Chapter Four
Chapter Four
transport
TCP
TCP UDP
UDP
network
ICMP
ICMP IP
IP IGMP
IGMP
link
hardware
hardware
ARP
ARP RARP
RARP
interface
interface
2
3
Network attacks
Spoofing attack: a situation in which one person or program
successfully imitate another by falsifying data and thereby
gaining an illegitimate advantage.
• IP spoofing
• Putting a wrong IP address in the source IP address of an
IP packet
• DNS spoofing
• Changing the DNS information so that it directs to a
wrong machine
4
Network attacks (cont’d…)
URL spoofing/Webpage phishing
11
Working of PGP(cont’d…)
12
Transport Layer attack
• TCP operates using synchronized connections,
initiated with 3 way handshake.
• TCP SYN flood attack exploits the vulnerability at this
stage of TCP connection.
– The attacker sends TCP SYN packets by
impersonating the IP address of an inactive host.
– The target machine responds SYN acknowledgment
waiting for the inactive host to respond.
– However, instead of opening a session, the
attacker continuously sends SYN requests and the
victim’s buffer will be flooded and cannot respond
to other requests. 13
Philosophy of TLS Design
16
Architecture of SSL…
• SSL itself is not a single layer protocol; in fact it is composed of two
sub-layers.
The four sub-components of the SSL protocol handle various tasks for secure
communication between the client machine and the server.
• Record Protocol
18
Functions of SSL Protocol Components…
• Multiple secure TCP connections between a client and a server can share
the same session.
• Handshake protocol actions through four phases.
19
Functions of SSL Protocols…
20
Functions of SSL Protocols…
21
Establishment of SSL Session
22
Establishing security capabilities…
• This phase comprises of exchange of two messages
– Client_hello and Server_hello.
24
Phase 3 − Client authentication and key exchange
• Client also
sends Certificate_verify message if
certificate is sent by him to prove he
has the private key associated with this
certificate. Basically, the client signs a
hash of the previous messages.
25
Phase-4:Finish
• Client and server
send Change_cipher_spec mes
sages to each other to cause
the pending cipher state to be
copied into the current state.
32
Network Layer: IP security (IPSec)
• IPSec is a protocol suit for securing IP
communications by authenticating and encrypting
each IP packet of a communication session.
• Applications of IPSec
34
The two protocols of IPsec
• There are two security protocols defined by IPsec — Authentication
Header (AH) and Encapsulating Security Payload (ESP).
• Confidentiality (encryption)
- Encryption of user data for privacy
• Access control 37
- Gives access privileges to end users (done by
Two communication modes of IPSec
• Transport Mode:
– The protocol protects the message passed down to
IP from the transport layer.
– The message is processed by AH/ESP and
appropriate headers are added in front of the
transport header.
– The IP header is then added in front of that by IP.
• Tunnel Mode:
– IPsec is used to protect a complete encapsulated IP
datagram after the IP header has already been
applied to it.
– The IPsec header appears in front of the original IP
38
header and then a new IP header is added in front of