1. Trang chủ
  2. » Giáo án - Bài giảng

Network systems security by mort anvari lecture12

42 168 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 42
Dung lượng 334 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Countering Clever Smurf Attack  When R3 receives a message, R3 needs to determine whether message was indeed sent by R2, or was modified or replayed by an adversary between R3 and R2 

Trang 1

Denial-of-Service (DoS) Attacks Network Systems

Security

Mort Anvari

Trang 2

 These inserted, modified, and replayed

messages can go undetected until they cause severe damage to network

 The physical location of the adversary in

network may never be determined

 Example: denial-of-service attacks

Trang 3

Denial-of-Service (DoS)

Attacks

 Aimed to deny normal service

provided by the target computer

Trang 4

Ping Protocol

 Allow any computer to check whether any other computer in the Internet is up

 Any computer x can send a “ping” message to any computer y

which replies by sending back a “pong” message (thus x knows y is up)

 In ping message: src = xand dst = y

 In pong message: src = yand dst = x

ping(x, y)

Trang 5

Broadcast Ping Protocol

 If in ping message dst = “all”, a copy of ping is broadcast to every computer

 Each computer replies by sending back a pong, and x is

flooded with pong messages

 In ping message: src = xand dst = “all”

 In pong message: src = yand dst = x

ping(x,all)

pong(y´,x)

Trang 7

Countering Smurf Attack

 Make each router check the src of each

received message and discard the message

Trang 8

Clever Smurf Attack

 An adversary inserts a ping(x, all) message between routers R2 and R3

 R3 thinks the message was forwarded by R2 and so accepts the message

R1

Trang 9

Countering Clever Smurf

Attack

 When R3 receives a message, R3 needs to determine whether message was indeed sent by R2, or was modified or replayed

by an adversary between R3 and R2

 If use IPSec, will need to set up SA’s

between each pair of adjacent routers: too expensive

Our solution: use hop integrity protocol

between each pair of adjacent routers

Trang 10

Hop Integrity

subnetwork

Detection of Message Modification:

from p, q can check that m was not modified after sent

Detection of Message Replay:

from p, q can check that m was not a replay

of an old message

Trang 11

Adversary vs Routers

actions to disrupt communication between two routers

 Message loss

 Message modification

 Message replay

cannot be compromised by the adversary

 The routers will execute hop integrity

protocols that can detect and defeat the adversary actions

Trang 12

Hop Integrity Protocol

 Each pair of adjacent routers need to share a secret S, which is updated periodically by the two routers using a secret exchange protocol

 To each IP message sent between two adjacent routers, add a sequence number sq, and an integrity check d

Trang 14

Component of

Hop Integrity Protocols

 Three protocols between each pair

of adjacent routers

Trang 15

How to Exchange Secret

for computing the digest of every msg

sent to an adjacent router q

to q periodically?

to q periodically and q sends an ack to p?

layer and integrity check layer

Trang 16

Secret Exchange Protocol

a secret update message to p every T

hours

from q, p updates secret and sends an ack to q

seconds, q retransmits the secret

update message

Trang 17

Secret Exchange Protocol

S[0] old S[1] new

Trang 18

Recovery in

Secret Exchange Protocol

S[0] old S[1] new

if S[1] = S then S[0] :=S[1]

t seconds

t seconds

if S = S[0] S = S[1] then S :=S[1]

BpS[0], S[1]

S[1] = S  S[0]

Trang 19

 To detect insertion and modification

 Each sent msg from p to q is as follows

(hd | d | txt)where p computes d as

d = MD(S | hd | txt)

 On receiving a msg, q checks

if d = MD(S[0] | hd | txt) 

d = MD(S[1] | hd | txt) then q forwards msg

else q discards msg

Weak Integrity Protocol

Trang 20

Weak Integrity Protocol

.

(hd | d | txt) S[0]

Trang 21

Strong Integrity

numbers are attached to all sent msgs from p to q

 If p is reset, unbounded number of fresh messages are discarded by q

 If q is reset, it can accept unbounded

number of replayed messages

 Soft sequence numbers

Trang 22

 Successive sequence numbers are attached to all sent msgs from p to q:

(hd | sq | txt)

 q maintains two variables

expsequence number of next msg

fi; q updates exp, c, cmax

Soft Sequence Numbers

Trang 23

Soft Sequence Numbers

sq

.

Trang 24

 Each sent msg from p to q is as follows

(hd | sq | d | txt)where p computes d as

d = MD(S | hd | sq | txt)

 On receiving a msg, q checks

if (d = MD(S[0] | hd | sq | txt) 

d = MD(S[1] | hd | sq | txt) ) (exp  sq  c = random value cmax)then q forwards msg

else q discards msgfi; q updates exp, c, cmax

Strong Integrity Protocol

Using Soft Sequence Numbers

Trang 25

Hard Sequence Numbers

SAVE and FETCH

sequence number will be stored in

persistent memory

stored sequence number will be loaded from persistent memory into memory

Trang 26

Strong Integrity Protocol

Using Hard Sequence Numbers

 Each sent msg from p to q is as follows

(hd | sq | d | txt) where p computes d as

d = MD(S | hd | sq | txt)

 On receiving a msg, q checks

if (d = MD(S[0] | hd | sq | txt) 

d = MD(S[1] | hd | sq | txt) )  (exp  sq) then q forwards msg

else q discards msg fi; q updates exp

 p and q executes SAVE periodically

 When waking up from a reset, p (or q) executes FETCH to fetch last stored seq#, executes SAVE to store next seq#, and

continues after SAVE finishes

Trang 27

Other Applications of Hop Integrity

 Mobile IP

 Secure multicast

 Security of routing protocols

Trang 28

Mobile IP

other than its home network H

agent (HA) and forwarded to its foreign agent (FA)

Internet

home agent (HA)

Trang 29

Problem with Mobile IP

 Mobile computer c can send a msg thru FA

 However, this msg may be filtered out by next router q because its source address is

“strange”

Internet

home agent (HA)

foreign agent

(FA)

H F

q

m

m

Trang 30

Mobile IP with Hop Integrity

 With integrity check d added to msg m, q can check that m was indeed forwarded by FA

 Thus, q ignores strange source of msg m and forwards m toward its ultimate destination

Internet

home agent (HA)

foreign agent

(FA)

H F

Trang 31

 Multicast msgs are forwarded through a spanning tree from root to every multicast destination

 If a destination receives a multicast msg, then each

destination receives a copy of same msg with high probability

Trang 32

 Multicast msgs are forwarded through a spanning tree from root to every multicast destination

 If a destination receives a multicast msg, then each

destination receives a copy of same msg with high probability

Trang 33

 Multicast msgs are forwarded through a spanning tree from root to every multicast destination

 If a destination receives a multicast msg, then each

destination receives a copy of same msg with high probability

Trang 34

 Multicast msgs are forwarded through a spanning tree from root to every multicast destination

 If a destination receives a multicast msg, then each

destination receives a copy of same msg with high probability

Trang 35

Security Problem with

Trang 36

Multicast with Hop Integrity

 With hop integrity, an inserted or modified multicast message will be detected and

discarded at its first hop in the spanning tree

Trang 37

Routing Information Protocol

(RIP)

 Every 30 seconds, RIP process in router R’ sends its routing table in a response msg to RIP process in each adjacent R

 R updates its routing table when it receives a response

msg from any adjacent R’

Trang 38

RIP with Hop Integrity

 With hop integrity, the response msgs are protected against message modification, insertion, and replay

Trang 39

Security of Routing Protocols

protection (against message

modification, insertion, and replay) for other routing protocols

 OSPF protocols (Hello, Exchange, Flood)

mechanisms that have been proposed for some protocols

Trang 40

Implementation of Hop

Integrity

 Implementation of hop integrity

protocols in Linux kernel

 Add integrity check digest and soft sequence number to IP options in

IP header

 Compatible with legacy routers

 Flexibility of deployment

Trang 41

Related Works

 Completes hop integrity

 Not needed if hop integrity is installed

Trang 42

denial-of-Next Class

 Security in transport layer

 SSL and TLS

 Application of SSL/TLS in Web security

Ngày đăng: 09/01/2018, 11:58

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

  • Đang cập nhật ...

TÀI LIỆU LIÊN QUAN