Chapter 4 and 5
Chapter 4 and 5
• IP spoofing
• Putting a wrong IP address in the source IP address of an
IP packet
• DNS spoofing
• Changing the DNS information so that it directs to a
wrong machine
2
Network attacks (cont’d…)
URL spoofing/Webpage phishing
PresentationPresentation
Translates, encrypts and compresses
Translates, encrypts data
and compresses data
Session Session
Establishes, Establishes,
managesmanages
and terminates sessions
and terminates sessions
One-to-One E-mail
• In this scenario, the sender sends an e-mail message to
only one recipient. Usually, not more than two MTA are
involved in the communication.
9
One-to-One E-mail(cont’d…)
11
One-to-Multiple Recipients E-mail(cont’d…)
13
One-to-Distribution List E-mail(cont’d…)
• When the sender wants to send a confidential e-mail to the
recipients of the mailing list (say R1, R2, and R3); the privacy is
ensured as follows −
• The sender and all recipients have their own pair of private-public keys. The
Exploder Server has a pair of private-public key for each mailing list (ListPUB,
ListPVT) maintained by it.
• The sender generates a secret symmetric key Ks and then encrypts the
message with this key.
• The sender then encrypts KS with the public key associated with the list,
obtains ListPUB(KS).
• The sender sends encrypted message and ListPUB(KS). The exploder MTA
decrypts ListPUB(KS) using ListPVT and obtains KS.
• The exploder encrypts KS with many public keys as there are members in the
list.
• The Exploder forwards the received encrypted message and corresponding
encrypted KS to all recipients in the list. For example, the Exploder forwards
the encrypted message and R1PUB(KS) to recipient 1 and so on. 14
Pretty Good Privacy (PGP)
16
Working of PGP(cont’d…)
17
Transport Layer attack
• TCP operates using synchronized connections,
initiated with 3 way handshake.
• TCP SYN flood attack exploits the vulnerability at this
stage of TCP connection.
– The attacker sends TCP SYN packets by
impersonating the IP address of an inactive host.
– The target machine responds SYN acknowledgment
waiting for the inactive host to respond.
– However, instead of opening a session, the
attacker continuously sends SYN requests and the
victim’s buffer will be flooded and cannot respond
to other requests. 18
Philosophy of TLS Design
21
Architecture of SSL…
• SSL itself is not a single layer protocol; in fact it is composed of two
sub-layers.
The four sub-components of the SSL protocol handle various tasks for secure
communication between the client machine and the server.
• Record Protocol
23
Functions of SSL Protocol Components…
• Multiple secure TCP connections between a client and a server can share
the same session.
• Handshake protocol actions through four phases.
24
Functions of SSL Protocols…
25
Functions of SSL Protocols…
26
Establishment of SSL Session
27
Establishing security capabilities…
• This phase comprises of exchange of two messages
– Client_hello and Server_hello.
29
Phase 3 − Client authentication and key exchange
• Client also
sends Certificate_verify message if
certificate is sent by him to prove he
has the private key associated with this
certificate. Basically, the client signs a
hash of the previous messages.
30
Phase-4:Finish
• Client and server
send Change_cipher_spec mes
sages to each other to cause
the pending cipher state to be
copied into the current state.
36
Network Layer: IP security (IPSec)
• IPSec is a protocol suit for securing IP
communications by authenticating and encrypting
each IP packet of a communication session.
• Applications of IPSec
38
Network Layer: IP security (IPSec)
Benefits of IPSec...
• Confidentiality (encryption)
- Encryption of user data for privacy
• Access control 42
- Gives access privileges to end users (done by
Two communication modes of
IPSec
• Transport Mode:
– The protocol protects the message passed down to
IP from the transport layer.
– The message is processed by AH/ESP and
appropriate headers are added in front of the
transport header.
– The IP header is then added in front of that by IP.
• Tunnel Mode:
– IPsec is used to protect a complete encapsulated IP
datagram after the IP header has already been
applied to it.
– The IPsec header appears in front of the original IP
43
header and then a new IP header is added in front of
CHAPTER 5
security mechanism
44
Securing Private Networks
• Minimize external access to LAN
Keep intruders,
malicious code and
unwanted traffic or
information out
Keep private and
Private Network
sensitive
information in
Private data
security wall
between External attacks
private
(protected) External Network
network and
47
outside word
Overview of Firewall…
48
Types of Firewalls
49
Packet Filtering Firewalls/Routers
• Packet Filtering router applies a set of rules to each
incoming and outgoing IP packet and then forwards or
discards the packet.
– A filtering firewall works at the network level.
51
Overview of Proxy Server
• Proxy Server is a computer program that acts as an
intermediary between a web browser and a web server.
– To give users rapid access to popular web destinations.
53
Web caches (proxy server)
Goal: satisfy client request without involving origin server
56
Steps Involved in a Proxy Transaction
1. Internal host makes request to access a Web
site
2. Request goes to proxy server, which examines
header and data of the packet against rule base
3. Proxy server recreates packet in its entirety
with a different source IP address
4. Proxy server sends packet to destination;
packet appears to come from proxy server
5. Returned packet is sent to proxy server, which
inspects it again and compares it against its
rule base
6. Proxy server rebuilds returned packet and
sends it to originating computer; packet
appears to come from external host 57
Goals of Proxy Servers
• Conceal internal clients
• Block URLs
• Block and filter content
• Protect e-mail proxy
• Improve performance
• Ensure security
• Provide user authentication
• Redirect URLs
58
Circuit-Level Gateway
• SOCKS (RFC 1928) refers to a circuit-level gateway.
• The server accepts the request after checking that the client meets the
basic filtering criteria.
• The SOCKS server informs the client, and in case of success, starts relaying
the data between the two connections.
• Circuit level gateways are used when the organization trusts the internal 60
IDS/IPS
• It's a network security program that looks for harmful
activity on a network or system.
Signature-based IDS
65