VTU Network Security (10ec832) Unit-1 Notes
VTU Network Security (10ec832) Unit-1 Notes
VTU Network Security (10ec832) Unit-1 Notes
NETWORK SECURITY
PART-A
UNIT-1
UNIT - 1
Services, mechanisms and attacks, The OSI security architecture, A model for
network security.
TEXT BOOK:
1. Cryptography and Network Security, William Stalling, Pearson Education, 2003.
REFERENCE BOOKS:
1. Cryptography and Network Security, Behrouz A. Forouzan, TMH, 2007.
2. Cryptography and Network Security, Atul Kahate, TMH, 2003.
UNIT – 1: Services, Mechanisms and Attacks, The OSI security architecture, A Model for
Network Security.
OVERVIEW
1. SECURITY SERVICES [DEC-2012(10M)]
X.800 defines a security service as a service that is provided by a protocol layer of
communicating open systems and that ensures adequate security of the systems or of data
transfers.
Also the RFC 2828(Internet Security Glossary version 2) defines security services as a
processing or communication service that is provided by a system to give a specific kind of
protection to system resources.
X.800 divides these services into five categories and fourteen specific services. Shown in the
fig1 and table 1.
OR
Authentication
This service provides the authentication of the Party at the other end of the line.
In connection –oriented communication, it provides authentication of the sender or
receiver during the connection establishment (peer entity authentication).
In connectionless communication, it authenticates of the data (data origin
authentication).
Two specific authentication services are defined in X.800:
a. Peer entity authentication:
Provides for the corroboration of the identity of a peer entity in an association.
Peer entity authentication is provided for use at the establishment of, or at times
during the data transfer phase of, a connection.
It attempts to provide confidence that an entity is not performing either a masquerade
or an unauthorized replay of a previous connection.
If a violation of integrity is detected, then the service may simply report this violation,
and some other portion of software or human intervention is required to recover from
the violation.
Alternatively there are mechanisms available to recover from the loss of integrity of
data as we will review subsequently.
The incorporation of automated recovery mechanisms is, in general, the more
attractive alternative.
1.5 Nonrepudiation
Nonrepudiation prevents either sender or receiver from denying a transmitted
message.
Thus, when a message is sent, the receiver can prove that the alleged sender in fact
sent the message. Similarly, when a message is received, the sender can prove that the
alleged receiver in fact received the message.
OR
Nonrepudiation
Nonrepudiation service protects against repudiation by either the sender or the
receiver of the data.
In Nonrepudiation with proof of the origin, the receiver of the data can later prove the
identity of the sender if denied.
In Nonrepudiation with proof of delivery, the sender of data can later prove that data
were delivered to the intended recipient.
Mechanism
Service Enciph- Digital Access Data Authentication Traffic Routing Notarization
erment signature control integrity exchange padding control
location and identity of communicating hosts and could observe the frequency and
length of messages being exchanged. This information might be useful in guessing
the nature of the communication that was taking place.
Passive attacks are very difficult to detect, because they do not involve any alteration
of the data. However, it is feasible to prevent the success of these attacks, usually by
means of encryption. Thus, the emphasis in dealing with passive attacks is on
prevention rather than detection.
1. Masquerade: -
A masquerade takes place when one entity pretends to be a different entity (Figure a).
A masquerade attack usually includes one of the other forms of active attack.
For example, authentication sequences can be captured and replayed after a valid
authentication sequence has taken place, thus enabling an authorized entity with few
privileges to obtain extra privileges by impersonating an entity that has those
privileges.
(a) Masquerade
2. Replay:-
Involves the passive capture of a data unit and its subsequent retransmission to
produce an unauthorized effect (Figure b).
(b) Replay
3. Modification of messages:-
Modification of messages simply means that some portion of a legitimate message is
altered, or that messages are delayed or reordered, to produce an unauthorized effect
(Figure c).
For example, a message meaning ―”Allow John Smith to read confidential file
accounts “is modified to mean ―”Allow Fred Brown to read confidential file
accounts”.
4. Denial of service:-
The denial of service prevents or inhibits the normal use or management of
communications facilities (Figure d).
This attack may have a specific target; for example, an entity may suppress all
messages directed to a particular destination.
Another form of service denial is the disruption of an entire network, either by
disabling the network or by overloading it with messages so as to degrade
performance.
Some secret information shared by the two principals and, it is hoped, unknown to
the opponent.
An example is an encryption key used in conjunction with the transformation to
scramble the message before transmission and unscramble it on reception.
A trusted third party may be needed to achieve secure transmission.
For example, a third party may be responsible for distributing the secret information
to the two principals while keeping it from any opponent. Or a third party may be
needed to arbitrate disputes between the two principals concerning the authenticity of
a message transmission.
FIG 5:-
The security mechanisms needed to cope with unwanted access fall into two broad categories
(see above Figure 1.4).The first category might be termed a gatekeeper function. It includes
password-based login procedures that are designed to deny access to all but authorized users
and screening logic that is designed to detect and reject worms, viruses, and other similar
attacks. Once either an unwanted user or unwanted software gains access, the second line of
defense consists of a variety of internal controls that monitor activity and analyze stored
information in an attempt to detect the presence of unwanted intruders.