Leksion 4 Security Threats

16
8/12/2019 Leksion 4 Security Threats http://slidepdf.com/reader/full/leksion-4-security-threats 1/16 Security Threats MsC, Ing. Ezmerina Kotobelli [email protected]

Transcript of Leksion 4 Security Threats

Page 1: Leksion 4 Security Threats

8/12/2019 Leksion 4 Security Threats

http://slidepdf.com/reader/full/leksion-4-security-threats 1/16

Security Threats

MsC, Ing. Ezmerina [email protected]

Page 2: Leksion 4 Security Threats

8/12/2019 Leksion 4 Security Threats

http://slidepdf.com/reader/full/leksion-4-security-threats 2/16

Overview

Security threats

IP flaws

Attacks

Page 3: Leksion 4 Security Threats

8/12/2019 Leksion 4 Security Threats

http://slidepdf.com/reader/full/leksion-4-security-threats 3/16

The Security Life-Cycle

  Threats

 Policy

 Specification  Design

 Implementation

 Operation and Maintenance

Page 4: Leksion 4 Security Threats

8/12/2019 Leksion 4 Security Threats

http://slidepdf.com/reader/full/leksion-4-security-threats 4/16

Taxonomy of Threats

Taxonomy – a way to classify and refer to threats (andattacks) by names/categories

Benefits – avoid confusion

Focus/coordinate development efforts of security

mechanisms

 No standard yet

One possibility: by results/intentions first, then by

techniques, then further by targets, etc.

Associate severity/cost to each threat

Page 5: Leksion 4 Security Threats

8/12/2019 Leksion 4 Security Threats

http://slidepdf.com/reader/full/leksion-4-security-threats 5/16

Why Should I Care?

Attack packets with spoofed IP address help hide the

attacking source.

A smurf attack launched with your host IP address could

 bring your host and network to their knees. Higher protocol layers (e.g., TCP) help to protect

applications from direct harm, but not enough.

Page 6: Leksion 4 Security Threats

8/12/2019 Leksion 4 Security Threats

http://slidepdf.com/reader/full/leksion-4-security-threats 6/16

Current IPv4Infrastructure

 No authentication for the source

Various approaches exist to address the problem:

Router/firewall filtering

TCP handshake

Page 7: Leksion 4 Security Threats

8/12/2019 Leksion 4 Security Threats

http://slidepdf.com/reader/full/leksion-4-security-threats 7/16

Router Filtering

Decide whether this packet, with certain source IP

address, should come from this side of network.

 Not standard - local policy.

Page 8: Leksion 4 Security Threats

8/12/2019 Leksion 4 Security Threats

http://slidepdf.com/reader/full/leksion-4-security-threats 8/16

Router Filtering

Very effective for some networks (ISP should always

do that!)

At least be sure that this packet is from some

 particular subnet Problems:

Hard to handle frequent add/delete hosts/subnets

or mobile IP

Upsets customers should legitimate packets getdiscarded

 Need to trust other routers

Page 9: Leksion 4 Security Threats

8/12/2019 Leksion 4 Security Threats

http://slidepdf.com/reader/full/leksion-4-security-threats 9/16

TCP Handshake

Page 10: Leksion 4 Security Threats

8/12/2019 Leksion 4 Security Threats

http://slidepdf.com/reader/full/leksion-4-security-threats 10/16

TCP Handshake

Page 11: Leksion 4 Security Threats

8/12/2019 Leksion 4 Security Threats

http://slidepdf.com/reader/full/leksion-4-security-threats 11/16

Page 12: Leksion 4 Security Threats

8/12/2019 Leksion 4 Security Threats

http://slidepdf.com/reader/full/leksion-4-security-threats 12/16

IP Spoofing & SYNFlood

X establishes a TCP connection with B assuming A’s

IP address

Page 13: Leksion 4 Security Threats

8/12/2019 Leksion 4 Security Threats

http://slidepdf.com/reader/full/leksion-4-security-threats 13/16

Smurf Attack

Generate ping stream (ICMP echo request) to a

network broadcast address with a spoofed source IP

set to a victim host

Every host on the ping target network will generate a ping reply (ICMP echo reply) stream, all towards the

victim host

Amplified ping reply stream can easily overwhelm

the victim’s network connection Fraggle and Pingpong exploit UDP in a similar way

Page 14: Leksion 4 Security Threats

8/12/2019 Leksion 4 Security Threats

http://slidepdf.com/reader/full/leksion-4-security-threats 14/16

Vulnerability

A vulnerability (or security flaw) is a specific failure

of the security controls.

Using the failure to violate the site security:

exploiting the vulnerability; the person who doesthis: an attacker.

It can be due to:

Lapses in design, implementation, and operation

 procedures.Even security algorithms/systems are not

immune!o We will go over some examples in this course.

Page 15: Leksion 4 Security Threats

8/12/2019 Leksion 4 Security Threats

http://slidepdf.com/reader/full/leksion-4-security-threats 15/16

Example: IP Protocol-related Vulnerabilities

Authentication based on IP source address

But no effective mechanisms against IP spoofing

Consequences (possible exploits)

Denial of Service attacks on infrastructures, e.g.

o IP Spoofing and SYN Floodo Smurf and Fraggle attacks

o OSPF Max Sequence

Page 16: Leksion 4 Security Threats

8/12/2019 Leksion 4 Security Threats

http://slidepdf.com/reader/full/leksion-4-security-threats 16/16