SECURITY THREATS FOR TELEMATIC COMMUNICATIONS SECURITY IN WIRELESS NETWORKS Carlos Rey-Moreno – crey-moreno@uwc.ac.za Introduction to Security Services How secure are our data networks? ❍ What is a Threat? ❍ What is an Attack? ❍ What is a Vulnerability? Common types of network attacks ❍ Eavesdropping ❍ Masquerading ❍ Man-in-the-middle ❍ Denial of service What is a Security Service? ❍ ITU-T Definition ❍ Services to reduce design vulnerabilities X.800 Security Services for Open Systems ❍ Confidentiality ❍ Integrity ❍ Authentication ❍ Access Control ❍ Non Repudiation ❍ Anonymity ❍ Availability How secure are we on a data network? What is a Threat? A potential for violation of security, which exists when there is an entity, circumstance, capability, action, or event that could cause harm. How secure are we on a data network? What is a Threat? A potential for violation of security, which exists when there is an entity, circumstance, capability, action, or event that could cause harm. Something that can be wrong!!! How secure are we on a data network? Why do we have to minimize the threats? ❍ Because the threats lead to attacks An intentional act by which an entity attempts to evade security services and violate the security policy of a system. That is, an actual assault on system security that derives from an intelligent threat. (See: penetration, violation, vulnerability.) How secure are we on a data network? Why do we have to minimize the threats? ❍ Because the threats lead to attacks An intentional act by which an entity attempts to evade security services and violate the security policy of a system. That is, an actual assault on system security that derives from an intelligent threat. (See: penetration, violation, vulnerability.) Actions to damage a system!!! How secure are we on a data network? How is implemented an attack? ❍ Attacks are implemented through vulnerabilities A flaw or weakness in a system's design, implementation, or operation and management that could be exploited to violate the system's security policy. How secure are we on a data network? How is implemented an attack? ❍ Attacks are implemented through vulnerabilities A flaw or weakness in a system's design, implementation, or operation and management that could be exploited to violate the system's security policy. The ways to damage a system!!! How secure are we on a data network? Threats Vulnerabilities The threats are exploited by attacks. The attacks are designed taking advantage of the vulnerabilities of the network protocols and systems (one attack can involve several vulnerabilities). If the attack succeeds the systems may get down. Attacks Success HARM How secure are we on a data network? Example 1: e-commerce web server attack Vulnerabilities database http://nvd.nist. gov/home.cfm ❍ Threat. Attacker impersonating a customer ❍ Vulnerability. Check the vulnerabilities of the web server (brand, version, operating system…). For example we discovered that the users database is opened to LDAP queries in the current web server version. ❍ Attack. The attacker designs an attack based on the discovered vulnerabilities. He/She makes thousands of queries to users database to get potential targets. Try the most popular passwords with all the gathered users until gets a valid user/password credential. Finally the attacker can make a purchase with charge to the victim. How secure are we on a data network? So we have to know the threats of a system in order to define the appropriate security services to avoid or minimize the consequences of attacks ❍ We have to know the threats ❍ We have to discover the potential attacks (the way that the threats become reality) ❍ We have to incorporate security services in the systems to minimize (or avoid) the harm caused by attacks Common Types of Network Attacks Eavesdropping ❍ An attacker who has gained access to the data path in the network listen or read the traffic. Information for Bob Alice Attacker Information for Bob Information for Bob Bob The attacker gets the information sent to Bob illegally Common Types of Network Attacks Masquerading ❍ The attacker impersonates one of the participants in the communication. Attacker Alice Hello Bob, I am Alice, could you please send me the money to this address: XXX? Hello Alice, of course I will send you the money to that address Bob Common Types of Network Attacks Man-in-the-middle ❍ The attacker controls the communication transparently. The participants believe that they are communicating directly with each other. I need 10 € I need 5 € Alice I need 5 € Attacker I need 10 € Bob The attacker modifies the information and nobody knows Common Types of Network Attacks Denial of service ❍ The attacker prevents the normal use of the network resources. Alice Bob Attacker The attacker turns the network down We already know the threats and now… what? What can we do? How can we protect the networks? First Step: To remove the design vulnerabilities Deploying Security Services What is a security service? “A service, provided by a layer of communicating open systems, which ensures adequate security of the systems or of data transfers”. Recommendation X.800 What is a security service? “A service, provided by a layer of communicating open systems, which ensures adequate security of the systems or of data transfers”. Recommendation X.800 What does it mean? What is a layer of an open system? What is the adequate security? What is a security service? Layered communication model: What is that? The model of layered architecture is the dominant paradigm to design final telecommunication solutions What is a security service? Layered communication model: Why is widely accepted? You can face the big problem through small problems Divide and Conquer strategy!!! L5 L4 Big Layer L3 L2 L1 F(x) = Functionality of x F(Big Layer) = F(L5) + F(L4) + F(L3) + F(L2) + F(L1) C(x) = Complexity of x C(Big Layer) >> C(L5) + C(L4) + C(L3) + C(L2) + C(L1) R (x) = Reutilization of x R(Big Layer) <<< R(L5) or R(L4) or R(L3) or R(L2) or R(L1) What is a security service? Development of a telematic solution – Security of the Design State L5 S1 L4 L3 S2 S3 Number of vulnerabilities: N S5 L4 L3 S4 L2 L1 L5 Security services are functionalities added to the layers to reduce the number of vulnerabilities (implies the reduction of threats too) L2 L1 Number of vulnerabilities: S S<<N What are these functionalities to provide security? X.800 Security Services for Open Systems The ITU-T X.800 Recommendation defines five security services ❍ ❍ ❍ ❍ ❍ Confidentiality Integrity Authentication Non-repudiation Access Control Currently there are two more common security services widely accepted ❍ Anonymity ❍ Availability X.800 Security Services for Open Systems Confidentiality ❍ When it is provided, it protects the network users from attacks of eavesdropping. Only the authorized recipient of the information will access the information. Eavesdropping attack Information for Bob Information for Bob Bob Alice Confidentiality Service Attacker Information for Bob The attacker gets the information sent to Bob illegally X.800 Security Services for Open Systems Integrity ❍ When it is provided, it guarantees that the data received by the authorized receiver is the same as the data sent by the authorized sender. MIMT attack I need 10 € I need 5 € Alice Integrity Service I need 5 € Attacker I need 10 € Bob The attacker modifies the information and nobody knows X.800 Security Services for Open Systems Authentication ❍ When it is provided, it guarantees the identity of the users involved in the communication. Masquerading attack Authentication Service Attacker Alice Bob X.800 Security Services for Open Systems Non repudiation ❍ When it is provided, it avoids that either the issuer or the receiver can deny the participation in a communication. Alice Attacker Notification 1 Have you got the notification? Non repudiation Service NO You can not deny that you have signed the message X.800 Security Services for Open Systems Access Control ❍ When it is provided, it guarantees that only the authorized people can access to protected resources. Access Control Service Attacker Bob Bob Shared between Bob and Alice Bob’s resources Security Services <=> Layers Now we know the common security services to protect the layers from attacks, but… What services do we have to provide in each layer? It depends on the layer that we are considering… let’s go to talk about wireless layer - Wifi (link level according to ITU-T X.200 Recommendation) Confidentiality Access Control Authentication How do we implement those services? How to implement Security Services Security Services Security Protocols Security Mechanism Tools for providing security Cryptographic Mechanism With cryptography we can build security mechanisms (e.g. with RSA we build Digital Signatures) With security mechanisms we can build security Protocols (e.g. with digital signatures we build IPSec or SSL) With security protocols we can build security services (e.g. with IPSec we provide integrity, confidentiality and authentication) With security services we can build secure services (e.g. with integrity, confidentiality and authentication we build ecommerce solution) The content of this presentations has used materials from: - Iván Pau de la Cruz @ UPM, Spain Thanks to him!