Chapter 17: 1
Computer Security 3e
Dieter Gollmann
Security.di.unimi.it/1314/
Computer Security 3e Dieter Gollmann Security.di.unimi.it/1314/ - - PowerPoint PPT Presentation
Computer Security 3e Dieter Gollmann Security.di.unimi.it/1314/ Chapter 17: 1 Chapter 17: Network Security Chapter 17: 2 Agenda Net adversary TCP attacks DNS attacks Firewalls Intrusion detection Honeypots Chapter 17:
Chapter 17: 1
Security.di.unimi.it/1314/
Chapter 17: 2
Chapter 17: 3
Chapter 17: 4
Chapter 17: 5
SYN x SYN ACK x+1, y ACK y+1, x+1 TCP handshake SYN x (spoofed sender) SYN ACK x+1, y ACK y+1, x+1 TCP session hijacking
Chapter 17: 6
y SYN x SYN ACK x+1,y ACK y+1, x+1
TCP handshake
y SYN x SYN ACK x+1,y
SYN flooding attack
y’ SYN x’
SYN ACK x’+1,y’ .
Chapter 17: 7
Chapter 17: 8
Chapter 17: 9
Chapter 17: 10
resolve a host name (target).
sends glue records that give the IP addresses of those servers.
target’s domain, together with their IP addresses (glue records).
authoritative name servers.
address to local name server.
Chapter 17: 11
www.foo.com: 1.2.3.4 www.foo.com? QID = 2701 www.foo.com? list of GTLD servers for .com with IP addresses; QID = 2701 list of authoritative name servers for foo.com with IP addresses; QID = 2702 www.foo.com: 1.2.3.4; QID = 2703
recursive ns client: www.foo.com authoritative ns GTLD server Root name server
www.foo.com? QID = 2702 www.foo.com? QID = 2703
Chapter 17: 12
Chapter 17: 13
Chapter 17: 14
Chapter 17: 15
domain.
take over; send answer that includes next QID and maps host name to your chosen IP address.
value will be cached; the correct answer is dropped.
Chapter 17: 16
concurrent to the attack, send answers with QIDs from a small window.
authoritative answer, slow down authoritative name server with a DoS attack.
correct binding, set a long time to live.
Chapter 17: 17
Chapter 17: 18
Chapter 17: 19
Chapter 17: 20
recursive name server attacker authoritative name server requests for random.foo.com requests for random.foo.com with query ID answers for random.foo.com with guessed QID and RR for www.foo.com; attacker wins race if correct guess arrives before NXDOMAIN. next try, new host NXDOMAIN wins
Chapter 17: 21
Chapter 17: 22
Chapter 17: 23
resource records.
DNSKEY research records.
Chapter 17: 24
Chapter 17: 25
DNSKey pub_key1 DS h(pub_key2) RRSig sigpub_key1(h(pub_key2)) DNSKey pub_key2
Chapter 17: 26
Chapter 17: 27
Chapter 17: 28
HotJava to Netscape and beyond, 1996 IEEE Symposium
Chapter 17: 29
Conference, April 2001.
Chapter 17: 30
Chapter 17: 31
Chapter 17: 32
security.
Chapter 17: 33
Chapter 17: 34
Chapter 17: 35
Chapter 17: 36
Chapter 17: 37
Chapter 17: 38
Chapter 17: 39
Chapter 17: 40
Chapter 17: 41
Chapter 17: 42
you might not realise for a while.
tell you ....
allow the protocol.
Chapter 17: 43
Chapter 17: 44
Chapter 17: 45
Chapter 17: 46
Chapter 17: 47
Chapter 17: 48
have to leave port 80 open, more and more protocols are tunnelled through http to get through the firewall.
Chapter 17: 49
Chapter 17: 50
Chapter 17: 51
Chapter 17: 52
Chapter 17: 53
be presented to management …
Chapter 17: 54
DoS attack.
Chapter 17: 55
discovered and exploited;
issue database updates; customers need to install these;
methods, so effective database difficult to build;
Chapter 17: 56
Chapter 17: 57
Network Intrusion Detector’s Look at Suspicious Events, Proceedings of the 12th Annual Computer Security Incidence Handling Conference, Chicago, 2000.
Chapter 17: 58
buffer overflow packet.
positives (e.g. user goes on holiday, works late in the office, forgets password, or starts to use new application).
patient attacker may be able to gradually shift the base-line
“intrusion detection”.
Chapter 17: 59
IDS vulnerabilities have been exploited.
Chapter 17: 60
encrypted traffic,…
Chapter 17: 61
activity);
commercial systems).
Chapter 17: 62
Internet Internet
Mail server Web server Console
Chapter 17: 63
change from user to supervisor mode had been effected properly through a command like su.
Chapter 17: 64
Internet Internet
Mail server Web server Console
Chapter 17: 65
session
index.html
Chapter 17: 66
Chapter 17: 67
signatures: 771,733 alerts created.
Chapter 17: 68
October 2001
Chapter 17: 69
Chapter 17: 70
Chapter 17: 71