Lec21 Security
Lec21 Security
INTERNATIONAL SCHOOL
PRESENTATION :- IT
NAME :- NEERAJ KUMAR
CLASS :- 11TH
ROLL NO. :- 1107
SUBMITTED TO :- SAHIL SIR
TOPIC :- NETWORK SECURITY
Network Security
Neeraj Kumar
Class XI
OVERVIEW
hat is security?
hy do we need security?
ho is vulnerable?
ictionary.com says:
• 1. Freedom from risk or danger; safety.
• 2. Freedom from doubt, anxiety, or fear; confidence.
• 3. Something that gives or assures safety, as:
• 1. A group or department of private guards: Call building
security if a visitor acts suspicious.
• 2. Measures adopted by a government to prevent
espionage, sabotage, or attack.
• 3. Measures adopted, as by a business or homeowner, to
prevent a crime such as burglary or assault: Security was
lax at the firm's smaller plant.
…etc.
WHY DO WE NEED SECURITY?
rotect vital information while still allowing access to those who need it
• Trade secrets, medical records, etc.
harmaceutical companies
ultinational corporations
enial of Service
• Ingress filtering, IDS
CP hijacking
• IPSec
acket sniffing
• Encryption (SSH, SSL, HTTPS)
ocial problems
• Education
FIREWALLS
an be hardware or software
• Ex. Some routers come with firewall functionality
• ipfw, ipchains, pf on Unix systems, Windows XP and Mac OS X
have built in firewalls
FIREWALLS
Internet DMZ
Web server, email
server, web proxy,
etc
Firewall
Firewall
Intranet
FIREWALLS
ight need some of these services, or might not be able to control all the
machines on the network
FIREWALLS
xample: ipfw
• /sbin/ipfw add deny tcp from
cracker.evil.org to wolf.tambov.su telnet
ther examples: WinXP & Mac OS X have built in and third party firewalls
• Different graphical user interfaces
• Varying amounts of complexity and power
INTRUSION DETECTION
xample
• IRIX vulnerability in webdist.cgi
• Can make a rule to drop packets containing the line
• “/cgi-bin/webdist.cgi?distloc=?;cat%20/etc/passwd”
owever, IDS is only useful if contingency plans are in place to curb attacks as
they are occurring
MINOR DETOUR…
YN flooding attack
end SYN packets with bogus source address
• Why?
erver responds with SYN ACK and keeps state about TCP half-open
connection
• Eventually, server memory is exhausted with this state
MURF
• Source IP address of a broadcast ping is forged
• Large number of machines respond back to victim, overloading it
DENIAL OF SERVICE
IC M P e c h o ( s p o o f e d s o u r c e a d d r e s s o f v ic tim )
S e n t to IP b r o a d c a s t a d d r e s s
IC M P e c h o r e p ly
In te rn e t
P e rp e tra to r V ic tim
DENIAL OF SERVICE
roblem: End hosts may lie about other fields which do not affect
delivery
• Source address – host may trick destination into believing that the
packet is from a trusted source
• Especially applications which use IP addresses as a simple
authentication method
• Solution – use better authentication methods
TCP ATTACKS
ttacker can insert malicious data into the TCP stream, and the
recipient will believe it came from the original source
• Ex. Instead of downloading and running new program, you
download a virus and execute it
TCP ATTACKS
r. Big Ears lies on the path between Alice and Bob on the network
• He can intercept all of their packets
TCP ATTACKS
irst, Mr. Big Ears must drop all of Alice’s packets since they must
not be delivered to Bob (why?)
Pa
ck
ets
The Void
TCP ATTACKS
hen, Mr. Big Ears sends his malicious packet with the next ISN
(sniffed from the network)
ISN, SRC=Alice
TCP ATTACKS
hat if Mr. Big Ears is unable to sniff the packets between Alice and
Bob?
• Can just DoS Alice instead of dropping her packets
• Can just send guesses of what the ISN is until it is accepted
Malicious user
TCP ATTACKS
ow do we prevent this?
PSec
• Provides source authentication, so Mr. Big Ears cannot pretend to
be Alice
• Encrypts data before transport, so Mr. Big Ears cannot talk to Bob
without knowing what the session key is
FIVE MINUTE BREAK
hey put the bits on the wire with the destination MAC address …
nd remember that other hosts are listening on the wire to detect for
collisions …
t couldn’t get any easier to figure out what data is being transmitted
over the network!
PACKET SNIFFING
un Example 1:
• “Hi, I’m your AT&T rep, I’m stuck on a pole. I need you to punch
a bunch of buttons for me”
SOCIAL PROBLEMS
un Example 2:
• Someone calls you in the middle of the night
• “Have you been calling Egypt for the last six hours?”
• “No”
• “Well, we have a call that’s actually active right now, it’s on your
calling card and it’s to Egypt and as a matter of fact, you’ve got about
$2000 worth of charges on your card and … read off your AT&T card
number and PIN and then I’ll get rid of the charge for you”
SOCIAL PROBLEMS
un Example 3:
• Who saw Office Space?
• In the movie, the three disgruntled employees installed a money-
stealing worm onto the companies systems
• They did this from inside the company, where they had full access
to the companies systems
• What security techniques can we use to prevent this type of access?
SOCIAL PROBLEMS
t is important to stay on top of the latest CERT security advisories to know how to
patch any security holes