Introduction to Network Security
Chapter 5 Physical Network Layer
1
- Dr. Doug Jacobson - Introduction to
Network Security - 2009
Introduction to Network Security Chapter 5 Physical Network Layer - - PowerPoint PPT Presentation
Introduction to Network Security Chapter 5 Physical Network Layer Dr. Doug Jacobson - Introduction to 1 Network Security - 2009 Topics Lower Layer Security Physical Layer Overview Common attack methods Ethernet
1
Network Security - 2009
2
Network Security - 2009
Medium access Medium Access Protocol Device Interface Software Drivers Service Access Points Data buffers Hardware Software Physical Media Upper Layer Physical media specific signal Digital Data in bytes Digital Data in bytes
3
Network Security - 2009
4
Network Security - 2009
R1 R2 D2 D1 D4 D3 D5 D6 D7 Network N1 Network N2 Network N3 HW-D1 HW-D2 HW-R1a HW-R1-b HW-D4 HW-D3 HW-D5 HW-D7 HW-D6 HW-R2a HW-R2b Packet
5
Network Security - 2009
Computer 1 HW = A1 Computer 2 HW = C2 Router 1 HW = A2, B1 Router 2 HW = B3, C1 Attacker 1 Attacker 2 Attacker 3 Network A Network C Network B
6
Network Security - 2009
Computer 1 HW = A1 Computer 2 HW = C2 Router 1 HW = A2, B1 Router 2 HW = B3, C1 Attacker 1 Attacker 2 Attacker 3 Network A Network C Network B
7
Network Security - 2009
8
Network Security - 2009
9
Network Security - 2009
10
Network Security - 2009
Name Cable type Speed Maximum Distance between devices 10Base2 Coax 10 Mbps 185 meters 10BaseF Fiber 10 Mbps 500 meters 10BaseT Twisted Pair 10 Mbps 100 meters 100BaseT Twisted Pair 100 Mbps 100 meters 100BaseFX Fiber 100 Mbps 1000 meters 1000Base-X Fiber or coax 1000 Mbps Depends on cable type
11
Network Security - 2009
Packet
12
Network Security - 2009
13
Network Security - 2009
14
Network Security - 2009
15
Network Security - 2009
16
Network Security - 2009
Hub Hub Hub Hub C2 C5 C7 C3 C4 C1 C6
17
Network Security - 2009
18
Network Security - 2009
Switch 1 Switch 2 Switch 3 Switch 4 C2 C5 C7 C3 C4 C1 C6 P1 P2 P3 P4 P1 P2 P3 P1 P2 P3 P4 P1 P2 P3 Router R1 Port HW Address P1 Uplink P2 C2 P3 Multiple Port HW Address P1 Uplink P2 C5 P3 C6 P4 C7 Port table, switch 2 Port table, switch 4
19
Network Security - 2009
Switch 1 Switch 2 Switch 3 C2 C5 C3 C4 C1 P1 P2 P3 P4 P1 P2 P3 P1 P2 P3 Tap Spanning or mirrored port Router Hub Monitoring Point Router Switch OR
20
Network Security - 2009
21
Network Security - 2009
22
Network Security - 2009
23
Network Security - 2009
24
Network Security - 2009
25
Network Security - 2009
26
Network Security - 2009
27
Network Security - 2009
28
Network Security - 2009
29
Network Security - 2009
30
Network Security - 2009
31
Network Security - 2009
32
Network Security - 2009
33
Network Security - 2009
34
Network Security - 2009
35
Network Security - 2009
Router Switch Access point C SSID = SERVER ROOM Access point A SSID = LAB Access point B SSID = OFFICE A B C D E
36
Network Security - 2009
Access Point A Access point B Beacon SSID = LAB Device C Beacon SSID = OFFICE Probe Probe Response SSID = LAB Probe Response SSID = OFFICE Discovery Joining Association Request Association Response Probe 37
Network Security - 2009
38
Network Security - 2009
Listen quiet Got Ack Send Quiet Packet to send Packet sent No Yes Yes No Yes No Pick random Number of Time slots Slot count = 0 No Yes Wait a time slot Decrement slot count
39
Network Security - 2009
40
Network Security - 2009
Router Switch A B C Network D G E F
41
Network Security - 2009
Router Switch A B C Wireless Router Network 1 Network 2 E D F
42
Network Security - 2009
43
Network Security - 2009
44
Network Security - 2009
45
Network Security - 2009
46
Network Security - 2009
47
Network Security - 2009
48
Network Security - 2009
49
Network Security - 2009
50
Network Security - 2009
51
Network Security - 2009
52
Network Security - 2009
53
Network Security - 2009
54
Network Security - 2009
Router Switch Internet Rouge Access Point Rogue User Attacker / Wardriver Building Walls 55
Network Security - 2009
56
Network Security - 2009
Router Switch Internet Real Access Point Wireless User Attacker Building Walls Fake Access Point 57
Network Security - 2009
58
Network Security - 2009
59
Network Security - 2009
60
Network Security - 2009
61
Network Security - 2009
Network Password Clear Text Traffic Encrypted Traffic with Shared Key Acknowledge Encrypted Traffic with Shared Key Acknowledge Password Device B Device A Associate Request Associate Response Associate Request Associate Response Authenticate Request Authenticate Request
62
Network Security - 2009
63
Network Security - 2009
64
Network Security - 2009
Home Network Password Clear Text Traffic Encrypted Traffic with Session Key A Acknowledge Negotiate Key Negotiate Key Encrypted Traffic with Session Key B Send Password Acknowledge Negotiate Key Negotiate Key Password Device B Device A Send Password Associate Request Associate Response Associate Request Associate Response 65
Network Security - 2009
66
Network Security - 2009
Enterprise Network Password Clear Text Traffic Encrypted Traffic with Session Key A Acknowledge Negotiate Key Negotiate Key Encrypted Traffic with Session Key B Send Password Acknowledge Negotiate Key Negotiate Key Password Device B Device A Send Password Enterprise User Authentication System Password Verification Associate Request Associate Response Associate Request Associate Response
67
Network Security - 2009
68
Network Security - 2009
69
Network Security - 2009
70
Network Security - 2009
71
Network Security - 2009
72
Network Security - 2009
Router Switch 1 D2 D1 D4 D3 D5 D6 D7 Switch 2 Switch 3 1 2 3 1 1 2 2 VLAN 1 VLAN 2
73
Network Security - 2009
Router Switch D4 D1 D5 D7 D6 D3 D2 Switch VLAN 1 VLAN 2 Router Router 74
Network Security - 2009
75
Network Security - 2009
Router/ Perimeter Defense Router/ Perimeter Defense Switch Internet Wireless VLAN Attacker
76
Network Security - 2009
77
Network Security - 2009
Router/ Perimeter Defense Router Perimeter Defense Policy Enforcement Switch / Policy Enforcement Internet Wireless VLAN
Policy Decision Point
Authentication System
78
Network Security - 2009
79
Network Security - 2009
80
Network Security - 2009