Network Security
- Dr. Haojin Zhu
Zhu-hj@cs.sjtu.edu.cn https://nsec.sjtu.edu.cn/
1
Network Security Dr. Haojin Zhu Zhu-hj@cs.sjtu.edu.cn - - PowerPoint PPT Presentation
Network Security Dr. Haojin Zhu Zhu-hj@cs.sjtu.edu.cn https://nsec.sjtu.edu.cn/ 1 About Instructor Dr. Haojin Zhu, Professor of Computer Science and Engineering Department https://nsec.sjtu.edu.cn/ zhu-hj@cs.sjtu.edu.cn Office:
1
shaofengli2013@gmail.com
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31 3/19/2019
32 3/19/2019
33
34
3/19/2019
35 3/19/2019
36 3/19/2019
37 3/19/2019
38
3/19/2019
39 3/19/2019
40 3/19/2019
41 3/19/2019
42 3/19/2019
– http://www.informationisbeautiful.net/visualizations/worlds-biggest-data- breaches-hacks/
– http://us.norton.com/security_response/threatexplorer/index.jsp
43
44
– Security measures are often not considered until an Enterprise has been penetrated by malicious users
– Many Internet sites allow wide-open Internet access
– Most TCP/IP protocols not built with security in mind
– Example: buffer overflow vulnerabilities
45
46
47
2019-03-19 48
▪ in the nature of eavesdropping on, or monitoring of, transmissions. ▪ the goal is to obtain information that is being transmitted.
▪ release of message contents ▪ traffic analysis. Passive attacker (adversary) Passive attacks Release of message contents Traffic analysis
2019-03-19 49
▪ A telephone conversation, an e-mail message, and a transferred file may contain sensitive or confidential information. ▪ The attacker: identify the sensitive or confidential information. Bob Alice Passive attacker (adversary)
Internet or other communication facility
2019-03-19 50
the goal of an attacker is to ▪
▪ determine the location and identity of communicating hosts Bob Alice Passive attacker (adversary) Observe the pattern of messages from Bob to Alice
2019-03-19 51
▪ involve some malicious actions on the transmission ▪ can be subdivided into four categories: ✓ masquerade, ✓ replay, ✓ modification of messages, ✓ denial of service.
2019-03-19 52
▪
▪ in order to gain unauthorized access or malicious goal Bob Alice Active attacker (adversary) This forged message appears to be from Bob
Internet or other communication facility
2019-03-19 53
▪ involves the passive capture of the transmitted data ▪ subsequently replays it to produce an unauthorized effect Bob Alice Active attacker (adversary) Capture message from Bob to Alice, later replay message to Alice
Internet or other communication facility
2019-03-19 54
▪ make some modification of the transmitted data ▪ to produce an unauthorized effect.
▪ a message "Allow Alice to read confidential file accounts“ ▪ is modified to "Allow Alice to delete confidential file accounts.” Bob Alice Active attacker (adversary) Modify message from Bob to Alice
Modified
2019-03-19 55
Service (DoS): prevents the normal use
management of communication facilities. ➢ by overloading it with messages so as to degrade its performance.
Active attacker (adversary) Disrupt service provided by server
Internet or other communication facility
Bogus
56