outline
play

Outline Presentation of ENST Digital security in 2005: crisis, - PDF document

A Survey of Network Security Research at ENST Gwendal Le Grand gwendal.legrand@enst.fr Ecole Nationale Suprieure des Tlcommunications (ENST), Paris France CNRS (LTCI UMR 541) Sance du 6 fvrier 2003 Outline Presentation of


  1. A Survey of Network Security Research at ENST Gwendal Le Grand gwendal.legrand@enst.fr Ecole Nationale Supérieure des Télécommunications (ENST), Paris France CNRS (LTCI – UMR 541) Séance du 6 février 2003 Outline � Presentation of ENST � Digital security in 2005: crisis, stakes and roadmap � Network security and projects at ENST (selected activities) � Conclusion Page 2 - A survey of Network Security at ENST - 19/08/2005

  2. ENST : Ecole Nationale Supérieure des Télécommunications Website : http://www.enst.fr/en � computer science and network (INFRES) department � ≈ 50 permanent staff � ≈ 50 PhD students � Research @INFRES: � Software & System engineering, Middleware, Reconfigurability, Adaptability, software radio � Heterogeneous networks, interconnection, interworking and administration, Traffic modelling, � Architecture Design, Metrology, QoS ; Mobile technologies : GSM, GPRS, UMTS, WiFi, Bluetooth, � Queues, performance assessment, distribution approximations, stochastic analysis. � Discrete structures, graphs, algorithms ; Algebraic coding, cryptology ; � Artificial Intelligence, expert systems, natural languages processing ; � Databases, Semantic Web. � Security : Critical Infrastructure Protection, QuantumNetworks, Grid security, Network security � (802.11, Bluetooth), Ad hoc & active network security, Privacy, cryptology, watermarking, cryptographic protocols, PKIs, IPv6 security, Authentication, Honey pots, IDS, protection of services ; ENST is part of Euronetlab (www.euronetlab.net). � Study of security of QoS routers and mobile routers. � Page 3 - A survey of Network Security at ENST - 19/08/2005 The security crisis No real trust in ICT � Physical relationship still important in exchanges and commerce (relative � failure of e-commerce, …) • trust in the exchanges ≠ security of electronic payment. Virtual world � • Anonymity, geographic virtuality. No real spread of existing technologies � Digital signature not used � PKI (too complicated, non interoperable, hard to assess) � Smart card does not really spread out of France � How to protect distributed systems? � Biometry still not used (except digital identity maybe) � Need to define new concepts for security � • Find alternatives to Alice and Bob, claissical cryptography, SSL … Security is hard to sell: No “added value”, noRoI � Page 4 - A survey of Network Security at ENST - 19/08/2005

  3. ICT Security stakes in 2005 • Avoid drastic security measures Restore trust in the digital world � Crisis management E-commerce, e-business, e-content, e- • ICT vulnerability � government, e-vote, e-democracy •Interconnected, more complex and fragile Interdependencies Resilient infrastructures � Just-in-time business Protected Networks and systems � • A quality label (certification) Multimedia, software, � dissemination of knowledge Software engineering Protect infospheres � • Protection against any type of attack Individual : protect privacy � Physical attacks Company : anticipate problems � Critical infrastructures : prevent domino Towards a digital order? � effect, limit cybercriminality Security incompatible with uncontrolled world. Need of some principles (ethics, responsability, Immune applications and data � transparency, autonomy, …) in a realistic world. Applicable for the international community. … in a mobile world with ambient intelligence Accepted by users and stakeholders Page 5 - A survey of Network Security at ENST - 19/08/2005 Why are systems vulnerable? Complexity Distribution � � Ontologies and their structuration Scalability � � Heterogeneity Protocols and exchanges � � • Size, number of actors, entities and actions Architecture � Sensitivity � • Semantics and types of components and links Tangible value � • Each canonic architecture has its intrinsic vulnerabilities Corporate image (symbolic � Virtual (abstraction) attack …) � • Digital imitation (machine, network, OS, company …) Movement � Mobility … but a mobile world � has a history • footprints of the ontologies (subjects, objects, operations) • Witnesses Page 8 - A survey of Network Security at ENST - 19/08/2005

  4. Mobility and ambient intelligence Classical security models are timeless and not fitted to mobility � Must enrich existing models, policies, protocols to take into account context and spatio � temporal properties. Tracability to log history � • Keep the memory of the system Morphology of the system is linked to its protection and its security � Restore trust in ICT systems requires to reform Internet, prevent anonymity, provide � proofs. Need of alibis to prove that here and now there are witnesses of events. � Need to identifying spatio-temporal trusted invariants in this environment: location of � base stations, trusted clock, etc. Mobility may be an asset � Liberty: intelligence and information may move where needed � Creates entropy: useful to introduce randomness and secrets (mobile cryptography). � Page 9 - A survey of Network Security at ENST - 19/08/2005 Security R&D roadmap Classical security technologies � Security of the content and services � Cryptology, cryptographic � (application layer) protocols and formal methods DRM, IPR � Security policies and models � Watermarking � Certification and assessment � Cryptographic protocols dedicated to � methodology specific uses Security of infrastructures � Network security � Model the big public open � Security of multi service networks domains � (GPRS, UMTS …) • PKIs, quantum, critical Security of protocols (AAA, DNSSec, infrastructures … � Mobile IP, …) Model privacy � IDS, honeypots … � • Personal infospheres … Hardware entities � Security of non functional properties � Personal trust entity (smart card) � Mobility: ad hoc networks, mesh � networks, PANA … Secure hardware architecture : � configurable crypto-processor high Configurability: personalized � throughput cryptography middleware, downloadable software, mobile agents Biometry � Distribution: security of grids, � virtual machines, distributed OS Architectures � Page 10 - A survey of Network Security at ENST - 19/08/2005

  5. Projects at ENST (recent past, present and near future ) European projects National (RNRT) ITEA Ambience : security in a � Icare :trusted infrastructures, � mobile world, ambient PKIs intelligence Swap : WAP security � ITEA BRIC : audiovisual � watermarking MMQoS : security, mobility and � QoS CELTIC BUGYO: Telecom � infrastrucure protection Anaïs : security of Professional � Mobile Radio IST Acip : Critical infrastructure � protection Infradio : Security on a � campus and of infospheres in IST CI2RCO: CIIP � meshed networks IST IRRIIS (IP): CIIP– starts � Epis : smart card security E2E end 2005 � with IPv6 IST DESEREC (IP): CIIP– � Resodo : Security of domestic starts end 2005 � networks IST SECOQC (IP): Quantum � Aquaflux : mediametry network � watermarking IST EuroNGI (NoE): Trust … � Artus : augmented reality � Vipbob : cryptographic protocol � marking with biometric data Page 11 - A survey of Network Security at ENST - 19/08/2005 INFRADIO (RNRT)– Radio infosphere � 138.142.55.1 à 55.253 (DHCP) � 255.255.255.0 � 10.0.0.1 à 253 (DHCP) � 138.142.55.254 � 255.255.255.0 Invité � 10.0.0.254 Permanent What radio infrastructure? Routeur de l’ENST � Communication sphere � 138.142.54.254 � � 138.142.54.1 à 54.125 � 255.255.254.0 � 255.255.255.128 � 138.142.54.126 Switch APs Cisco 1200 802.11a et g Variable size, spontaneous, robust Dareau � VLAN 100 ( T ) VLANs 101, 102 et 103 ( T ) Secure, administrated � VLANs 100, 101, 102 et 103 ( T ) VLAN 103 ( U ) Applications � 138.142.54.133 VLAN 101 ( U ) � � 255.255.255.192 Switch Baystack 450-24T VLAN 102 ( U ) VLAN 104 ( U ) Security policies in a semi open world � VLAN 100 ( U ) � 10.0.0..254 � 138.142.54.194 Semi open VLAN 100 ( U ) � � 255.255.255.0 � 255.255.255.192 � 138.142.54.254 � 138.142.55.254 Captive Portal � 255.255.255.0 • Permanent staff, usual users, anonymous portal.infradio.enst.fr � 138.142.54.129 • Variable infrastructure � 138.142.54.193 � 138.142.54.130 � 255.255.255.192 � 138.142.54.126 Légende � 255.255.255.192 � 255.255.255.192 � 138.142.54.130 � 255.255.255.128 � 138.142.54.254 � Adresse IP Firewall 2 RADIUS, MySQL DNS, DHCP Firewall 1 Configurable security policies � � Masque de sous-réseau fw2.infradio.enst.fr radius.infradio.enst.fr ns1.infradio.enst.fr fw1.infradio.enst.fr � Passerelle par défaut T Tagged � 138.142.54.131 � 138.142.54.132 U Untagged • Audit and imputability policies � 255.255.255.192 � 255.255.255.192 • Granularity of security, adapt to a profile Mobility = vulnerability, manage a secure mobility � Authentication of subjects and objects, secure architecture, alibis, � tracability, web of trust QoS access control � Page 12 - A survey of Network Security at ENST - 19/08/2005

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend