The DataDiode Explained in 5 Simple Steps
The DataDiode Explained in 5 Simple Steps
fox-it.com/datadiode
Introduction
When protecting an isolated network against outsider attacks, there are a number of
objectives and technologies that are commonly used. Objectives typically boil down
to C.I.A.: confidentiality, integrity and availability. The best possible technology for
confidentiality is the unidirectional network connection by means of a DataDiode.
However, there is a lot of technology relating to DataDiodes that impacts integrity and
availability. In particular, protocol breaks and content checking have a subtle relation to
these objectives. This briefing paper will explain how these technologies relate to one
another and to the principal C.I.A. security objectives.
Upstream Downstream
Downstream Upstream
1 https://en.wikipedia.org/wiki/Buffer_overflow
2 http://resources.infosecinstitute.com/hacking-pdf-part-2/
3 http://theinvisiblethings.blogspot.co.uk/2010/04/remotely-attacking network-cards-or-why.html
4 | Fox-IT | Protecting confidential information using DataDiodes
3. Protocol
To deliver the payload, a protocol is used. A protocol is a In the ‘protecting secrets’ scenario it can generally be
set of communication agreements, which ensure that if assumed that the attacker has access to the upstream
both sides of a communication channel adhere to it, the network. From the upstream network, the attacker could
payload gets delivered correctly. To achieve its design attack the downstream network by abusing a design flaw
objectives, a protocol introduces extra data into the data in one of the systems on the downstream network.
flow to coordinate these protocol specific goals: traffic
control data. A protocol takes care of many things that a A unidirectional network connection prevents such an
normal computer user is never aware of: that the payload attack from leading to data leakage. The attack may still
gets routed in the right direction; that it is chopped into cause harm in terms of integrity and availability on the
parts where needed and reassembled again where possible. downstream network. A protocol break effectively cuts out
Protocols may do very complicated things like compression, attack vectors which live in the traffic control data, as will be
tunneling, load balancing, authentication, caching, spooling, discussed next.
all kinds of things to make the communication go smoothly.
Examples include FTP, SMTP and HTTP.
4 http://heartbleed.com
A C T B
Thrower
Catcher
Upstream Downstream
Our advice:
• Assess your information assets and determine which
are your most valuable business ‘secrets’, and the impact
of these leaking from your organization.
• Locate these ‘secrets’: are these on networks that are
connected to the Internet?
• Ask yourself: should they be on networks that are
connected to the Internet?
Colin Robbins
Holds a Joint first class honours Bachelor’s degree
in Computer Science and Electronic Engineering from
University College, London, and is a CESG Certified
Professional (Lead Security & Information Risk Assessor).
Fox-IT
Fox-IT prevents, solves and mitigates the most serious
threats caused by cyber-attacks, data leaks, or fraud
with innovative solutions for governments, defense
agencies, law enforcement, critical infrastructure and
banking and commercial enterprise clients worldwide.
Fox-IT combines smart ideas with advanced technology
to create solutions that contribute to a more secure
society. We develop products and custom solutions
for our clients to guarantee the safety of sensitive
and critical government systems, to protect industrial
networks, to defend online banking systems, and to
secure confidential data.
Fox-IT B.V.
Olof Palmestraat 6, Delft T +31 (0)15 284 7999
P.O. Box 638, 2600 AP Delft F +31 (0)15 284 7990
The Netherlands fox@fox-it.com