1. Trang chủ
  2. » Giáo án - Bài giảng

mạng máy tính phạm trần vũ bài giảng 14 network security

49 49 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 49
Dung lượng 862,63 KB

Nội dung

Computer Networks (Mạng Máy Tính 1) Lectured by: Dr Phạm Trần Vũ SinhVienZone.com https://fb.com/sinhvienzonevn Chapter Network Security Computer Networking: A Top Down Approach , 5th edition Jim Kurose, Keith Ross Addison-Wesley, April 2009 All material copyright 1996-2009 J.F Kurose and K.W Ross, All Rights Reserved SinhVienZone.com Introduction https://fb.com/sinhvienzonevn 1-2 Chapter 8: Network Security Chapter goals:  understand principles of network security: cryptography and its many uses beyond “confidentiality”  authentication  message integrity   security in practice:  firewalls and intrusion detection systems  security in application, transport, network, link layers SinhVienZone.com https://fb.com/sinhvienzonevn Chapter roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 8.4 Securing e-mail 8.5 Securing TCP connections: SSL 8.6 Network layer security: IPsec 8.7 Securing wireless LANs 8.8 Operational security: firewalls and IDS SinhVienZone.com https://fb.com/sinhvienzonevn What is network security? Confidentiality: only sender, intended receiver should “understand” message contents  sender encrypts message  receiver decrypts message Authentication: sender, receiver want to confirm identity of each other Message integrity: sender, receiver want to ensure message not altered (in transit, or afterwards) without detection Access and availability: services must be accessible and available to users SinhVienZone.com https://fb.com/sinhvienzonevn Friends and enemies: Alice, Bob, Trudy  well-known in network security world  Bob, Alice (lovers!) want to communicate “securely”  Trudy (intruder) may intercept, delete, add messages Alice channel data secure sender Bob data, control messages secure receiver Trudy SinhVienZone.com https://fb.com/sinhvienzonevn data Who might Bob, Alice be?  … well, real-life Bobs and Alices!  Web browser/server for electronic transactions (e.g., on-line purchases)  on-line banking client/server  DNS servers  routers exchanging routing table updates  other examples? SinhVienZone.com https://fb.com/sinhvienzonevn There are bad guys (and girls) out there! Q: What can a “bad guy” do? A: A lot! See section 1.6 eavesdrop: intercept messages  actively insert messages into connection  impersonation: can fake (spoof) source address  in packet (or any field in packet)  hijacking: “take over” ongoing connection by removing sender or receiver, inserting himself in place  denial of service: prevent service from being used by others (e.g., by overloading resources) SinhVienZone.com https://fb.com/sinhvienzonevn Chapter roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 8.4 Securing e-mail 8.5 Securing TCP connections: SSL 8.6 Network layer security: IPsec 8.7 Securing wireless LANs 8.8 Operational security: firewalls and IDS SinhVienZone.com https://fb.com/sinhvienzonevn The language of cryptography Alice’s K encryption A key plaintext encryption algorithm ciphertext Bob’s K decryption B key decryption plaintext algorithm m plaintext message KA(m) ciphertext, encrypted with key KA m = KB(KA(m)) SinhVienZone.com https://fb.com/sinhvienzonevn 10 Secure e-mail  Alice wants to send confidential e-mail, m, to Bob KS m KS K ( ) S + K B( ) K+ B KS(m ) KS(m ) + + KB(KS ) Internet K S( ) - KS + K B( ) KB(KS ) - KB- Bob:  uses his private key to decrypt and recover KS  uses KS to decrypt KS(m) to recover m SinhVienZone.com https://fb.com/sinhvienzonevn m Secure e-mail (continued) • Alice wants to provide sender authentication message integrity m H(.) KA- - + m - - KA(H(m)) KA(H(m)) KA( ) + KA Internet - + KA( ) compare m H( ) • Alice digitally signs message • sends both message (in the clear) and digital signature SinhVienZone.com H(m ) https://fb.com/sinhvienzonevn H(m ) Secure e-mail (continued) • Alice wants to provide secrecy, sender authentication, message integrity KAK A(H(m)) KS m KA( ) H( ) + K S( ) m KS + K B( ) K+ B + Internet + KB(KS ) Alice uses three keys: her private key, Bob’s public key, newly created symmetric key SinhVienZone.com https://fb.com/sinhvienzonevn Chapter roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 8.4 Securing e-mail 8.5 Securing TCP connections: SSL 8.6 Network layer security: IPsec 8.7 Securing wireless LANs 8.8 Operational security: firewalls and IDS SinhVienZone.com https://fb.com/sinhvienzonevn SSL: Secure Sockets Layer  Widely deployed security protocol    Supported by almost all browsers and web servers https Tens of billions $ spent per year over SSL  Originally designed by Netscape in 1993  Number of variations:  TLS: transport layer security, RFC 2246  Provides    Confidentiality Integrity Authentication SinhVienZone.com  Original goals:      Had Web e-commerce transactions in mind Encryption (especially credit-card numbers) Web-server authentication Optional client authentication Minimum hassle in doing business with new merchant  Available to all TCP applications  Secure socket interface https://fb.com/sinhvienzonevn 65 SSL and TCP/IP Application TCP Application SSL TCP IP IP Normal Application Application with SSL • SSL provides application programming interface (API) to applications • C and Java SSL libraries/classes readily available SinhVienZone.com https://fb.com/sinhvienzonevn 66 Could something like PGP: - KA m H( ) - KA( ) - KA(H(m)) + KS KS( ) + m KS + K B( ) + Internet + KB(KS ) KB • But want to send byte streams & interactive data •Want a set of secret keys for the entire connection • Want certificate exchange part of protocol: handshake phase SinhVienZone.com https://fb.com/sinhvienzonevn 67 Chapter roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 8.4 Securing e-mail 8.5 Securing TCP connections: SSL 8.6 Network layer security: IPsec 8.7 Securing wireless LANs 8.8 Operational security: firewalls and IDS SinhVienZone.com https://fb.com/sinhvienzonevn Chapter roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 8.4 Securing e-mail 8.5 Securing TCP connections: SSL 8.6 Network layer security: IPsec 8.7 Securing wireless LANs 8.8 Operational security: firewalls and IDS SinhVienZone.com https://fb.com/sinhvienzonevn Chapter roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 8.4 Securing e-mail 8.5 Securing TCP connections: SSL 8.6 Network layer security: IPsec 8.7 Securing wireless LANs 8.8 Operational security: firewalls and IDS SinhVienZone.com https://fb.com/sinhvienzonevn Firewalls firewall isolates organization’s internal net from larger Internet, allowing some packets to pass, blocking others public Internet administered network firewall SinhVienZone.com https://fb.com/sinhvienzonevn Firewalls: Why prevent denial of service attacks:  SYN flooding: attacker establishes many bogus TCP connections, no resources left for “real” connections prevent illegal modification/access of internal data  e.g., attacker replaces CIA’s homepage with something else allow only authorized access to inside network (set of authenticated users/hosts) three types of firewalls:  stateless packet filters  stateful packet filters  application gateways SinhVienZone.com https://fb.com/sinhvienzonevn Intrusion detection systems  packet filtering: operates on TCP/IP headers only  no correlation check among sessions   IDS:  intrusion detection system deep packet inspection: look at packet contents (e.g., check character strings in packet against database of known virus, attack strings)  examine correlation among multiple packets • port scanning • network mapping • DoS attack SinhVienZone.com https://fb.com/sinhvienzonevn Intrusion detection systems  multiple IDSs: different types of checking at different locations application gateway firewall Internet internal network IDS sensors SinhVienZone.com Web server FTP server DNS server demilitarized zone https://fb.com/sinhvienzonevn Network Security (summary) Basic techniques… cryptography (symmetric and public)  message integrity  end-point authentication  … used in many different security scenarios secure email  secure transport (SSL)  IP sec  802.11  Operational Security: firewalls and IDS SinhVienZone.com 8: Network Security https://fb.com/sinhvienzonevn ... Chapter 8: Network Security Chapter goals:  understand principles of network security: cryptography and its many uses beyond “confidentiality”  authentication  message integrity   security. .. connections: SSL 8.6 Network layer security: IPsec 8.7 Securing wireless LANs 8.8 Operational security: firewalls and IDS SinhVienZone.com https://fb.com/sinhvienzonevn What is network security? Confidentiality:... intrusion detection systems  security in application, transport, network, link layers SinhVienZone.com https://fb.com/sinhvienzonevn Chapter roadmap 8.1 What is network security? 8.2 Principles of

Ngày đăng: 28/01/2020, 22:39

TỪ KHÓA LIÊN QUAN