1. Trang chủ
  2. » Giáo án - Bài giảng

Network systems security by mort anvari lecture1

24 134 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Cấu trúc

  • Introduction to Network Systems Security

  • About the Course

  • Why Should You Take This Course

  • Your Best Strategy

  • What Can Go Wrong…

  • Message Loss

  • Message Interception

  • Message Modification

  • Message Insertion

  • Message Replay

  • Denial-of-Service Attack

  • Type of Attacks

  • Network Security Services

  • Confidentiality

  • Integrity

  • Authentication

  • Anti-replay

  • Availability

  • Access Control

  • Non-repudiation

  • Anonymity

  • Network Security Is Great…

  • …But Hard To Achieve

  • Next Class

Nội dung

Introduction to Network Systems Security Mort Anvari About the Course    A grad-level seminar course focusing on basics and issues in network security First half will be lectures about elements of network security, cryptography backgrounds, and introduction to network security designs Second half will be your chance to present what you have learned from key research papers 8/24/2004 Why Should You Take This Course     Security is an increasingly important issue You want to have basic knowledge about network security You can learn latest attacks and newest skills to counter those attacks You have a chance to implement the skills learned in the class 8/24/2004 Your Best Strategy      Come to every lecture to learn basic security problems and skills to counter them Keep yourself exposed to articles related to network security to collect project ideas Read each assigned paper and write good summary for each paper Do not wait till last minute to prepare for exam or work on project Enjoy the fun! 8/24/2004 What Can Go Wrong…  …when your computer y receive or is waiting for a message m? ? m Internet x y 8/24/2004 Message Loss  Adversary A can discard m in its transit A m x y 8/24/2004 Message Interception  Adversary A can get a copy of m when m passes by A m x m m y 8/24/2004 Message Modification  Adversary A can arbitrarily modify the content of m to become m’ A m x m’ y 8/24/2004 Message Insertion  Adversary A can arbitrarily fabricate a message m, pretending that m was sent by x src: x dst: y A m x y 8/24/2004 Message Replay  Adversary A can replay a message m that has been sent earlier by x and received by y m A m x y 8/24/2004 10 Denial-of-Service Attack  Adversary A can send huge amount of messages to y to block m from arriving at y A m ????? x … … … … … … y 8/24/2004 11 Type of Attacks  Passive attacks   Traffic analysis Message interception  Active attacks      8/24/2004 Message loss Message modification Message insertion Message replay Denial-of-Service attack 12 Network Security Services      Confidentiality Integrity Authentication Anti-replay     Availability Access control Non-repudiation Anonymity … 8/24/2004 13 Confidentiality   Keep message known only to the receiver and secret to anyone else Counter message interception 8/24/2004 14 Integrity   When receiver receives message m, receiver can verify m is intact after sent by sender Counter message modification 8/24/2004 15 Authentication   When receiver receives message m, receiver can verify m is indeed sent by the sender recorded in m Counter message insertion 8/24/2004 16 Anti-replay   When receiver receives message m, receiver can verify m is not a message that was sent and received before Counter message replay 8/24/2004 17 Availability   Property of a system or a resource being accessible and usable upon demand by an authorized entity Counter denial-of-service attack 8/24/2004 18 Access Control    Mechanism to enforce access rights to resources and data Users can access resources and data to which they have access rights Users cannot access resources and data to which they don’t have access rights 8/24/2004 19 Non-repudiation   When receiver receives message m, receiver gets proof that sender of m ever sent m Receiver of m can show proof to thirdparty so that sender of m cannot repudiate 8/24/2004 20 Anonymity   Identity of sender is hidden from receiver When receiver receives message m, receiver has no clue about sender of m 8/24/2004 21 Network Security Is Great…    Protect messages from interception in their transit Detect and discard messages that are modified, inserted, or replayed Disallow unauthorized access to local system resource and sensitive data 8/24/2004 22 …But Hard To Achieve      Many layers in network architecture Many different media of network connection Adversary’s location hard to determine New attacks keep emerging Cryptographic overhead 8/24/2004 23 Next Class   Formal specification and verification of network protocols Network security tools to counter the effects of adversary actions 8/24/2004 24 ... focusing on basics and issues in network security First half will be lectures about elements of network security, cryptography backgrounds, and introduction to network security designs Second half... 8/24/2004 Why Should You Take This Course     Security is an increasingly important issue You want to have basic knowledge about network security You can learn latest attacks and newest skills...      Come to every lecture to learn basic security problems and skills to counter them Keep yourself exposed to articles related to network security to collect project ideas Read each assigned

Ngày đăng: 09/01/2018, 11:57

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

  • Đang cập nhật ...

TÀI LIỆU LIÊN QUAN