1. Trang chủ
  2. » Luận Văn - Báo Cáo

NGN networks and security

56 228 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề NGN Networks and Security
Tác giả Ths.Hà Văn Kha, Mai Thanh Minh, Phan Anh Dũng
Chuyên ngành Networking / Security
Thể loại Báo cáo thực tập
Định dạng
Số trang 56
Dung lượng 1 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

APPIN’S PROPOSED NGN FRAMEWORK FEATURES Intact QoS of Communication Source Address Authentication Interdomain security via SEGs Domain based approach... ACCESS DOMAIN Access Domain Se

Trang 1

NGN Networks and Security

GVHD :Ths.Hà Văn Kha Ly SVTH :Mai Thanh Minh Phan Anh Dũng

Trang 2

NGN Architecture

Trang 3

The NGN functions are divided into service and transport strata.

End-user functions are connected to the NGN by the user-to-network interface (UNI).

Other networks are interconnected through the network-to-network interface (NNI).

The application-to-network interface (ANI) forms a boundary with respect to party application providers.

Trang 4

third-Realization example

Trang 5

NGN SECURITY ARCHITECTURE – BEST PRACTICE

Security Requirements for

 Architecture

 Protocols

 Network interconnection (e.g between carriers)

 Node administration and management (security recommendations have been made by Telcordia’s GR815 and ITU’s

Telecommunications Security Manual for node Security)

 Service management

 End-user access

Trang 7

EXAMPLE

 Slovak Telecom (ST) is the market leader in telecommunication services in Slovakia and one of

the largest companies in the Slovak economy.

 The deployment of an IP-based NGN network will also enable future delivery of new

broadband services such as

 Voice over IP

 Multimedia conferencing

 Unified messaging,

 Gaming and music downloads

 Enhanced Internet service,

 Integrated personal computer and phone applications

Trang 8

EXAMPLE (CONTD.)

 The NGN solution deployed by Slovak Telecom includes:

 Alcatel 5020 Softswitch controlling 28 geographically distributed 7505 Media Gateways, which provide the necessary

bridges between the voice and data worlds

 To prepare for the deployment of broadband services, 309 locations have been equipped with 1540 Litespan

multiservice nodes consolidating phone and DSL access

 The transport network has been enhanced with IP/MPLS equipment, based on the Alcatel 7670 Routing Switch

Platform, while network management is implemented with the Alcatel 1300 Convergent Management Centre

 This converged management centre offers major OPEX savings as it offers a coherent management for lines across their

TDM and NGN installed base

Trang 9

EXAMPLE

 Telenor is Norway's largest telecommunications group, with substantial international mobile operations.

 Considering that VoIP based services in the business market forecasted to grow to 25% in 2007, and that by then a

substantial part of Norway’s 2000 largest companies will have converted to a combined Mobile/IP solution for enterprise communications, Telenor is using its NGN service rollout as a key message to the market, confirming that they continue to offer leading edge solutions to their customers.

 To achieve this, Telenor’s Next Generation Network will be powered by an Alcatel A5020 Softswitch handling both

H323 and SIP calls Typically, enterprise workers will be connected by IP-PBX’es To achieve the advanced services as e.g IVR controlled follow-me, a layered numbering plan as well as PnP based CLIP/CLIR requested, a VPN service is created on the Alcatel OSP.

Trang 10

NGN Security Appin’s Approach

Trang 11

Threats

Attacks

Destruction Corruption

Disclosure Interruption

Trang 15

 Appin’s NGN Security framework will focus on securing the core network

 Focus here will be identify potential major threats and risks and mitigation techniques

required against them

Trang 16

APPIN’S NGN FRAMEWORK FEATURES (ITU-T REC X.805)

NGN Framework Features

Confidentiality

Integrity

Non repudiation Interoperability

Availability

Single Sign on

Trang 17

APPIN’S PROPOSED NGN FRAMEWORK

FEATURES

Intact QoS of Communication

Source Address Authentication

Interdomain security via SEGs

Domain based approach

Trang 18

CONCERNS OF OPERATOR

• Control of dynamic media sessions (outbound and inbound)

• Network Address Translation (NAT) traversal

• Performance : network latency and jitter

• Scalability

• Unauthorized signalling and media messages

• Call admission and policy control

• Internetwork message inspection

Concerns of an operator

(Basis for consulting)

Trang 19

EXAMPLE - IMPLEMENTATION

Trang 20

IPSEC AND OSS

 After a thorough threat analysis of NGN Carriers, IPSec came out as a clear option to implement security at Network or

Packet Processing layer of NGN communication architecture

 IPSec is especially useful for implementing VPNs and for remote user access over a dial-up connection to a private

Trang 21

IPSEC IMPLEMENTATION

Trang 22

IPSEC IN NGN

Trang 23

IPSEC DPI

 Appin’s NGN security framework is adept to the usage of DPI over IPSec communication

 Heuristic based approach for packet inspection shall be implemented on DPI

 Generally, DPI doesn’t work on IPSec due to encrypted ESP packets are assumed by DPI

engine in normal approach as ESP-NULL because they happened to have correct bytes which look like self-describing padding in the encrypted part.

 Heuristic checks assure that IPSec’s ESP NULL packets are properly identified and inspected

and not passed over as being ESP Encrypted

Trang 24

IMPLEMENTATION REQUIREMENTS

 From an NGN point of view, the servers and gateways will be equipped with an integral IPsec machine,

either in software or, preferably, as a hardware plug-in (security and performance aspect)

 A Security Server (SecS) is required to control and manage the overall security environment The feature

options of this SecS are:

 VPN policy (access control for VPN groups)

 X.509 digital certificate manage-cross-certification with other certification authorities

 Remote management of VPN clients

 Standardized key generation and key distribution

Trang 25

IMPLEMENTATION REQUIREMENTS (CONTD.)

 The key management protocols are:

 IKE

 PKINIT (Public Key Initial authentication) and Kerberos

 PKCROSS, which is used for cross-domain key management

 All signalling control (e.g Real-Time Control Protocol RTCP) and even media streams (including RTP and UDP) are

encrypted Media and signalling streams are encrypted for confidentiality and even optionally for the purpose of message integrity using the Message Authentication Code (MAC).

Trang 26

NGN Layer based security

Trang 27

• Application Layer Gateways (ALG’s)

• Session Border Controllers (SBCs)

• Deep Packet Inspection

Trang 28

PE/P Devices

AAA Servers

Trust Network

CE/PE interface

Address Specific Packet Filters (ACLs)

Peer interface on PE router security

Private Address Space usage

Routing authentication

Separation of CE/PE links

DP authentication

MPLS SECURITY

Trang 29

MPLS SECURITY EXAMPLE - CE-PE SECURITY

Trang 30

MPLS SECURITY EXAMPLE - CE-PE SECURITY

(CONTD.)

 In the part where the NGN equipment is connected to the bearer network, the general solution is dual home

of CE to PE

 Currently, Huawei's routers support layer-2 features So the AG/UMG/Softswitch can be connected to the AR

directly, thus dispensing with the convergence switch

 Huawei's routers support fast fault detection (FFD) and correlation between FFD and routing protocol

 Therefore, the E-VRRP (Evaluation of Virtual Router Redundancy Protocol) and IP FRR (IP Fast ReRouting)

technologies can be used to implement fast protection switching between CE and dual PE.

Trang 31

Application Layer Security

 ITU T recommends Middleware security for Application layer

 Middleware recommendation also includes IMS Security

 Middleware Service will simplify and unify service creation

 It will curb exposure of available network capabilities to third parties

 Inherent increase of security threats and increase in the risk of attacks on network resources will be

minimized

Trang 32

APPLICATION LAYER SECURITY

 End-to-End Application layer security based on standard such as

 XML Digital Signatures

 XML Encryption

 SAML (Security Assertion Markup Language)

 Intrusion detection and prevention (IDP)

 Deep packet inspection system protecting applications middleware against SQL injection

attacks which are not mitigated by existing solutions

Trang 33

IDP Architecture

Trang 34

ACCESS DOMAIN

 Access Domain Security

 Authentication will be performed on transport layer, Service (IMS) layer and Application

layer.

 Network Access Control (IP-CAN Security) using:

 User/User terminal authentication

 Link layer authentication mechanism like PPPoA/ PPPoE, 802.1x with EAP/ AKA, MAC

address/ line authentication

 Access control lists (ACLs) & application.

Trang 35

ACCESS DOMAIN SECURITY

EXAMPLES(CONTD.)

• Access Control to IMS (domain)

– Token based SIP request for IMS edge authentication

– NGN-SLA (Service Level Authentication) between UE and S-CSCF.

– Authentication options to be supported

» Full IMS security (Authentication & Key Agreement (AKA) as defined by 3GPP (plus NAT

traversal)

» Residential Gateway for legacy equipment

» NASS bundled authentication.

– IMS security shall be independent of access IP-CAN security.

Trang 36

ACCESS DOMAIN SECURITY (CONTD.)

 Access Control to services and applications:

 SIP signaling with HTTP Digest authentication

Trang 37

 Utilization of IP packet/session information like

 Address

 Protocol ID

 User ID

 XCAP for presence

ACCESS DOMAIN SECURITY (CONTD.)

Trang 38

NETWORK DOMAIN SECURITY

Packet Filtering

Stateful Inspection IMS firewall for signaling (NO RTP)

Tropology hiding (THIG)

Bandwidth fraud protection

Access Control by signaled pinhole firewall for media(RTP) in SC at UNI and NNI.

Split DNS architecture and DNS TSIC for Zone Infrastructure.

Protection against DOS attacks.

Minimum site Perimeter Security

Trang 39

NETWORK DOMAIN SECURITY (CONTD.) – NODE PROTECTION

Node Protection File control

• ACL Authorization

• Restrictive default permissions Granular File Access rules

• User specific rules

• Capability to allow to sensitive resources only through approved programs

• Administrator defined critical files prohibiting change

Trang 40

NETWORK DOMAIN SECURITY (CONTD.)

• Process Controls-Administrator

– Subsets sharing of root authority among different administrators based on their functional roles

– Audit controls

• Will track user names from initial authentications to create secure and useful audit trails with full integrity

• Administrators will be able to select which events to audit in addition to the default start-up and shutdowns

• Other auditing options can include user logins ,logouts access to resources and change directory commands.

Trang 41

• Will prevent tempering of audit files by anyone while it is running on the machine

• Will protect the audit records and have facilities for routing logs to a centralized audit system ,making the audit data

truly reliable

NETWORK DOMAIN SECURITY (CONTD.)

Trang 42

NGN SECURITY SOLUTIONS

 The solutions include:

 Stateful inspection firewalls examine the transport layer based on the active policy and make decisions to allow or deny a

packet

 Proxy-based firewalls (i.e Back-2-Back User Agents) provide application layer awareness and thus better control for VoIP

traffic

 Application Layer Gateways (ALG’s) operate similar to proxy based firewalls but tend to facilitate the traversal of VoIP

traffic (e.g to resolve NAT issues) rather than enforcing granular security policy

 Session Border Controllers (SBCs), that are used to route VoIP traffic and provide a level of QoS, fall under the category of

Proxy-based firewalls

 Deep Packet Inspection provides the ability to enforce policy and inspection controls on the entire packet.

Trang 43

NGN SECURITY STEP WISE APPROACH

Trang 44

IP NGN Security Actions

Identify

Principal Actions Relevant Technologies

Identifying and assigning trust-levels to subscribers, networks, devices, services, and traffic is a crucial first step to infrastructure security

 Identify and authenticate subscribers and subscriber devices (where

possible)

 Associate security profiles with each subscriber and device

 Associate network addresses and domain identifiers subscriber devices

 Classify traffic, protocols, applications, and services at trust-boundaries

 Inspect traffic headers and payloads to identify subscribers, protocols,

services, and applications

 Authentication, Authorization, and Accounting (AAA) Servers

 Extensible Authentication Protocols

 Deep Packet Inspection

 Network-Base Application Recognition

 Service Control Engines / Application Performance Assurance

Trang 45

IP NGN Security Actions

Monitor

Any device that touches a packet or delivers a service can provide data describing policy compliance, subscriber behavior, and network health

Principal Actions Relevant Technologies

 Gather performance- and security-relevant data inherent to routers and

switches

 Log transactional and performance data at access and service gateways

 Link IP traffic with specific subscribers devices, and origins whenever possible

 Deploy protocol-, traffic-, and service-inspection for reporting and detection

 Develop behavior baselines for comparison to real-time measurements

 Employ command / change accounting

 Netflow

 SNMP / RMON / SysLog

 Network / Traffic Analysis Systems

 Intrusion Detection Systems

 Virus- / Message-Scanning Systems

 Deep Packet Inspection

 Packet Capturing Tools

 SPAN / RSPAN

 Authentication, Authorization, and Accounting (AAA) Servers

 DHCP / DNS Servers

45

Trang 46

IP NGN Security Actions

Correlate

Important macro trends and events can often go unrecognized until other numerous – seemingly unrelated – events are correlated

Principal Actions Relevant Technologies

 Assure time synchronization throughout network and service infrastructures

 Collect and collate data from distributed, disparate monitoring services

 Analyze and correlate data to identify trends and macro-level events

 Security Information Management Systems (SIMS)

 Netflow Analysis Systems

 Event Correlation Systems

 Behavioral Analysis Systems

 Anomaly Detection Systems

46

Trang 47

IP NGN Security Actions

Harden

Hardening is the application of tools and technologies to prevent known – or unknown – attacks from affecting network or service

infrastructures

Principal Actions Relevant Technologies

 Deploy layered security measures – defense-in-depth

 Authenticate control-, and management-plane traffic

 Authenticate and limit management access to devices, servers, and services

 Prevent Denial of Service (DoS) attacks – state attacks, resource exhaustion,

protocol manipulation, buffer overflows

 Validate traffic sources to prevent spoofing

 Access Control Lists

 Authentication, Authorization, and Accounting (AAA) systems

 Reverse-Path Forwarding Checks

 Control-Plane Policing

 Role-based control interfaces

 Memory and CPU thresholds

 Intrusion Detection Systems

 High-Availability Architectures

 Load Balancing

47

Trang 48

IP NGN Security Actions

Isolate

Isolating is a critical design practice then helps prevent access to critical resources, protect data, and limit the scope of disruptive events

Principal Actions Relevant Technologies

 Limit and control access to (and visibility into) transport-, operations-, and

service-delivery infrastructures

 Prevent visibility and access between different services, customers…

 Create network zones to isolate based on functionality – DNS, network

management, service delivery, access…

 Define strict boundaries between networks, operational layers, and services

of different trust-levels

 Encrypt sensitive traffic to prevent unauthorized access

 Virtual Private Networks

 Virtual Routing and Forwarding

 Demarcation / Functional Separation Zones

 Access Control Lists

48

Ngày đăng: 19/06/2014, 19:28

TỪ KHÓA LIÊN QUAN