Unit 3
Unit 3
S/MIME Functionality
In terms of general functionality, S/MIME is very similar to
PGP. Both offer the ability to sign and/or encrypt messages.
In this subsection, we briefly summarize S/MIME capability.
We then look in more detail at this capability by examining
message formats and message preparation.
1. Functions
INTRUSION DETECTION:
Inevitably, the best intrusion prevention system will fail. A
system's second line of defense is intrusion detection, and this has
been the focus of much research in recent years. This interest is
motivated by a number of considerations, including the following:
· If an intrusion is detected quickly enough, the intruder can
be identified and ejected from the system before any damage is
done or any data are compromised.
· An effective intrusion detection system can serve as a
deterrent, so acting to prevent intrusions.
Intrusion detection enables the collection of information
about intrusion techniques that can be used to strengthen the
intrusion prevention facility.
Intrusion detection is based on the assumption that the
behavior of the intruder differs from that of a legitimate user
in ways that can be quantified.
Figure 5.2.1 suggests, in very abstract terms, the nature of the
task confronting the designer of an intrusion detection system.
Although the typical behavior of an intruder differs from the
typical behavior of an authorized user, there is an overlap in these
behaviors. Thus, a loose interpretation of intruder behavior, which
will catch more intruders, will also lead to a number of "false
positives," or authorized users identified as intruders. On the
other hand, an attempt to limit false positives by a tight
interpretation of intruder behavior will lead to an increase in false
negatives, or intruders not identified as intruders.Thus, there is an
element of compromise and art in the practice of intrusion
detection.
1. The approaches to intrusion
detection:
Statistical anomaly detection: Involves the collection of data
relating to the behavior of legitimate users over a period of time.
Then statistical tests are applied to observed behavior to
determine with a high level of confidence whether that behavior is
not legitimate user behavior.
Confidentiality
Authentication
Integirity
IP Security Architecture:
1. Architecture:
Architecture or IP Security Architecture covers the general
concepts, definitions, protocols, algorithms and security
requirements of IP Security technology.
2. ESP Protocol:
ESP(Encapsulation Security Payload) provide the confidentiality
service. Encapsulation Security Payload is implemented in
either two ways:
1. ESP with optional Authentication.
2. ESP with Authentication.
Packet Format:
Security Parameter Index(SPI):
This parameter is used in Security Association. It is used
to give a unique number to the connection build
between Client and Server.
Number:
Sequence
Unique Sequence number are allotted to every packet so that
at the receiver side packets can be arranged properly.
Payload Data:
Payload data means the actual data or the actual message. The
Payload data is in encrypted format to achieve confidentiality
Padding:
Extra bits or space added to the original message in order to
ensure confidentiality. Padding length is the size of the added
bits or space in the original message.
Next Header:
Next header means the next payload or next actual data.
Authentication Data
This field is optional in ESP protocol packet format.
3. Encryption algorithm:
Encryption algorithm is the document that describes various
encryption algorithm used for Encapsulation Security
Payload.
4. AH Protocol:
AH (Authentication Header) Protocol provides both
Authentication and Integrity service. Authentication Header
is implemented in one way only: Authentication along with
Integrity.
Authentication Header covers the packet format and general issue
related to the use of AH for packet authentication and integrity.
5. Authentication Algorithm:
Authentication Algorithm contains the set of the documents that
describe authentication algorithm used for AH and for the
authentication option of ESP.
Difference between IPSec and SSL
IPSec Protocol:
It is an Internet Engineering Task Force standard suite of
protocols between two communication points. It can also be
defined as the encrypted, decrypted and authenticated
packets. It generally uses cryptographic security services to
protect communications. It can be seen that network-level
peer and data origin authentication, data integrity, data
encryption, and protection are supported by IPsec.
For Example, IPSec can be used in between two routers in
order to create a site-to-site VPN and between a firewall and
windows host for a remote access VPN.
SSL:
It is a networking protocol that is used at the transport layer
to provide a secure connection between the client and the
server over the internet. It is a transparent protocol that
requires little interaction from the end-user when
establishing a secure session. SSL Tunneling involves a client
that requires an SSL connection to a backend service or
secure server via a proxy server.
For Example, For securing the communication between a
web browser and a web server, he SSL is used.
IPSec SSL
Internet protocol security (IPsec) is a set of protocols that provide security for Internet
SSL is a secure protocol developed for sending information s
Protocol.
It Work in Internet Layer of the OSI model. It Work in Between the transport layer and application layer
Layer (SSL) and Transport Layer
Security (TLS)
SSL (Secure
Socket Layer)
TLS (Transport
Secure Socket Layer (SSL)
Warning:
This Alert has no impact on the connection between sender
and receiver.
Fatal Error:
This Alert breaks the connection between sender and
receiver.
Silent Features of Secure Socket Layer:
The advantage of this approach is that the service can be
tailored to the specific needs of the given application.
Secure Socket Layer was originated by Netscape.
SSL is designed to make use of TCP to provide reliable end-
to-end secure service.
This is a two-layered protocol.
Transport Layer Security (TLS)
Transport Layer Securities (TLS) are designed to provide
security at the transport layer. TLS was derived from a
security protocol called Secure Service Layer (SSL). TLS
ensures that no third party may eavesdrops or tampers with
any message.
There are several benefits of TLS:
Encryption:
TLS/SSL can help to secure transmitted data using
encryption.
Interoperability:
TLS/SSL works with most web browsers, including
Microsoft Internet Explorer and on most operating systems
and web servers.
Algorithm flexibility:
TLS/SSL provides operations for authentication mechanism,
encryption algorithms and hashing algorithm that are used
during the secure session.
Ease of Deployment:
Many applications TLS/SSL temporarily on a windows server
2003 operating systems.
Ease of Use:
Because we implement TLS/SSL beneath the application
layer, most of its operations are completely invisible to client.
Working of TLS:
The client connect to server (using TCP), the client will be
something. The client sends number of specification:
1. Version of SSL/TLS.
2. which cipher suites, compression method it wants to use.
The server checks what the highest SSL/TLS version is that is
supported by them both, picks a cipher suite from one of the
clients option (if it supports one) and optionally picks a
compression method. After this the basic setup is done, the
server provides its certificate. This certificate must be trusted
either by the client itself or a party that the client trusts.
Having verified the certificate and being certain this server
really is who he claims to be (and not a man in the middle), a
key is exchanged. This can be a public key, “PreMasterSecret”
or simply nothing depending upon cipher suite.
Both the server and client can now compute the key for
symmetric encryption. The handshake is finished and the two
hosts can communicate securely. To close a connection by
finishing. TCP connection both sides will know the
connection was improperly terminated. The connection
cannot be compromised by this through, merely interrupted.
Secure Electronic Transaction (SET)
Protocol
Secure Electronic Transaction or SET is a system that ensures
the security and integrity of electronic transactions done
using credit cards in a scenario. SET is not some system that
enables payment but it is a security protocol applied to those
payments. It uses different encryption and hashing techniques
to secure payments over the internet done through credit
cards. The SET protocol was supported in development by
major organizations like Visa, Mastercard, Microsoft which
provided its Secure Transaction Technology (STT), and
Netscape which provided the technology of Secure Socket
Layer (SSL).
SET protocol restricts the revealing of credit card details to
merchants thus keeping hackers and thieves at bay. The SET
protocol includes Certification Authorities for making use of
standard Digital Certificates like X.509 Certificate.
1.
Signature-based Method:
Signature-based IDS detects the attacks on the basis of the
specific patterns such as number of bytes or number of 1’s
or number of 0’s in the network traffic. It also detects on
the basis of the already known malicious instruction
sequence that is used by the malware. The detected
patterns in the IDS are known as signatures.Signature-
based IDS can easily detect the attacks whose pattern
(signature) already exists in system but it is quite difficult
to detect the new malware attacks as their pattern
(signature) is not known.
2.Anomaly-based Method:
Anomaly-based IDS was introduced to detect the unknown
malware attacks as new malware are developed rapidly. In
anomaly-based IDS there is use of machine learning to
create a trustful activity model and anything coming is
compared with that model and it is declared suspicious if it
is not found in model. Machine learning based method has
a better generalized property in comparison to signature-
based IDS as these models can be trained according to the
applications and hardware configurations.
Comparison of IDS with Firewalls:
IDS and firewall both are related to the network security but
an IDS differs from a firewall as a firewall looks outwardly
for intrusions in order to stop them from happening.
Firewalls restrict access between networks to prevent
intrusion and if an attack is from inside the network it don’t
signal. An IDS describes a suspected intrusion once it has
happened and then signals an alarm.
Malwares – Malicious Software
Trojan horse –
A Trojan horse is malware that carries out malicious operations under
the appearance of a desired operation such as playing an online game. A
Trojan horse varies from a virus because the Trojan binds itself to non-
executable files, such as image files, audio files.
Logic Bombs –
A logic bomb is a malicious program that uses a trigger to
activate the malicious code. The logic bomb remains non-
functioning until that trigger event happens. Once triggered,
a logic bomb implements a malicious code that causes harm
to a computer. Cybersecurity specialists recently discovered
logic bombs that attack and destroy the hardware
components in a workstation or server including the cooling
fans, hard drives, and power supplies. The logic bomb
overdrives these devices until they overheat or fail.
Ransomware –
Ransomware grasps a computer system or the data it
contains until the victim makes a payment. Ransomware
encrypts data in the computer with a key which is unknown
to the user. The user has to pay a ransom (price) to the
criminals to retrieve data. Once the amount is paid the
victim can resume using his/her system.
Backdoors –
A backdoor bypasses the usual authentication used to access a
system. The purpose of the backdoor is to grant the cyber
criminals future access to the system even if the organization
fixes the original vulnerability used to attack the system.
Rootkits –
A rootkit modifies the OS to make a backdoor. Attackers
then use the backdoor to access the computer distantly. Most
rootkits take advantage of software vulnerabilities to modify
system files.
Keyloggers –
Keylogger records everything the user types on his/her
computer system to obtain passwords and other sensitive
information and send them to the source of the keylogging
program.
Virus Countermeasures