Communication Security and
Countermeasure
Slide ke-6 Mata Kuliah: Keamanan Jaringan
Course Objectives
• Virtual Private Network (VPN).
• Network Address Translator (NAT). • Switching Technologies.
• WAN Technologies.
Virtual Private Network
(VPN)
• Communication Tunnel that provides point-to-point transmission of both
authentication and data traffic over an intermediary untrusted network.
– Most VPNs use Encryption to protect the encapsulated traffic
Tunneling
•
Tunneling
is the network communications process that protects the contents of protocol packets by encapsulating them in packets of another protocol.• The encapsulation is what creates the logical illusion of a communications tunnel over the untrusted network.
– This virtual path exists between the Encapsulation
Tunneling (Cont.)
In fact, sending a letter to your grandmother
involves the use of a tunneling system. You create the personal letter (the primary content protocol packet) and place it in an envelope (the tunneling
protocol). The envelope is delivered through the
Tunneling Drawbacks
•
Inefficient
of communicating:– Most protocols include their own error detection, error handling, acknowledgment, and session management features, so using more than one protocol at a time compounds the overhead required to communicate a single message.
– Tunneling creates either Larger Packets or
Implementing VPN (Cont.)
• Point-to-point Tunneling Protocols (PPTP) creates a point-to-point tunnel between two systems and encapsulates PPP packets.
Implementing VPN (Cont.)
• Layer 2 Tunneling Protocol (L2TP) was derived by combining elements from both PPTP and L2F.
Implementing VPN (Cont.)
•
IP Security (IPSec)
is both a stand-alone VPN protocol and the securitymechanism for L2TP, and it can be used only for IP traffic.
• IPSec has two primary components, or functions:
– Authentication Header (AH).
Network Address Translator
(NAT)
• NAT is a mechanism for
Converting
the internal IP addresses found in packetheaders into public IP addresses for transmission over the Internet.
• NAT was developed to allow private
networks to use any IP address set without causing collisions or conflicts with public
Network Address Translator
(NAT)
Network Address Translator
(Cont.)
• NAT translates the IP addresses of your internal clients to leased addresses outside your environment.
• NAT offers numerous benefits:
1. Able to connect an entire network to the Internet using only a single (or just a few) leased public IP addresses.
2. Using the private IP addresses in a private
Network Address Translator
(Cont.)
• NAT offers numerous benefits:
3. Protects a Network by hiding the IP
addressing scheme and network topography from the Internet.
Switching Technologies:
Circuit Switching
• Circuit Switching was originally
developed to manage telephone calls over the public switched telephone network.
– A dedicated physical pathway is created between the two communicating parties.
• Once a call is established, the links
between the two parties remain the same
Switching Technologies:
Circuit Switching
• Circuit-switching systems employ permanent, physical connections.
– However, the term permanent applies only to each communication session.
– Only after a session has been closed can a
pathway be reused by another communication.
• Circuit switching grants exclusive use of a communication path to the current
Switching Technologies:
Packet Switching
• Packet-switching: the data is chopped up into small pieces called packets and sent over the network.
– Each packet of data has its own header that contains source and destination information.
Switching Technologies:
Comparison
• In circuit switching, a circuit is first
established and then used to carry all data between devices.
• In packet switching no fixed path is created between devices that
communicate;
Switching Technologies:
Virtual Circuit
• Virtual Circuit or communication path is a logical pathway or circuit created over a
packet-switched network between two specific endpoints.
• Within packet-switching systems are two types of virtual circuits:
Switching Technologies:
Virtual Circuit
• A PVC is like a dedicated leased line; the logical circuit always exists and is waiting for the customer to send data.
• An SVC is more like a dialup connection because a virtual circuit has to be created before it can be used and then
Wide Area Network (WAN)
Technologies
• WAN links and long-distance connection technologies can be divided into two
primary categories: dedicated and non-dedicated lines.
• A dedicated line is always on and waiting
Wide Area Network (WAN)
Technologies
• A non-dedicated line is one that requires a connection to be established before data transmission can occur.
• A non-dedicated line can be used to
Network Attacks and
Countermeasure
• Understanding the threats and Possible Countermeasures is an important part of securing an environment.
– Any activity that can cause harm to resources must be addressed and mitigated if possible.
• Keep in mind that harm includes more than just destruction or damage.
Network Attacks and
Countermeasure:
Eavesdropping
• Listening to communication traffic for the purpose of duplicating it.
– Once a copy of traffic content is in the hands of a attacker, they can often Extract Many Forms of confidential information, such as usernames, passwords, process procedures, data, etc.
– Wireshark and NetWitness and dedicated
Network Attacks and
Countermeasure:
Eavesdropping
Network Attacks and
Countermeasure:
Eavesdropping
• Combating eavesdropping by maintaining
physical access
security to preventunauthorized personnel from accessing your IT infrastructure
Network Attacks and
Countermeasure:
Masquerading
• Act of
Pretending
to be someone or something you are not, to access asystems.
• Masquerading is often possible through capturing of usernames and passwords
or of session setup procedures.
Network Attacks and
Countermeasure:
Reply Attack
• An offshoot of masquerading attacks and are made possible through capturing
network traffic via eavesdropping.
– Replay attacks attempt to Reestablish a
Communication Session by replaying captured traffic against a system.
• You can prevent them by using one-time authentication mechanisms and
Network Attacks and
Countermeasure:
Modification
• An attack in which captured packets are
altered
and then played against a system.– Modified packets are designed to bypass the restrictions of improved authentication
mechanisms and session sequencing.
• Countermeasures to modification replay attacks include using digital signature verifications and packet checksum
End of Slides
• Available at