is correctly identified. This concept is shown in figure.
➢ Fabrication is possible in absence of proper authentication mechanisms.
3
Integrity
➢ When the contents of a message are changed after the sender sends it, but before it
reaches the intended recipient, we say that the integrity of the message is lost. It is
shown in figure.
➢ For example, consider that user A sends message to user B. User C tampers with a
message originally sent by user A, which is actually meant for user B. User C
change its contents and send the changed message to user B. User B has no way of
knowing that the contents of the message changed after user A had sent it. User A
also does not know about this change. This type of attack is called modification.
➢ Modification causes of loss of message integrity.
Non repudiation
Requires that neither the sender nor the receiver of a message be able to deny the
transmission.
Access control:
Access control determines and controls who can access what. It regulates which user has access
to the resource, under what circumstances.
Availability:
➢ The principle of availability is that resources should be available to authorized
parties at all times.
➢ For example, due to the intentional actions of an unauthorized user C, an authorized
user A may not be able to contact a server B. This would defeat the principle of
availability. Such an attack is called interruption.
➢ Interruption causes loss of availability.
4
TYPES OF SECURITY ATTACK:
There are two types of attacks.
1. Active attacks
2. Passive attacks
Active attacks
An active attack is an attempt to alter system resources or affect their operation.
I.e., these attacks involve in some modification to the original message in some manner or the
creation of a false stream.
These attacks can be classified in to four categories:
Masquerade:
One entity pretends to be a different entity.
It is generally done by using stolen IDs and passwords or through bypassing authentication
mechanism.
5
Replay:
This attack involves capturing a copy of the message sent by the original sender and
retransmitting it later to bring an unauthorized result.
Modification of messages:
➢ Some portion of message is altered or the messages are delayed or recorded, to produce
an unauthorized effect.
➢ For example, a message meaning "Allow John Smith to read confidential file accounts" is
modified to mean "Allow Fred Brown to read confidential file accounts."
Denial of service:
6
Passive Attacks:
➢ Passive attacks are those where the attacker indulges in eavesdropping or
monitoring of data transmission.
➢ Passive attacks do not involve any modifications to the contents of an original
message. There are two types of passive attacks.
1. Release of message contents and
2. Traffic analysis.
Release of message contents:
➢ The release of message contents is a type of attack that analyzes and read the
message delivered between senders to receiver.
➢ A telephone conversation, an electronic mail message, or a transferred file may
contain sensitive or confidential information.
➢ We would like to prevent an opponent from getting the contents of these transmissions.
Traffic analysis.
➢ The attacker simply listens to the network communication to perform traffic
analysis to determine the location of key nodes, the routing structure, and even
application behavior patterns.
➢ In this type of attack, an intruder observes the frequency and length of msg.
being exchanged between communicating nodes.
➢ Attacker can then use this information for guessing the nature of communication
that was taking place.
Passive attacks are very difficult to detect because they do not involve any alteration of the
data. Typically, the messages are sent and received in normal fashion. Neither the sender
nor receiver is aware that a third party has read the messages or observed the traffic
7
pattern. However, message encryption is a simple solution to prevent passive attacks.
Thus, the emphasis in dealing with passive attacks is on prevention rather than detection.
Also known as the OSI reference model, it divides the technologies used in networks into seven parts, also
called layers. You may have heard people say something like, “That’s a Layer 3 problem.” They are referring
to the third layer in this model. The seven layers of the OSI reference model, starting from the lowest layer,
are:
1. Physical layer
2. Data Link layer
3. Network layer
4. Transport Layer
5. Session
6. Presentation Layer
7. Application
The TCP/IP model, like the OSI reference model, separates technologies into layers. However, the TCP/IP
model only uses 4 layers. Depending on the source, you may also find this model referred to as the TCP/IP
stack or the Internet protocol suite. The layers for the TCP/IP model are:
1. Connection
2. Internet
3. Transport
4. Application
The TCP/IP model was developed before the OSI Model, so by the time the OSI model was finished, the
TCP/IP model had already gained traction and acceptance from different organizations like the Department of
Defense and IBM.
The TCP/IP model became the standard for modern networks and is the model that we all use now on the
modern Internet. But the OSI model was used to influence the improvement of the TCP/IP model and is still
used for academic purposes and as a reference model.
The OSI model is so prevalent, that in the IT field when we refer to a layer with a number, like Layer 7, we are
referring to the OSI Model and not the TCP/IP model.
But both models, in general terms, are not that different. This is how they compare to each other.
8
The first two layers on the OSI model (Physical and Data Link) are equivalent to the Link Layer on the TCP/IP
Stack. The 3rd layer (Network Layer) is equivalent to the Internet Layer, the Transport layer stays the same,
and the last three layers (Session, Presentation and Application) are merged into one single layer called
Application.
Since this is a Networking Fundamentals course, we will be covering from layer 1 to 4, on the OSI model. As
the TCP/IP stack shows, the last 3 layers are considered the Application layer, so we will only briefly mention
those last 3 layers in this course, and will instead focus most of our time on the first 4.
9
10
Firewall:
Firewalls can be used to protect a local system or network of systems (Internal
Network) from Out-side networks (Internet) from security threats.
➢ Special type of router.
➢ Frequently used to prevent unauthorized internet users from accessing private
networks connected to the internet, especially intranets.
➢ Controls transmission between internal and external networks. i.e. All
messages entering or leaving the intranet pass through the firewall, which
examines each message and blocks those that do not meet the specified
security criteria.
➢ It is essentially a barrier between two networks that evaluates all incoming or
outgoing traffic to determine whether or not it should be permitted to pass to
the other network. i.e. decides what to allow/disallow.
➢ Can be implemented in both hardware and software, or a combination of both.
➢ At broad level, there are two kind of attacks:
• Most corporations have large amounts of valuable and confidential
data in their networks. Leaking of this critical information to
competitors can be a great setback.
• Apart from the danger of the insider information leaking out, there is a
great danger of the outside elements (such as viruses and worms)
entering a corporate network to create disaster.
11
Firewall characteristics/ Design Goals of Firewalls:
A firewall is defined as collection of components placed between two networks that
collectively have Following characteristics:
All traffic from inside to outside, and vice versa, must pass through the firewall.
This is achieved by physically blocking all access to the local network except via the
firewall. Only authorized traffic, as defined by the local security policy, will be allowed to
pass.
Limitations of Firewalls:
➢ Firewall match the network traffic against the rule set defined in its table. Once the
rule is matched, associate action is applied to the network traffic.
➢ For example, Rules are defined as any employee from HR department cannot access
the data from code server and at the same time another rule is defined like system
administrator can access the data from both HR and technical department.
➢ Rules can be defined on the firewall based on the necessity and security policies of
the organization.
From the perspective of a server, network traffic can be either outgoing or incoming.
Firewall maintains a distinct set of rules for both the cases. Mostly the outgoing
traffic, originated from the server itself, allowed to pass.
➢ Still, setting a rule on outgoing traffic is always better in order to achieve more
security and prevent unwanted communication.
➢ Incoming traffic is treated differently. Most traffic which reaches on the firewall is
one of these three major Transport Layer protocols- TCP, UDP or ICMP. All these
12
types have a source address and destination address. Also, TCP and UDP have port
numbers. ICMP uses type code instead of port number which identifies purpose of that
packet.
Types of Firewall
Firewalls are generally of two types: Host-based and Network-based.
1. Host- based Firewalls : Host-based firewall is installed on each network node which
controls each incoming and outgoing packet. It is a software application or suite of applications,
comes as a part of the operating system. Host-based firewalls are needed because network
firewalls cannot provide protection inside a trusted network. Host firewall protects each host
from attacks and unauthorized access.
2. Network-based Firewalls: Network firewall function on network level. In other words, these
firewalls filter all incoming and outgoing traffic across the network. It protects the internal network
by filtering the traffic using rules defined on the firewall. A Network firewall might have two or
more network interface cards (NICs). A network-based firewall is usually a dedicated system with
proprietary software installed.
CRYPTOGRAPHY CONCEPTS
CRYPTOGRAPHY TECHNIQUES
From the beginning any era, human being has two natural needs:
To communicate and share information and
To communicate selectively.
These two needs gave rise to the art of coding the messages in such a way that only the intended
people could have access to the information. Unauthorized people could not extract any
information.
The word “cryptography‟ is the combination of two Greek words, “Krypto” meaning hidden or
secret and “graphene” meaning writing.
Cryptography: It is the art of achieving security by encoding messages to make them non-
readable format.
It is a method of protecting information and communications through the use of codes, so that
only those for whom the information is intended can read and process it.
Cryptanalysis:
Substitution-cipher technique:
In the substitution-cipher technique, the each characters of a plain-text message are
replaced byother characters, numbers or symbols.
ABCDEFGHIJKLMNOPQRSTUVYZ
DEFGHIJKLMNOPQRSTUVWXYZC
14
PT: KIIT
CT: NLLW
Mono-alphabetic Cipher
➢ A monoalphabetic cipher is a substitution cipher where a symbol in the plaintext
has a one-to-one relationship with a symbol in the ciphertext.
➢ It means that a symbol in the plaintext is always replaced with the same
symbol in theciphertext, irrespective of its position in the plaintext.
➢ It uses random substitution.
➢ This means that in a given plain-text message, each A can be replaced by any other
alphabet(B through Z), each B can also be replaced by any other random alphabet (A
or C through Z), and so on. The crucial difference being, there is no relation between
the replacement ofB and replacement of A. That is, if we have decided to replace each
A with D, we need notnecessarily replace each B with E—we can replace each B with
any other character!
Playfair Cipher:
➢ The Playfair cipher scheme was invented in 1854 by Charles Wheatstone but was named
after Lord Playfair who promoted the use of the cipher. In playfair cipher unlike
traditional cipher we encrypt a pair of alphabets(digraphs) instead of a single alphabet.
➢ It was used for tactical purposes by British forces in the Second Boer War and in World
War I and for the same purpose by the Australians during World War II. This was
because Playfair is reasonably fast to use and requires no special equipment.
The Playfair encryption scheme uses two main processes.
> Creation and population of matrix
> Encryption process
Step 1: Creation and Population of Matrix
• The Playfair cipher makes use of a 5
x 5 matrix (table), which is used to
store a keyword or phrase that
becomes the key for encryption and
decryption.
• The way this is entered into the 5 x 5
matrix is based on some simple rules:
1. Enter the keyword in the matrix row-wise: left-to-right, and then top-to-bottom.
2. Drop duplicate letters.
3. Fill the remaining spaces in the matrix with the rest of the English alphabets (A-Z)
that werenot a part of our keyword. While doing so, combine I and J in the same cell of
the table.
In other words, if I or J is a part of the keyword, disregard both I and J while filling the
remainingslots.
5. If the alphabets of the pair appear in same column of the matrix, then substitute
them withtheir immediate below alphabets. If the letter of the plain text is itself
below, then wrap it up with the top letter of the column it happens.
6. If the alphabets of the pair are not in same row or column then define a rectangle
with theoriginal pair and substitute them with other corners of the rectangle.
Example
Hill Cipher
The Hill cipher works on multiple letters at the same time.
17
Lester Hill invented this in 1929. The Hill cipher uses the matrix theory of mathematics.
Working:
• Treat each letter with a number like A=0, B=1, C=2…… Z=25.
• Let us say, our original message is “TAJ”
• As per the rule, T=19 A=0 J=9
Now multiply the plain text matrix with any number as keys. The multiplying matrix
should beof n x n where n is the number of rows of original matrix
Now compute mod 26 on resultant matrix i.e. take the remainder after dividing by 26.
Example:
Now let’s decide on an order for the column as 4, 1, 3 and 2 and now we will read the text in
column-wise.
Cipher-text: LHIEEIUESSCEPWMNDLAO
B. Columnar Technique with multiple rounds
In this method, we again change the chipper text we received from a Basic technique that is in
round 1 and again follows the same procedure for the cipher-text from round 1.
Algorithm:
1. In a rectangle of pre-defined size, write the plain-text message row by row.
2. Read the plain message in random order in a column-wise fashion. It can be any order
such as 2, 1, 3 etc.
3. Thus, Cipher-text of round 1 is obtained.
4. Repeat from step 1 to 3.
Example:
Original message: "INCLUDEHELP IS AWESOME".
Now we apply the above algorithm and create the rectangle of 4 column (we decide to make a
rectangle with four column it can be any number.)
19
Now let’s decide on an order for the column as 4, 1, 3 and 2 and now we will read the text in
column-wise.
Cipher-text of round 1: LHIEEIUESSCEPWMNDLAO
Round 2:
20
One time pad should be discarded after every single use and this technique is proved
highly secure and suitable for small messages but illogical if used for long messages.
Encryption:-The process of encoding plain text messages into cipher text messages is
called as encryption.
Asymmetric encryption uses the public key for the encryption, and a private key is
used for decryption.
Or
Basic concept
In computing, Internet Protocol Security (IPSec) is a secure network protocol suite that
authenticates and encrypts the packets of data to provide secure encrypted communication
between two computers over an Internet Protocol network. It is used in virtual private networks
(VPNs).
Static web pages are also known as flat or stationary web page. They are loaded on the client’s
browser as exactly they are stored on the web server. Such web pages contain only static
information. User can only read the information but can’t do any modification or interact with
the information.
Static web pages are created using only HTML. Static web pages are only used when the
information is no more required to be modified.
21
Dynamic Web page
Dynamic web page shows different information at different point of time. It is possible to
change a portion of a web page without loading the entire web page. It has been made possible
using Ajax technology.
It is created by using server-side scripting. There are server-side scripting parameters that
determine how to assemble a new web page which also includes setting up of more client-side
processing.
A static web page (sometimes called a flat page or a stationary page) is a web page that is
delivered to the user's web browser exactly as stored,[1] in contrast to dynamic web pages which
are generated by a web application.
Consequently, a static web page displays the same information for all users, from all contexts,
subject to modern capabilities of a web server to negotiate content-type or language of the
document where such versions are available and the server is configured to do so.
SSL is designed to make use of TCP to provide a reliable end-to-end secure service.
SSL is not a single protocol but rather two layers of protocols.
The SSL Record Protocol provides basic security services to various higher-layer protocols.
The HTTP which provides the transfer service for Web client/server interaction, can operate on
top of SSL.
23
Change CipherSpec protocol:
The cryptographic secret (encrypted data) is generated, once the handshake protocol is over.
It is used to signal that cryptographic secret is ready to use.
This protocol consists of a single message, which consists of a single byte with the value 1.
The sole purpose of this message is to cause the pending state to be copied to into the current
state.
Alert Protocol:
The alert protocol is Used to signal errors or any abnormal condition.
Each message in this protocol consists of two bytes.
The first byte takes the value warning(1) or fatal(2) to convey the severity of the Message.
In case of fatal error, the connection is immediately terminated.
SECURE HYPER TEXT TRANSFER PROTOCOL (SHTTP)
➢ The Secure Hyper Text Transfer Protocol (SHTTP) is a set of security mechanisms
defined for protecting the Internet traffic.
➢ This includes the data-entry forms and Internet-based transactions.
➢ The services offered by SHTTP are quite similar to those of SSL. However, SSL has
become highly successful—SHTTP has not.
➢ SHTTP works at the application layer, and so it is tightly coupled with HTTP, unlike
SSL.
➢ SHTTP supports both authentication and encryption of HTTP traffic between the client
and the server.
➢ The key difference between SSL and SHTTP is that SHTTP works at the level of
individual messages.
➢ It can encrypt and sign individual messages. On the other hand, SSL does not
differentiate between different messages.
➢ It aims at making the connection between a client and the server, regardless of the
messages that they are exchanging.
➢ Not as popular as SSL
➢ Almost obsolete.
➢ Uses public key cryptography and digital certificates for validating both
consumers andmerchants.
➢ It provides the four security requirements – confidentiality, data integrity, user
24
andmerchant authentication, and consumer non-repudiation.
Architecture OR participants of SET:
The SET protocol coordinates the activities of:
1. Card Holder (Consumer) – he is the buyer who is the registered holder of the credit card.
2. Card Issuer(Consumer’s Bank) – bank that issues the credit card to card holder.
3. Merchant – refers to the seller who is connected to an acquirer.
4. Acquirer (Merchant’s Bank) – bank that serves as an agent to link a merchant to
multipleissuers(customer’s banks).
5. Payment Gateway – this is connected to acquirer. It is situated between the SET
systemand the financial network of the credit card system for processing
the credit card payment.
6. Certification Authority (CA) – Issues digital signatures to concerned parties.
l. The customer browses the merchant's website to evaluate the products offered by the
merchant. He or she then selects the products to be purchased and adds them to the
shopping cart.
2. The customer then uses a single message to communicate with the merchant and
payment gateway. The message has two parts, namely, purchase order, which is used by
the merchant, and card information, which is used by the merchant's bank (acquirer).
3. The card information is then forwarded to the acquirer authorization.
5. If the purchase is authorized, the issuer sends the authorization to the acquirer.
6. A copy of the authorization is also forwarded to the merchant.
7. The merchant completes the order and informs the customer about it.
8. Merchant captures the transaction from its bank.
9. Finally, the credit card invoice is printed by the issuer and provided to the customer.
USER AUTHENTICATION
Authentication Basics:
Authentication
26
➢ Proof of identity or we can say that “who is Who”.
➢ It is the process of giving someone identity so that he or she can access that particular
application or data.
➢ For e.g.: giving identity-card to a student of an institute.
➢ Authentication is the first step in any cryptographic solution
o –Because unless we know who is communicating, there is no point in
encryption what is being communicated.
➢ Authentication is any process by which a system verifies the identity of a user who
wishes to access it.
➢ Establish trust before communication takes place.
Passwords:
➢ A password is a string of alphabets, numbers and special characters, which is supposed
to be known only to the entity (usually person) that is being authenticated.
➢ Password Based Authentication
o –Clear Text Passwords is the Simplest Password based Authentication
Mechanism.
➢ How it works?
o –Prompt for user ID and Password
o –User enters user ID and Password
o –User ID and Password Validation i.e user-id and password are validated.
o –Authentication Result: Inform user accordingly.
Password Based Authentication:
27
• Adding Randomness
To improve the security and to detect a replay attack we need to add a bit of randomness to the
earlier schemes.
Steps
1. Storing Message Digests as derived passwords in the user database.
2. User sends a login request
3. Server creates a random Challenge
4. User Signs the Random Challenge with the Message Digest of the Password
5. Server Verifies the Encrypted Random Challenge from the user
Server returns an appropriate message back to the user
28
Authentication Tokens:
• It is an extremely useful alternative to a password
•These small devices are usually of the size of a small key chain.
•Usually an authentication Token has the following features
–Processor
–LCD for displaying outputs
–Battery
–Optionally a small keypad for entering information
–Optionally a real-time clock
1. Creation of a Token
–Created by the Authentication servers that are designed to use with authentication tokens.
–A unique value i.e. a seed is automatically placed or pre-programmed inside each token by
the server.
–Server also keeps a copy of the seed against the user ID in the user database.
–Seed can be conceptually considered as a user password.
–Difference is that the user password is known to the user, seed value remains unknown to the
user.
2. Use of the Token
–An Authentication Token automatically generates pseudorandom numbers called one- time
passwords.
–One-time passwords are generated randomly by authentication tokens using seed value.
–When a user wants to be authenticated by any server, the user will get a screen to enter user ID
and the latest one-time password.
–The users enter its ID and gets is latest one-time password from the authentication token.
–The user ID and password travels to the server as a part of the login request
–Server verifies using some mechanism that this one-time password is created using the valid
seed value.
3: Server Returns an Appropriate Message back to the User
Finally, the server sends an appropriate message back to the user, depending on whether the
previous operations yielded success or failure.
29
Authentication Token Types:
1. Challenge/Response Tokens
2. Time-based Tokens
1. Challenge/Response Tokens:
Step 1: User Sends a Login Request.
In this technique, the user sends the login request only with his/her user id (and
not the one-time password).
Step 2: Server Creates a Random Challenge
If the user id is valid, the server now creates a random challenge (a random number,
generated using a pseudo-random number generation technique), and sends it back to
the user.
Step 3: User Signs the Random Challenge with the Message Digest of the Password
This request is then sent to the server as the login request.
Step 4: Server Verifies the Encrypted Random Challenge Received from the User
The server receives the random challenge, which was encrypted with the seed by the
user’s authentication token. In order to verify that the random challenge, the server must
perform an identical operation.
Step 5: Server Returns an Appropriate Message Back to the User
Finally, the server sends an appropriate message back to the user, depending on whether
the operation is success or failure.
2. Time-based Tokens:
Step 1: Password Generation and Login Request:
The seed value and the system time of token, together perform cryptographic algorithm
to generate a password automatically.
Step 2: Server-side Verification:
The server receives the password. It also performs an independent cryptographic
function on the user’s seed value and the current system time to generate its version of
the password. If the two values match, it considers the user as a valid one.
Step 3: Server Returns an Appropriate Message Back to the User:
Finally, the server sends an appropriate message back to the user, depending on
whether the operation is success or failure.
30
2. Login Request
–User sends its ID only.
3. Server Creates a Random Challenge
–User ID validity is checked.
–Sends random challenge in plain text to user.
4. User Signs the Random Challenge
–User signs the random challenge received from Server by using its Private Key
–User’s private key is stored in a file in user computer
–To access its private key file, user has to give a correct password
–User sends the signed random challenge to the server
5. Server returns an appropriate message back to the user
Smart Cards:
➢ A smart card is a security token that has an embedded chip.
➢ Smart cards are typically the same size as a driver's license and can be made out
of metal or plastic.
➢ They connect to a reader either by direct physical contact (also known as chip
and dip) or through a short-range wireless connectivity standard such as Near Field
Communication (NFC).
➢ It is Portable.
➢ Used to perform cryptographic mechanisms
Use of Smart Cards:
➢ The use of Smart Cards is related to Certificate Based Authentication
➢ This is because the smart cards allows the generation of public-private key pairs within
the card
➢ They also support the storage of digital certificates within the card.
➢ The private key always remain in the smart card in a secure fashion
➢ The public key and the certificate is exposed outside
➢ Also the smart cards are capable of performing cryptographic functions such as
encryption, decryption, message digest creation and signing within the card
➢ Thus during the certificate based authentication, the signing of random challenge sent
by the server can be performed inside the card
31
Problems and issues in Smart Cards:
➢ Lack of standardization and inter-operability between smart cards vendors
➢ Smart card reader are not yet a part of a desktop computer like hard disk drive or floppy
drives
➢ Non-availability of smart card reader driver software
➢ Non-availability of smart card aware cryptographic service software
➢ cost of smart cards and card reader is high.
Biometric Authentication:
Definition:
Biometrics refers to the automatic identification of a person based on his or her
physiological or behavioral characteristics.
➢
A biometric device works on the basis of some human characteristics, such as finger
prints, voice or the pattern of lines in the iris of your eye
➢ The user database contains a sample of user’s biometric characteristics
➢ During the authentication, the user is required to provide another sample of the
users’ biometric characteristic.
➢ This is matched with the one in the database, and if the two samples are same, the user is
considered to be a valid one.
➢ The samples produced during every authentication process can vary slightly. (e.g. cuts on
the finger)
➢ An approximate match can be acceptable.
Any Biometric Authentication System defines two configurable parameters:
False Accept Ratio (FAR):
• It is a measurement of the chance that a user who should be rejected is actually
accepted by a system as good enough.
–False Reject Ratio (FRR):
• It is a measurement of the chance that a user who should be accepted as valid
is actually rejected by a system as not good enough
•Thus FAR and FRR are exactly opposite to each other.
Biometric characteristics:
1) Physiological
2) Behavioral
Physical biometrics:
➢ Fingerprint
➢ Facial recognition/face location
➢ Hand geometry
➢ Iris scan
➢ Retina scan
Fingerprint recognition
➢ A live acquisition of a person’s fingerprint.
➢ Dots (very small ridges),
➢ Space between two temporarily divergent ridges),
➢ Spurs (a notch protruding from a ridge),
32
➢ Bridges (small ridges joining two longer adjacent ridges), crossovers (two ridges that
cross each other).
Facial Recognition
1. Capture image
2. Find face in image
3. Extract features (store template)
4. Compare templates
5. Declare matches
Hand Geometry
Hand or finger geometry is an automated measurement of many dimensions of the hand and
fingers.
Iris recognition
Iris scanning measures the iris pattern in the colored part of the eye.
Retina recognition
Images back of the eye and compares blood vessels with existing data.
Behavioral biometrics
➢ Speaker/ voice recognition.
➢ Signature/ handwriting.
➢ Keystroke/ patterning.
Speaker / Voice Recognition
➢ Voice or speaker recognition uses vocal characteristics to identify individuals
using a pass-phrase.
➢ A telephone or microphone can serve as a sensor.
Signature Verification
➢ An automated method of measuring an individual’s signature.
➢ This technology examines speed, direction, and pressure of writing; the time that the
stylus is in and out of contact with the “paper’’.
Keystroke dynamics
➢ It is an automated method of examining an individual’s keystrokes on a keyboard.
➢ This technology examines such dynamics as speed and pressure, the total time
taken to type particular words, and the time elapsed between hitting certain keys.
APPLICATIONS:
➢ Prevent unauthorized access to ATMs, Cellular phones Desktop PCs.
➢ Criminal identification.
➢ In automobiles biometrics can replace keys with keyless entry devices.
➢ Airport security.
33
NETWORK SECURITY AND VPN
•The TCP/IP protocol suite was developed prior to the OSI model. Therefore,
the layers in the TCP/IP protocol suite do not exactly match those in the OSI
model.
• TCP/IP protocol suite is made of five layers: Application Layer,
Transport Layer,Internet Layer, Network Access Layer
• TCP/IP is a hierarchical protocol made up of interactive modules, each of
which provides a specific functionality; however, the modules are not
necessarily interdependent.
• At the transport layer, TCP/IP defines three protocols: Transmission
Control Protocol (TCP), User Datagram Protocol (UDP), and Stream
Control Transmission Protocol (SCTP).
• At the Internet layer, the main protocol defined by TCP/IP is the Internet
Protocol (IP);there are also some other protocols that support data movement
in this layer.
TCP/IP Layers:
34
bytes, followed by data from the application program. The header is 20 bytes if there
are no options and up to 60 bytes if it contains options.
Source port address:
This is a 16-bit field that defines the port number of the application program in the
host that is sending the segment. This serves the same purpose as the source port
address in the UDP.
Sequence number:
This 32-bit field defines the number assigned to the first byte of data contained in this
segment. As TCP is a stream transport protocol. To ensure connectivity, each byte to
be transmitted is numbered. The sequence number tells the destination which byte in
this sequence is the first byte in the segment. During connection establishment each
party uses a random number generator to create an initial sequence number (ISN),
which is usually different in each direction.
Acknowledgment number:
This 32-bit field defines the byte number that the receiver of the segment is expecting
to receive from the other party. If the receiver of the segment has successfully
received byte number x from the other party, it Returns x+1 as the acknowledgment
number.
Header length:
This 4-bit field indicates the number of 4-byte words in the TCP header. The length
of the header can be between 20 and 60 bytes. Therefore, the value of this field is
always between 5 (5 *4=20) and 15 (15*4=60).
Reserved: This is a 6-bit field reserved for future use.
Control:
This field defines 6 different control bits or flags . One or more of these bits can be
set at a time. These bits enable flow control, connection establishment and
termination, connection abortion, and the mode of Flags from left to right:
Window size:
This field defines the window size of the sending TCP in bytes. Note that the length
of this field is 16 bits, which means that the maximum size of the window is 65,535
bytes.
Checksum:
The 16-bit checksum field is used for error-checking of the header and data.
Urgent pointer:
if the URG flag is set, then this 16-bit field is an offset from the sequence number
35
indicating the last urgent data byte.
IP DATAGRAM FORMAT:
• Packets in the network (internet) layer are called datagram.
• A datagram is a variable-length packet consisting of two parts: header and data.
• The header is 20 to 60 bytes in length and contains information essential
to routing and delivery.
IP header format:
Version (VER):
This 4-bit field defines the version of the IP protocol. Currently the version is 4(IPv4).
36
Header length (HLEN):
This 4-bit field defines the total length of the datagram header in 4-byte words. This
field is needed because the length of the header is variable (between 20 and 60 bytes).
When there are no options, the header length is 20 bytes, When the option field is at
its maximum size(i.e. 60)
Service type (TOS):
It defines how the datagram should be handled. Part of the field was used to define
the precedence of the datagram; the rest defined the type of service (low delay, high
throughput, and so on).
Total length:
It defines the total length of the datagram including the header in bytes. It is a 16-bit
number so maximum IP size is 216 bytes.
Identification:
This 16-bit field identifies a datagram originating from the source host. The
combination of the identification and source IP address must uniquely define a datagram as
it leaves the source host.
Flags:
This is a three-bit field. The first bit is reserved (not used). The second bit is called
the do not fragment bit. If its value is 1, the machine must not fragment the datagram.
If its value is 0, the datagram can be fragmented if necessary. The third bit is called
the more fragment bit. If its value is 1, it means the datagram is not the last fragment;
there are more fragments after this one. If its value is 0, it means this is the last or
only fragment.
Fragmentation offset:
This 13-bit field shows the relative position of this fragment with respect to the whole
datagram.
Time to live:
A datagram has a limited lifetime in its travel through an internet. This field was
originally designed to hold a timestamp, which was decremented by each visited
router. The datagram was discarded when the value became zero.
Protocol:
This 8-bit field defines the higher-level protocol that uses the services of the
IP layer. An IP datagram can encapsulate data from several higher level protocols
such as TCP, UDP, ICMP, and IGMP. This field specifies the final destination
protocol to which the IP datagram should be delivered.
37
Header Checksum:
This fields represents a value that is calculated using an algorithm covering all the
fields in header. This field is used to check the integrity of an IP datagram.
Source address:
This 32-bit field defines the IP address of the source. This field must remain
unchanged during the time the IP datagram travels from the source host to the
destination host.
Destination address:
This 32-bit field defines the IP address of the destination. This field must remain
unchanged during the time the IP datagram travels from the source host to the
destination host.
Virtual Private Network (VPN):
➢ A VPN is thus a mechanism to simulate a private network over a public
network, such as the Internet.
➢ The term virtual signifies that it depends on the use of virtual connections.
➢ These connections are temporary and do not have any Physica1 presence.
They are made up of packets.
➢ Uses the Internet as if it is a private network.
➢ Far less expensive than a leased line.
➢ Uses IPSec protocol.
VPN Architecture:
38
We have shown two networks, Network I and Network 2. Network l connects to the
Internet via a firewall named Firewall I. Similarly, Network 2 connects to the Internet with
its own firewall 2.
The two firewalls are virtually connected to each other via the Internet. We have shown
this with the help of a VPN tunnel between the two firewalls.
Let us understand how the VPN protects the traffic passing between any two hosts on the
two different networks. For this, let us assume that host X on Network 1 wants to send a
data packet to host Y on Network 2. This transmission would work as follows.
1. Host X creates the packet, inserts its own IP address as the source address and the IP
address of host Y as the destination address. This is shown in figure. It sends the packet
using the appropriate mechanism.
2. The packet reaches firewall 1. As we know, firewall 1 now adds new headers to the
packet. In these new headers, it changes the source IP address or the packet from that of
host X to its own address (i.e. the IP address of Firewall 1, say F1). It also changes the
destination IP address of the packet from that of host Y to the IP address of Firewall 2. say
F2). This is shown in Fig. It also performs the packet encryption and authentication,
depending on the settings and sends the modified packet over the Internet.
39
40
3. The packet reaches firewall1 2 over the internet, via one more routers, as usual, Firewall
2 discards the outer header and performs the outer header and performs appropriates
decryption and other cryptographic functions as necessary. This yields the original packets,
as was created by host X in step 1. This is shown in fig. It then takes a look the plain text
contents of the packets and realizes that the packet is meant for host Y. Therefore, it
delivers the packet to host Y.
➢ Before IPSec was initiated, the IP packets were prone to security failure.
➢ The technology that brings secure communications to the internet protocol
layer or network layer is called IP Security, commonly abbreviated IPSec.
➢ IPSec is a set of services and protocols that provide a complete security
solution for an IP network.
➢ It is a collection of protocols designed by the Internet Engineering Task
Force (IETF) to provide security in the internet layer.
➢ It can be used in protecting data flows between a pair of host(host-to-host),
between a pair of security gateways(network-to-network), or between a
security and a host(network-to-host).
42
Secure branch office connectivity over the Internet:
➢ A company can build a secure virtual private network over the Internet or
over a public WAN. This enables connecting all the branches of company.
That will save the costs of creating a private network and network
management overhead.
Establishing extranet and intranet connectivity with partners:
➢ IPSec can be used to secure communication with other organizations,
ensuring authentication and confidentiality and providing a key exchange
mechanism.
Enhancing electronic commerce security:
➢ Even though some Web and electronic commerce applications have built-in
security protocols, the use of IPSec enhances that security.
43
IP security services: (Important)
Someone may claim that securing a network doesn’t require much more
than someone to manage the firewall rules and access control lists, and to
45
maintain and update such rules whenever needed. They might continue
perhaps by claiming that the network security monitoring is a rather
simple task. However, we don’t agree with such claims for any operating
networks with some reasonable business value, mostly because those few
simple security solutions are only providing network protection in one or
two different layers of security. For ex- ample, the lack of layered
protection often leaves plenty of unguarded room for
e.g. an insider to prepare & operate some malicious tasks.
Feasibility analysis
47
Table 2. Feasibility analysis for network security monitoring system.
Area Principles/Tasks
Feasibility First, clarify and list the main assets, goals
analysis and critical operational criteria of the
networked system & data to be protected
using monitoring and other controls.
Ensure the sufficient intake and
implementation of critical requirements, e.g.
protection against new risks & threats, during
the whole lifecycle of the system. Invite
participants from all relevant areas for the risk
& requirement analysis work.
Define the major things that need to be
monitored in the network. Divide these into
the baseline attributes that are continuously
monitored, filtered and prioritized, but also to
detailed logs that shall constitute the basis for
forensic analysis (e.g. of information leaks).
Identify the best products & references of
security monitoring and analyse how these
match to your goals for monitoring.
Analyse the feasibility of candidate
monitoring platforms according to your
critical operational criteria.
Decide whether the required security
monitoring in- vestments & operating costs
are in balance with the benefits of operation
continuity and the value of business assets.
Design
49
large scale security monitoring data exchanges. Data storage, on the other
hand, should be designed with enough redundancy, backup, and recovery
capabilities in mind. Single points of failure are to be avoided, even in
centralized solutions.
Last but not least, it is very essential how the selected mature
monitoring technology (hardware and software) platforms & standards
shall be applied into practise. E.g. what security properties are utilized?
What kind of authentication and authorization systems shall be taken into
use for secure access and maintenance? What security protocols shall be
used? Using which algorithms & key lengths? Standard, publicly assessed
standards should be selected and certified vendors selected.
In addition, during the design phases of your network security
monitoring sys- tem, you should consider to carry out the following tasks:
Area Principles/Tasks
Design Ensure the scalability of your security
monitoring system & operation using open
standards and scalable architectures that have
proven cost efficiency
Divide the analysis tasks of monitoring results
based on your strengths and topology, e.g. using
local internal analysis and suitable external
services for your particular security monitoring
goals
Ensure the secure design of the monitoring
system elements by using & mandating defined
security assurance methods, tools & processes
for the monitoring platforms and products
Ensure the correct focus for the security
monitoring functionality by carrying out
repetitive reviews with users and process
owners
50
Procurement
Area Principles/Tasks
Procurement Define the baseline requirements for the
security monitoring functionality that shall be
used in purchasing network equipment,
systems and software. Follow the standards
and your targeted needs for the requirement
baseline creation
51
Estimate your future monitoring needs and
question & explore the candidate vendor
system’s extension possibilities
Question with each of your network product
vendor about the security monitoring
capabilities in their cur- rent & future
networking products
Ensure that also the status of load or load
balancing of any procured critical network
service can be monitored when needed. Load
monitoring capability should exist in network
devices as well
Avoid any proprietary solutions and
protocols when implementing security
monitoring. Avoid vendor dependence
whenever possible
52
Implementation
Area Principles/Tasks
Implementation Ensure that security monitoring
functionality shall not interfere with the
basic objective of the networked system,
even under exceptional circumstances
Separate the network management,
monitoring & control equipment from your
other networked systems
Implement also the management of your
network security controls in a way which
enables you53to minimize the damage done
soon after identifying a probem in some
network location via monitoring
54
Configuration
Today, it is admitted that the installed security systems & solutions may
also bring vulnerabilities or continuation risks to the target system that
was supposed to be protected. The understanding of these risks is
extremely important for systems which have high availability and
dependability requirements. Therefore, good service and configuration
management practices must also be employed to security (monitoring)
systems. Specifically, the security system’s maintenance must be well
coordinated with the critical services of company’s business operations,
for the purpose of producing continuously value for the stakeholders. Of
course, the main task for security maintenance is to maintain the risk-free
con- figuration in security systems, which shall be in compliance with the
security & continuity requirements for the operation.
When the deployment scale is large, implying that there are hundreds or
thou- sands of devices or systems to be monitored, an automated security
configuration compliance tool shall often be necessary. These tools
should utilize well established standards such as Security Content
Automation Protocol (SCAP) for automated follow up of vulnerability &
security configuration. This may also guide the security monitoring
implementation into more future-proof and extensible direction.
An important viewpoint is also the physical configuration, which shall
define the safe locations and positioning of monitoring equipment for
reliable operations. Then, what is the complete set up constituting from
essential appliances, power, backup devices & media, cabling, etc, shall
complete the secure configuration of a monitoring system. Also the
physical system inventory & set up should be well managed, controlled,
and documented for always being up-to- date after any approved change.
Finally, the baseline data groups (e.g. normal, malicious, abnormal and
un- classified), and the signatures of rule based systems, must be
established, preset & maintained for the secure configuration.
Configuration security related tasks for the network security monitoring
sys- tem include:
55
Table 6. Configuration of network security monitoring system.
Area Principles/Tasks
Configuration Ensure that the configuration of your security
monitor- ing system shall not change
unintended. Manage the configuration of
each device or virtual system using a well
controlled change management process
Test the feasibility of any changes to the
monitoring configuration before applying,
when possible. Do not test new
configurations in the production system
In addition to protecting the integrity of your
configura- tion information, do not disclose
the detailed configura- tion information of
your security monitoring system to potential
attackers
Both the deployment process and the operations & maintenance (O&M)
of net- work security monitoring systems are rather broad topics to be
discussed here extensively, but a few advices may be given, anyhow.
The device and software installation procedures and the bootstrapping
of trust & secure channels between the monitoring components require
good deployment plans and some compact guidance for the field install
crew. For example, the credential and certificate installation tasks by the
field crew shall be usually out of question. Such functions must be carried
out before installation, or at least installed automatically during the field
installation process. A rather big issue may also be to successfully and
securely integrate the security monitoring systems to the existing network
environment. For example, often some new rules, data mirroring, log
memory, and access rights need to be defined for the switch- es, firewalls,
access control systems, and perhaps even some application service
configurations.
For O&M, perhaps the most import issue is to define accurately the
56
roles & responsibilities for the operations & maintenance personnel. It
must be clear which authorization procedures are mandated for upgrading
and updating the systems, hardware and software. This includes patching,
vulnerability fixes, firmware upgrades, etc. In the case of service
agreement, it must be contracted with the service provider that how, when
and by whom their systems shall be updated & configured.
Area Principles/Tasks
Deployment Ensure that the possible remote
configuration process and access control are
secure before deploying a network- or
monitoring device
Keep the elementary system operations, such
as in- formation generation & bulk data
transfer, rather simple & basic for the most of
the networked devices. Allow for more
flexible configuration and online adjustment
for higher level devices and monitoring
systems
O&M Ensure simple & understandable usage,
update and maintenance process for the
security monitoring system
Update and reconfigure your security
monitoring system according to
continuously identified new vulnerabilities
and risks targeting your network
Disposal Ensure that the confidential information is
saved and destroyed from any of your
monitoring equipment be- fore disposal.
Preserve the identification information of any
monitoring HW & software product versions
that you may need e.g. for spare part &
upgrade acquisition
57
Assessing and selecting the basic indicators of an attack
60
Unfortunately, the above workflow that we have developed seems to be
rather wide-ranging and extensive. However, this is in line with our
findings that per- haps the most difficult problem in network security
monitoring is the questions – What should be monitored? and What really
pays off to monitor?
In next subsections, we clarify each of these deduction steps, together
with few examples.
All serious security work starts from ensuring that we understand not only
the current system operation but also the security controls already put in
place to protect the system from unwanted disturbances & potential
malicious activity. This analysis is needed to properly understand the
meaning and capabilities of the existing security solutions & security
controls currently planned or in use for our system. The security controls
should typically include:
• Enforced security policies (administrative & technical policies)
• Instructions for secure operations & secure ways of working
• Security requirements for systems and subsystems development
• Instructions of work and defence in the cases of emergency,
security incident & updating/upgrading
• Processes for establishing & maintaining the security of
outsourced systems.
Another task related with the security controls analysis should be to the
map security controls with the capabilities of feasible security monitoring
systems. Which of our security policies and requirements can be
supported in meaningful ways using some security monitoring methods?
At this point, we could even have first ideas that what kind of security
monitoring functionalities could be realistic and meaningful for our
system?
63
o Best attack/abuse tools for the purpose (e.g. tool
evaluation for criminal motives)
o Listing the available exploits for entering to abuse case.
Step # 4: Sorting out the relevant attacks, criminal activity & abuse
against the system
Using the threats and vulnerabilities identified for the system, we need to
ana- lyse which of the potential attacks or abuse cases are really relevant
against our system and its current protection. In practise, this means that
we should combine the information attained in previous Steps (2) and (3).
Following example clarifies what kind of attack vectors might be possible
within organization, if not extra-guarded. Specifically, such lists should
help us in concluding which of the hypothetical abuse cases seem realistic
against our system. In other words, we would need to sort out the
irrelevant cases and concentrate only on really potential abuse cases.
Example - Insider abuse: We might conclude during our case analysis
that the following attack vectors might be relevant against our system:
• An employee (insider) uses social engineering to collect
unauthorized information (All our employees are not trained
against social engineering)
• A user bluffs administrator to reveal his administration
practices (Our administrators lack precaution or responsibility)
• An employee uses other person’s user account (Our users commit
insecure user account practices)
• An employee uses other person’s user rights (Employee can stole
session or user credentials)
• An employee exploits system’s internal vulnerability (Mole or ex
employee present in premises?)
• An employee manipulates system log files (Might we
possess a wounded administrator, log files are stored
insecurely)
• An employee generates system error to hide unauthorized
access (Might we have an improper configuration of logging
system? Do we really keep track of log files systematically in
all cases?). 64
Typically, the number & exploitation potential of attack vectors depend
much on the weaknesses that specifically exist in common working
processes and personnel’s ways of working. Of course, sometimes a
companion of technical fault or vulnerability is also required to enable the
enemy to finalize the abuse, who may then commit “a perfect crime”
without perception.
66
• Costs of doing efficiently the following:
o Abuse & attack identification
o Abuse block out
o Incident reporting
o Abuse prevention planning & management.
Estimating the benefits of preventing an abuse case. To accomplish this
task, we may simply recall the results of previous step: impact analysis
(costs of lost value, production & brand, restoration costs) and probability
analysis.
Finally, we should to carry out the comparison of costs & benefits for
each abuse case. Obviously, this could be done according to each
company’s preferences, but e.g. 3–5 different abuse risk criticality levels
could be defined, for example:
• Critical risk (critical benefits in prevention, at feasible
prevention costs)
• High risk (benefits in prevention, at feasible prevention costs)
• Medium risk (benefits in prevention, at probably non-feasible
preven- tion costs)
• Low risk (uncertain benefits in prevention, at non-feasible
prevention costs).
The feasible analysis of attribute data can usually contain two principal
method families. When there are lots of data to be analysed, together with
modest computing and memory capabilities, then the “statistical analysis”
methods may be feasible. Statistical analysis methods are feasible for
identifying suspect behavior in the network, but they are not 100 %
accurate.
On the other hand, the “distinct analysis” methods are feasible against
known attacks. However, the drawbacks include a mandatory data
inspection system, which often requires e.g. powerful processing, lots of
memory, and also some manual maintenance work for its rule-base
updates.
More of the analysis method selection is discussed in subchapter “3.4
Data analysis methods”.
After the attribute data flow has been processed, it needs to be combined
& correlated with the previously preset data and visualized to the user.
The presentation of the aggregated results can be done, for example,
visualizing the:
• malicious data groups (match to malicious)
• abnormal data groups (match to abnormal), and
• unclassified data groups (no match)
in different ways than the normal data groups (match to normal). The
optimal, automated way to recognize 69& formulate these groups should be
tested using various visualization tools. These results, the best tools &
their visualization schemes, should then be mapped to the relevant abuse
cases.
More of the data aggregation topic is discussed in section “3.4.2 About
net- work data aggregation methods”.
Each of the various operators of the networks and systems should be able
to develop a reasonable monitoring deployment with a feasible direct
scope for them. Of course, this should not exclude the co-operation and
exchange of relevant monitoring information between the (interoperating)
network & system operators, while still working according to laws &
regulations. Next, there are presented some examples of various high
level monitoring scopes of interest.
71
Example scopes for Outsourced systems monitoring
73
Example scopes for Network systems monitoring
We are also aiming to give some concrete support for the detailed attribute selection
task. Therefore, we introduce and assess briefly below some indicators & attributes,
which could be captured and analysed to effectively recognize the potentially malicious
phenomena, for the purposes of network
75 security monitoring.
Unfortunately, more concrete case studies are needed that should enable us for
presenting even more extensive attribute lists. Each network operator or administrator
shall define a list of their own, according to feasible risks and limitations of their
networked technological environment. The deployed (risky) software applications shall
probably affect a lot into the selection of the most relevant security monitoring
attributes.
See a table below as a simple example list.
76
Table 14. Some possible attributes for security attack & abuse
analyses.
78
Suspicious More data sent Alteration Flow analyzer
network towards external in data emphasizing
behavior networks flows, FW applications,
logs & protocols,
events conversations,
endpoints
More data sent Alteration Firewall log
from external in data analysis tool. Or
networks flows, FW flow analyzer
logs & emphasizing
events applications,
proto- cols,
conversations,
end- points
Unexpected data Alteration Flow analyzer
flows in data emphasizing the
flows, FW flows (NetFlow,
logs & cFlow, jFlow,
events sFlow)
Unexpected Faulty messages Analysis of error
behavior similar or sent error codes or diagnostic
to device error codes tool results
Social Unexpected Junk emails, Following up the
engineerin information phone calls, activities that were
g activities requests queries, social not related to
abuse assigned tasks
Suspicious content Suspect text Content based
strings or data filtering &
formats alarming systems
Applicatio “Various “Application Application
n specific application specific monitoring systems.
indicators specific abuse attributes” Also following up
indications” the implications of
application usage,
etc.
Typically, the edges f such deployed LAN shall be the potential physical loca-
tions for installing the major security monitoring probes or SIEM. This is
due to better potential of capturing larger amounts of data with
representative scope for further analysing the incoming & outgoing data,
traffic, flows, etc.
While the physical data network architecture might explain the wiring, node
location, network topology and other such issues, it may not clarify how the
different devices should communicate with each other. For communicating the data
that shall be used as input for the security monitoring systems, there are few
basic alternatives on ow the transfer of such data may be arranged. These alter-
natives are discussed briefly in below subsections.
80
Figure 2. Communicating the local network monitoring data to local monitoring
g service.
Communication
alter- native for Pros Cons
monitoring data
Server broadcasting Simple Broadcast signalling
Server polling Proven, de-facto Limited
scalability,
state-based
Client Distributed Not real-time
pushing operation,
batches scalable
Client pushing at Distributed Bulk of events
events operation, real-
time
Client publishing Distributed Web service risks
operation,
scalable
DB Functionality, Database system
synchronization flexible risks
82
About corporate level monitoring data collection
The cost-effective arrangements for monitoring data transfer at corporation level shall depend
largely, of course, on the corporation’s common data communication architecture. While these
architectures may be based on various communication technologies, we would still like to try
and give couple of security advices at this level also.
Applying for corporation & group levels, the necessary data collection facilities for the
network security monitoring purposes should be planned, managed & maintained in secure
ways, such as:
• The basic topics to be monitored shall be defined in the planning phase. Risk analysis
for the necessary information transfers should be made.
• It should be agreed about the usage of common corporate level communication
standards for monitoring supervision data – which may often be Internet based for cost-
efficiency.
• It should be planned and arranged for the centralized monitoring data services where all
(summary) data is collected to and from where it may be further analysed. Also, one
alternative might be to contract with the (outsourced) security service provider, when
feasible.
• By default, all the network management & monitoring data connections should be
authenticated, integrity, replay & confidentiality protected.
• Network administrator’s system access should be restricted – e.g. only allowing access
from network supervision & management workstations.
• User accounts for network supervision should only allow the reading of log files, not
modification. Modification of log files should be made impossible by default.
Note that the global network security co-operation- & data collection principles are
currently as work-in-progress in various global research & standardization communities.
Unfortunately, it has not often been possible to arrange truly open security information
exchange networks, due to risks for attacker community follow up. Where applicable,
however, feasible secure Internet standard proto- cols should be used for the security
information exchanges due to fast interworking, security and integration capabilities
83