network security

34
Network security (intro) 27.06.2013, CyLab @ ESI CEE

Upload: nikolay-stoitsev

Post on 29-Jun-2015

247 views

Category:

Technology


1 download

DESCRIPTION

Presentation on Network security for CyLab at ESI Center

TRANSCRIPT

Page 1: Network security

Network security (intro)27.06.2013, CyLab @ ESI CEE

Page 3: Network security

Protocols

TCPHTTPHTTPSDNS

Page 4: Network security

Attacks

DoS/DDoSSession hijackingSequence predictionConnection KillingRequest SmugglingMan-in-the-middle attack

Page 5: Network security

Transmission Control Protocol (TCP)

● The core protocol of the Internet protocol suite (IP)

● Reliable● Ordered● With error checking● Connection-oriented

Page 6: Network security

TCP Three-way Handshake

Page 7: Network security

TCP Communication

Page 8: Network security

DoS/DDoS

Denial-of-service attack (DoS attack)

Distributed denial-of-service attack (DDoS attack)

Page 9: Network security

DDOS

Page 10: Network security

DDOS Danger

● Cyberattacks on Estonia

Page 11: Network security

SYN Flooding

Page 12: Network security

Session hijacking

TCP sequence prediction attack

Page 13: Network security

TCP sequence prediction attack

Page 14: Network security

TCP sequence prediction attack

Page 15: Network security

TCP Connection Killing

● With RST● With FIN

Page 16: Network security

HTTP

● Hypertext Transfer Protocol (HTTP)● Request-response protocol in the client-

server computing model

Page 17: Network security

HTTP

Page 18: Network security

HTTP Request Smuggling

Cache Poisoning ExploitingRequest Credential Hijacking

Page 19: Network security

Man-in-the-middle attack

Page 20: Network security

MITM

ARP PoisoningDNS SpoofingDNS Poisoning

Page 21: Network security

Example

Page 22: Network security

HTTPS

HTTP Secure● HTTP on top of SSL/TLS protocol● Provides authentication of the web site● Bidirectional encryption

Page 23: Network security

Public-key cryptography

Page 24: Network security

Public Key CertificateSerial Number: Used to uniquely identify the certificate.

Subject: The person, or entity identified.

Signature Algorithm: The algorithm used to create the signature.

Signature: The actual signature to verify that it came from the issuer.

Issuer: The entity that verified the information and issued the certificate.

Valid-From: The date the certificate is first valid from.

Valid-To: The expiration date.

Key-Usage: Purpose of the public key

Public Key: The public key.

Page 25: Network security

Public Key Certificate Signing

Page 26: Network security

SSL/TLS

● SSL is the predecessor of TLS● Asymmetric cryptography for authentication● Symmetric encryption for confidentiality● Message authentication codes for message

integrity

Page 27: Network security

SSL/TLS

Page 28: Network security

RC4

● RC4 is used in SSL● Simple● Remarkable speed

Page 29: Network security

RC4 attack

Discovered statistical biases in RC4 key table

50% of all TLS traffic is currently protected using the RC4 algorithm

Page 30: Network security

RC4 attack

"The attacks arise from statistical flaws in the keystream generated by the RC4 algorithm which become apparent in TLS ciphertexts when the same plaintext is repeatedly encrypted at a fixed location across many TLS sessions"

Page 31: Network security

DNS

Domain name system

Page 32: Network security

DNS Attacks

DNS SpoofingDNS Cache Poisoning

Page 33: Network security

DNS Rebinding

Circumvents same origin policy

Page 34: Network security

Questions?Thank you!