Internet Insecurity: INFS 766 Internet Security Protocols
Internet Insecurity: INFS 766 Internet Security Protocols
INTERNET INSECURITY
Internet insecurity spreads at Internet speed Morris worm of 1987 Password sniffing attacks in 1994 IP spoofing attacks in 1995 Denial of service attacks in 1996 Email borne viruses 1999 Distributed denial of service attacks 2000 Fast spreading worms and viruses 2003 Spam 2004 no end in sight Internet insecurity grows at super-Internet speed security incidents are growing faster than the Internet (which has roughly doubled every year since 1988)
Ravi Sandhu 2000-2004
SECURITY OBJECTIVES
CONFIDENTIALITY disclosure
INTEGRITY modification
AVAILABILITY access
USAGE-CONTROL purpose
SECURITY TECHNIQUES
Prevention
access control
Detection
auditing/intrusion detection incident handling
Acceptance
practicality
Ravi Sandhu 2000-2004
RISK
Outsider Attack
insider attack
Insider Attack
outsider attack
6
PERSPECTIVE ON SECURITY
No silver bullets A process NOT a turn-key product Requires a conservative stance Requires defense-in-depth A secondary objective Absolute security does not exist Security in most systems can be improved
Ravi Sandhu 2000-2004
PERSPECTIVE ON SECURITY
absolute security is impossible does not mean absolute insecurity is acceptable
INTRUSION SCENARIOS
10
11
12
13
INFRASTRUCTURE ATTACKS
router attacks
modify router configurations
14
15
Application Layer
higher level protocols
Application Layer End user functions Presentation Layer Session Layer Transport Layer Network functions Network Layer Data Link Layer Physical Layer
lower level protocols or network services higher level protocols
PHYSICAL MEDIUM
Ravi Sandhu 2000-2004
16
SOURCE NODE
Ravi Sandhu 2000-2004
DESTINATION NODE
17
TELNET
FTP TCP
SMTP UDP IP
HTTP etc
Ethernet
19
TELNET
DNS
FTP TCP
SMTP UDP IP
HTTP etc
RIP EGP BGP
4 ICMP
ARP
RARP
Ethernet
TELNET
DNS SSL
FTP
SMTP UDP
HTTP
RIP EGP BGP
4 ICMP
TCP
IPSEC
IP Ethernet
ARP
RARP
Token-Ring ATM
23
25
26
SHOULD
strongly recommended but not required
MAY
possibility even if not stated a may is always allowed unless it violates MUST NOT
Ravi Sandhu 2000-2004
27
TCP/IP VULNERABILITIES
28
29
30
IP PACKET
header data
carries a layer 4 protocol
or a layer 3 protocol
or a layer 2 protocol
TCP INSIDE IP
IP HEADER
TCP HEADER
32
IP HEADER FORMAT
version: 4bit, currently v4 header length: 4 bit, length in 32 bit words TOS (type of service): unused total length: 16 bits, length in bytes identification, flags, fragment offset: total 16 bits used for packet fragmentation and reassembly TTL (time to live): 8 bits, used as hop count Protocol: 8 bit, protocol being carried in IP packet, usually TCP, UDP but also ICMP, IPSEC, IP, IPX, PPP, Ethernet header checksum: 16 bit checksum source address: 32 bit IP address destination address: 32 bit IP address
33
IP HEADER FORMAT
options
source routing
34
35
responder
SYN(Y), ACK(X)
ACK(Y)
36
37
IP SPOOFING
Send SYN packet with spoofed source IP address SYN-flood real source so it drops SYN-ACK packet guess sequence number and send ACK packet to target
target will continue to accept packets and response packets will be dropped
Ravi Sandhu 2000-2004
38
39
SMURF ATTACK
Send ICMP ping packet with spoofed IP source address to a LAN which will broadcast to all hosts on the LAN Each host will send a reply packet to the spoofed IP address leading to denial of service
40
ULTIMATE VULNERABILITY
IP packet carries no authentication of source address IP spoofing is possible
IP spoofing is a real threat on the Internet IP spoofing occurs on other packet-switched networks also, such as Novells IPX
41
FIREWALLS
42
WHAT IS A FIREWALL?
internal network
FIREWALL
external Internet
43
WHAT IS A FIREWALL?
all traffic between external and internal networks must go through the firewall
easier said than done
firewall has opportunity to ensure that only suitable traffic goes back and forth
easier said than done
Ravi Sandhu 2000-2004
44
ULTIMATE FIREWALL
internal network
Air Gap
external Internet
45
BENEFITS
secure and carefully administer firewall machines to allow controlled interaction with external Internet internal machines can be administered with varying degrees of care does work
Ravi Sandhu 2000-2004
46
BASIC LIMITATIONS
connections which bypass firewall services through the firewall introduce vulnerabilities insiders can exercise internal vulnerabilities performance may suffer single point of failure
Ravi Sandhu 2000-2004
47
TYPES OF FIREWALLS
Packet filtering firewalls
IP layer
Combinations of these
Ravi Sandhu 2000-2004
48
49
FILTERING ROUTERS
internal network
packet filtering router
external Internet
mail gateway
i-nw-to-router router-to-i-nw
Ravi Sandhu 2000-2004
e-nw-to-router router-to-e-nw 50
51
52
FILTERING ROUTERS
internal network 1
internal network 2
external Internet
53
FILTERING HOST
internal network
external router
external Internet
one can use a packet filtering firewall even if connection to Internet is via an external service provider
Ravi Sandhu 2000-2004
54
55
internal network
external router
external Internet
SIMPLEST CONFIGURATION
Ravi Sandhu 2000-2004
56
APPLICATION PROXIES
have to be implemented for each service may not be safe (depending on service)
57
58
60
61
INTRUSION DETECTION
62
RELATED TECHNOLOGIES
Intrusion detection Vulnerability assessment Incident response Honey pots Sniffer probes
63
attack-signature based detection also called misuse detection specification-based detection requires user profiling requires some learning capability in the system
default deny
Combinations of these
Ravi Sandhu 2000-2004
64
65
ATTACKER
Outsider
easier
insider
harder
66
68
Prevalence of disease is 1 in 10,000 Alice tests positive What is probability Alice has the disease?
69
Prevalence of disease is 1 in 10,000 Alice tests positive What is probability Alice has the disease? 1 in 100 False alarm rate: 99 in 100 !!!!!
Ravi Sandhu 2000-2004
70
71
72
73
74
75
example, tcp-wrapper
host-based agents
monitor accesses and changes to critical system files and changes in user privilege
example, tripwire
76
INTRUSION DETECTION
Needs to integrate with other security technologies such as cryptography and access control one component of defense-in-depth layered security strategy incident-response and recovery are important considerations
Ravi Sandhu 2000-2004
78