Language:EN
Pages: 13
Rating : ⭐⭐⭐⭐⭐
Price: $10.99
Page 1 Preview
network security lecture osi model the osi model g

Network security lecture osi model the osi model groups information

Network Security: Lecture 1

• This lecture covers more details, especially with regard to:  Security Concepts and Threats
 An overview of the above, with regard to the lower layers of the OSI Network Model.

 OSI and TCP/IP Models
 Reviewing the OSI or TCP/IP models and discussing some security aspects of each of the OSI or TCP/IP layers.

Security Concepts and Threats

• A simple model illustrating security attacks:

Sender

 Active attacks: The adversary adopts the role of a sender.

© 2012.1 UWS Lecture No. 1-2

... Passive Attacks

• Passive attacks mainly involve observing or copying the information being transmitted between the two end entities.• A message being transmitted usually consists of two parts:  Message header
 Message body
• Two kinds of passive attacks depending on what
information contents are being observed:
 Unauthorized release of message contents usually from the message body
 Traffic analysis
 Observing information about the message, i.e.

Network Security: Lecture 1

Active Attacks …

Attacker

message M

• A spoofing attack may lead to modifying information stored on the target end entity

Message with false contents

... Active Attacks …

• Replay attack
 Makes use of a previously sent message from the sender

Bob Attacker

message n

message n

message 1 ...

• Modification attack:
 An attacker interrupts a message, modifies it, and sends the modified copy to the receiver.

 Modification attacks also include message stream modification, e.g.

• Denial of service (DoS) attack
 Sending bogus or craft messages to a receiver (which can be a computer or a network) to adversely affect its operation.

 May be classified as:
 Asymmetric
• The attacker uses little resource from himself/herself to perform a DoS attack on a larger or more powerful target.

Network Security: Lecture 1

Secure Communication Requirements ...

Alice

Are messages being
eavesdropped?

 This includes message stream integrity.

• Message (origin) authentication
 The link between the transmitted information and the sender’s identity needs to be verified. Also for non-repudiation purpose.

• The OSI model groups information, functions, and resourses into 7 layers or levels of abstraction.

Layer No. Layer Name

Each layer communicates with its peer layer at the other end

 In theory. a security attack can occur in any of the layer.

© 2012.1 UWS Lecture No. 1-12

• OSI layer structure is used in most of the discussions regarding different layers of networking

• In the following, some details of the lower 4 layers of the OSI model will be discussed and reviewed with regard to network security.

 Information at this level is represented in the form of electrical, optical or electromagnetic waves.

• Attacks at this level are usually passive in nature, e.g. wire- tapping and eavesdropping.

Physical security and security at the OSI physical layer are

not parts of this unit.

• Information at this layer is encapsulated in frames.

• Frame format (Ethernet):

Header Data

• If privacy protection is used at this layer, that means the Data portion is encrypted, including the IP packet header and data.

• Source MAC address

• Passive attack is possible by changing the mode of a NIC to promiscuous mode to capture all the frames transmitted on the LAN.

• Privacy protection:

Router

MAC Address

Attacker

Router’s ARP
Cache is attacked, but it is not the
real target

192.168.1.1 MAC_PC3

192.168.1.2 MAC_PC2

© 2012.1 UWS Lecture No. 1-17

Network Security: Lecture 1

192.168.1.1 MAC_PC3

PC4’s ARP Cache

Network Security: Lecture 1

Network Layer …

IP Payload

contains upper layer protocol data unit (PDU) which is normally, but not
necessarily, a TCP segment.

• Destination IP
address

Network Security: Lecture 1

… Network Layer

© 2012.1 UWS Lecture No. 1-20

 It establishes a communication session between the source and destination first before any data are sent.

© 2012.1 UWS Lecture No. 1-21

Sent in one
message ACK-SYN
SYN

ACK

SYN
ACK

© 2012.1 UWS Lecture No. 1-22

 Each computer needs to store the state of this process.

 At this point, the server
• stores the state of the half-open connection
• waits for the client to send the last ACK message
• If the client does not respond, then the server will drop the half-open connection after a time-out period.

Network Security: Lecture 1

… TCP SYN Flood Attack

Temporary storage for
half-open connections

© 2012.1 UWS Lecture No. 1-24

 Passive attacks are side-effects and usually attackers (whether

human or malicious programs) are actively engaged in the attacks.

*** End ***

© 2012.1 UWS Lecture No. 1-25

You are viewing 1/3rd of the document.Purchase the document to get full access instantly

Immediately available after payment
Both online and downloadable
No strings attached
How It Works
Login account
Login Your Account
Place in cart
Add to Cart
send in the money
Make payment
Document download
Download File
img

Uploaded by : Julia Davies

PageId: ELI6A9BE72