Deficiencies in Networks

28
Deficiencies in Networks Anonymity Lack of Access Control Anything can be forged Shared medium Crowded Unpredictable Complexity Difficult to comprehend Difficult to do right

description

Deficiencies in Networks. Anonymity Lack of Access Control Anything can be forged Shared medium Crowded Unpredictable Complexity Difficult to comprehend Difficult to do right. Large Network. Implication of Those Deficiencies. Criminals have found the Internet FTC Report 2007 - PowerPoint PPT Presentation

Transcript of Deficiencies in Networks

Page 1: Deficiencies in Networks

Deficiencies in Networks Anonymity

Lack of Access Control Anything can be forged

Shared medium Crowded Unpredictable

Complexity Difficult to comprehend

Difficult to do right

Page 2: Deficiencies in Networks
Page 3: Deficiencies in Networks

Large Network

Page 4: Deficiencies in Networks

Implication of Those Deficiencies

Criminals have found the Internet FTC Report 2007

• $1.2 billion in fraud• 1/3 Identity Theft• 64% initiated through Net

Border Protection• $200 Million IP theft

Stealth Worms• Outbreaks rare since 2004• Botnets growing to huge size• Increase in spam• DOS to Georgia

Page 5: Deficiencies in Networks

Actual Fraud Complaints 05-07

Page 6: Deficiencies in Networks

Confiscated IP

Page 7: Deficiencies in Networks

Introduction 1-7

Network Security The field of network security is about:

how bad guys can attack computer networks how we can defend networks against attacks how to design architectures that are immune

to attacks Internet not originally designed with

(much) security in mind original vision: “a group of mutually trusting

users attached to a transparent network” Internet protocol designers playing “catch-

up” Security considerations in all layers!

Page 8: Deficiencies in Networks

Introduction 1-8

Bad guys can put malware into hosts via Internet Malware can get in host from a virus, worm, or

trojan horse.

Spyware malware can record keystrokes, web sites visited, upload info to collection site.

Infected host can be enrolled in a botnet, used for spam and DDoS attacks.

Malware is often self-replicating: from an infected host, seeks entry into other hosts

Page 9: Deficiencies in Networks

Introduction 1-9

Bad guys can put malware into hosts via Internet Trojan horse

Hidden part of some otherwise useful software

Today often on a Web page (Active-X, plugin)

Virus infection by receiving

object (e.g., e-mail attachment), actively executing

self-replicating: propagate itself to other hosts, users

Worm: infection by passively

receiving object that gets itself executed

self- replicating: propagates to other hosts, usersSapphire Worm: aggregate scans/sec

in first 5 minutes of outbreak (CAIDA, UWisc data)

Page 10: Deficiencies in Networks

Viruses

Code

Init

Executed by user or app Inserts into code

In empty regions of app Redirects app start instructions

Effect Mischief Spyware

Spread Locally As used

Page 11: Deficiencies in Networks

Trojans

Already Exists in Code Does not propagate Effect

Mischief Spyware Anything

Page 12: Deficiencies in Networks

Worms

Self Replicating Exploit vulnerabilities Effect

Cause High Net Traffic Mischief/Spyware

Spread Over Networks Actively

Polymorphic

Page 13: Deficiencies in Networks

Code Red Propagation

Page 14: Deficiencies in Networks

Sapphire Worm Propagation

Page 15: Deficiencies in Networks

Backdoor

Adding illicit access to a host Remotely

• Creating a server• Adding User with remote access

Locally• Bury alternative access in code

Page 16: Deficiencies in Networks

Hybrid Bugs

Bugs are people too!

Page 17: Deficiencies in Networks

What about Anti-virus?

Can only match known signatures Fine if there is a match Not so fine if there isn’t

• Zero-day attack– (a bit presumptuous term)

• Unknown attack Some bugs disable anti-virus

Page 18: Deficiencies in Networks

Introduction 1-18

Bad guys can attack servers and network infrastructure

Denial of service (DoS): attackers make resources (server, bandwidth) unavailable to legitimate traffic by overwhelming resource with bogus traffic

1. select target

2. break into hosts around the network (see botnet)

3. send packets toward target from compromised hosts

target

Page 19: Deficiencies in Networks

Denial of Service

Denial of Service Typically one source Utilizes weaknesses in App or Proto to bring

services down Distributed Denial of Service

Many hosts attacking a small network Indistinguishable from certain network

phenomena (Flash Crowds).

Page 20: Deficiencies in Networks

Syn Flood

TCP Session

TCP Session

TCP Session

TCP Session

TCP Session

TCP Session

TCP Session

Server

SYN

Page 21: Deficiencies in Networks

Ping of Death (POD)

Feed the target more than he can handle

Host Chokes

Page 22: Deficiencies in Networks
Page 23: Deficiencies in Networks

Introduction 1-23

The bad guys can sniff packetsPacket sniffing:

broadcast media (shared Ethernet, wireless) promiscuous network interface reads/records all packets

(e.g., including passwords!) passing by

A

B

C

src:B dest:A payload

Wireshark software used for end-of-chapter labs is a (free) packet-sniffer

Page 24: Deficiencies in Networks
Page 25: Deficiencies in Networks

Introduction 1-25

The bad guys can use false source addresses IP spoofing: send packet with false source

addressA

B

C

src:B dest:A payload

Page 26: Deficiencies in Networks

Introduction 1-26

The bad guys can record and playback

record-and-playback: sniff sensitive info (e.g., password), and use later password holder is that user from system point of

view

A

B

C

src:B dest:A user: B; password: foo

Page 27: Deficiencies in Networks

Introduction 1-27

Network Security more throughout this course chapter 8: focus on security crypographic techniques: obvious uses

and not so obvious uses

Page 28: Deficiencies in Networks

Sources

Federal Trade Commission, Consumer Fraud and Identity Theft Complaint Data: January-December 2007, 2008.

Department of Justice, Report to the President and Congress on Coordination of Intellectual Property Enforcement and Protection, January 2008