Network Management and Network Security Chapter-8
Network Management and Network Security Chapter-8
Network Management and Network Security Chapter-8
a. Performance Management:
To quantify, measure, report, analyze, and control the performance (e.g, utilization and
throughput) of different network components are the main goal of performance
management. These components include individual devices (e.g, links, routers, and hosts)
as well as the end to end abstraction such as a path through the network. Protocol standard
such as the Simple Network Management Protocol (SNMP) play a central role in Internet
performance management.
b. Fault Management:
The goal of fault management is to log, detect, and respond to fault condition int the
network. The difference between fault management and performance management is
blurred. The fault management is used to manage immediate handling of the failures like
link failure, host failure, or router hardware problem, these problems are also known as a
transient network failure. With the help of performance management, the SNMP protocol
plays a major part in fault management.
c. Configuration Management:
Tracking of the devices that are on the managed network and the hardware and software
configurations are allowed by Configuration management.
d. Accounting Management:
To specify, log, and control user and device access to network resources are allowed by
Accounting management. usage quotas, usage-based charging, and the allocation of
resource-access privileges all fall under accounting management.
e. Security Management:
The goal of security management is to control access to network resource according to
some well-defined policy. The key distribution centers are a component of network
management. The use of firewalls to monitor and control external access point to one’s
network is another crucial component.
SNMP is an application-level protocol in which a few manager stations control a set of agents.
The protocol is designed at the application level so that it can monitor devices made by different
manufacturers and installed on different physical networks. A management station, called a
manager, is a host that runs the SNMP client program. A managed station, called an agent, is a
router (or a host) that runs the SNMP server program. Management is achieved through simple
interaction between a manager and an agent. The agent keeps performance information in a
database. The manager has access to the values in the database. For example, a router can store in
appropriate variables the number of packets received and forwarded. The manager can fetch and
compare the values of these two variables to see if the router is congested or not. The manager can
also make the router perform certain actions. For example, a router periodically checks the value
of a reboot counter to see when it should reboot itself. It reboots itself, for example, if the value of
the counter is 0. The manager can use this feature to reboot the agent remotely at any time. It
simply sends a packet to force a 0 value in the counter. Agents can also contribute to the
management process. The server program running on the agent can check the environment and, if
it notices something unusual, it can send a warning message (called a Trap) to the manager. In
other words, management with SNMP is based on three basic ideas:
a. A manager checks an agent by requesting information that reflects the behavior of the
agent.
b. A manager forces an agent to perform a task by resetting values in the agent database.
c. An agent contributes to the management process by warning the manager of an unusual
situation.
Management Components
To do management tasks, SNMP uses two other protocols: Structure of Management Information
(SMI) and Management Information Base (MIB). In other words, management on the Internet is
done through the cooperation of three protocols: SNMP, SMI, and MIB, as shown in Figure 3.
Role of SNMP
It defines the format of the packet to be sent from a manager to an agent and vice versa. It also
interprets the result and creates statistics (often with the help of other management software). The
packets exchanged contain the object (variable) names and their status (values). SNMP is
responsible for reading and changing these values.
Role of SMI
To use SNMP, we need rules for naming objects. We also need rules to define the types of objects.
What types of objects are handled by SNMP? Can SNMP handle simple types or structured types?
How many simple types are available? What are the sizes of these types? What is the range of
these types? In addition, how are each of these types encoded? We need these universal rules
because we do not know the architecture of the computers that send, receive, or store these values.
The sender may be a powerful computer in which an integer is stored as 8-byte data; the receiver
may be a small computer that stores an integer as 4-byte data. SMI is a protocol that defines these
rules. However, we must understand that SMI only defines the rules; it does not define how many
objects are managed in an entity or which object uses which type. SMI is a collection of general
rules to name objects and to list their types. The association of an object with the type is not done
by SMI.
Role of MIB
We hope it is clear that we need another protocol. For each entity to be managed, this protocol
must define the number of objects, name them according to the rules defined by SMI, and associate
a type to each named object. This protocol is MIB. MIB creates a set of objects defined for each
entity in a manner similar to that of a database (mostly metadata in a database, names and types
without values).
organizations can take for spoofing attack prevention include packet filtering, using spoofing
detection software, and cryptographic network protocols.
8.2 Cryptography
Cryptography is derived from the Greek words: kryptos, "hidden", and graphein, "to write" - or
"hidden writing". Cryptography is the science of using mathematics to encrypt and decrypt data.
Cryptography enables you to store sensitive information or transmit it across insecure networks
(like the Internet) so that it cannot be read by anyone except the intended recipient. While
cryptography is the science of securing data, cryptanalysis is the science of analyzing and breaking
secure communication. Classical cryptanalysis involves an interesting combination of analytical
reasoning, application of mathematical tools, pattern finding, patience, determination, and luck.
Cryptanalysts are also called attackers. Cryptology embraces both cryptography and cryptanalysis.
Encryption and Decryption
names represent computers or processes that actually send or receive data, or intercept or change
data.
Conventional encryption has benefits. It is very fast. It is especially useful for encrypting data that
is not going anywhere. However, conventional encryption alone as a means for transmitting secure
data can be quite expensive simply due to the difficulty of secure key distribution.
For a sender and recipient to communicate securely using conventional encryption, they must
agree upon a key and keep it secret between themselves. If they are in different physical locations,
they must trust a courier, the Bat Phone, or some other secure communication medium to prevent
the disclosure of the secret key during transmission. Anyone who overhears or intercepts the key
in transit can later read, modify, and forge all information encrypted or authenticated with that key.
Asymmetric-Key Cryptography
Public key cryptography is an asymmetric scheme that uses a pair of keys for encryption: a public
key, which encrypts data, and a corresponding private, or secret key for decryption. You publish
your public key to the world while keeping your private key secret. Anyone with a copy of your
public key can then encrypt information that only you can read. It is computationally infeasible to
deduce the private key from the public key. Anyone who has a public key can encrypt information
but cannot decrypt it. Only the person who has the corresponding private key can decrypt the
information.
With this approach, all the participants have access to public keys, and private keys are generated
locally by each participant and therefore need never be distributed. As long as a user protects his
and her private key, incoming communication is secure. At any time, a user changes the private
key and publish the companion public key replace the old public key.
Comparison
Let us compare symmetric-key and asymmetric-key cryptography. Encryption can be thought of
as electronic locking; decryption as electronic unlocking. The sender puts the message in a box
and locks the box by using a key; the receiver unlocks the box with a key and takes out the message.
The difference lies in the mechanism of the locking and unlocking and the type of keys used. In
symmetric-key cryptography, the same key locks and unlocks the box. In asymmetric-key
cryptography, one key locks the box, but another key is needed to unlock it.
8.3 IP Security
(IPSec) is a collection of protocols designed by the Internet Engineering Task Force (IETF) to
provide security for a packet at the network level. IPSec helps create authenticated and confidential
packets for the IP layer.
Two Modes
IPSec operates in one of two different modes: transport mode or tunnel mode.
Transport Mode
In transport mode, IPSec protects what is delivered from the transport layer to the network layer.
In other words, transport mode protects the payload to be encapsulated in the network layer, as
shown in Figure below.
Note that transport mode does not protect the IP header. In other words, transport mode does not
protect the whole IP packet; it protects only the packet from the transport layer (the IP-layer
payload). In this mode, the IPSec header (and trailer) are added to the information coming from
the transport layer. The IP header is added later. Transport mode is normally used when we need
host-to-host (end-to-end) protection of data. The sending host uses IPSec to authenticate and/or
encrypt the payload delivered from the transport layer. The receiving host uses IPSec to check the
authentication and/or decrypt the IP packet and deliver it to the transport layer. Figure below shows
this concept.
Tunnel Mode
In tunnel mode, IPSec protects the entire IP packet. It takes an IP packet, including the header,
applies IPSec security methods to the entire packet, and then adds a new IP header, as shown in
Figure 7 below
The new IP header, as we will see shortly, has different information than the original IP header.
Tunnel mode is normally used between two routers, between a host and a router, or between a
router and a host, as shown in Figure 9. The entire original packet is protected from intrusion
between the sender and the receiver, as if the whole packet goes through an imaginary tunnel.
Figure 9 Tunnel Figure
mode8 Tunnel
in action
mode in action
8.4 FIREWALLS
All previous security measures cannot prevent Eve from sending a harmful message to a system.
To control access to a system we need firewalls. A firewall is a device (usually a router or a
computer) installed between the internal network of an organization and the rest of the Internet. It
is designed to forward some packets and filter (not forward) others. Figure 10 shows a firewall.
Figure 10 Firewall
For example, a firewall may filter all incoming packets destined for a specific host or a specific
server such as HTTP. A firewall can be used to deny access to a specific host or a specific service
in the organization. A firewall is usually classified as a packet-filter firewall or a proxy-based
firewall.
a. Packet-Filter Firewall
A firewall can be used as a packet filter. It can forward or block packets based on the information
in the network-layer and transport-layer headers: source and destination IP addresses, source and
destination port addresses, and type of protocol (TCP or UDP). A packet-filter firewall is a router
that uses a filtering table to decide which packets must be discarded (not forwarded). Figure 11
shows an example of a filtering table for this kind of a firewall.
b. Proxy Firewall
The packet-filter firewall is based on the information available in the network layer and transport
layer headers (IP and TCP/UDP). However, sometimes we need to filter a message based on the
information available in the message itself (at the application layer). As an example, assume that
an organization wants to implement the following policies regarding its web pages: only those
Internet users who have previously established business relations with the company can have
access; access to other users must be blocked. In this case, a packet-filter firewall is not feasible
because it cannot distinguish between different packets arriving at TCP port 80 (HTTP). Testing
must be done at the application level (using URLs). One solution is to install a proxy firewall
(computer) (sometimes called an application gateway), which stands between the customer
computer and the corporation computer. When the user client process sends a message, the
application gateway runs a server process to receive the request. The server opens the packet at the
application level and finds out if the request is legitimate. If it is, the server acts as a client process
and sends the message to the real server in the corporation. If it is not, the message is dropped and
an error message is sent to the external user. In this way, the requests of the external users are
filtered based on the contents at the application layer. Figure 12 shows an application gateway
implementation for HTTP.