• Tidak ada hasil yang ditemukan

Overview.ppt 322KB Jun 23 2011 10:21:44 AM

N/A
N/A
Protected

Academic year: 2017

Membagikan "Overview.ppt 322KB Jun 23 2011 10:21:44 AM"

Copied!
13
0
0

Teks penuh

(1)

CS 393/682: Network

Security

(2)

Networks under attack

 What can wrong?

 How are computer networks vulnerable?

 What are some of the more prevalent

(3)

The bad guys can put malware

into your host via the Internet

 We connect our hosts to the Internet to

get good stuff:

 E-mail, web pages, mp3s, video clips,

search results, etc.

 But along with the good stuff, comes

the malware, which can:

 Delete files

 Install spyware that collects private info  Enroll our compromised host in a botnet

(4)

Malware: self-replicating

 Once it infects one host:

 seeks entry into other hosts

 and then into yet more hosts

 Virus

 Requires some form of human interaction to spread

 Classic example: E-mail viruses

 Worms

 No user interaction needed

 Worm in infected host scans IP addresses and port

numbers, looking for vulnerable processes to infect

 Trojan horse

(5)

The bad guys can attack servers &

network infrastructure

Denial of Service (DoS):

Diminishes usability of network host, network, or network infrastructure.

Vulnerability attack: Attacker sends well-crafted messages to a vulnerable app or OS, crashing service or host.

Bandwidth flooding: Attacker sends a deluge of packets to the targeted host. Target’s access link becomes clogged..

Connection flooding: The attacker establishes large number of half- or fully-open TCP

(6)

The bad guys can sniff

packets

 Passive sniffers near wireless

transmitters

 Wired environments too.

 Many LANs broadcast

 Residential cable access systems broadcast  Bad guys with access to internal network

infrastructure can install sniffers.

 Packet sniffers are passive

(7)

The bad guys can masquerade

as someone you trust

 Easy to create packet w/ arbitrary source address, packet content & dest address

 then transmit packet into the Internet

 which forwards the packet to its destination.

The bad guys can modify or

delete messages

 Man-in-the-middle: bad guy inserted in path between two communicating entities

 Sniff, inject, modify, delete packets

(8)

How did the Internet get to be

such an insecure place?

 Originally for a group of mutually trusting users attached to a transparent network.

 By definition, no need for security

 Mutual trust

 By default, can send a packet to any other user

 IP source address taken by default to be true

(9)

Course Goals

 Become expert in Internet protocols

 Understand the types of problems

 Survey some attacks

 Become familiar with some attack tools

 Understand the basic network security tools

to counter the attacks

 Become familiar with firewall, IDS, VPN

configuration

 Focus on principles rather than technology

trends, current events

(10)

Topics covered

 Network attacks

 reconnaissance,

sniffing, port

scanning, DDoS, TCP hijacking

 Firewalls and

intrusion detection  Cryptography

 Symmetric key, public

key, integrity

 Secure protocols

 PGP, SSL, IPsec,

secure Wi-Fi

 Advanced topics

 IP source traceback

 Reputation systems

 VoIP security

(11)

Labs

 1) Wireshark: TCP/IP review

 2) Wireshark: SSL

 3) IPsec and VPNs

 4) IKE (key negotiation for IPsec)

 5) IPmodules (firewalls)

(12)

Prerequisites

 CS 684 or equivalent course on

computer networking

 with a heavy dose of TCP/IP

 Proficiency in Linux

(13)

Recommended Books

 Course PowerPoint slides

 Network Security Essentials, William Stallings, 1992,

Prentice Hall; decent introduction to cryptography and secure protocols.

 Computer Networking, 4th Edition, Kurose and Ross,

2007: for networking and TCP/IP background material, cryptography and secure protocols

 Counter Hack, 2nd Edition, Ed Skoudis, 2005, for material in first few lectures on attacks

 Network Security, Private Communication in a Public

Referensi

Dokumen terkait

IVIUTIARA INDAH PURNAMA LENGKAP 60,11 LULUS. SARANA KONSTRI,IKSINDO UTAMA LENGKAP

Mata acara ke-1 sampai dengan ke-3 merupakan agenda yang rutin diadakan dalam RUPS Tahunan Perseroan; Mata acara ke-4 adalah laporan penggunaan dana hasil penawaran umum perdana

MULTIMEDIA INTERAKTIF TALEMPONG PACIK SEBAGAI MEDIA PEMBELAJARAN SENI DI SMP N 3 KOTA SOLOK. Universitas Pendidikan Indonesia| repository.upi.edu

NAMA NIP UNIT KERJA LAMA UNIT KERJA BARU JAM MENGAJAR KETERANGAN SMP Negeri 1.. 1 ARIEF

Para perencana strategi mengidentifikasi sifat konsumen ini dan kegunaan mereka guna menghindari ancaman kehilangan konsumen dan untuk menemukan atau menciptakan peluang

“Barangsiapa yang membacanya dalam sehari sebanyak 100 x, maka itu seperti membebaskan 10 orang budak, dicatat baginya 100 kebaikan, dihapus baginya 100 kesalahan, dirinya

Ada pengaruh yang signifikan variabel komunikasi internal terhadap peningkatan kinerja pegawai secara parsial yang didasarkan pada hasil pengujian nilai t hitung

Keterpaduan ketiga kelompok tersebut didasari atas lima faktor pendukung yang saling terkait yakni: (1) keberhasilan pemuliaan tergantung pada ketersediaan dan kekayaan plasma