Introduction to Network Security
Chapter 4 Taxonomy of Network-Based Vulnerabilities
1
- Dr. Doug Jacobson - Introduction to
Network Security - 2009
Introduction to Network Security Chapter 4 Taxonomy of - - PowerPoint PPT Presentation
Introduction to Network Security Chapter 4 Taxonomy of Network-Based Vulnerabilities Dr. Doug Jacobson - Introduction to 1 Network Security - 2009 Topics Network Security Model Header attacks Protocol Attacks
1
Network Security - 2009
2
Network Security - 2009
3
Network Security - 2009
Application TCP Payload Application Protocol TCP Protocol IP Physical Network Payload Header Payload Header Payload Header Payload Header IP Protocol Physical Network Protocol Internet Payload Header Attacker Generated Packet User
4
Network Security - 2009
5
Network Security - 2009
6
Network Security - 2009
2000 2006 1980 ARPANET virus (accidental) 1988 Internet worm infects over 6,000 hosts 1980 1990 1982 First Computer Virus (Apple ][) 1986 First PC virus Numerous viruses 1995 First Macro Virus 1999 Melissa worm 2000 Nimda, code Red, Sircam, Numerous others 2003 Sober, Sobig, Blaster, Slammer 2004 Sasser, MyDoom,
7
Network Security - 2009
8
Network Security - 2009
Impact Threats Vulnerability High Low More Less Likely Unlikely 9
Network Security - 2009
10
Network Security - 2009
– Device can be confused by setting source and destination to the same address
11
Network Security - 2009
IP payload IP Header IP Reassembly buffer (65535 bytes)
length = 100 IP payload
12
Network Security - 2009
13
Network Security - 2009
14
Network Security - 2009
Client Server Request to open connection Acknowledge Connection Request Wait for Client Acknowledgement Allocate Buffers Acknowledge Server Acknowledgement Connection is open Connection is open
15
Network Security - 2009
Attacking Client Server Open 1 Connect Ack 1 Wait for Client ACK 1 Open 2 Open 3 Open 4 Open 5 Open 6 Allocate Buffers Allocate Buffers Allocate Buffers Allocate Buffers Allocate Buffers No Buffers available Connect Ack 2 Connect Ack 3 Connect Ack 4 Connect Ack 5 Wait for Client ACK 2 Wait for Client ACK 3 Wait for Client ACK 4 Wait for Client ACK 5 NAK
16
Network Security - 2009
17
Network Security - 2009
Application TCP Layer-to-layer Authentication IP Physical Network Internet User Application TCP IP Physical Network User User-to-User Layer-to-layer Authentication Layer-to-layer Authentication Layer-to-layer Authentication User-to-host Authentication Host-to-User Authentication
18
Network Security - 2009
19
Network Security - 2009
20
Network Security - 2009
21
Network Security - 2009
22
Network Security - 2009
Router Internet Attacker Broadcast Packet Target Network Multiple Replies
23
Network Security - 2009
24
Network Security - 2009
25
Network Security - 2009