Module 5-System Security and Wireless Security-With University Questions
Module 5-System Security and Wireless Security-With University Questions
○ Internet access enables the outside world to reach and interact with local network assets-threat
○ Equip each workstation and server with strong security features, such as intrusion protection -
cost-effective
○ When a security flaw is discovered, each potentially affected system must be upgraded to fix
that flaw
○ Widely accepted alternative to host-based security services is the firewall
Firewalls
○ firewall is inserted between the premises network and the Internet to establish a controlled link and to
1. All traffic from inside to outside, and vice versa, must pass through the firewall
2. Only authorized traffic, as defined by the local security policy, will be allowed to pass
3. The firewall itself is immune to penetration
Firewalls characteristics
Techniques used to control access and enforce the site's security policy
1. Service control: Determines the types of Internet services that can be accessed, inbound or
outbound
2. Direction control: Determines the direction in which particular service requests may be
initiated and allowed to flow through the firewall
3. User control: Controls access to a service according to which user is attempting to access it
4. Behavior control: Controls how particular services are used For example, the firewall may
filter email to eliminate spam
Capabilities of Firewall
1. Defines a single choke point that keeps unauthorized users out of the protected network
2. Provides protection from various kinds of IP spoofing and routing attacks
3. Single choke point simplifies security management because security capabilities are
consolidated on a single system or set of systems.
4. Provides a location for monitoring security -related events-Audits and alarms can be
implemented on the firewall system.
5. Convenient platform for several Internet functions that are not security related-Network
address translator
6. Serve as the platform for Ipsec: Using the tunnel mode capability firewall can be used to
implement virtual private networks
Limitations of Firewall
Types of Firewall
○ Source IP address: The IP address of the system that originated the IP packet (e.g., 192.178.1.1)
○ Destination IP address: The IP address of the system the IP packet is trying to reach (e.g.,
192.168.1.2)
○ Source and destination transport-level address: The transport-level (e.g., TCP or UDP) port
number, which defines applications such as SNMP or TELNET
○ IP protocol field: Defines the transport protocol TCP/UDP
○ Interface: For a firewall with three or more ports, which interface of the firewall the packet came from
or which interface of the firewall the packet is destined for
Firewalls-Packet Filtering Firewall
Example:
○ packets from a particular external host, SPIGOT, are blocked because that host has a history of
sending massive files in e-mail messages.
○ Inbound mail is allowed (port 25 is for SMTP incoming), but only to a gateway host
Firewalls-Packet Filtering Firewall
○ Source station specifies the route that a packet should take as it crosses the Internet, in the hopes that
this will bypass security measures that do not analyze the source routing information
○ Countermeasure: discard all packets that use this option
Firewalls-Packet Filtering Firewall
3.Tiny Fragment Attacks:
○ intruder uses the IP fragmentation option to create extremely small fragments and force the
TCP header information into a separate packet fragment
○ attack is designed to circumvent filtering rules that depend on TCP header information
Tiny Fragment Attacks: Countermeasure
○ attacker hopes that the filtering firewall examines only the first fragment and that the remaining
fragments are passed through
○ attack can be defeated by enforcing a rule that the first fragment of a packet must contain a
predefined minimum amount of the transport header
○ If the first fragment is rejected, the filter can remember the packet and discard all subsequent
fragments
Firewall - Stateful Inspection Firewall
● This type of firewall operates at the network layer and maintains a record of the state of network
connections. It monitors the full context of a conversation, keeping track of the state of
connections and ensuring that only legitimate packets are allowed based on the established session
information. Stateful inspection firewalls offer greater security than packet filtering firewalls by
considering the entire conversation instead of just individual packets.
● Traditional packet filter makes filtering decisions on an individual packet basis and does not take
into consideration any higher layer context
○ when an application that uses TCP creates a session with a remote host, it creates a TCP
connection in which the
○ TCP port number for the remote (server) application is a number less than 1024
○ TCP port number for the local(client) application is a number between 1024 and 65535
○ numbers less than 1024 are the "well-known" port numbers
○ assigned permanently to particular applications (e.g., 25 for server SMTP) numbers between
1024 and 65535 are generated dynamically
○ have temporary significance only for the lifetime of a TCP connection
Firewall - Stateful Inspection Firewall
Drawback-Packet Filtering Firewall
○ Reviews the same packet information as packet filtering but also records information about TCP
connections
○ Some stateful firewalls also keep track of TCP sequence numbers to prevent attacks that depend
on the sequence number
Firewall- Application-Level Gateway
○ An application-level firewall operates at the application layer (Layer 7) of the OSI model. It can examine
the contents of the application data and make decisions based on the specific application protocols being
used, such as HTTP, FTP, or DNS. Application-level firewalls provide more granular control and can detect
and block certain application-specific attacks.
○ If the gateway does not implement the proxy code for a specific application, the service is not supported and
cannot be forwarded across the firewall
○ Gateway can be configured to support only specific features of an application that the network administrator
considers acceptable while denying all other features
Firewall- Application-Level Gateway
Advantages:
○ more secure than packet filters - only scrutinize a few allowable applications
○ it is easy to log and audit all incoming traffic at the application level
Disadvantage:
• additional processing overhead on each connection - there are two spliced connections between the
end users, with the gateway at the splice point, and the gateway must examine and forward all traffic
in both directions
Firewall- Circuit level Gateway
● Once the two connections are established, the gateway typically relays TCP segments from one
connection to the other without examining the contents
● security function consists of determining which connections will be allowed
● Used in situations where the system administrator trusts the internal users
Gateway can be configured to support:
○ A system identified by the firewall administrator as a critical strong point in the network's
security
○ serves as a platform for an application-level or circuit-level gateway
Characteristics:
1. bastion host hardware platform executes a secure version of its operating system, making it a
trusted system
2. Only the services that the network administrator considers essential are installed on the bastion
host (proxy applications such as Telnet, DNS, FTP, SMTP, and user authentication)
Bastion Host
● May require additional authentication before a user is allowed access to the proxy services
○ Each proxy is configured to support only a subset of the standard application's command set
Each proxy is configured to allow access only to specific host systems
○ Each proxy maintains detailed audit information by logging all traffic, each connection, and the
duration of each connection. The audit log is an essential tool for discovering and terminating
intruder attacks.
Firewall Configurations
○ bastion host has two network cards- one is used for internal connection and the
second one is used for connection with the router
○ In this case, even if, the router got compromised, the internal network will remain
unaffected since it is in the separate network zone
○ an information server or other hosts can be allowed direct communication with the
router if this is in accord with the security policy
Firewall Configurations- screened subnet firewall configuration
Firewall Configurations- screened subnet firewall configuration
● This configuration creates an isolated subnetwork, which may consist of simply the
bastion host but may also include one or more information servers and modems for
dial-in capability
Firewall Configurations- screened subnet firewall configuration-Advantages
• Access Matrix
• There can be multiple programs
• Programs contains multiple segments or
files
• Process denotes users
• Process1 have access to Program1 for
Read & Execute
• Process1 have access to Segment A for
Read & Write
• Process1 have no access to Segment B
• Access Control Lists
• List of process that can access particular
program/segment
• Capability List
• List of operations
Access Control Structure-More Details
● One axis of the matrix consists of identified subjects that may attempt data access.
Typically, this list will consist of individual users or user groups, although access could
be controlled for terminals, hosts, or applications instead of or in addition to users. The
other axis lists the objects that may be accessed. At the greatest level of detail, objects
may be individual data fields. More aggregate groupings, such as records, files, or even
the entire database, may also be objects in the matrix. Each entry in the matrix
indicates the access rights of that subject for that object.
● The matrix may be decomposed by columns, yielding access control lists. Thus, for
each object, an access control list lists users and their permitted access rights.
● Decomposition by rows yields capability tickets. A capability ticket specifies
authorized objects and operations for a user. Each user has a number of tickets and
may be authorized to loan or give them to others.
The Concept of Trusted Systems
The reference monitor has access to a file, known as the security kernel database,
that lists the access privileges (security clearance) of each subject and the protection
attributes (classification level) of each object.
Reference Monitor Concept
● The reference monitor enforces the security rules (no read up, no write down)
and has the following properties:
○ Complete mediation: The security rules are enforced on every access, not
just, for example, when a file is opened.
○ Isolation: The reference monitor and database are protected from
unauthorized modification.
○ Verifiability: The reference monitor's correctness must be provable. That is,
it must be possible to demonstrate mathematically that the reference monitor
enforces the security rules and provides complete mediation and isolation.
Trojan Horse Defense
The delivery method typically sees an attacker use social engineering to hide
malicious code within legitimate software to try and gain users' system access
with their software.
One way to secure against Trojan horse attacks is the use of a secure, trusted
operating system.
Trojan Horse Defense
Trojan Horse Defense
1. In this case, a Trojan horse is used to get around the standard security mechanism used by
most file management and operating systems: the access control list. In this example, a user
named Bob interacts through a program with a data file containing the critically sensitive
character string "CPE170KS." User Bob has created the file with read/write permission provided
only to programs executing on his own behalf: that is, only processes that are owned by Bob may
access the file. The Trojan horse attack begins when a hostile user, named Alice, gains
legitimate access to the system and installs both a Trojan horse program and a private file to be
used in the attack as a "back pocket." Alice gives read/write permission to herself for this file and
gives Bob write-only permission.
2. Alice now induces Bob to invoke the Trojan horse program, perhaps by advertising it as a useful
utility. When the program detects that it is being executed by Bob, it reads the sensitive character
string from Bob's file and copies it into Alice's back-pocket file. Both the read and write
operations satisfy the constraints imposed by access control lists. Alice then has only to access
Bob's file at a later time to learn the value of the string.
Trojan Horse Defense
3. Now consider the use of a secure operating system in this scenario. Security levels are assigned to
subjects at logon on the basis of criteria such as the terminal from which the computer is being
accessed and the user involved, as identified by password/ID. In this example, there are two security
levels, sensitive and public, ordered so that sensitive is higher than public. Processes owned by Bob
and Bob's data file are assigned the security level sensitive. Alice's file and processes are restricted to
public.
4. If Bob invokes the Trojan horse program, that program acquires Bob's security level. It is therefore
able, under the simple security property, to observe the sensitive character string. When the program
attempts to store the string in a public file (the back-pocket file), however, the is violated and the
attempt is disallowed by the reference monitor. Thus, the attempt to write into the back-pocket file is
denied even though the access control list permits it: The security policy takes precedence over the
access control list mechanism.
Wireless Security
1. Discovery: An AP uses messages called Beacons and Probe Responses to advertise its IEEE 802.11i security policy.
The STA uses these to identify an AP for a WLAN with which it wishes to communicate. The STA associates with the
AP, which it uses to select the cipher suite and authentication mechanism when the Beacons and Probe Responses
present a choice.
2. Authentication: During this phase, the STA and AS prove their identities to each other. The AP blocks non-
authentication traffic between the STA and AS until the authentication transaction is successful. The AP does not
participate in the authentication transaction other than forwarding traffic between the STA and AS.
3. Association: As soon as the authentication ends, the client prepares to associates with the AP by forwarding an
association request to negotiate required cipher suites such as TKIP/CCMP/GCMP. During the client's association, the
AP keeps an association ID and sends an association response back. A client can be authenticated to many networks
but can be associated with only one network at a time
4. Key generation and distribution: The AP and the STA perform several operations that cause cryptographic keys to
be generated and placed on the AP and the STA. Frames are exchanged between the AP and STA only.
5. Protected data transfer: Frames are exchanged between the STA and the end station through the AP. As denoted by
the shading and the encryption module icon, secure data transfer occurs between the STA and the AP only; security is
not provided end-to-end.
6. Connection termination: The AP and STA exchange frames. During this phase, the secure connection is torn down
and the connection is restored to the original state.
Types of Wi-Fi networks
● Wi-Fi Personal Networks
● Wi-Fi Enterprise Networks
Mode of operation -Wi-Fi Personal Networks
Mode of operation -Wi-Fi Enterprise Networks
4-Way Handshake Phase
● The 4-way handshake is the process of
exchanging 4 messages between an access
point (authenticator) and the client device
(supplicant) to generate some encryption keys
which can be used to encrypt actual data sent
over Wireless medium.
● PMK (Pairwise Master Key)
● PTK (Pairwise Transient Key):
● Pairwise Transient key is used to encrypt all
unicast traffic between a client station and the
access point. PTK is unique between a client
station and access point. To generate PTK, client
device and access point need the following
information.
● WEP attempted to limit access to wireless network data in the same way wired local area networks
(LANs) protect data. Users with physical access to the network access points are the only ones with
access to wired networks. Wireless networks like Wi-Fi depend on encryption protocols like WEP to
prevent unauthorized access to network data.
Wired Equivalent Privacy (WEP)
The basic network security services the protocol provides for wireless networks include the following:
● Privacy. WEP initially used a 64-bit key with the RC4 stream encryption algorithm to encrypt data transmitted
wirelessly. Later versions of the protocol added support for 128-bit keys and 256-bit keys for improved security. WEP
uses a 24-bit initialization vector, which resulted in effective key lengths of 40, 104 and 232 bits.
● Data integrity. WEP uses the CRC-32 checksum algorithm to check that transmitted data is unchanged at its
destination. The sender uses the CRC-32 cyclic redundancy check to generate a 32-bit hash value from a sequence of
data. The recipient uses the same check on receipt. If the two values differ, the recipient can request a retransmission.
● Authentication. WEP authenticates clients when they first connect to the wireless network access point. It enables
authentication of wireless clients with these two mechanisms:
1. Open System Authentication. With OSA, Wi-Fi-connected systems can access any WEP network access
point, as long as the connected system uses a service set identifier that matches the access point SSID.
2. Shared Key Authentication. With SKA, Wi-Fi-connected systems use a four-step challenge-response
algorithm to authenticate.
Working of WEP- Encryption
Wired Equivalent Privacy (WEP) - Limitations
❑ Stream cipher. Encryption algorithms applied to data streams, called stream ciphers, can be
vulnerable to attack when a key is reused. The protocol's relatively small key space makes it
impossible to avoid reusing keys.
❑ RC4 weaknesses. The RC4 algorithm itself has come under scrutiny for cryptographic weakness
and is no longer considered safe to use. (sender simply XOR the keystream with plaintext to
produce cyphertext)
❑ If an atatcker flips a bit in ciphertext, corresponding bit in the plaintext will be flipped
❑ If an eavesdropper intercepts two ciphertexts encrypted with same keystream, It is possible
to get XOR of two plain text, This XOR output enables some statistical attacks to recover
plaintext
❑ Optional. As designed, the protocol use is optional. Because it's optional, users often failed to
activate it when installing WEP-enabled devices.
❑ Shared key. The default configuration for these systems uses a single shared key for all users.
You can't authenticate individual users when all users share the same key.
Wifi protected access(WPA)
● The two security protocols and security certification programs are Wi-Fi Protected Access (WPA) and
Wi-Fi Protected Access I (WPA2).
● These are developed by the Wi-Fi Alliance to secure wireless computer networks.
● The Wi-Fi Alliance defined these protocols because of the serious weaknesses the researchers found in
the previous system, Wired Equivalent Privacy (WEP).
● WPA also referred to as the draft IEEE 802.11; standard became available in 2003.
● The Wi-Fi Alliance made it as an intermediate measure in anticipation of the availability of the more
secure and complex WPA2, which became available in 2004 which is a common shorthand for the full
IEEE 802.11i (or IEEE 802.11-2004) standard.
Working of WPA/2 Encryption
● When a client want to send some information (plaintext) to the AP, it uses PTK just negotiated and combine with the packet
number (nonce) to form the packet key for that packet.
● The packet number is incremented by one for every frame transmitted.
● Idea is to combine session key with packet number to create a unique packet key.
● This packet key is fed to the stream cipher to create required keystream.
● This keystream is simply Xor-ed with the plaintext to create the encrypted data (cipher text).
● The nonce (packet number) will be appended in the header of cipher text, so that AP will be able to decrypt the packet.
Wifi protected access(WPA)
● The WPA is an intermediate measure to take the place of WEP.
● WPA could be implemented through firmware upgrades on wireless network interface cards that were
designed for WEP in 1999. However, since more changes were required in the wireless access points (APs)
than those needed on the network cards, most pre-2003 APs could not be upgraded to support WPA.
● The WPA protocol implements almost all of the IEEE 802.11i standard.
● The Temporal Key Integrity Protocol (TIP) was adopted for WPA.
● WEP used a 64-bit or 128-bit encryption key that must be manually entered on wireless access points and
devices which once entered can never be changed.
● TKIP employs a per-packet key, which means that it dynamically generates a new 128-bit key for each packet
and thus prevents the types of attacks that compromised WEP.
Wifi protected access(WPA)
● WPA included a Message Integrity Check, which is designed to prevent an attacker to alter or resend
data packets.
● This replaced the cyclic redundancy check (CRC) that was used by the WEP standard.
● CRC's had a main flaw that it did not provide a sufficiently strong data integrity guarantee for the
packets it handled.
● Well tested message authentication codes existed to solve these problems, but they required too much
computation to be used on old network cards.
● WPA uses a message integrity check algorithm called TKIP to verify the integrity of the packets.
● TKIP is much stronger than a CRC, but the algorithm used in WPA2 is stronger.
● Researchers discovered a flaw in WPA similar to older weaknesses in WEP and the limitations of the
message integrity code hash function, named Michael, that is used to retrieve the keystream from short
packets to use for re-injection and spoofing.
Wifi protected access(WPA2)
● ANS: The concept of association is closely related to mobility in WLAN (Wireless Local Area Network) networks. In
WLAN, association refers to the process by which a wireless client device, such as a laptop or smartphone,
establishes a connection with an access point (AP) to access the network.
● When a client device moves within the coverage area of a WLAN network, it may need to switch its association from
one access point to another as it moves out of range of the current AP and into the range of another AP. This
process is known as mobility or handover.
● During mobility, the client device needs to disassociate from the current AP and then associate with the new AP
seamlessly to maintain an uninterrupted network connection. The new AP, upon receiving the association request
from the client, authenticates and authorizes the client to join the network.
● The association process in WLAN networks plays a crucial role in supporting mobility. It ensures that client devices
can seamlessly roam between different access points without experiencing interruptions or loss of connectivity.
Effective association mechanisms and protocols are essential for enabling efficient mobility management in WLAN
networks.