11 - Network Security Flashcards
Network Security
Attacks:
Routing (BGP)
Naming (DNS) -> “Reflection” (DDoS)
-> Phishing
What makes the Internet insecure?
1) the internet is on by default
2) Attacks look like normal traffic
3) Federation ->Thousands of independent operators control
In a packet switching network
Resources are not reserved and packets are self-contained
Packet switch networks
are vulnerable to resource exhaustion attacks
Components of security
Threat: Potential violation
Attack: action that violates
Availability: ability to use a resource
Confidentiality: concealing information
Authenticity: assures the origin of information
Integrity: prevents unauthorized changes
Attack on confidentiality
Eavesdropping
DDoS is an attack on which property of security?
Availability
Negative impacts of attacks:
- theft of confidential info
- Unauthorized use
- False info
- Disruption of service
Routing Security (BGP)
Control Plane Authentication
-Origin: Ensures next AS advertising prefix is the owner
protects the origin AS (owner of prefix is the owner)
Route attacks - How?
1) Config error - mis-configuration
2) Router is compromised
3) Unserupulous ISPs
Types of attacks
Config/management - tamper with management software that changes the configuration
Tamper with software
tamper with routing data
Path Attestation
{thePath} signed by the private key
Moving to new As it includes the original route attestation with it’s private key and it’s own route attestation signed by it’s own private key
Signing with path attestation prevents
1) Some Hijack attacks
2) Short path attacks
3) Modification of AS paths
Attestation cannot prevent
1) Suppression
2) certain replay attacks (premature re-advertisement of a withdrawn route)
DNS attacks
1) MITM (DNS SEC)
2) Spoofing (DNS SEC)
3) Cache poisoning (defense: 0x20)
4) Corruption
5) DNS reflection (can be a weapon for DDos)