Network Security Overview
Network Security Overview
Network Security Overview
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Why Is Security Important?
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Chapter 1 Outline
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Mission and Definitions
What is data?
Any object that can be processed or executed by a
computer
Two states of data
transmission state
storage state
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Tasks of Network Security
Data confidentiality
including data in transmission and storage states
Data integrity
including data in transmission and storage state
Data non-repudiation
Data availability
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Loopholes, Flaws, and Defects
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Chapter 1 Outline
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Eavesdropping
Cryptanalysis
Find useful information from ciphertext data
e.g. analyzing statistical structure
Defense method
Use longer keys and stronger encryption algorithm
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Password Pilfering
Password Pilfering
Password protection is often the first defense
line, which may be the only defense available
in the system
Methods to pilfer user password:
Guessing
Social engineering
Dictionary attacks
Password sniffing
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Guessing
Easiest, particularly on short or default passwords
Most commonly-used passwords (ref. SpashData):
123456
password
12345678
abc123
123456789
111111
1234567
Iloveyou
adobe123
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Social Engineering
Methods of using social skills to pilfer secret information
Physical Impersonation
The attacker pretends to be a different person to delude the
victim
Phishing
The most common form of mass social engineering attacks in
recent years
Disguised email messages or masquerade web sites
See the next slide for a real phishing example verbatim (note the
typos in the phishing email), where the link in the email is a trap
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Date: Fri, 5 Oct 2007 16:11:46 -0700
From: US Bank [email protected]
Subject: US Bank Internet Online Access is Locked October 5, 2007 at 12:23:05 PM
Were sorry, but you reached the maximum number of attempts allowed to
login into your US Bank account. For your protection, we have locked your
account.
Consequently, we placed a temporary restriction on your account. We did this
to protect your account from any fraudulent activity.
Please click below and complete the steps to Remove Limitations. This allows
us to confirm your identity and unlock your US Bank online account
http://www4-usbank.com/
If we do no receive the appropriate account verification within 48 hours, then
we will assume this US Bank account is fraudulent and will be suspented.
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
In general, any phishing email would contain a link to a bogus
Web site, called a phishing site
Other forms
Collect recycled papers from recycling bins
Web browser pop up a window asking for user login
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Dictionary Attacks
Only encrypted passwords should be stored in a computer
system
in UNIX/Linux:
passwords are stored in a file named shadows under
directory /etc
in Windows XP:
passwords are stored in a file named SAM, which is
stored in the systems registry
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
A typical dictionary attack proceeds as follows:
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Password Sniffing
Password sniffers are software programs, used to capture
remote login information such as user names and user
passwords
Cain & Abel, a password recovery tool, can capture and crack
encrypted password for the Microsoft Operating System
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Password Protection
Rules to help protect passwords from pilfering:
1. Use long passwords, with a combination of letters, capital letters, digits,
and other characters such as $,#,@. Do not use dictionary words,
common names and dates.
2. Do not reveal your passwords to anyone you do not know. Do not submit
to anyone who acts as if he has authority. If you have to give out your
password, do so face to face.
3. Change passwords periodically and do not reuse old passwords.
4. Do not use the same password for different accounts.
5. Do not use remote login software that does not encrypt user passwords
and other important personal information.
6. Shred all discarded papers using a good paper shredder.
7. Avoid entering any information in any popup window, and avoid clicking
on links in suspicious emails.
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Other User-Authentication Methods
Man-in-the-middle attacks.
Message replays
Defense Mechanisms
Attach a random number to the message. This number is referred to as
nonce (it requires to store the entire history)
Attach a time stamp to the message (it is impossible to synchronize
networked computers 100%; there will be a small error of time)
The best method is to use a nonce and a time stamp together (only
store the messages within a small time interval [t, t+t])
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Network Spoofing
IP spoofing is one of the major network spoofing
techniques
SYN flooding
The attacker fills the target computers TCP buffer with a
large number of crafted SYN packets
Purpose: Make the target computer unable to establish
connection (i.e., to silent/mute the computer)
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
SYN flooding
1. Attacker sends to victim a large number of crafted SYN packets
2. The victims computer is obliged to send an ACK packet to the
crafted source IP address contained in the SYN packet
according to the 3-way handshake protocol
3. Because the source IP address is crafted and unreachable, the
victim computer will never receive the ACK packet it is waiting
for, allowing the crafted SYN packet to remain in the TCP
buffer
4. The TCP buffer is completely occupied by the crafted SYN
packets, causing the computer unable to establish
communications with other computers
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
TCP Hijacking
V is a company computer
Alice, an employee of the company, is going to remote logon to V
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
ARP Spoofing
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Buffer-Overflow Exploitation
Buffer-Overflow Exploitation
Buffer overflow, a.k.a. buffer overrun, is a common software flaw.
Buffer overflow occurs if the process writes more data into a buffer area
than it is supposed to hold
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
General steps of buffer-overflow attack:
1. Find a program that is prone to buffer overflows (e.g. programs
use function do not check bounds)
2. Figure out the address of the attackers code
3. Determine the number of bytes that is long enough to overwrite
the return address
4. Overflow the buffer that rewrites the original return address of
the function call with the address of the attackers code
Defense method
1. Coding: follow good programming practice; always add
statements to check bounds when dealing with buffers
2. Compiling: insert a random canary value before a returned
address
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Repudiation
Defense method
Use stronger encryption and authentication algorithms
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Intrusion
An illegitimate user gains access to someone elses computer
systems. Configuration loopholes, protocol flaws, and software side
effects may all be exploited by intruders
IP scans and Port scans are common hacking tools. However, it can
also help users to identify in their own systems which ports are open
and which ports may be vulnerable.
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Traffic Analysis
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
(1) Sender forwards an IP packet to gateway A. (2) gateway A encrypts senders
IP packet and routes it to the next router in the Internet. (3) The IP packet from
Gateway A is delivered to gateway B. (4) Gateway B removes its header,
decrypts the encrypted IP packet of the sender, and forwards it to the receiver.
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Denial of Service Attacks
The goal is to block legitimate users from getting
services they can normally get from servers
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
DoS
SYN flooding is a typical and effective technique used by DoS
attacks. The smurf attack is another typical type of DoS attack
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Spam Mail
While not intended to bring the users computer out of service, spam
mails do consume computing resources
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Malicious Software
Worms
Trojan horses
Logic bombs
Backdoors
Spyware
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Viruses and Worms
A computer virus is a piece of software that can reproduce itself. A
virus is not a standalone program. It must attach itself to another
program or another file. A program or file that contains a virus is
called an infected host
Defense method
Do not download software from distrusted Web sites or other sources
Do not open any executable file given to you by someone you do not
know
Make sure software patches are installed and up to date
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Trojan Horse
Trojan horses are software programs that appear to do
one thing, but secretly also perform other tasks
Defense method
Employers should take care of their employees, so that none would
be tempted to place a logic bomb
Project managers should hire an outside company or form a special
team of reviewers from a different group of people other than the
developer to review the source code
Relevant laws should be established so that employees who planted
logic bombs will face criminal charges
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Backdoors
Backdoors are secret entrance points to a
program
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Spyware
Spyware is a type of software that installs itself on the
users computer
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Spyward can also do a list of other things,
including
Monitoring monitor and report to a web server or to the
attackers machine a users surfing habits and patterns.
Password sniffing sniff user passwords by logging
users keystrokes using a keystroke logger
Adware software that automatically displays
advertising materials on the users computer screen.
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Hackers
Hackers
Computer hackers are people with special knowledge of computer
systems. They are interested in subtle details of software, algorithms,
and system configurations
Black-Hat Hackers hack computing systems fro their own benefit
Grey-Hat Hackers wear a white hat most of the time, but may also wear
a black hat once in a while
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Script Kiddies
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Cyber Spies
Collecting intelligence through intercepted network
communications is the job of cyber spies
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Vicious Employees, Cyber Terrorists
and Hypothetical Attackers
Vicious Employees
Vicious employees are people who intentionally breach security to harm
their employers
Cyber Terrorists
Cyber terrorists are terrorists who use computer and network
technologies to carry out their attacks and produce public fear
Hypothetical Attackers
black-hat hackers
script kiddies
greedy cyber spies who are willing to betray their countries or
organizations for monetary benefits
vicious employees
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Chapter 1 outline
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Basic Security Model
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Network model of cryptosystem
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
1. Solusi apa dari sisi programmer untuk mengantisipasi
serangan buffer overflow?
2. Apa perbedaan serangan DOS dan DDOS ?
3. Bagaimana solusi untuk menghindari serangan bentuk
Trojan?
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Chapter 1 outline
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015
Example Security Resources
CERT
www.cert.org
SANS Institute
www.scans.org
Microsoft Security
www.microsoft.com/security/default.mspx
NTBugtraq
www.ntbugtraq.com
CVE database
www.cve.mitre.org
J. Wang and Z. Kissel. Introduction to Network Security: Theory and Practice. Wiley and HEP, 2015