study of campus network security

30
CAMPUS NETWORK SECURITY AND IMPROVEMENT Seminar Guide Mr . Mahesh Dali Asst. Professor Mr. Mahesh Dali Asst.Professor TRISHLA THAKUR 1DS11TE098 Department of telecommunication Engineering

Upload: trishla-thakur

Post on 28-Jul-2015

30 views

Category:

Engineering


3 download

TRANSCRIPT

Page 1: Study of campus network security

CAMPUS NETWORK SECURITYAND

IMPROVEMENT

Seminar Guide Mr . Mahesh Dali Asst. ProfessorMr. Mahesh DaliAsst.Professor

TRISHLA THAKUR1DS11TE098

Department of telecommunication Engineering

Page 2: Study of campus network security

AGENDA

Introduction- Why network security is necessary

Existing risks-Be aware of vulnerabalities and threats

Security technologies-Understand security services

Discussion on SAPPDRR model and other dynamic model

further Improvement of campus network

Page 3: Study of campus network security

INTRODUCTION

Why we need security?

Protect vital information while still allowing access to those who need it

Provide authentication & access control for resources

Page 4: Study of campus network security

Campus network is a highly professional LAN, which is interconnected with internet which is in harsh environment

Managing the network of a higher-education campus or organization has raised problems of massive growth of stored data and need to share it causing over-stressed network, network misuse and security breaches.

Page 5: Study of campus network security

They is a continuous risk of hacker’s attacks, system failure and information leakage

Campus network should be

formed on

Unified planBased on

Security risk analysis

Adopt advance technologies

Such as firewall,honeynet,VP

N&

monitoring system

Strengthen systems and specifications

Under the guidance of dynamic

model

Page 6: Study of campus network security

Analysis of security risk in campus Campus network is based on TCP/IP

protocol of the large scale LAN

TCP/IP is constructed by the physical layer, network interface layer, transport layer and application layers.

The risk of campus network security comes from all the layers.

Page 7: Study of campus network security

(a) SECURITY RISK AT PHYSICAL LAYER

Improper placement of physical devices or environmental preventive measures are ineffective

Page 8: Study of campus network security

(b) SECURITY RISK AT DATA LINK LAYER

This layer directly threatens to attack the other layer. security issues are mainly

MAC addresses related attacking DHCP discontented fool ARP attacks

Page 9: Study of campus network security

(c) SECURITY RISKS AT NETWORK LAYER

layer encapsulates IP datagram routing forward to address the problem of communication between machine.

The common security problems of this layer are:

IP Address spoofing, RIP (routing information protocol) attacks Port scanning threat

Page 10: Study of campus network security

AGENDA

Introduction- Why network security is necessary

Existing risks-Be aware of vulnerabilities and threats

Security technologies-Understand security services

Discussion on SAPPDRR model and other dynamic model

Improvement of campus network

Page 11: Study of campus network security

FIREWALL

Lots of vulnerabilities on hosts in network

Users don’t keep systems up to date

Solution? Limit access to the network Put firewalls across the perimeter of the

network

Page 12: Study of campus network security

A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.

Page 13: Study of campus network security

Protection Methods

Packet Filtering

Network Address Translation (NAT) Proxy Services

Virus Scanning

Content Filtering

Page 14: Study of campus network security

VIRTUAL PRIVATE NETWORK

WHAT IS VPN? VPN is a technology that allows private

networks to make use of a public network, such as the Internet, as a means of communication .

Page 15: Study of campus network security

How it works?

Two connections – one is made to the Internet and the second is made to the VPN.

Datagram – contains data, destination and source information.

Firewalls – VPNs allow authorized users to pass through the firewalls.

Protocols – protocols create the VPN tunnels.

Page 16: Study of campus network security

Four Critical Functions

Authentication – validates that the data was sent from the sender.

Access control – limiting unauthorized users from accessing the network.

Confidentiality – preventing the data to be read or copied as the data is being transported.

Data Integrity – ensuring that the data has not been altered

Page 17: Study of campus network security

HONEYNET A honeynet is a trap set to detect, deflect,

or, in some manner, counteract attempts at unauthorized use of information systems.

High-interaction honeypot designed to: capture in-depth information learn who would like to use your

system without your permission for their own ends

Its an architecture, not a product or software.

Page 18: Study of campus network security

How it works

Page 19: Study of campus network security

CERTIFICATION TECHNOLOGIES

Digital certificates provide a mechanism to authenticate and secure information on open networks.

Page 20: Study of campus network security

Application

Applications using this mechanism includeo secure emailo secure web communicationso digital signing of software fileso smart card authenticationo encrypting file systems

SSL is a digital certificates issued by a trusted Certificate Authority for e-commerce website.

Digital certificate is issued by a third-party Certificate Authority (CA) like VeriSign.

Page 21: Study of campus network security

Existing Dynamic Models

PDR(protection ,detection ,recovery ) MODEL

PPDR (policy, protection, detection, recovery)MODEL

APPDRR MODEL

Page 22: Study of campus network security

APPDRR MODELThis is a network security model based on concept of closed-loop control.

This model is a passive dynamic defense model

PDR,PPDR and APPDRR model minimize the loss of network attacks but defence and protection required costly system and speed will be affected.

Page 23: Study of campus network security

SAPPDRR MODEL Reasonable security mechanism, risk analysis

carried out according to the specific need of the service, to develop appropriate security policies.

Network security of SAPPDRR model= Risk analysis+ Security strategy+ Defence system +Real-time monitoring +Real-time response +Disaster recovery +Active counterattack SAPPDRR model deals with all this.

This model is active dynamic defence model

Page 24: Study of campus network security

SAPPDRR MODEL OVER OTHER MODEL

A,B,C,D----- mutually independent safety system

X(attacker)from network BExample

Page 25: Study of campus network security

SAPPDRR MODEL

Dynamic model deals

with

demand for service

Risk analysis

Security policies

System defence

Real time monitorin

g

Response

Disaster recovery

Initiative fight back

Page 26: Study of campus network security

Further improvementNetwork Monitoring

SystemPurpose of a monitor check regularly that everything is in

order and, if not, transmit an alarm When fault is rectified monitor will

record, update the system and again work

Page 27: Study of campus network security

How monitoring is done

A monitor is often dedicated to a particular function:

o ping monitor -checks that all equipment

o Interface monitor- checks that interfaces and communications are operating

o Module monitor-checks switches, power supplies and fan modules

o Threshold module- transmits an alarm if traffic load, CPU load, etc. exceeds a pre-defined limit

A ping monitor uses an ICMP echo (ping) while other uses SNMP. All these monitors send alarm signals to the alarm system.

Page 28: Study of campus network security

Conclusion

Along with the development of computer network technology , campus network expanding and Increasing of users and visitors, the development of a virtual private network technology, the popularity of Internet and the stability of the campus network safe operation have all become the focus of the campus network management. SAPPDRR model & Network monitoring is the basic measure to ensure network stability and monitor the flow of information online. The proper control of network information can also be used to monitor the network information, eliminate unhealthy Internet information, and maintain the network environment .

SAPPDRR model can satisfy the needs of our campus network management and security management.

Page 29: Study of campus network security

REFERECES

1.Changwei huang and Jinquan Xoing. Study of campus network based on SAPPDARR model ieee 2014

2.li Wengjing, Xu Binghong, Design and Implementation of the computer network monitoring

system, 2014

3.Guo Zhenghui,Han Xiujuan, Discussion on Network Monitoring , 2006. 4.Tian Bin, Research on Monitoring IP Network, 2006 5.Tang Shucai, Zhang Guoming, Practical Techniques of Network Management, 2002. 6.Network Security: History, Importance, and Future “University of Florida Department of

Electrical and Computer Engineering Bhavya Daya ”.

7.“SecurityOverview,www.redhat.com/docs/manuals/enterprise/RHEL4-Manual/security-guide/ch-sgs-ov.html.

8. CCNA Exploration 4.0 LAN Switching and Wireless, Cisco Networking Academy, Cisco Systems, Inc 2007

Page 30: Study of campus network security

THANK YOU

I QUESTIONS