复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)25 security-dosfirewall——Attacks and Countermeasures

Security Part One Attacks and Countermeasures 15-441 With slides from: Debabrata Dash, Nick Feamster, Myas Sekar 15-411: F08 security
Security Part One: Attacks and Countermeasures 15-441 With slides from: Debabrata Dash,Nick Feamster, Vyas Sekar 15-411: F08 security 1

Flashback. Internet design goals 1. Interconnection 2. Failure resilience 3. Multiple types of service 4. Variety of networks 5. Management of resources 6. Cost-effective 7. LoW entry-cost 8. Accountability for resources Where is security? 15-411: F08 security
Flashback .. Internet design goals 1. Interconnection 2. Failure resilience 3. Multiple types of service 4. Variety of networks 5. Management of resources 6. Cost-effective 7. Low entry-cost 8. Accountability for resources Where is security? 15-411: F08 security 2

Why did they leave it out? Designed for connectivity Network designed with implicit trust ◆ No bad"guys Can't security be provided at the edge? Encryption, Authentication etc End-to-end arguments in system design 15-411: F08 security
Why did they leave it out? • Designed for connectivity • Network designed with implicit trust No “bad” guys • Can’t security be provided at the edge? Encryption, Authentication etc End-to-end arguments in system design 15-411: F08 security 3

Security vulnerabilities At every laver in the protocol stack! ° Network-layer attacks IP-level vulnerabilities ◆ Routing attacks Transport-layer attacks ◆ TCP vulnerabilities Application-layer attacks 15-411: F08 security
Security Vulnerabilities • At every layer in the protocol stack! • Network-layer attacks IP-level vulnerabilities Routing attacks • Transport-layer attacks TCP vulnerabilities • Application-layer attacks 15-411: F08 security 4

IP-evel vulnerabilities iP addresses are provided by the source ◆ Spoofing attacks Using IP address for authentication + e.g., login with. rhosts Some features that have been exploited ◆ Fragmentation Broadcast for traffic amplification 15-411: F08 security
IP-level vulnerabilities • IP addresses are provided by the source Spoofing attacks • Using IP address for authentication e.g., login with .rhosts • Some “features” that have been exploited Fragmentation Broadcast for traffic amplification 15-411: F08 security 5

Security Flaws in IP The iP addresses are filled in by the originating host Address spoofing Using source address for authentication r-utilities(rlogin, rsh, rhosts etc.) 2111c Can a claim it is b to the server s? Internet .ARP Spoofing 1.13s Can c claim it is b to the server s? A11111112B 15-411: F08 security ° Source routing
Security Flaws in IP • The IP addresses are filled in by the originating host Address spoofing • Using source address for authentication r-utilities (rlogin, rsh, rhosts etc..) Internet 2.1.1.1 C A 1.1.1.1 1.1.1.2 B 1.1.1.3 S •Can A claim it is B to the server S? •ARP Spoofing •Can C claim it is B to the server S? 15-411: F08 security •Source Routing 6

Smurf Attack 口 Internet Attacking System Broadcast Enabled 6 Network Victim System 15-411: F08 security
Smurf Attack Attacking System Internet Broadcast Enabled Network Victim System 15-411: F08 security 7

ICMP Attacks No authentication ICMP redirect message Can cause the host to switch gateways ◆ Benefit of doing this? Man in the middle attack, sniffing icmP destination unreachable Can cause the host to drop connection ICMP echo request/reply Many more .http://www.sans.org/rr/whitepapers/threats/477.php 15-411: F08 security
ICMP Attacks • No authentication • ICMP redirect message Can cause the host to switch gateways Benefit of doing this? ▪ Man in the middle attack, sniffing • ICMP destination unreachable Can cause the host to drop connection • ICMP echo request/reply • Many more… http://www.sans.org/rr/whitepapers/threats/477.php 15-411: F08 security 8

Routing attacks Divert traffic to malicious nodes ◆B|ack-ho|e ◆ Eavesdropping How to implement routing attacks? ◆ Distance∨ ector: ◆Link- state: BGP vulnerabilities 15-411: F08 security 9
Routing attacks • Divert traffic to malicious nodes Black-hole Eavesdropping • How to implement routing attacks? Distance-Vector: Link-state: • BGP vulnerabilities 15-411: F08 security 9

Routing attacks Divert traffic to malicious nodes ◆B|ack-ho|e ◆ Eavesdropping How to implement routing attacks? Distance-Vector Announce low-cost routes Link-state: Dropping links from topology BGP vulnerabilities ◆ Prefix-hijacking ◆ Path alteration 15-411: F08 security 10
Routing attacks • Divert traffic to malicious nodes Black-hole Eavesdropping • How to implement routing attacks? Distance-Vector: Announce low-cost routes Link-state: Dropping links from topology • BGP vulnerabilities Prefix-hijacking Path alteration 15-411: F08 security 10
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)25 Secure Communication with an Insecure Internet Infrastructure.ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)23 mobile_Wireless Networking.ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)22 Queue Management and QoS.ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)21 Peer-to-Peer(p2p).ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)20 The Web.ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)19 TCP Performance.ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)18 tcpdetails_More TCP & Congestion.ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)17 TCP & Congestion Control.ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)16 Transport Protocols.ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)15 Virtual Circuits, ATM, MPLS.ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)14 ip-grab-bag(IP Wrap up).ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)13 DNS.ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)12 Inter-Domain Routing BGP(Border Gateway Protocol).ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)11 Multicast.ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)10 Intra-Domain Routing.ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)09 IP Packets.ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)08 Software School.ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)07 Ethernet.ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)06 Physical Layer(Cont)& Data Link Layer.ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)05 physical_Transmission.ppt
- 复旦大学:《计算机网络 Computer Networking》课程电子教案(PPT课件讲稿)26 Wireless, Ad-Hoc Networks, Sensor Networks.ppt
- 复旦大学:《计算机网络》课程PPT课件_10 IP-Prot——Routers and Routing.pdf
- 《数据库系统》参考书籍:《Database Management Systems》2nd Ed(Raghu Ramakrishnan / Johannes Gehrke).pdf
- 《数据库系统》课程参考资料:DB2系统管理员指南 IBM DB2 Version 8 Administrator Guide(1/3)Planning.pdf
- 《数据库系统》课程参考资料:DB2系统管理员指南 IBM DB2 Version 8 Administrator Guide(2/3)Implementation.pdf
- 《数据库系统》课程参考资料:DB2 SQL指南 IBM DB2 Universal Database SQL Reference Volume 1 Version 8(1/2).pdf
- 《数据库系统》课程参考资料:DB2系统管理员指南 IBM DB2 Version 8 Administrator Guide(3/3)Performance.pdf
- 《数据库系统》课程参考资料:DB2 SQL指南 IBM DB2 Universal Database SQL Reference Volume 2 Version 8(2/2).pdf
- 复旦大学:《数据库系统》学生数据库设计(MIS)论文_1.奚亚蓉——电信局程控机房维护管理信息系统.doc
- 复旦大学:《数据库系统》学生数据库设计(MIS)论文_2.吴小莉——检测管理信息系统.doc
- 复旦大学:《数据库系统》学生数据库设计(MIS)论文_3.周瑾——图书借阅管理系统.doc
- 复旦大学:《数据库系统》学生数据库设计(MIS)论文_4.邓彦——上药三厂科技图书信息管理系统.doc
- 复旦大学:《数据库系统》学生数据库设计(MIS)论文_5.蒋君伟——医院管理信息系统.doc
- 复旦大学:《数据库系统》学生数据库设计(MIS)论文_6.缪晶——进销存管理系统.doc
- 复旦大学:《数据库系统》学生数据库设计(MIS)论文_7.王菻华——进口货代管理信息系统.doc
- 复旦大学:《数据库系统》学生数据库设计(MIS)论文_8.孙建英——库存管理信息系统.doc
- 复旦大学:《数据库系统》学生数据库设计(MIS)论文_9.樊庆萍——图书借阅管理系统.doc
- 复旦大学:《数据库系统》学生数据库设计(MIS)论文_10.李建蓉——资料管理信息系统.doc
- 复旦大学:《数据库系统》学生数据库设计(MIS)论文_11.周颖——中学教务管理系统.doc
- 复旦大学:《数据库系统》学生数据库设计(MIS)论文_12.王慧平——上海市印刷七厂药务管理信息系统.doc