study of campus network security
TRANSCRIPT
CAMPUS NETWORK SECURITYAND
IMPROVEMENT
Seminar Guide Mr . Mahesh Dali Asst. ProfessorMr. Mahesh DaliAsst.Professor
TRISHLA THAKUR1DS11TE098
Department of telecommunication Engineering
AGENDA
Introduction- Why network security is necessary
Existing risks-Be aware of vulnerabalities and threats
Security technologies-Understand security services
Discussion on SAPPDRR model and other dynamic model
further Improvement of campus network
INTRODUCTION
Why we need security?
Protect vital information while still allowing access to those who need it
Provide authentication & access control for resources
Campus network is a highly professional LAN, which is interconnected with internet which is in harsh environment
Managing the network of a higher-education campus or organization has raised problems of massive growth of stored data and need to share it causing over-stressed network, network misuse and security breaches.
They is a continuous risk of hacker’s attacks, system failure and information leakage
Campus network should be
formed on
Unified planBased on
Security risk analysis
Adopt advance technologies
Such as firewall,honeynet,VP
N&
monitoring system
Strengthen systems and specifications
Under the guidance of dynamic
model
Analysis of security risk in campus Campus network is based on TCP/IP
protocol of the large scale LAN
TCP/IP is constructed by the physical layer, network interface layer, transport layer and application layers.
The risk of campus network security comes from all the layers.
(a) SECURITY RISK AT PHYSICAL LAYER
Improper placement of physical devices or environmental preventive measures are ineffective
(b) SECURITY RISK AT DATA LINK LAYER
This layer directly threatens to attack the other layer. security issues are mainly
MAC addresses related attacking DHCP discontented fool ARP attacks
(c) SECURITY RISKS AT NETWORK LAYER
layer encapsulates IP datagram routing forward to address the problem of communication between machine.
The common security problems of this layer are:
IP Address spoofing, RIP (routing information protocol) attacks Port scanning threat
AGENDA
Introduction- Why network security is necessary
Existing risks-Be aware of vulnerabilities and threats
Security technologies-Understand security services
Discussion on SAPPDRR model and other dynamic model
Improvement of campus network
FIREWALL
Lots of vulnerabilities on hosts in network
Users don’t keep systems up to date
Solution? Limit access to the network Put firewalls across the perimeter of the
network
A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.
Protection Methods
Packet Filtering
Network Address Translation (NAT) Proxy Services
Virus Scanning
Content Filtering
VIRTUAL PRIVATE NETWORK
WHAT IS VPN? VPN is a technology that allows private
networks to make use of a public network, such as the Internet, as a means of communication .
How it works?
Two connections – one is made to the Internet and the second is made to the VPN.
Datagram – contains data, destination and source information.
Firewalls – VPNs allow authorized users to pass through the firewalls.
Protocols – protocols create the VPN tunnels.
Four Critical Functions
Authentication – validates that the data was sent from the sender.
Access control – limiting unauthorized users from accessing the network.
Confidentiality – preventing the data to be read or copied as the data is being transported.
Data Integrity – ensuring that the data has not been altered
HONEYNET A honeynet is a trap set to detect, deflect,
or, in some manner, counteract attempts at unauthorized use of information systems.
High-interaction honeypot designed to: capture in-depth information learn who would like to use your
system without your permission for their own ends
Its an architecture, not a product or software.
How it works
CERTIFICATION TECHNOLOGIES
Digital certificates provide a mechanism to authenticate and secure information on open networks.
Application
Applications using this mechanism includeo secure emailo secure web communicationso digital signing of software fileso smart card authenticationo encrypting file systems
SSL is a digital certificates issued by a trusted Certificate Authority for e-commerce website.
Digital certificate is issued by a third-party Certificate Authority (CA) like VeriSign.
Existing Dynamic Models
PDR(protection ,detection ,recovery ) MODEL
PPDR (policy, protection, detection, recovery)MODEL
APPDRR MODEL
APPDRR MODELThis is a network security model based on concept of closed-loop control.
This model is a passive dynamic defense model
PDR,PPDR and APPDRR model minimize the loss of network attacks but defence and protection required costly system and speed will be affected.
SAPPDRR MODEL Reasonable security mechanism, risk analysis
carried out according to the specific need of the service, to develop appropriate security policies.
Network security of SAPPDRR model= Risk analysis+ Security strategy+ Defence system +Real-time monitoring +Real-time response +Disaster recovery +Active counterattack SAPPDRR model deals with all this.
This model is active dynamic defence model
SAPPDRR MODEL OVER OTHER MODEL
A,B,C,D----- mutually independent safety system
X(attacker)from network BExample
SAPPDRR MODEL
Dynamic model deals
with
demand for service
Risk analysis
Security policies
System defence
Real time monitorin
g
Response
Disaster recovery
Initiative fight back
Further improvementNetwork Monitoring
SystemPurpose of a monitor check regularly that everything is in
order and, if not, transmit an alarm When fault is rectified monitor will
record, update the system and again work
How monitoring is done
A monitor is often dedicated to a particular function:
o ping monitor -checks that all equipment
o Interface monitor- checks that interfaces and communications are operating
o Module monitor-checks switches, power supplies and fan modules
o Threshold module- transmits an alarm if traffic load, CPU load, etc. exceeds a pre-defined limit
A ping monitor uses an ICMP echo (ping) while other uses SNMP. All these monitors send alarm signals to the alarm system.
Conclusion
Along with the development of computer network technology , campus network expanding and Increasing of users and visitors, the development of a virtual private network technology, the popularity of Internet and the stability of the campus network safe operation have all become the focus of the campus network management. SAPPDRR model & Network monitoring is the basic measure to ensure network stability and monitor the flow of information online. The proper control of network information can also be used to monitor the network information, eliminate unhealthy Internet information, and maintain the network environment .
SAPPDRR model can satisfy the needs of our campus network management and security management.
REFERECES
1.Changwei huang and Jinquan Xoing. Study of campus network based on SAPPDARR model ieee 2014
2.li Wengjing, Xu Binghong, Design and Implementation of the computer network monitoring
system, 2014
3.Guo Zhenghui,Han Xiujuan, Discussion on Network Monitoring , 2006. 4.Tian Bin, Research on Monitoring IP Network, 2006 5.Tang Shucai, Zhang Guoming, Practical Techniques of Network Management, 2002. 6.Network Security: History, Importance, and Future “University of Florida Department of
Electrical and Computer Engineering Bhavya Daya ”.
7.“SecurityOverview,www.redhat.com/docs/manuals/enterprise/RHEL4-Manual/security-guide/ch-sgs-ov.html.
8. CCNA Exploration 4.0 LAN Switching and Wireless, Cisco Networking Academy, Cisco Systems, Inc 2007
THANK YOU
I QUESTIONS