Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
44 views54 pages

06 - Network Security

The document discusses key concepts in computer security, focusing on network security, communication security, and perimeter security. It details the evolution and functionality of Transport Layer Security (TLS), including its handshake process, key exchange methods, and challenges. Additionally, it covers Virtual Private Networks (VPNs), firewalls, and their roles in protecting organizational networks from unauthorized access and attacks.

Uploaded by

Ahmad Alhazmi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views54 pages

06 - Network Security

The document discusses key concepts in computer security, focusing on network security, communication security, and perimeter security. It details the evolution and functionality of Transport Layer Security (TLS), including its handshake process, key exchange methods, and challenges. Additionally, it covers Virtual Private Networks (VPNs), firewalls, and their roles in protecting organizational networks from unauthorized access and attacks.

Uploaded by

Ahmad Alhazmi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 54

Computer Security

Network Security

Umm Al-Qura University Computer Security 1


Network Security Concepts
Assumes that each organisation owns a network
– Wants to protect own local network
– Wants to protect communication with other networks
Network Security: two main areas
• Communication Security: Protection of data transmitted across
networks between organisations and end users
– Transport Layer Security
– Virtual Private Network
• Perimeter Security: Protection of an organization’s network from
unauthorized access
– Firewalls
– Intrusion Detection Systems

Umm Al-Qura University Computer Security 22


Communication Security Analogy

Physical transport security

Internet

Protected Pipe

Digital communication security


Umm Al-Qura University Computer Security 33
TRANSPORT LAYER SECURITY (TLS)

Umm Al-Qura University Computer Security 4


SSL/TLS: History
• 1994: Netscape Communications developed the network authentication
protocol Secure Sockets Layer, SSLv2.
– Badly broken, officially deprecated 2011
• 1995: Netscape release their own improvements SSLv3.
– Broken, officially deprecated 2015
• In January 1999, RFC 2246 was issued by the IETF, Transport Layer
Security Protocol: TLS 1.0
– Similar to, but incompatible with SSLv3
– Followed by TLS 1.1 (2006) and TLS 1.2 (2008)
– Current version: TLS 1.3 (2018), removes all old/insecure features/algorithms

Umm Al-Qura University Computer Security 6


5
TLS: Overview
• TLS is a cryptographic services protocol based on the Browser PKI and is
commonly used on the Internet.
– Each server has a server certificate and private key installed
– Allows browsers to establish secure sessions with web servers.
• Port 443 is reserved for HTTP over TLS/SSL and the protocol https is used
with this port.
– http://example.com implies using standard HTTP using port 80.
– https://example.com implies HTTP over TLS/SSL with port 443.
• Other applications:
– IMAP over TLS: port 993
– POP3 over TLS: port 995

Umm Al-Qura University Computer Security 7


6
TLS: Protocol Stack

TLS TLS Change TLS Application


Handshake Cipher Suite Alert Protocol
Protocol Protocol Protocol (e.g. HTTP)

TLS Record Protocol

TCP

IP

Umm Al-Qura University Computer Security 8


7
TLS: Architecture Overview
• Designed to provide secure reliable end-to-end services over TCP.
– Confidentiality
– Integrity
– Authenticity
• Consists of 3 higher level protocols:
– TLS Handshake Protocol
– TLS Alert Protocol
– TLS Change Cipher Spec Protocol
• The TLS Record Protocol provides the practical encryption and integrity
services to various application protocols.

Umm Al-Qura University Computer Security 9


8
TLS: Handshake Protocol
• The handshake protocol
– Negotiates the encryption to be used
– Establishes a shared session key
– Authenticates the server
– Authenticates the client (optional)
• After the handshake, application data is transmitted securely (encrypted +
integrity protected)

Umm Al-Qura University Computer Security 10


9
TLS: Simplified Handshake
Client Server
Supported crypto
algorithms and Client Hello
protocol versions
Server Hello Common protocol,
Common algorithm,
Perform key
exchange & server Client Key Exchange Server certificate
authentication
Server Key Exchange
Client and Server generate session key from secret material
Change Cipher Suite
Go to crypto with Go to crypto with
common algorithm Change Cipher Suite common algorithm
and session key and session key

Continues with TLS Record protocol encrypted with session key


Umm Al-Qura University Computer Security 11
10
TLS: Elements of Handshake
• Client hello
– Advertises available algorithms (e.g. RSA, AES, SHA256)
– Different types of algorithms bundled into “Cipher Suites”
– Format: TLS_key-exchange-algorithm_WITH_data-protection-algorithm
– Example (TLS 1.2): TLS_RSA_WITH_AES_256_CBC_SHA256
• RSA for key exchange
• AES (128 bit key) with CBC mode for encryption
• SHA256 as hash function for authentication and integrity protection
– Example (TLS 1.3): TLS_AES_256_GCM_SHA384
• DH for key exchange (implicit)
• AES with GCM for encryption + integrity protection
• SHA384 as hash function for authentication Details
for the
interested

Umm Al-Qura University Computer Security 12


11
TLS: Elements of Handshake
• Server hello
– Returns the selected cipher suite
– Server adapts to client capabilities
• Server Certificate
– X.509 digital certificate sent to client
– Client verifies the certificate including that the certificate signer is in its acceptable
Certificate Authority (CA) list. Now the client has the server’s certified public key.
• Client Certificate
– Optionally, the client can send its X.509 certificate to server, in order to provide mutual
authentication
• Server/Client Key Exchange
– The client and server can a establish session key using asymmetric
encryption or DH key exchange (details below) Details
for the
interested

Umm Al-Qura University Computer Security 13


12
TLS: Record Protocol Overview
• Provides two services for TLS connections.
– Message Confidentiality:
• Encrypt the payload using symmetric encryption (e.g. AES)
– Message Integrity/Authenticity:
• Calculate a MAC to ensure the message was not modified in transmission
• For both operations, the session key exchanged during
the handshake is used

Umm Al-Qura University Computer Security 14


13
Weakness of DH Key Exchange

A B

ga gb

ge ge

Secure Communication Secure Communication

K1 = gae mod p K2 = gbe mod p

Umm Al-Qura University Computer Security 14


Countermeasure

?
A B

verifiy
signature
using B‘s
gb
public key signed
with B‘s
ga private key

Secure Communication

K = gab mod p

Umm Al-Qura University Computer Security 15


TLS: Key Exchange
• DH exchange:
– Client and server perform Diffie-Hellman-Exchange (DH)
– Server signs his DH value with server private key (RSA)
– Client validates signature with server public key (RSA)
• RSA exchange:
– Asymmetric encryption of symmetric key
– Was in the past the preferred method (simpler)
– Some security issues (no “forward secrecy”)
→ not recommended any more

Umm Al-Qura University Computer Security 17


TLS in a nutshell

Security Authenticity
Confidentiality Integrity
Goals (Message + Sender)

Hand- Server
DH Key Exchange Authentication
shake (Certificate + DSig)

Symmetric Message
Payload
Encryption Authentication Code

Goal support
Key usage

Umm Al-Qura University Computer Security 18


TLS Challenges
• Many vulnerabilities exist for TLS (e.g. DROWN, POODLE, ROBOT, Logjam,
FREAK, BEAST)
→ keep client and server software up-to-date
• Also vulnerabilities in cryptographic algorithms
→ configure server to exclude weak algorithms
• TLS provides security just for a single TCP connection
– Browser can establish HTTP and HTTPS connections; even to the same server (e.g.
HTML via HTTPS, images via HTTP)
• Relies on browser PKI which has many security issues
• No trust indicator
– Owner of “mafia.com” can get a legitimate certificate
– Phishing and TLS can be easily combined
– “Secure Connection” indicator can be misleading

Umm Al-Qura University Computer Security 19


VIRTUAL PRIVATE NETWORKS (VPN)

Umm Al-Qura University Computer Security 19


VPN
• TLS secures only a single TCP connection
• Sometimes:
– all communication from a computer shall be secured
– also non-TCP communication shall be secured
• Typical application:
– VPN tunnel into a company network
– Tunnel can only be established after authentication
– All communication is routed (and secured) through the tunnel
– Client is virtually part of the local company network
– Client gets access to internal services

Umm Al-Qura University Computer Security 21


Typical usage of VPN

External
Location Company
Network

Internet

Protected Pipe

Umm Al-Qura University Computer Security 22


Risk of using VPN
Attacker

External
Location Company
Network

Internet

Protected Pipe

Secure pipe can be attack channel to company network !


Umm Al-Qura University Computer Security 23
VPN
• Another application: VPN Browsing Proxy
• Usage Examples:
– Access to services subscribed by own organization
(e.g. VPN tunnel to UiO to access digital libraries)
– Hide user’s true location (circumvent geo-blocking or censorship)

Umm Al-Qura University Computer Security 24


VPN Browsing – via VPN Proxy

Internet
services

VPNaaS
Internet
(exposed IP addr.)

User

Umm Al-Qura University Computer Security 25


Tor – The Onion Router
• An anonymizing routing protocol Image courtesy indymedia.de

• Originally sponsored by the US Naval Research Laboratory


• From 2004 to 2006 was supported by EFF
• Since 2006 independent nonprofit organization

• Creates a multi-hop proxy circuit through the Internet from client to


destination.
• Each hop “wraps” another encryption layer thereby hiding the next
destination.
• No cleartext-gap, except at the exit-node.
• No node knows end-to-end client-server association

Umm Al-Qura University Computer Security 26


„Onion“ Message

Destination: Jane
Payload

Image courtesy https://www.torproject.org

Umm Al-Qura University Computer Security 27


„Onion“ Message

Destination: Node A
Encrypted for A

Destination: Node B
Encrypted for B

Destination: Node C
Encrypted for C
A B
Destination: Jane
Payload

Image courtesy https://www.torproject.org

Umm Al-Qura University Computer Security 28


FIREWALLS

Umm Al-Qura University Computer Security 28


Defending local networks: Network Perimeter Security

External Network Internal Network


(DMZ)
DNS Mail Web Production Work
Server Server Server Servers Stations

Firewall Firewall
Internet Normal
access
Gateway Switch Router, Switch
Router & Proxy
Packet Filter
Honeypot IDS IDS DB

Umm Al-Qura University Computer Security 31


Firewalls
• A firewall is a check point that protects the internal networks against attack
from outside networks
• The check point decides which traffic can pass in & out based on rules

External Network
Potential Threats
Internal
Internet Resources

Firewall
=
Check Point

Umm Al-Qura University Computer Security 32


Firewalls: Overview 1
• If the risk of having a connection to the Internet is unacceptable, the most
effective way of treating the risk is to avoid the risk altogether and disconnect
completely.
• If disconnection from the Internet is not practical, then firewalls may provide
an effective level of protection that can reduce the risk to an acceptable level.
• Firewalls are often the first line of defence against external attacks but should
not be the only defence.
• A firewall’s purpose is to prevent unauthorized access to or from a private
network.

Umm Al-Qura University Computer Security 33


Firewalls: Overview 2
• All traffic entering or leaving must pass through firewall
• The network owner must define criteria/rules for what is (un)authorized
– The rules defines what to let pass through;
– The rules defines what to block.
• Firewalls must be effectively administered, updated with the latest patches
and monitored.
• Firewalls can be implemented in both hardware and software, or a
combination of both.

Umm Al-Qura University Computer Security 34


Types of Firewall Technology (vehicle analogy)
• Packet Filters Inspects packet
headers only
ABC123

• Stateful Packet Filters


Analyses
bi-directional traffic

• Application Level Gateway/ Next Generation Firewall

End-to-end connection
inspects payload, and
analyses traffic
Umm Al-Qura University Computer Security 35
Types of firewalls

Simple Packet Filter Stateful Packet Filter Application Level Gateway

Umm Al-Qura University Computer Security 36


(Stateless) Packet Filter
• A packet filter is a network router that can accept/reject packets based on
headers
• Packet filters examine each packet’s headers and make decisions based on
attributes such as:
– Source or Destination IP Addresses
– Source or Destination Port Numbers
– Protocol (UDP, TCP or ICMP)
– ICMP message type
– And which interface the packet arrived on
• Unaware of session states at internal or external hosts
• High speed, but primitive filter

Umm Al-Qura University Computer Security 37


(Stateless) Packet Filters
• Widespread packet filter software (Linux):
– iptables / netfilter
– nft / nttables
• Examples (iptables)
• iptables -A FORWARD -s 131.234.142.33 -j ACCEPT
– All packets from source IP Address 131.234.142.33 are accepted
• iptables -A FORWARD -p tcp –d 10.0.0.56 --dport 22 -j ACCEPT
– All packets using transport protocol and destination address 10.0.0.56 and destination
port 22 are accepted

Umm Al-Qura University Computer Security 38


Problems with Stateless Filtering
• Assume a typical “security policy”:
– Access from internal to external allowed
– Access from external to internal prohibited
– Example application: home network
• Naive packet filter configuration:
– outgoing packet → forward
– incoming packet → reject
• Problem?
• Most internet applications would not work!

Umm Al-Qura University Computer Security 39


Stateful Filtering
Internal
Internet Network

TCP, SYN, DST: X

TCP, SYN ACK, SRC: X

UDP, DNS Request, DST: Y

UDP, DNS Response, SRC: Y

TCP, SYN, SRC: Z

UDP, DNS Response, SRC: X

Umm Al-Qura University Computer Security 40


Stateful Packet Filters
• Stateful packet filters track current state of a connection/session
– Recognise if a particular packet is part of an established connection by ‘remembering’
recent traffic history.
– Will add a temporary rule to allow the reply traffic back through the firewall.
– When “session” is finished, the temporary rule is deleted.
• This makes the definition of filtering rules easier to accomplish and therefore
potentially more secure.
• High speed
• Can use relatively advanced filter rules
• Requires memory
– So can be subject to DOS (Denial of Service) attacks

Umm Al-Qura University Computer Security 41


Stateful Packet Filters
• Examples (iptables)
• iptables -A FORWARD -m state --state NEW
-i eth0 -j ACCEPT
• Accept new connections (i.e. TCP SYN) from network interface eth0 („from
inside“)
• iptables -A FORWARD -m state
--state ESTABLISHED,RELATED -j ACCEPT
• Accept ALL packets which belong to an established TCP connection or are
related to an existing UDP communication

Umm Al-Qura University Computer Security 42


(Stateful) Packet Filter: Evaluation
• Strengths:
– Low overhead and high throughput
– Supports almost any application
• Weaknesses:
– Unable to interpret application layer data/commands
• may allow insecure operations to occur
– Allows direct connection between hosts inside & outside firewall

Umm Al-Qura University Computer Security 43


Application Level Gateway
• Inspects payload in end-to-end or proxy application connection
• Support specific application protocols
– e.g., http, telnet, ftp, smtp etc.
– each protocol supported by a specific proxy HW/SW module
• Can be configured to filter specific user applications
– E.g., Facebook, Youtube, LinkedIn
– Can filter detailed elements in each specific user application
• Can provide intrusion detection and intrusion prevention
• Very high processing load in firewall
– High volume needs high performance hardware, or else will be slow

Umm Al-Qura University Computer Security 44


Next Generation Firewalls

High range model: PA-7050


Up to 120 Gbps throughput
Prices starting from: US$ 150,000

High range models: 44000 / 64000


Up to 200 / 400 Gbps throughput
Prices starting from: US$ 200,000

Umm Al-Qura University Computer Security 45


Application Level Gateway
• Strengths:
– Easy logging and audit of all incoming traffic
– Provides potential for best security through control of application layer data/commands
• Weaknesses:
– May require some time for adapting to new applications
– Much slower than packet filters
– Much more expensive than packet filters

Umm Al-Qura University Computer Security 46


Firewalls: Simple Firewall Architecture

Internet
Router /
Firewall
(Gateway)

Internal Networks Internal Networks

DNS Web Email Workstations Production DB


Server Server Server Systems Server

Umm Al-Qura University Computer Security 47


Firewalls: DMZ Architecture

Internet
External
Router /
Firewall

DMZ (Demilitarized Zone) Production DB


Systems Server
Workstations
Internal
Router /
Firewall
DNS Web Email
Server Server Server
Internal Networks

Umm Al-Qura University Computer Security 48


INTRUSION DETECTION SYSTEMS

Umm Al-Qura University Computer Security 47


Intrusion Detection and Prevention
• Intrusion
– Actions aimed at compromising the security of a target network (confidentiality, integrity,
availability of resources)

• Intrusion detection
– The identification of possible intrusion through intrusion signatures and network activity
analysis
– IDS: Intrusion Detection Systems

• Intrusion prevention
– The process of both detecting intrusion activities and managing automatic responsive
actions throughout the network
– IPS: Intrusion Prevention Systems
– IDPS: Intrusion Detection and Prevention Systems

Umm Al-Qura University Computer Security 50


Intrusion Detection Systems:
• IDS are automated systems that detect suspicious activity
• IDS can be either host-based or network-based.
• A host-based IDS is designed to detect intrusions only on the host it is
installed on
– monitor events, changes to host’s OS files and traffic sent to the host
• Network based IDS (NIDS) detect intrusions on one or more network
segments, to protect multiple hosts
– monitor networks looking for suspicious traffic
• What can be detected:
– Attempted and successful misuse, both external and internal agents
– Malware: Trojan programs, viruses and worms
– DoS (Denial of Service) attacks

Umm Al-Qura University Computer Security 51


Network IDS Deployment
External Router /
Firewall
Internet
Internal
Router /
Firewall DB Production
Work
Server Server
DMZ Network Station

Internal Networks
DNS Web Email NIDS
Server Server Server

NIDS
Umm Al-Qura University Computer Security 52
Intrusion Detection Techniques
• Misuse detection
– Use attack “signatures” (need a model of the attack)
• Sequences of system calls, patterns of network traffic, etc.
– Must know in advance what attacker can do, based on known attack patterns
– Can only detect known attacks
– Relatively few false positives
• Anomaly detection
– Using a model of normal system behavior, try to detect deviations and abnormalities
• e.g., raise an alarm when a statistically rare event(s) occurs
– Can potentially detect unknown attacks
– Many false positives

Umm Al-Qura University Computer Security 53


Intrusion Detection Errors
• False negatives: attack is not detected
– Big problem in signature-based misuse detection
• False positives: harmless behavior is classified as attack
– Big problem in statistical anomaly detection
• Both types of IDS suffer from both error types
• Both false positives and false negatives are problematic

Umm Al-Qura University Computer Security 55


Remarks on Intrusion Detection
• Most alarms are false positives
– Requires automated screening and filtering of alarms
• Most true positives are trivial incidents
– can be ignored,
– the attacks will never be able to penetrate any system
• Serious incidents need human attention
– Can be dealt with locally
– May require external expertise
• Potential for improvement through more intelligent IDS
– Less false positives
– Better detection of advanced attacks (APT)

Umm Al-Qura University Computer Security 56


END OF LECTURE

Umm Al-Qura University Computer Security 58


54

You might also like