Network Security Marco Carli Roadmap Introduction Security services X.800 RFC 2828 Players Conclusions Marco Carli 2 Once .. Centralized information Centralized processing Remote terminal access Marco Carli 3 … now: Distributed information Distributed processing Remote smart systems access Marco Carli 4 Network security Network are composed of interconnected hosts Hosts provide services and store information Users access services and exchange/store information Marco Carli 5 Network security It is important to assure in a distributed setting: privacy/confidentially Integrity/consistency Availability etc. Marco Carli 6 Roadmap Introduction Security services X.800 RFC 2828 Players Conclusions Marco Carli 7 Security Service Definition: It enhances the security of the data processing systems and the information transfers of an organization; intended to counter security attacks; make use of one or more security mechanisms to provide the service Marco Carli 8 Security Service - 2 replicate functions normally associated with physical documents eg. have signatures, dates; need protection from disclosure, tampering, or destruction; be notarized or witnessed; be recorded or licensed; … Marco Carli 9 Security Services (X.800 and RFC 2828) ITU-T Recommendation X.800 (Security Architecture for OSI) defines a systematic way of defining and providing security requirements a useful abstract overview of security concepts X.800 defines Security Service as: a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data Marco Carli transfers 10 Security Services (X.800 and RFC 2828) IETF RFC 2828 (Internet Security Glossary) defines Security Service as: a processing or communication service provided by a system to give a specific kind of protection to system resources; security services implement security policies, and are implemented by security mechanisms. Marco Carli 11 Roadmap Introduction Security services X.800 RFC 2828 Players Conclusions Marco Carli 12 Security Services (X.800) 1. Authentication - the communicating entity is the one claimed 2. Access Control - prevention of the unauthorized use of a resource 3. Data Confidentiality –protection of data from unauthorized disclosure 4. Data Integrity - assurance that data received is as sent by an authorized entity 5. Non-Repudiation - protection against denial by one of the parties in a communication Marco Carli 13 Authentication - simple Hi, I am Jane Prove it Marco Carli Mary 14 Authentication - mutual Hi, I am Jane. Is Trust there? Hi Jane. Trust is speaking! PROOF Speaking! Is Linda there? Trust Company Marco Carli Jane 15 Authentication - mutual Hi, I am Jane Prove it Marco Carli Mary 16 authorization Give me Alice’s Car Did she authorize you? Marco Carli Mary 17 Integrity Data has not been changed, destroyed, or lost in an unauthorized or accidental manner Maintaining demonstrable data integrity is one of the cardinal aims of data security Marco Carli 18 Privacy, secrecy 'Privacy' and 'secrecy' are easily confused. Secrecy is something you might seek. Privacy is something you should have. You might, for example, wish to keep some communications secret. You should have the right to expect that the communications remain private. However, neither is easily attainable in the modern world. Strong encryption can render data communications secret and private - but only depending on where Marco Carli you live in the world. 19 Non repudiation Attribute of communications that seeks to prevent future false denial of involvement by either party. with proof of origin provides the recipient of data with evidence that proves the origin of the data. with proof of receipt provides the originator of data with evidence that proves the data was received as addressed. Non-repudiation is consequently an essential element of trust in e-business. Marco Carli 20 Non repudiation Problems: The signature is a forgery; The signature is not a forgery, but was obtained via: Unconscionable conduct by a party to a transaction; Fraud instigated by a third party; Undue influence exerted by a third party. When did you sign it? Where did you sign it? Marco Carli 21 Security parameters RFC 2828 Access control Audit Data origin authentication Peer entity authentication Availability Data confidentiality Data integrity System integrity Non-repudiation Marco Carli 22 Roadmap Introduction Security services X.800 RFC 2828 Players Conclusions Marco Carli 23 Security Services (RFC 2828) Access control service protection of system resources against unauthorized access Audit service records information needed to establish accountability for system events and for the actions of system entities that cause Marco Carli them 24 Security Services (RFC 2828) Authentication service: a security service that verifies an identity claimed by or for an entity in a network, there are two general forms of authentication service: i) data origin authentication service, ii) peer entity authentication service Marco Carli 25 Security Services (RFC 2828) (i) data origin authentication service: verifies the identity of an entity that is claimed to be the original source of received data provided to any entity that receives or holds the data Marco Carli 26 Security Services (RFC 2828) (ii) peer entity authentication service: verifies an identity claimed by or for a system entity in an association. used to confirm the identity of one entity to another, thus protecting against a masquerade by the first entity. this service requires an association to exist between the two entities Marco Carli 27 Security Services (RFC 2828) availability service protects a system to ensure its availability denial-of-service attacks data confidentiality service information is not made available or disclosed to unauthorized individuals, entities, or processes (i.e., to any unauthorized system entity) protects data against unauthorized disclosure Marco Carli 28 Security Services (RFC 2828) data integrity service: data has not been changed, destroyed, or lost in an unauthorized or accidental manner. deals with constancy of and confidence in data values, not with the information that the values represent. protects against unauthorized changes to data, (intentional or not), by ensuring that changes to data are detectable. Marco Carli 29 Security Services (RFC 2828) can only detect a change and report it to an appropriate system entity; changes cannot be prevented unless the system is perfect (error-free) and no malicious user has access however, a system that offers data integrity service might also attempt to correct and recover from changes although data integrity service is defined separately from data origin authentication service and peer entity authentication service, it is closely related to them Marco Carli 30 Security Services (RFC 2828) system integrity service: the system integrity is the quality that a system has when it can perform its intended function protects system resources in a verifiable manner against unauthorized or accidental change, loss, or destruction Marco Carli 31 Security Services (RFC 2828) non-repudiation service: a security service that provide protection against false denial of involvement in a communication; does not prevent an entity from repudiation; it provides evidence that can be stored and later presented to a third party Marco Carli 32 Security Services (RFC 2828) there are two basic kinds of nonrepudiation service: 1. ”non-repudiation with proof of origin" - this service can be viewed as a stronger version of an data origin authentication service, in that it proves authenticity to a third party 2. ”non-repudiation with proof of receipt" protects the originator against an attempt by the recipient to falsely deny receiving the data Marco Carli 33 Security Mechanisms (X.800) specific security mechanisms (can be included in appropriate communication layer): encipherment digital signatures access controls data integrity authentication exchange traffic padding routing control notarization (third-party authentication) Marco Carli 34 Security Mechanisms (X.800) pervasive security mechanisms (general): trusted functionality security labels event detection security audit trails security recovery Marco Carli 35 Relationship Between Security Services and Mechanisms Marco Carli 36 Roadmap Introduction Security services X.800 RFC 2828 Players Conclusions Marco Carli The enemy 37 Imagine.. Marco Carli 39 Where is the enemy? Outside the boundary Inside … Protect the LAN/Intranet Among the partners Defend it! Firewall Protect the Extranet (VPN) Everywhere Protect the applications Marco Carli 40 From… internal system (33%) remote dial-up (12%) Internet (74%) Computer Security Institue/FBI 2002 report Marco Carli 41 Effects Denial of service (40%) Virus (85%) Non authorized access (40%) Secrecy steeling (20%) Fraudes (12%) Sabotages (8%) Unauthorized network use (78%) Marco Carli 42 2002 CSI/FBI Computer Crime & Security Survey 89% is protected by firewall 60% uses IDS (Intrusion Detection System) 40% of intrusions comes from outside! 90% is protected by antivirus software 85% affected by viruses, worm, trojan, etc,... Marco Carli 43 Attackers Script download malicious software (from hacker web sites) Hackers’ game to prove to their peers that they can compromise a specific system Insiders access data that they have no rights to access Organizational level attackers use the full resources of the organization to attack Marco Carli 44 Roadmap Introduction Security services X.800 RFC 2828 Players Conclusions Marco Carli 45 System insecurity “Attack technology is developing in a open source environment and is evolving rapidly” “Thousands - perhaps millions - of system with weak security are connected to the Internet” Marco Carli 46 System insecurity “The explosion in use of the Internet is straining our poor technical talent. The average level of system administrators … has decreased dramatically in the last 5 years” “Increasingly complex sw is being written by programmers who have no training in writing secure code” Marco Carli 47 System insecurity “Attacks and attack tools transcend geography and national boundaries” “The difficulty of criminal investigation of cybercrime coupled with the complexity of international law means that … prosecution of computer crime is unlikely” Marco Carli 48 Problems Networks have been created with a different purpose. No encryption User authentication: weak! Pw No mutual authentication LAN: broadcast MAN: Shared networks. Third part equipments Software bugs. Viruses… Marco Carli 49 Problems Networks uncertain boundaries (wlan, tunneling, mobility, UMTS,..) More bandwidth, more services (UMTS!!) Increasing complexity Internet Operating systems Windows 3.1 ~ 3 milions code Windows 95 ~ 15 milions Windows 2000 ~ 60 milions Marco Carli 50 Security The protection of resources (including data and programs) from accidental or malicious modification, destruction, or disclosure Marco Carli 51 References W. Stallings, "Cryptography and Network Security: Principles and Practice" 3th Edition, Prentice Hall C. Kaufman, R. Perlman, M. Speciner, "Network Security: Private Communication in a Public World" 2nd Edition, Prentice Hall Marco Carli 52