Overview of Network Security - Electrical and Computer Engineering

advertisement
Course Outline: Fundamental Topics

System View of Network Security
 Network Security Model
 Security Threat Model & Security Services Model
 Overview of Network Security

Security Basis: Cryptography
 Secret key cryptography
 Hashes and message digests
 Public key cryptography
 Key distribution and management

Network Security Applications:
An Overview of Network
Security (II)
EE5723/EE4723
Spring 2012
 Authentication and security handshakes pitfalls
 Well known network security protocols such as
Kerberos, IPSec, SSL/SET, PGP& PKI, WEP
EE5723/EE4723
Spring 2012
ISO 7498-2: Security Architecture
of OSI Reference Model
Outline

Security Architecture of OSI Reference Model

Security Placement w/in Multiple Protocol
Layers
EE5723/EE4723
Spring 2012
 Internet Protocol Architecture
 The OSI reference model & its services
(ISO 7498-1)
 Details of ISO 7498-2
EE5723/EE4723
Spring 2012
1
Internet Protocol Layering
Internetworking
Host A
Host B
Application Layer
Application Layer
HTTP Message
Router
Network
B
Transport Layer
Internet Layer
IP Datagram
Network Layer
Host A
EE5723/EE4723
Router
Internet Layer
Internet Layer
Network
A
Transport Layer
TCP Packet
Host B
Ethernet
Frame
IP Datagram
Network Layer
Physical Network
Spring 2012
The OSI Reference Model:
ISO 7498-1
EE5723/EE4723
Network Layer
Physical Network
Spring 2012
Internet Protocols vs. OSI
Internet
OSI Reference Model - internationally
standardized network architecture.
 An abstract representation of an ideal
network protocol stack
 OSI = Open Systems Interconnection
 Specified
S
ifi d iin ISO 7498-1
7498 1
 Model has 7 layers
Ethernet
Frame
OSI

EE5723/EE4723
Spring 2012
5
Application
A li ti
Application
7
Presentation
6
Session
5
4
TCP
Transport
4
3
IP
Network
3
2
Network Interface
Data Link
2
1
Hardware
Physical
1
EE5723/EE4723
Spring 2012
2
Lower/Upper Layers

Layers
y
1-4 often referred to as “lower layers”.
y

Layers 5-7 are the “upper layers”.

Lower layers relate more closely to the
communications technology.

Upper layers relate to applications.
EE5723/EE4723
Spring 2012
Layer 6: Presentation Layer

Concerned with representation
p
of
transmitted data.

Deals with different data representations,
e.g. of numbers, characters.


Also deals with data compression and
encryption.
Layer for source coding.
EE5723/EE4723
Spring 2012
Layer 7: Application Layer

Home to wide variety of protocols for specific
user needs, e.g.:
 virtual
terminal service,
 file transfer,
 electronic mail,
 directory services.
EE5723/EE4723
Spring 2012
Layer 5: Session Layer

Allows establishment of sessions between
machines, e.g. to
 allow
remote logins
file transfer service.
 provide

Responsible for dialogue control.

Also performs token management and
synchronization.
EE5723/EE4723
Spring 2012
3
Layer 4: Transport Layer

Basic function is to take data from Session
Layer,
y split
p it up
p into smaller units, and
ensure that the units arrive correctly.

Concerned with efficient provision of service.

The Transport Layer also determines the
‘type
type of service
service’ to provide to the Session
Layer.

Also responsible for congestion control.
EE5723/EE4723
Spring 2012
Layer 2: Data Link Layer

Provides reliable, error-free service on top
of raw Level 1 service
service.
 include



Controls the subnet.

Key issue is routing in the subnet; can be
based on:
 static
tables,
 determined at start of session,
 highly dynamic (varying for each packet).
EE5723/EE4723
Frames used to manage errors via
acknowledgements and selective frame
retransmission.
Spring 2012
Spring 2012
Layer 1: Physical Layer

Concerned with bit transmission over
physical channel.

Issues include:
encoding, CRC, etc.
Breaks data into frames. Requires
creation of frame boundaries.
EE5723/EE4723
Layer 3: Network Layer
 definition
of 0/1,
 whether channel simplex/duplex,
 connector design.

Mechanical, electrical, procedural matters.
EE5723/EE4723
Spring 2012
4
Services & Protocols
Layering Principles

N+1
PDU
(N+1) Entity
Service User
SDU
(N) Entity
Service Provider
Layer N+1 protocol
(N+1) Entity
Service User
 Service
defines what each layer can do (but not
how it does it).
Layer N Service
Access Point (SAP)
Layer N protocol
N
PDU
(N) Entity
Service Provider

N
PDU
PDU - Protocol Data Unit
SDU - Service Data Unit
EE5723/EE4723
Spring 2012
ISO 7498-2: Security Architecture

Service = set of primitives provided by one
layer
y to layer
y above.
Protocol = set of rules g
governing
g data
communication between peer entities, i.e.
format and meaning of frames/packets.
EE5723/EE4723
Spring 2012
Policies, threats, services, & mechanisms

Provides standard definitions of security
terminology
In a secure system, the rules governing security
behavior should be made explicit in the form of a
security policy.
 Security
policy: ‘the set of criteria for the provision of
security services’.

Provides standard descriptions for security
services and mechanisms

A security threat is a possible means by which a
security policy may be breached (e.g. loss of
integrity or confidentiality).

Defines where in OSI reference model
security services may be provided


Introduces security management concepts
A security service is a measure which can be put in
place to address a threat (e.g. provision of
confidentiality).

A security mechanism is a means to provide a
service (e.g. encryption, digital signature).
EE5723/EE4723
Spring 2012
EE5723/EE4723
Spring 2012
5
Step1: Generic security policy
Security life-cycle in ISO 7498-2

Define security Model
 Define
D fi


ISO 7498-2 generic authorization policy:
 ‘Information
Information
may not be given to, accessed by,
nor permitted to be inferred by, nor may any
resource be used by, those not appropriately
authorized.’
security
it policy
li
 Analyze
 Define

security threats (according to policy)
security services to meet threats
Define security
y mechanisms to p
provide
services

Possible basis for more detailed policy.

Does not cover availability (e.g. DoS attack)
issues (for legitimate user).
Provide on-going management of security
EE5723/EE4723
Spring 2012
EE5723/EE4723
Policy Types

ISO 7498-2 distinguishes between 2 types
of security policies:
 Identity-based:
where access to and use of
resources are determined on the basis of the
identities of users and resources
 Rule
Rule-based:
based:
where resource access is
controlled by global rules imposed on all users,
e.g. using security labels.
EE5723/EE4723
Spring 2012
Spring 2012
Step 2: Fundamental threats

A threat is:

a person, thing, event or idea which poses some danger to an
asset (in terms of confidentiality, integrity, availability or
l iti t use).
legitimate
)

An attack is a realization of a threat

Safeguards = countermeasures (e.g. controls, procedures) to
protect against threats.

Vulnerabilities = weaknesses in safeguards

Four fundamental threats:




Information leakage
Integrity violation
DoS
illegitimate use
EE5723/EE4723
Spring 2012
6
Step3: Security Services


Security services in ISO 7498-2 are a special
class of safeguards applying to a communication
environment.
ISO 7498-2 defines 5 main categories of security
service:
Step 4: Security Mechanisms

To p
provide and support
pp security
y services

Can be divided into two classes:
 Specific
security mechanisms, used to provide
specific security services, and
 Pervasive security mechanisms (e.g., trust
functionality, intrusion/event detection, security
recovery), not specific to particular services.
 Authentication
(including entity authentication and
origin authentication)
 Access control
 Data confidentiality
 Data integrity
 Non-repudiation
EE5723/EE4723
Spring 2012
Specific security mechanisms


EE5723/EE4723
 encipherment
signature
 access control mechanisms
 data integrity mechanisms
 authentication exchanges
 traffic padding
 routing control
 notarization
Spring 2012
Encipherment mechanisms = encryption or cipher
algorithms.
g
 Can
 digital
EE5723/EE4723
Spring 2012
Specific Mechanisms (Cont’d)

Eight types:
Often expensive

provide data and traffic flow confidentiality.
Digital signature mechanisms
 signing
procedure (private)
 verification procedure (public).
 Can provide non-repudiation,
non repudiation origin authentication and
data integrity services.

Both can be basis of some authentication
exchange mechanisms.
EE5723/EE4723
Spring 2012
7
Specific Mechanisms (Cont’d)
Specific Mechanisms (Cont’d)


Access Control mechanisms
 The
addition of ‘pretend’ data to conceal real volumes of
data traffic.
traffic
 Provides traffic flow confidentiality.
 A server
using client information to decide whether to
grant access to resources

E.g. access control lists, capabilities, security labels.


Data integrity mechanisms
 Protection


sensitive data using insecure channels.
be chosen to use only physically secure
network components.

N t i ti mechanisms
Notarization
h i
 Integrity,
origin and/or destination of data can be
guaranteed by using a 3rd party trusted notary.
Authentication exchange mechanisms
entity authentication service.
EE5723/EE4723
Routing control mechanisms
 Used to prevent
 E.g. route might
against modification of data.
Provide data integrity and origin authentication services. Also
b i off some authentication
basis
th ti ti exchange
h
mechanisms.
h i
 Provide
Traffic padding mechanisms

Spring 2012
Notary typically applies a cryptographic transformation to the
data.
EE5723/EE4723
Service/mechanism table
Spring 2012
Service/mechanism table (cont’d)
 ISO 7498-2 indicates which mechanisms can be used to provide which services
 Illustrative NOT definitive.
Service
S
i
Entity authentication
Mechanism
Enciph ermentt
Y
Digital
sign.
i
Y
Origin authentication
Y
Y
Access control
Access
C t l
Control
Data
i t
integrity
it
Y
Connection confidentiality
Y
Connectionless
Y
confidentiality
Selective field confidentiality
Y
Traffic flow confidentiality
Y
Connection integrity with recovery
Y
Y
Connection integrity without recovery
Y
Y
Selective field connection integrity
Y
Connectionless integrity
Y
Y
Selective field connectionless integrity
Y
Y
Y
Non -repudiation of origin
Y
Y
Non -repudiation of delivery
Y
Y
EE5723/EE4723
Spring 2012
Y
Y
Mechanism Auth.
Service
exchange
Entity authentication
Y
Origin authentication
Access control
Connection confidentiality
Connectionlessconfidentiality
Selective field confidentiality
Traffic flow confidentiality
Connection integrity with recovery
Connection integrity without recovery
Selecti e field connection integrity
Selective
integrit
Connectionless integrity
Sele ctive field connectionless integrity
Non-repudiation of origin
Non-repudiation of delivery
EE5723/EE4723
Traffic
padding
Routing
Control
Notaris ation
Y
Y
Y
Y
Y
Y
Spring 2012
8
Pervasive security mechanisms
Pervasive Mechanisms


 Any
functionality providing or accessing security
mechanisms should be trustworthy.
 May involve combination of software and hardware.
Five types identified:
functionality,
 security labels,
 event detection,
 security audit trail,
 security recovery.
 trusted
EE5723/EE4723
Spring 2012
Pervasive Mechanisms (Cont’d)


Security labels
 Any
resource (e.g. stored data, processing power,
communications bandwidth) may have security label
associated with it to indicate security sensitivity.
 Similarly labels may be associated with users. Labels
may need to be securely bound to transferred data.
EE5723/EE4723
Link and E2E Encryption:


(1) Link encryption:
–A lot of encryption devices
–Decrypt
yp each p
packet at every
y
switch
-Intermediate switch must be trusted
-Invisible to the users
Includes detection of

attempted security violations,
legitimate security-related activity.
Can be used to trigger event reporting (alarms), event logging,
automated recovery.
Security audit trail
(2) End-to-end encryption
–Addresses potential flaws in lower layers
–The source encrypt and the receiver
decrypts
–Payload
P l d encrypted
t d
–Header in the clear
–Only end nodes must be trusted

Log of past security-related events.
 Permits detection and investigation of past security breaches

Security recovery

Includes mechanisms to handle requests to recover from security
failures (security tolerant).
 May include immediate abort of operations, temporary invalidation
of an entity, addition of entity to a blacklist.
EE5723/EE4723
Spring 2012
Link vs. End-to-End Encryption
Event detection


Trusted functionality
Spring 2012
(3) High Security: Both link and E2E encrypion are
Ref: Network Security Essential,
by Stallings
EE5723/EE4723
needed
Spring 2012
9
Security Services & Layering in General
Typical Message: Link Encryption
Link-to-link Encryption
Sender
Protocol
layer
B
Intermediate Host
N
T
Message
message
(plaintext)
exposed
4. transport
E
Receiver
Message
5. application
M
Transport Header
Network Header
3. network
Data Link Header
2. data link
1. physical
Data Link Trailer

Message encrypted
Message in plaintext
EE5723/EE4723
Ref: Security in Computing, by Charles P.
Pfleeger & Shari Lawrence Pfleeger
Spring 2012
If all hosts on a network are reasonably trustworthy, but
the communications medium is shared w/ other users or
is not secure, link encryption is an easy control to use
EE5723/EE4723
Security Services & Layering in General
Spring 2012
Typical Message: End-to-End Encryption
End-to-End Encryption
S d
Sender
Protocol
layer
I t
Intermediate
di t Host
H t
R i
Receiver
B
N
T
M
E
Message
5. application
4. transport
message
(plaintext)
exposed
Message
Transport Header
3. network
2 d
2.
data
t li
link
k
Network Header
1. physical
Data Link Header
Data Link Trailer
Message encrypted
Message in plaintext
EE5723/EE4723
Spring 2012
EE5723/EE4723
Spring 2012
10
Comparison of Encryption Architecture

Link-to-link encryption
 Message is plaintext inside of hosts (trustworthy?): node
authentication needed
 Faster
F t (mostly
(
tl hardware);
h d
) Easier/invisible
E i /i i ibl ffor user
 one key per node/interface pair

End-to-end encryption
 Flexible (hardware or software)
 Application & user aware
 No trust in intermediate nodes required: need end user
authentication
 One key per host pair

Unavoidable multilayer security provisioning
EE5723/EE4723
Spring 2012
11
Download