overview
play

Overview TCP/IP Securing TCP/IP Open Systems Interconnection Model - PowerPoint PPT Presentation

Overview TCP/IP Securing TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Chapter 6 Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2 Introduction to TCP/IP


  1. Overview � TCP/IP Securing TCP/IP � Open Systems Interconnection Model � Anatomy of a Packet � Internet Protocol Security (IPSec) Chapter 6 � Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2 Introduction to TCP/IP (cont ’ d) Introduction to TCP/IP � Layered protocol stack: hierarchical cooperation � Transmission Control Protocol / Internet Protocol � TCP/IP comprises a suite of four protocols � These protocols completely describe how devices communicate on TCP/IP networks – the Internet � The TCP/IP design is consistent with the Open Systems Interconnection (OSI) reference model 3 4

  2. Introduction to TCP/IP (cont ’ d) TCP/IP Suite FTP, Telnet, HTTP … � Data encapsulation 5 6 Internet Protocol (IP) Internet Protocol (cont ’ d) � The Internet Protocol provides routing functions � IP is also responsible for fragmentation of for datagrams traversing the network datagrams � Each datagram has source and destination � A datagram cannot exceed the maximum size for addresses (IP address, logical) the network it is traveling on � IP determines if the datagram has reached its � This is not known at creation time by the sender destination or if it must be forwarded � Datagrams that are too large must be broken into fragments � If it must be forwarded, IP determines the next hop � IP does NOT provide a reliability guarantee � Each fragment must contain the information required to reassemble the original datagram � No assurance that a packet will reach its specified destination � Labeled with a length and an offset � Best effort attempt � Together with the identification field in the header 7 8

  3. Datagram Fragmentation Transmission Control Protocol (TCP) � Has 3 important features � TCP is a reliable protocol (guarantees delivery of packets from source to destination by acknowledgement and retransmission) � TCP provides error-checking (using a checksum) � TCP is connection-oriented (provides session establishment and teardown handshaking protocols to create dedicated process-to-process communication, has sequence controls) � After a TCP packet is constructed, it is transformed into an IP datagram by adding information to the headers ( encapsulation ) 9 10 TCP Handshaking Protocol User Datagram Protocol (UDP) � Like TCP, UDP is a transport layer protocol � Unlike TCP, UDP is connectionless and does not provide a reliability guarantee � Used to deliver a packet from one process to another with very low overhead (efficiency) � Does not use handshaking to establish connections � Does not keep track of sequencing and acknowledge information Figure 6.3 Three-way TCP handshake � Often used for application like streaming media session establishment that do not depend on guaranteed delivery of every packet 11 12

  4. Internet Control Message Open Systems Interconnection Protocol (ICMP) Reference Model (OSI) � Developed in the late 1970s to describe basic � Responsible for transmitting control messages functionality of networked data communications between networked hosts � Types of control messages include � Uses encapsulation to sequentially process data � Network/host/port unreachable through the layers until it is ready for transmission � Packet time to live expired � Each layer performs some transformation of data such � Source quench (overloaded gateway, pause traffic) as adding a header or converting data into another form � Redirect messages (used to reroute traffic) � At the sender, data is transformed from application to � Echo request and echo reply messages (ping) physical layer � Include basic portions of IP header to use the � At the recipient, data is transformed from physical to same routing infrastructure as IP application layer 13 14 OSI Model (cont ’ d) OSI Model (cont ’ d) � Has seven layers � Encapsulation 15 16

  5. OSI Layers OSI Layers (cont ’ d) � Application layer is the highest layer of OSI � Session layer model � Responsible for network connections between processes � Contains software that interacts directly with computer � A security vulnerability at this layer is session hijacking users � Hijacker takes over a session after authentication has taken place � Web browsers, e-mail, office productivity suites, etc. � Transport layer � Majority of security vulnerabilities occur at this layer � Responsible for data flow between two systems � Malicious code objects such as viruses, worms, and Trojan horses � Error recovery functionality, flow control mechanism � Presentation layer � Common transport protocols are TCP and UDP � Responsible for converting data into formats for � Many security vulnerabilities at this level exchange between higher and lower layers � SYN Flood attack � Responsible for allowing data in Application layer to be � Attacks TCP ’ s three-way handshaking process shared among applications � Buffer overflow attacks � Responsible for encryption and decryption of data 17 18 Network Layer Fragment OSI Layers (cont ’ d) Attacks � Network Layer � Ex. Internet Protocol � Responsible for ensuring that datagrams are routed across the network � Responsible for addressing and fragmentation of datagrams � Fragmentation attacks were common at this layer, modern operating systems are less vulnerable � Two fragments overlap � Two adjacent fragments do not meet 19 20

  6. OSI Layers (cont ’ d) OSI vs TCP/IP Layers � Data Link Layer � Conversion between datagrams and binary � Two sublayers � Logical Link Control (LLC) sublayer � Error correction, flow control, frame synchronization � MAC sublayer � 48-bit physical addressing scheme for network devices � Physical layer Ex. 00:00:0C:45:12:A6 � Converts binary data to network impulses � Type of impulse depends on media, electrical, or optic � Physical threats include the use of packet sniffers to monitor traffic 21 22 Packet Anatomy (cont ’ d) Packet Anatomy � Packet headers are built sequentially with each � Packets have two main components layer potentially adding information (Encapsulation) � Packet header � IP headers include � Packet payload � Total length and offset fields for fragmentation � Packet sniffers are hardware or software that � Source Address and Destination Address (IP addresses) passively monitor traffic on a network � can be used maliciously to view unauthorized information � are also used by system administrators to understand and analyze traffic flow and possible attacks � To use a packet sniffer, you must understand the components and structure of a packet 23 24

  7. Packet Anatomy (cont ’ d) Packet Anatomy (cont ’ d) � TCP headers include � UDP headers are added when UDP is the transport protocol � Source Port and Destination Port � SYN, ACK, RST, FIN flags � Only four fields for minimal overhead � checksum � Fields are Source Port, Destination Port, Length, and Checksum � Packet payload is the actual data content that is to be transported � Anything that can be expressed in binary (images, word documents, etc.) 25 26 Internet Protocol Security (IPSec) Web Security � TCP/IP is inherently insecure, designed originally to � WWW comprises the second largest portion of operate between a small number of trusted machines traffic on the Internet (e-mail is first) � IPSec is a security-enhanced version of IP � SSL and HTTP-S are technologies used to add security to Web communications � Security Associations (SAs) contain identification and key materials, ISAKMP is responsible for create and maintain SAs � Secure Socket Layers (SSL) v.2, v.3 � Authentication Headers (AHs) provide integrity and � Usually used between Web browser clients and servers, authentication functionality known as HTTP over SSL (https) � Encapsulating Security Payload (ESP) adds confidentiality � Facilitates exchange of digital certificates guarantees � Replaced by Transport Layer Security (TLS) v.1 � Transport mode used when intermediate network may � Secure-HTTP (HTTP-S) not support IPSec, headers are not encrypted � A connectionless protocol, found in only a few less � Tunnel mode allows encryption of all data including common browsers headers, often found in gateway-to-gateway traffics 27 28

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend