Computer Networks: Basics & Security Issues

97
Computer Networks: Basics & Security Issues Burak Ekici [email protected] Department of Computer Engineering, Ya¸ sar University, Turkey. April 22, 2012 Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 1 / 49

Transcript of Computer Networks: Basics & Security Issues

Page 1: Computer Networks: Basics & Security Issues

Computer Networks: Basics & Security Issues

Burak [email protected]

Department of Computer Engineering,Yasar University,

Turkey.

April 22, 2012

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 1 / 49

Page 2: Computer Networks: Basics & Security Issues

Agenda

1 General Information About NetworksThe Notion: Computer NetworkThe ISO/OSI Model

The ISO/OSI Layers

2 Network SecurityDefinition & The Goals: Network SecurityNetwork Security: ApproachesVulnerabilities: Layer by Layer

3 Summary

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 2 / 49

Page 3: Computer Networks: Basics & Security Issues

The Notion: Computer Network

Definition: Computer Network

A computer network is simply two or more computers connectedtogether so they can exchange information. A small network can be assimple as two computers linked together with the aim of informationsharing and/or common usage of H/W devices.

Figure: Two Networked Computers

Image Source: Building a Simple Network (by Intel)Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 3 / 49

Page 4: Computer Networks: Basics & Security Issues

Types of Networks

Networking Types

1 Local Area Networks (LAN): A LAN connects computers together atone location.

2 Metropolitan Area Networks (MAN): A MAN connects two or moreLANs together but does not span outside the boundaries of a city,town, or metropolitan area.

3 Wide Area Networks (WAN): A WAN connects larger geographicareas. Often, smaller LANs are interconnected to form a large WAN.

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 4 / 49

Page 5: Computer Networks: Basics & Security Issues

The ISO/OSI Model

Figure: The OSI Layer

Definition: The ISO/OSI Model

The International StandardsOrganization (ISO) Open SystemsInterconnect (OSI) Reference Modelpresents seven layers of communicationstypes, and the interfaces between them.

The aim is connecting two computers indifferent platforms together.

The ISO/OSI Layers

Each layer provides service to the itsabove and below layers.

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 5 / 49

Page 6: Computer Networks: Basics & Security Issues

The ISO/OSI Layers

The Pysical Layer

I Physical Layer defines the physical environment in/on whichinformation, in the form of bits, is transferred.

I Wired Communication EnvironmentI Wireless Communication Environment

I In order for both sender and receiver machines to put the samemeaning on the transferred data; the same protocols should be used.

I Protocols that are used in this layer: ISDN, RS-232, EIA-422,RS-449, EIA-485, 10BASE-T, 100BASE-TX, SONET, DSL, ...

Physical Transmission of the Data!!!

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 6 / 49

Page 7: Computer Networks: Basics & Security Issues

The ISO/OSI Layers

The Pysical Layer

I Physical Layer defines the physical environment in/on whichinformation, in the form of bits, is transferred.

I Wired Communication EnvironmentI Wireless Communication Environment

I In order for both sender and receiver machines to put the samemeaning on the transferred data; the same protocols should be used.

I Protocols that are used in this layer: ISDN, RS-232, EIA-422,RS-449, EIA-485, 10BASE-T, 100BASE-TX, SONET, DSL, ...

Physical Transmission of the Data!!!

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 6 / 49

Page 8: Computer Networks: Basics & Security Issues

The ISO/OSI Layers

The Pysical Layer

I Physical Layer defines the physical environment in/on whichinformation, in the form of bits, is transferred.

I Wired Communication EnvironmentI Wireless Communication Environment

I In order for both sender and receiver machines to put the samemeaning on the transferred data; the same protocols should be used.

I Protocols that are used in this layer: ISDN, RS-232, EIA-422,RS-449, EIA-485, 10BASE-T, 100BASE-TX, SONET, DSL, ...

Physical Transmission of the Data!!!

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 6 / 49

Page 9: Computer Networks: Basics & Security Issues

The ISO/OSI Layers

The Pysical Layer

I Physical Layer defines the physical environment in/on whichinformation, in the form of bits, is transferred.

I Wired Communication EnvironmentI Wireless Communication Environment

I In order for both sender and receiver machines to put the samemeaning on the transferred data; the same protocols should be used.

I Protocols that are used in this layer: ISDN, RS-232, EIA-422,RS-449, EIA-485, 10BASE-T, 100BASE-TX, SONET, DSL, ...

Physical Transmission of the Data!!!

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 6 / 49

Page 10: Computer Networks: Basics & Security Issues

The ISO/OSI Layers

The Data Link Layer

I Data Link Layer defines the access rights to the Physical Layer.

I Responsible for the integrity of the data.

I Adds MAC address to the transferred data.

I The unit of transmitted information is called a frame which consistsof a link-layer header followed by bits.

I Protocols that are used in this layer: Ethernet, HDLC, Wi-Fi, Tokenring, FDDI, PPP, ...

Hardware address evaluation!!!

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 7 / 49

Page 11: Computer Networks: Basics & Security Issues

The ISO/OSI Layers

The Data Link Layer

I Data Link Layer defines the access rights to the Physical Layer.

I Responsible for the integrity of the data.

I Adds MAC address to the transferred data.

I The unit of transmitted information is called a frame which consistsof a link-layer header followed by bits.

I Protocols that are used in this layer: Ethernet, HDLC, Wi-Fi, Tokenring, FDDI, PPP, ...

Hardware address evaluation!!!

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 7 / 49

Page 12: Computer Networks: Basics & Security Issues

The ISO/OSI Layers

The Data Link Layer

I Data Link Layer defines the access rights to the Physical Layer.

I Responsible for the integrity of the data.

I Adds MAC address to the transferred data.

I The unit of transmitted information is called a frame which consistsof a link-layer header followed by bits.

I Protocols that are used in this layer: Ethernet, HDLC, Wi-Fi, Tokenring, FDDI, PPP, ...

Hardware address evaluation!!!

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 7 / 49

Page 13: Computer Networks: Basics & Security Issues

The ISO/OSI Layers

The Data Link Layer

I Data Link Layer defines the access rights to the Physical Layer.

I Responsible for the integrity of the data.

I Adds MAC address to the transferred data.

I The unit of transmitted information is called a frame which consistsof a link-layer header followed by bits.

I Protocols that are used in this layer: Ethernet, HDLC, Wi-Fi, Tokenring, FDDI, PPP, ...

Hardware address evaluation!!!

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 7 / 49

Page 14: Computer Networks: Basics & Security Issues

The ISO/OSI Layers

The Data Link Layer

I Data Link Layer defines the access rights to the Physical Layer.

I Responsible for the integrity of the data.

I Adds MAC address to the transferred data.

I The unit of transmitted information is called a frame which consistsof a link-layer header followed by bits.

I Protocols that are used in this layer: Ethernet, HDLC, Wi-Fi, Tokenring, FDDI, PPP, ...

Hardware address evaluation!!!

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 7 / 49

Page 15: Computer Networks: Basics & Security Issues

The ISO/OSI Layers

The Data Link Layer

I Data Link Layer defines the access rights to the Physical Layer.

I Responsible for the integrity of the data.

I Adds MAC address to the transferred data.

I The unit of transmitted information is called a frame which consistsof a link-layer header followed by bits.

I Protocols that are used in this layer: Ethernet, HDLC, Wi-Fi, Tokenring, FDDI, PPP, ...

Hardware address evaluation!!!

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 7 / 49

Page 16: Computer Networks: Basics & Security Issues

The ISO/OSI Layers

The Network Layer

I Network Layer manages the network traffic to avoid the possiblecollision.

I The unit of transmitted information is called a packet which consistsof a network layer header followed by a frame.

I Adds IP address to the transferred data.

I Protocols that are used in this layer: IP, IPv4, IPv6, ICMP, ARP,IGMP, . . .

Network address evaluation!!!

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 8 / 49

Page 17: Computer Networks: Basics & Security Issues

The ISO/OSI Layers

The Network Layer

I Network Layer manages the network traffic to avoid the possiblecollision.

I The unit of transmitted information is called a packet which consistsof a network layer header followed by a frame.

I Adds IP address to the transferred data.

I Protocols that are used in this layer: IP, IPv4, IPv6, ICMP, ARP,IGMP, . . .

Network address evaluation!!!

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 8 / 49

Page 18: Computer Networks: Basics & Security Issues

The ISO/OSI Layers

The Network Layer

I Network Layer manages the network traffic to avoid the possiblecollision.

I The unit of transmitted information is called a packet which consistsof a network layer header followed by a frame.

I Adds IP address to the transferred data.

I Protocols that are used in this layer: IP, IPv4, IPv6, ICMP, ARP,IGMP, . . .

Network address evaluation!!!

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 8 / 49

Page 19: Computer Networks: Basics & Security Issues

The ISO/OSI Layers

The Network Layer

I Network Layer manages the network traffic to avoid the possiblecollision.

I The unit of transmitted information is called a packet which consistsof a network layer header followed by a frame.

I Adds IP address to the transferred data.

I Protocols that are used in this layer: IP, IPv4, IPv6, ICMP, ARP,IGMP, . . .

Network address evaluation!!!

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 8 / 49

Page 20: Computer Networks: Basics & Security Issues

The ISO/OSI Layers

The Network Layer

I Network Layer manages the network traffic to avoid the possiblecollision.

I The unit of transmitted information is called a packet which consistsof a network layer header followed by a frame.

I Adds IP address to the transferred data.

I Protocols that are used in this layer: IP, IPv4, IPv6, ICMP, ARP,IGMP, . . .

Network address evaluation!!!

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 8 / 49

Page 21: Computer Networks: Basics & Security Issues

The ISO/OSI Layers

The Transport Layer

I Transport Layer is the first purely logical layer

I It also ensures error-freeness of the transmission.

I Data-transmission rates, congestion control are also theresponsibilities of the layer.

I The unit of transmitted information is called a segment whichconsists of a transport layer header followed by a packet.

I Protocols that are used in this layer: TCP, UDP, SCTP, DCCP, ...

Connection Type Evaluation

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 9 / 49

Page 22: Computer Networks: Basics & Security Issues

The ISO/OSI Layers

The Transport Layer

I Transport Layer is the first purely logical layer

I It also ensures error-freeness of the transmission.

I Data-transmission rates, congestion control are also theresponsibilities of the layer.

I The unit of transmitted information is called a segment whichconsists of a transport layer header followed by a packet.

I Protocols that are used in this layer: TCP, UDP, SCTP, DCCP, ...

Connection Type Evaluation

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 9 / 49

Page 23: Computer Networks: Basics & Security Issues

The ISO/OSI Layers

The Transport Layer

I Transport Layer is the first purely logical layer

I It also ensures error-freeness of the transmission.

I Data-transmission rates, congestion control are also theresponsibilities of the layer.

I The unit of transmitted information is called a segment whichconsists of a transport layer header followed by a packet.

I Protocols that are used in this layer: TCP, UDP, SCTP, DCCP, ...

Connection Type Evaluation

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 9 / 49

Page 24: Computer Networks: Basics & Security Issues

The ISO/OSI Layers

The Transport Layer

I Transport Layer is the first purely logical layer

I It also ensures error-freeness of the transmission.

I Data-transmission rates, congestion control are also theresponsibilities of the layer.

I The unit of transmitted information is called a segment whichconsists of a transport layer header followed by a packet.

I Protocols that are used in this layer: TCP, UDP, SCTP, DCCP, ...

Connection Type Evaluation

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 9 / 49

Page 25: Computer Networks: Basics & Security Issues

The ISO/OSI Layers

The Transport Layer

I Transport Layer is the first purely logical layer

I It also ensures error-freeness of the transmission.

I Data-transmission rates, congestion control are also theresponsibilities of the layer.

I The unit of transmitted information is called a segment whichconsists of a transport layer header followed by a packet.

I Protocols that are used in this layer: TCP, UDP, SCTP, DCCP, ...

Connection Type Evaluation

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 9 / 49

Page 26: Computer Networks: Basics & Security Issues

The ISO/OSI Layers

The Transport Layer

I Transport Layer is the first purely logical layer

I It also ensures error-freeness of the transmission.

I Data-transmission rates, congestion control are also theresponsibilities of the layer.

I The unit of transmitted information is called a segment whichconsists of a transport layer header followed by a packet.

I Protocols that are used in this layer: TCP, UDP, SCTP, DCCP, ...

Connection Type Evaluation

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 9 / 49

Page 27: Computer Networks: Basics & Security Issues

The ISO/OSI Layers

The Session Layer

I Session Layer provides the mechanism for opening, closing andmanaging a session between end-user application processes.

I Protocols that are used in this layer: Named Pipes, Socket, NetBIOS,SAP, Half Duplex, Full Duplex, Simplex, SDP, RPC, SMPP, SSH

Opening and Closing Connections!!!

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 10 / 49

Page 28: Computer Networks: Basics & Security Issues

The ISO/OSI Layers

The Session Layer

I Session Layer provides the mechanism for opening, closing andmanaging a session between end-user application processes.

I Protocols that are used in this layer: Named Pipes, Socket, NetBIOS,SAP, Half Duplex, Full Duplex, Simplex, SDP, RPC, SMPP, SSH

Opening and Closing Connections!!!

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 10 / 49

Page 29: Computer Networks: Basics & Security Issues

The ISO/OSI Layers

The Session Layer

I Session Layer provides the mechanism for opening, closing andmanaging a session between end-user application processes.

I Protocols that are used in this layer: Named Pipes, Socket, NetBIOS,SAP, Half Duplex, Full Duplex, Simplex, SDP, RPC, SMPP, SSH

Opening and Closing Connections!!!

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 10 / 49

Page 30: Computer Networks: Basics & Security Issues

The ISO/OSI Layers

The Presentation Layer

I Presentation Layer puts meaning on the transmitted information forits receiver to understand it.

I Different programs could use each other’s data format.

I Protocols that are used in this layer: TDI, ASCII, MPEG, ISO 8822,ISO 8823, ISO 8824, ITU-T T.73, ITU-T X.409, ...

Data Sequence Management!!!

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 11 / 49

Page 31: Computer Networks: Basics & Security Issues

The ISO/OSI Layers

The Presentation Layer

I Presentation Layer puts meaning on the transmitted information forits receiver to understand it.

I Different programs could use each other’s data format.

I Protocols that are used in this layer: TDI, ASCII, MPEG, ISO 8822,ISO 8823, ISO 8824, ITU-T T.73, ITU-T X.409, ...

Data Sequence Management!!!

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 11 / 49

Page 32: Computer Networks: Basics & Security Issues

The ISO/OSI Layers

The Presentation Layer

I Presentation Layer puts meaning on the transmitted information forits receiver to understand it.

I Different programs could use each other’s data format.

I Protocols that are used in this layer: TDI, ASCII, MPEG, ISO 8822,ISO 8823, ISO 8824, ITU-T T.73, ITU-T X.409, ...

Data Sequence Management!!!

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 11 / 49

Page 33: Computer Networks: Basics & Security Issues

The ISO/OSI Layers

The Presentation Layer

I Presentation Layer puts meaning on the transmitted information forits receiver to understand it.

I Different programs could use each other’s data format.

I Protocols that are used in this layer: TDI, ASCII, MPEG, ISO 8822,ISO 8823, ISO 8824, ITU-T T.73, ITU-T X.409, ...

Data Sequence Management!!!

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 11 / 49

Page 34: Computer Networks: Basics & Security Issues

The ISO/OSI Layers

The Application Layer

I Application layer provides services for software applications.

I also supplies the ability for user applications to interact with thenetwork.

I Protocols that are used in this layer: HTTP, HTTPS, SMTP, POP,FTP, TFTP, UUCP, NNTP, SSL, SSH, IRC, SNMP, SIP, RTP,Telnet, ...

Applications for network interactions!!!

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 12 / 49

Page 35: Computer Networks: Basics & Security Issues

The ISO/OSI Layers

The Application Layer

I Application layer provides services for software applications.

I also supplies the ability for user applications to interact with thenetwork.

I Protocols that are used in this layer: HTTP, HTTPS, SMTP, POP,FTP, TFTP, UUCP, NNTP, SSL, SSH, IRC, SNMP, SIP, RTP,Telnet, ...

Applications for network interactions!!!

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 12 / 49

Page 36: Computer Networks: Basics & Security Issues

The ISO/OSI Layers

The Application Layer

I Application layer provides services for software applications.

I also supplies the ability for user applications to interact with thenetwork.

I Protocols that are used in this layer: HTTP, HTTPS, SMTP, POP,FTP, TFTP, UUCP, NNTP, SSL, SSH, IRC, SNMP, SIP, RTP,Telnet, ...

Applications for network interactions!!!

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 12 / 49

Page 37: Computer Networks: Basics & Security Issues

The ISO/OSI Layers

The Application Layer

I Application layer provides services for software applications.

I also supplies the ability for user applications to interact with thenetwork.

I Protocols that are used in this layer: HTTP, HTTPS, SMTP, POP,FTP, TFTP, UUCP, NNTP, SSL, SSH, IRC, SNMP, SIP, RTP,Telnet, ...

Applications for network interactions!!!

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 12 / 49

Page 38: Computer Networks: Basics & Security Issues

Network Security Basics

What is Network Security

Network Security is a specialized field in computer networking standing forkeeping networks away from:

I Distortion and destruction of the data transmitted,

I Penetration and cracking,

I Interruption of the communication.

together with the goals of:

I Confidentiality: avoidance of unauthorized access to the data

I Integrity: keeping data unchanged

I Availability: authorized user could use the network when/every timethey need.

I Authentication: the receiver should be sure about the origin or senderof the data (authentica data)

I Non-repudiation: the sender should not deny the data he/she sent.

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 13 / 49

Page 39: Computer Networks: Basics & Security Issues

Network Security Basics

What is Network Security

Network Security is a specialized field in computer networking standing forkeeping networks away from:

I Distortion and destruction of the data transmitted,

I Penetration and cracking,

I Interruption of the communication.

together with the goals of:

I Confidentiality: avoidance of unauthorized access to the data

I Integrity: keeping data unchanged

I Availability: authorized user could use the network when/every timethey need.

I Authentication: the receiver should be sure about the origin or senderof the data (authentica data)

I Non-repudiation: the sender should not deny the data he/she sent.

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 13 / 49

Page 40: Computer Networks: Basics & Security Issues

Network Security Basics

In order to achieve these goals:

1 Identifying a security policy:I Well-defined access rights.I Well-defined cases in the usages of network assets.

2 Being aware about system features:I define the weakest and strongest parts,I the most important assets,I the available and visible assets and links (all the time).

3 Forcing the limits to understand system vulnerabilities:I define possible attack strategies against your system,I possible attackers,I the reasons for these attacks.

4 Defining a security mechanism (ways to secure the vulnerable parts):I Usages of secure hard and softwares.I Cryptography: Encrypted transmission of the data.I Security Expertise.

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 14 / 49

Page 41: Computer Networks: Basics & Security Issues

Network Security Basics

In order to achieve these goals:

1 Identifying a security policy:I Well-defined access rights.I Well-defined cases in the usages of network assets.

2 Being aware about system features:I define the weakest and strongest parts,I the most important assets,I the available and visible assets and links (all the time).

3 Forcing the limits to understand system vulnerabilities:I define possible attack strategies against your system,I possible attackers,I the reasons for these attacks.

4 Defining a security mechanism (ways to secure the vulnerable parts):I Usages of secure hard and softwares.I Cryptography: Encrypted transmission of the data.I Security Expertise.

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 14 / 49

Page 42: Computer Networks: Basics & Security Issues

Network Security Basics

In order to achieve these goals:

1 Identifying a security policy:I Well-defined access rights.I Well-defined cases in the usages of network assets.

2 Being aware about system features:I define the weakest and strongest parts,I the most important assets,I the available and visible assets and links (all the time).

3 Forcing the limits to understand system vulnerabilities:I define possible attack strategies against your system,I possible attackers,I the reasons for these attacks.

4 Defining a security mechanism (ways to secure the vulnerable parts):I Usages of secure hard and softwares.I Cryptography: Encrypted transmission of the data.I Security Expertise.

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 14 / 49

Page 43: Computer Networks: Basics & Security Issues

Network Security Basics

In order to achieve these goals:

1 Identifying a security policy:I Well-defined access rights.I Well-defined cases in the usages of network assets.

2 Being aware about system features:I define the weakest and strongest parts,I the most important assets,I the available and visible assets and links (all the time).

3 Forcing the limits to understand system vulnerabilities:I define possible attack strategies against your system,I possible attackers,I the reasons for these attacks.

4 Defining a security mechanism (ways to secure the vulnerable parts):I Usages of secure hard and softwares.I Cryptography: Encrypted transmission of the data.I Security Expertise.

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 14 / 49

Page 44: Computer Networks: Basics & Security Issues

Network Security Basics

Security Mechanisms

1 Prevention Mechanisms: efforts for avoiding attacks

2 Detection Mechanism: efforts for detecting attacks

3 Recovery Mechanism: efforts for reconstructing a subverted system

4 User Awareness: informing users about the risks in the ways that theyuse resources

5 Physical Protection of H/W Devices

6 Usages of Access Control Softwares: through Need-to-Know Principal

7 Usages of Cryptographic Schemes

8 Monitoring the System Activity: auditing

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 15 / 49

Page 45: Computer Networks: Basics & Security Issues

Network Security Basics

Security Mechanisms

1 Prevention Mechanisms: efforts for avoiding attacks

2 Detection Mechanism: efforts for detecting attacks

3 Recovery Mechanism: efforts for reconstructing a subverted system

4 User Awareness: informing users about the risks in the ways that theyuse resources

5 Physical Protection of H/W Devices

6 Usages of Access Control Softwares: through Need-to-Know Principal

7 Usages of Cryptographic Schemes

8 Monitoring the System Activity: auditing

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 15 / 49

Page 46: Computer Networks: Basics & Security Issues

Network Security Basics

Security Mechanisms

1 Prevention Mechanisms: efforts for avoiding attacks

2 Detection Mechanism: efforts for detecting attacks

3 Recovery Mechanism: efforts for reconstructing a subverted system

4 User Awareness: informing users about the risks in the ways that theyuse resources

5 Physical Protection of H/W Devices

6 Usages of Access Control Softwares: through Need-to-Know Principal

7 Usages of Cryptographic Schemes

8 Monitoring the System Activity: auditing

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 15 / 49

Page 47: Computer Networks: Basics & Security Issues

Network Security Basics

Security Mechanisms

1 Prevention Mechanisms: efforts for avoiding attacks

2 Detection Mechanism: efforts for detecting attacks

3 Recovery Mechanism: efforts for reconstructing a subverted system

4 User Awareness: informing users about the risks in the ways that theyuse resources

5 Physical Protection of H/W Devices

6 Usages of Access Control Softwares: through Need-to-Know Principal

7 Usages of Cryptographic Schemes

8 Monitoring the System Activity: auditing

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 15 / 49

Page 48: Computer Networks: Basics & Security Issues

Network Security Basics

Security Mechanisms

1 Prevention Mechanisms: efforts for avoiding attacks

2 Detection Mechanism: efforts for detecting attacks

3 Recovery Mechanism: efforts for reconstructing a subverted system

4 User Awareness: informing users about the risks in the ways that theyuse resources

5 Physical Protection of H/W Devices

6 Usages of Access Control Softwares: through Need-to-Know Principal

7 Usages of Cryptographic Schemes

8 Monitoring the System Activity: auditing

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 15 / 49

Page 49: Computer Networks: Basics & Security Issues

Network Security Basics

Security Mechanisms

1 Prevention Mechanisms: efforts for avoiding attacks

2 Detection Mechanism: efforts for detecting attacks

3 Recovery Mechanism: efforts for reconstructing a subverted system

4 User Awareness: informing users about the risks in the ways that theyuse resources

5 Physical Protection of H/W Devices

6 Usages of Access Control Softwares: through Need-to-Know Principal

7 Usages of Cryptographic Schemes

8 Monitoring the System Activity: auditing

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 15 / 49

Page 50: Computer Networks: Basics & Security Issues

Network Security Basics

Security Mechanisms

1 Prevention Mechanisms: efforts for avoiding attacks

2 Detection Mechanism: efforts for detecting attacks

3 Recovery Mechanism: efforts for reconstructing a subverted system

4 User Awareness: informing users about the risks in the ways that theyuse resources

5 Physical Protection of H/W Devices

6 Usages of Access Control Softwares: through Need-to-Know Principal

7 Usages of Cryptographic Schemes

8 Monitoring the System Activity: auditing

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 15 / 49

Page 51: Computer Networks: Basics & Security Issues

Network Security Basics

Security Mechanisms

1 Prevention Mechanisms: efforts for avoiding attacks

2 Detection Mechanism: efforts for detecting attacks

3 Recovery Mechanism: efforts for reconstructing a subverted system

4 User Awareness: informing users about the risks in the ways that theyuse resources

5 Physical Protection of H/W Devices

6 Usages of Access Control Softwares: through Need-to-Know Principal

7 Usages of Cryptographic Schemes

8 Monitoring the System Activity: auditing

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 15 / 49

Page 52: Computer Networks: Basics & Security Issues

Network Security: Approaches

Figure: The OSI Layer

The General Approach

1 Detection of the vulnerabilities ofeach OSI/ISO layer:

I from which part of a layer; anattack could be performed

2 Securing each layer:I using current state of art in order

to close the security gaps.

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 16 / 49

Page 53: Computer Networks: Basics & Security Issues

Network Security: Approaches

Figure: The OSI Layer

The General Approach

1 Detection of the vulnerabilities ofeach OSI/ISO layer:

I from which part of a layer; anattack could be performed

2 Securing each layer:I using current state of art in order

to close the security gaps.

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 16 / 49

Page 54: Computer Networks: Basics & Security Issues

Vulnerabilities of Physical Layer: Transmission MediaSecurity

Physical Layer: In The Sense of Security

I Vulnerability: due to communications are being established and hardlyperformed at this layer; it is possible to eavesdrop on thecommunication by sniffing the actual medium (tapping).

I Attack Types: depends on the used media in communication.I wired communication environmentsI wireless communication environments

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 17 / 49

Page 55: Computer Networks: Basics & Security Issues

Vulnerabilities of Physical Layer: Transmission MediaSecurity

Physical Layer: In The Sense of Security

I Vulnerability: due to communications are being established and hardlyperformed at this layer; it is possible to eavesdrop on thecommunication by sniffing the actual medium (tapping).

I Attack Types: depends on the used media in communication.I wired communication environmentsI wireless communication environments

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 17 / 49

Page 56: Computer Networks: Basics & Security Issues

Transmission Media Security: Wired CommunicationEnvironments

Figure: A Twisted Pair Figure: A Coaxial Cable

Tapping into the media: Twisted Pair/Coaxial Cable

I the most vulnerable cable types

I relatively easy to hack (minimal equipments and knowledge)

I problematic case: they can be tapped into at any point along thecable without being detected

I twisted pairs emit electromagnetic energy that can be picked up withsensitive equipment even without physically tapping into the media

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 18 / 49

Page 57: Computer Networks: Basics & Security Issues

Transmission Media Security: Wired CommunicationEnvironments

Figure: A Fiber Optic Cable

Tapping into the media: Fiber Optic Cable

I the least vulnerable cable: no electromagnetic waves are generated;data is transmitted as beams of light

I relatively hard to hack (tap) but still holds the risk

I positive situation (user’s case): hiding the tap is too hard; if tappingcase happens with breaking the strand, then connection immediatelyshuts down.

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 19 / 49

Page 58: Computer Networks: Basics & Security Issues

Transmission Media Security: Wireless CommunicationEnvironments

Tapping into the media: Wireless Communication

I Easy to eavesdrop with special equipments,

I More detailedly: Next Session on Wireless Network Basics andSecurity!

Method(s) of Prevention: Physical Layer

1 Proper Monitoring!!!

2 Encrypted Data!!!

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 20 / 49

Page 59: Computer Networks: Basics & Security Issues

Transmission Media Security: Wireless CommunicationEnvironments

Tapping into the media: Wireless Communication

I Easy to eavesdrop with special equipments,

I More detailedly: Next Session on Wireless Network Basics andSecurity!

Method(s) of Prevention: Physical Layer

1 Proper Monitoring!!!

2 Encrypted Data!!!

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 20 / 49

Page 60: Computer Networks: Basics & Security Issues

Transmission Media Security: Wireless CommunicationEnvironments

Tapping into the media: Wireless Communication

I Easy to eavesdrop with special equipments,

I More detailedly: Next Session on Wireless Network Basics andSecurity!

Method(s) of Prevention: Physical Layer

1 Proper Monitoring!!!

2 Encrypted Data!!!

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 20 / 49

Page 61: Computer Networks: Basics & Security Issues

Transmission Media Security: Wireless CommunicationEnvironments

Tapping into the media: Wireless Communication

I Easy to eavesdrop with special equipments,

I More detailedly: Next Session on Wireless Network Basics andSecurity!

Method(s) of Prevention: Physical Layer

1 Proper Monitoring!!!

2 Encrypted Data!!!

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 20 / 49

Page 62: Computer Networks: Basics & Security Issues

Transmission Media Security: Wireless CommunicationEnvironments

Tapping into the media: Wireless Communication

I Easy to eavesdrop with special equipments,

I More detailedly: Next Session on Wireless Network Basics andSecurity!

Method(s) of Prevention: Physical Layer

1 Proper Monitoring!!!

2 Encrypted Data!!!

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 20 / 49

Page 63: Computer Networks: Basics & Security Issues

Vulnerabilities of Data Link Layer

Figure: The OSI Layer: Domino Effect

Data Link Layer: In The Sense ofSecurity

I OSI was built to allow differentlayers to work withoutknowledge of each other. Thatmeans that if a layer two iscompromised; the other layerswill not be aware which iscalled “Domino effect”.

I Attack Types:I ARP Based AttacksI MAC Address Based Attacks

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 21 / 49

Page 64: Computer Networks: Basics & Security Issues

Vulnerabilities of Data Link Layer

Figure: The OSI Layer: Domino Effect

Data Link Layer: In The Sense ofSecurity

I OSI was built to allow differentlayers to work withoutknowledge of each other. Thatmeans that if a layer two iscompromised; the other layerswill not be aware which iscalled “Domino effect”.

I Attack Types:I ARP Based AttacksI MAC Address Based Attacks

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 21 / 49

Page 65: Computer Networks: Basics & Security Issues

Vulnerabilities of Data Link Layer: MAC Attacks

Figure: MAC Address

Definition: MAC Address

A Media Access Control address (MAC) is a 48-bit unique identifierassigned to network interfaces for communications on the physical networksegment.

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 22 / 49

Page 66: Computer Networks: Basics & Security Issues

Vulnerabilities of Data Link Layer: ARP Attacks

Definition: ARP

The Address Resolution Protocol (ARP) is a widely used protocol forresolving network layer addresses into link layer addresses by using ARPtables.

Conversion of IP addresses to MAC (physical) addresses or viceversa.

Figure: An ARP Table

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 23 / 49

Page 67: Computer Networks: Basics & Security Issues

Vulnerabilities of Data Link Layer: ARP Attacks

How ARP Works?1 An ARP Request: Computer A asks the network, ”Who has this IP

address?”

2 An ARP Reply: Computer B tells Computer A, ”I have that IP. MyMAC address is [whatever it is].”

3 A Reverse ARP Request (RARP): Same concept as ARP Request, butComputer A asks, ”Who has this MAC address?”

4 A RARP Reply: Computer B tells Computer A, ”I have that MAC.My IP address is [whatever it is]”

arp -a

sudo arpspoof -i wlan0 -t 192.168.2.1 192.168.40.1

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 24 / 49

Page 68: Computer Networks: Basics & Security Issues

Vulnerabilities of Data Link Layer: ARP Attacks

Figure: ARP Request & Response

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 25 / 49

Page 69: Computer Networks: Basics & Security Issues

Vulnerabilities of Data Link Layer: ARP Attacks

Figure: ARP Poisoning

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 26 / 49

Page 70: Computer Networks: Basics & Security Issues

Vulnerabilities of Data Link Layer: Risk Mitigation in ARPAttacks

Method(s) of Prevention: ARP Attacks

I Use static ARP Caches

I Detect ARP Changes (ARPWATCH)

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 27 / 49

Page 71: Computer Networks: Basics & Security Issues

Vulnerabilities of Data Link Layer: MAC Attacks

Figure: A CAM Table

Definition: CAM Table

A CAM (content-addressable memory) is a table in an Ethernet switchwhich involves Media Access Control (MAC) addresses of stations and theports on which they connect to that switch.

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 28 / 49

Page 72: Computer Networks: Basics & Security Issues

Vulnerabilities of Data Link Layer: MAC Attacks

Figure: CAM Behavior

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 29 / 49

Page 73: Computer Networks: Basics & Security Issues

Vulnerabilities of Data Link Layer: MAC Attacks

Figure: CAM Behavior

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 30 / 49

Page 74: Computer Networks: Basics & Security Issues

Vulnerabilities of Data Link Layer: MAC Attacks

Figure: CAM BehaviorBurak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 31 / 49

Page 75: Computer Networks: Basics & Security Issues

Vulnerabilities of Data Link Layer: MAC Attacks

Figure: CAM Overflow

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 32 / 49

Page 76: Computer Networks: Basics & Security Issues

Vulnerabilities of Data Link Layer: MAC Attacks

MAC Attacks: MAC Address Spoofing

MAC spoofing is a technique for changing a factory-assigned Media AccessControl (MAC) address of a network device to bypass access control listson servers or routers for gaining unauthorized access.

Configuring Port Security Settings: Only 1 MAC address allowed oneach Port!!!

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 33 / 49

Page 77: Computer Networks: Basics & Security Issues

Vulnerabilities of Data Link Layer: MAC Attacks

MAC Attacks: MAC Address Spoofing

MAC spoofing is a technique for changing a factory-assigned Media AccessControl (MAC) address of a network device to bypass access control listson servers or routers for gaining unauthorized access.

Configuring Port Security Settings: Only 1 MAC address allowed oneach Port!!!

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 33 / 49

Page 78: Computer Networks: Basics & Security Issues

Vulnerabilities of Network Layer

Network Layer: In The Sense of Security

Vulnerabilities:

I False source addressing on malicious packets!!!

Attack Types:

I IP Address Spoofing: False source addressing on malicious packets!!!

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 34 / 49

Page 79: Computer Networks: Basics & Security Issues

Vulnerabilities of Network Layer: IP Based Attacks

Figure: Valid Connection

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 35 / 49

Page 80: Computer Networks: Basics & Security Issues

Vulnerabilities of Network Layer: IP Based Attacks

Figure: IP Spoofed Connection

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 36 / 49

Page 81: Computer Networks: Basics & Security Issues

Vulnerabilities of Network Layer: Risk Mitigation

Method(s) of Prevention: Network Layer

I Route policy controls - Use strict anti-spoofing and route filters atnetwork edges

I Firewalls with strong filter & anti-spoof policy

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 37 / 49

Page 82: Computer Networks: Basics & Security Issues

Vulnerabilities of Transport Layer

Transport Layer: In The Sense of Security

Vulnerabilities:

I End-to-end communication could be interrupted.

Attack Types:

I DoS Attacks: SYN Flood Attacks

I Port Scan Attacks

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 38 / 49

Page 83: Computer Networks: Basics & Security Issues

Vulnerabilities of Transport Layer

Transport Layer: In The Sense of Security

Vulnerabilities:

I End-to-end communication could be interrupted.

Attack Types:

I DoS Attacks: SYN Flood Attacks

I Port Scan Attacks

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 38 / 49

Page 84: Computer Networks: Basics & Security Issues

Vulnerabilities of Transport Layer: Scan Attacks

Port Scan Attacks

A port scan is an attack that sends client requests to a range of serverport addresses on a host, with the goal of finding an active port andexploiting a known vulnerability of that service.

nmap

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 39 / 49

Page 85: Computer Networks: Basics & Security Issues

Vulnerabilities of Transport Layer: Scan Attacks

Port Scan Attacks

A port scan is an attack that sends client requests to a range of serverport addresses on a host, with the goal of finding an active port andexploiting a known vulnerability of that service.

nmap

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 39 / 49

Page 86: Computer Networks: Basics & Security Issues

Vulnerabilities of Transport Layer: DoS Attacks

Dos Attacks: SYN Flooding

A SYN flood is a form of denial-of-service attack in which an attackersends a succession of SYN requests to a target’s system in an attempt toconsume enough server resources to make the system unresponsive tolegitimate traffic.

hping3

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 40 / 49

Page 87: Computer Networks: Basics & Security Issues

Vulnerabilities of Transport Layer: DoS Attacks

Dos Attacks: SYN Flooding

A SYN flood is a form of denial-of-service attack in which an attackersends a succession of SYN requests to a target’s system in an attempt toconsume enough server resources to make the system unresponsive tolegitimate traffic.

hping3

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 40 / 49

Page 88: Computer Networks: Basics & Security Issues

Vulnerabilities of Transport Layer: Risk Mitigation

Method(s) of Prevention: Transport Layer

I use syn cookies against syn flooding attack.

I Strict firewall rules limiting access to specific transmission protocolsand sub-protocol information such as TCP/UDP port number orICMP type

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 41 / 49

Page 89: Computer Networks: Basics & Security Issues

Vulnerabilities of Session & Presentation Layers

Session & Presentation Layers: In The Sense of Security

Vulnerabilities:

I It is virtually impossible to attack these layers.

I These layers just handle things like token management,synchronization and encoding translations.

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 42 / 49

Page 90: Computer Networks: Basics & Security Issues

Vulnerabilities of Application Layer

Application Layer: In The Sense of Security

Vulnerabilities:

I Back-doors and application design flaws bypass standard securitycontrols malicious Codes: Viruses, Trojans, Worms...

I DNS Based Attacks

What is DNS?

The domain name system (DNS) is the way that Internet domain namesare located and translated into Internet Protocol addresses. A domainname is a meaningful and easy-to-remember ”handle” for an Internetaddress.

searchnetworking.techtarget.com/definition/domain-name-system

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 43 / 49

Page 91: Computer Networks: Basics & Security Issues

Vulnerabilities of Application Layer

Application Layer: In The Sense of Security

Vulnerabilities:

I Back-doors and application design flaws bypass standard securitycontrols malicious Codes: Viruses, Trojans, Worms...

I DNS Based Attacks

What is DNS?

The domain name system (DNS) is the way that Internet domain namesare located and translated into Internet Protocol addresses. A domainname is a meaningful and easy-to-remember ”handle” for an Internetaddress.

searchnetworking.techtarget.com/definition/domain-name-system

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 43 / 49

Page 92: Computer Networks: Basics & Security Issues

Vulnerabilities of Application Layer: DNS Spoofing

Figure: DNS Spoofing

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 44 / 49

Page 93: Computer Networks: Basics & Security Issues

Vulnerabilities of Application Layer: DNS Poisoning

Figure: DNS Cache Poisoning

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 45 / 49

Page 94: Computer Networks: Basics & Security Issues

Vulnerabilities of Application Layer: Risk Mitigation

Method(s) of Prevention: Application Layer

I Application Level Access Control

I Standards, testing, review of application code and functionality

I Intrusion Detection Systems to monitor application inquiries andactivity

I Host based firewalls

I Anti-virus softwareI For DNS Spoofing and Poisoning Specific:

I hard to detect: since they are passive attacks.I type IP addresses directly.

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 46 / 49

Page 95: Computer Networks: Basics & Security Issues

Summary

Summarization1 Basics of Computer Networking

2 Introduction of ISO/OSI Model: Layer by Layer

3 Network Security: Basics and Goals involved

4 Defining a Security Mechanism

5 Vulnerabilities of each layer in ISO/OSI Model

6 Possible Attack Scenarios

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 47 / 49

Page 96: Computer Networks: Basics & Security Issues

Let’s Have a Break!!!

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 48 / 49

Page 97: Computer Networks: Basics & Security Issues

Bibliography

[UZUNAY2005]Yusuf UZUNAY, Middle East Technical University, Turkey.Layer-to-Layer Network Security.

[Reed2003]Damon Reed - SANS Institute InfoSec Reading Room.Applying the OSI Seven Layer Network Model To Information Security.

[Esparza2004]Charles R. Esparza - SANS Institute InfoSec Reading Room.Transmission Media Security.

[Khan1999]Ameel Zia Khan.Computer Network Security Basics - LUMS-ACM Chapter TopicPresentation.

Burak Ekici (Dept. of Comp. Eng.) Computer Networks: Basics & Security Issues 49 / 49