Lecture 11 - Network Security Flashcards
Two Threat Models
Passive Attack (Observing)
- Eavesdropping/Sniffing
- Traffic Analysis
Active Attack (Actually Attacking)
- Spoofing attack
- Squatting attack
- Phishing
Network Attack Example
Denial of Service by TCP Syn Flooding
- Initiate a genuine connection but then immediately break it.
- Never finish the 3-way request
- Victim busy with timeout.
- Amplify with botnets
Open Systems Interconnection (OSI)
Framework for layering network protocols
TCP/IP
Simplifies TCP/IP Application Layer Transport Internet Network Access.
IP Security
IP is connectionless and stateless.
Security mechanism
- IP authentication header (AH)
- IP encapsulation security payload.(EPS)
Encapsulation Security Payload (ESP)
additional header within the IP packet that describes what encryption and authentication is in use
Security Parameter Index
a number, stores security parameter.
Uses DH KEX
Transport and Tunnel Mode
Transport Mode
- Simply encrypt packets
- Prevent content to be read but not traffic analysis
Tunnel Mode
- Protect some segment of a channel with encryption
- Prevent Traffic Analysis and manipulation of payload
- Eg. VPN
ARP
- Protocol used in iPv4 to obtain physical MAC address for given IPs
- To construct IP & TCP packets for communication
ARP cache Poisoning
- Man-in-middle attack
- By sending an requested ARP reply and overwrite the MAC address in a host ARP cache with our own.
Prevent by:
-Ignore unsolicited ARP request
-Keep track who has what IP
DNS
- Translate domain names into IP address.
- Caches the new website.
- DNS packets are UDP. Stateless, on transport layer
DNS Spoofing
- Poison the cache of a nameserver people are using.
- Replace a website lookup with our IP, the Phish.
- Achieve through prior ARP cache poisoning, reply flod or kaminsky attack.
Protection
- random query number protect spoof replies
- DNSSEC certificate
Denial of Service
- attempt to make a machine/network resource unavailable to its intended users.
- Flooding a machine with request. eg ping flood.
- Distributed Dos using more than one machine.
Amplification attacks
utilise an aspect of a network protocol to increase the bandwith of an attack.
Smurf Attack
broadcast an ICMP Ping request to a router but with a spoofed IP belonging to the victim.