A Security Analysis of the Precise Time Protocol

Size: px
Start display at page:

Download "A Security Analysis of the Precise Time Protocol"

Transcription

1 A Security Analysis of the Precise Time Protocol Jeanette Tsang & Konstantin Beznosov December 5, 2006 Laboratory for Education and Research in Secure Systems Engineering (LERSSE) University of British Columbia

2 Outline 1. Work objectives 2. Assumptions 3. Discussion of Best Master Clock (BMC) attack 4. Results summary 5. Conclusion A Security Analysis of the Precise Time Protocol 2

3 Work Objectives 1. Identify generic security vulnerabilities 2. Identify PTP-specific vulnerabilities 3. Suggest countermeasures A Security Analysis of the Precise Time Protocol 3

4 Assumptions 1. Closed network i.e., no direct or indirect connections with the Internet 2. Insiders can mount passive & active attacks i.e., remove, modify, and inject messages 3. No IP-level data protection e.g., IPSec A Security Analysis of the Precise Time Protocol 4

5 Sample Run of the PTP Protocol Master Clock Slave Clock Record precise sending time Sync message: estimated sending time Follow_Up message: precise sending time of Sync Calculate offset A Security Analysis of the Precise Time Protocol 5

6 Attacks

7 Types of Attacks Identified 1. Modification 2. Masquerading 3. Delay 4. Replay 5. Denial of service A Security Analysis of the Precise Time Protocol 7

8 Attack 1: How to Masquerade as the Master Clock Two ways: 1) Impersonate Current Master Clock Steal current master clock identity 2) Switch the slave clock to the rogue master clock Win the Best Master Clock (BMC) election A Security Analysis of the Precise Time Protocol 8

9 How to Win Best Master Clock (BMC) Election (1/4) Sync message Legitimate Master 1. Snoop Grandmaster clock information sequenceid Uuid, etc. Rogue Master Victim Slave A Security Analysis of the Precise Time Protocol 9

10 How to Win BMC Election (2/4) 2. Send best Sync message to the slave clock Rogue Master Victim Slave A Security Analysis of the Precise Time Protocol 10

11 How to Win BMC Election (3/4) 3. Victim slave clock runs BMC and picks the rogue master Rogue Master Victim Slave A Security Analysis of the Precise Time Protocol 11

12 How to Win BMC Election (4/4) 4. Victim slave switches to the Rogue Master Rogue Master Victim Slave A Security Analysis of the Precise Time Protocol 12

13 Sample PTP Network Grandmaster Clock (GMC) Slave A1 Slave A2 Boundary Clock (Master) Boundary Clock (Slave) ETHERNET NETWORK 1 Boundary Clock (Slave) Port 1 Port 1 Switching Device A Port 2 ETHERNET NETWORK 2 Boundary Clock (Master) Boundary Clock (Master) Slave B1 Slave B2 Port 2 Port 3 Switching Device B A Security Analysis of the Precise Time Protocol 13

14 Attack 2: Depriving slave from synchronization Ways to attack: 1. Block sync messages Congestion Removal 2. Make victim slave to discard good sync messages Sync message modification Illegal update of sequenceid A Security Analysis of the Precise Time Protocol 14

15 Attack 2: Illegal update of sequenceid (1/4) Last sync sequenceid = 100 Sync Message sequenceid = 200 Rogue Master Victim Slave Current Master A Security Analysis of the Precise Time Protocol 15

16 Attack 2: Illegal update of sequenceid (2/4) Update last sync sequenceid 200 Rogue Master Victim Slave Current Master A Security Analysis of the Precise Time Protocol 16

17 Attack 2: Illegal update of sequenceid (3/4) Last sync sequenceid = 200 Sync Message sequenceid = 101 Rogue Master Victim Slave Current Master A Security Analysis of the Precise Time Protocol 17

18 Attack 2: Illegal update of sequenceid (4/4) Last sync sequenceid = sequenceid = 300 sequenceid = 400 Cannot keep up Rogue Master Victim Slave Current Master A Security Analysis of the Precise Time Protocol 18

19 Attack Type Effects Countermeasures Would IPsec help to counter this attack type? Modification Denial of Service Incorrect resynchronization Cryptographic integrity protection Yes Changing clock hierarchy Masquerading resynchronization Centralized or chained authentication mechanism No Delay Delay in timing messages Timeout of synchronization process Increase in offset calculation Algorithm to detect abnormal timestamp Back up plan using previous timing records Yes Replay Disturbance of message sequence Authentication mechanism Yes Saturate process queue Tunneled connection Congest network paths Denial of Service Small-scaled: Affect accuracy of synchronization Big-scaled: Put halt on the whole PTP system Physical protection Pay precautions to other malicious attacks Monitor traffic No A Security Analysis of the Precise Time Protocol 19

20 Conclusions Could not ensure integrity of messages and authenticity of sender Analyzed five types of attacks Incorrectly resynchronize clocks Rearrange or disrupt hierarchy Bring protocol participants into an inconsistent state Deprive victim slave clocks from synchronization in ways undetectable by generic network intrusion detection systems Proposed countermeasures for the identified attacks A Security Analysis of the Precise Time Protocol 20

21 More information available on lersse.ece.ubc.ca A Security Analysis of the Precise Time Protocol 21

A Security Analysis of the Precise Time Protocol

A Security Analysis of the Precise Time Protocol A Security Analysis of the Precise Time Protocol Jeanette Tsang and Konstantin Beznosov Laboratory for Education and Research in Secure Systems Engineering lersse.ece.ubc.ca University of British Columbia

More information

OpenID Security Analysis and Evaluation

OpenID Security Analysis and Evaluation University of British Columbia OpenID Security Analysis and Evaluation San-Tsai Sun, Kirstie Hawkey, Konstantin Beznosov Laboratory for Education and Research in Secure Systems Engineering (LERSSE) University

More information

Defenses against Wormhole Attack

Defenses against Wormhole Attack Defenses against Wormhole Attack Presented by: Kadhim Hayawi, ID: 20364216 COURSE PRESENTATION FOR ECE750 - INTELLIGENT SENSORS AND SENSOR NETWORKS Prof. Otman A. Basir Outline Introduction Packet Leashes

More information

Configuring Precision Time Protocol (PTP)

Configuring Precision Time Protocol (PTP) Finding Feature Information, on page 1 Restrictions and Limitations for PTP, on page 1 Information About Precision Time Protocol, on page 2 Configuring PTP, on page 10 Examples: Layer 2 and Layer 3 PTP

More information

Configuring PTP. Information About PTP. This chapter contains the following sections:

Configuring PTP. Information About PTP. This chapter contains the following sections: This chapter contains the following sections: Information About PTP Information About PTP, on page 1 PTP Device Types, on page 2 PTP Process, on page 3 High Availability for PTP, on page 3 Licensing Requirements

More information

The Kerberos Authentication System Course Outline

The Kerberos Authentication System Course Outline The Kerberos Authentication System Course Outline Technical Underpinnings - authentication based on key sharing - Needham-Schroeder protocol - Denning and Sacco protocol Kerbeors V - Login and client-server

More information

G Telecom Profile

G Telecom Profile Why G.8275.1? More About G.8275.1 First Published: March 29, 2016 Precision Time Protocol (PTP) is a protocol for distributing precise time and frequency over packet networks. PTP is defined in the IEEE

More information

arxiv: v3 [cs.cr] 25 May 2016

arxiv: v3 [cs.cr] 25 May 2016 A Security Analysis and Revised Security Extension for the Precision Time Protocol Eyal Itkin and Avishai Wool arxiv:1603.00707v3 [cs.cr] 25 May 2016 eyalitki@post.tau.ac.il, yash@eng.tau.ac.il Tel Aviv

More information

G Telecom Profile

G Telecom Profile Precision Time Protocol (PTP) is a protocol for distributing precise time and frequency over packet networks. PTP is defined in the IEEE Standard 1588. It defines an exchange of timed messages PTP allows

More information

Precision Time Protocol Software Configuration Guide for IE 2000U and Connected Grid Switches

Precision Time Protocol Software Configuration Guide for IE 2000U and Connected Grid Switches Precision Time Protocol Software Configuration Guide for IE 2000U and Connected Grid Switches Revised: March 14, 2017, Configuring PTP This document describes Precision Time Protocol (PTP) and how to configure

More information

Time Synchronization Security using IPsec and MACsec

Time Synchronization Security using IPsec and MACsec Time Synchronization using IPsec and MACsec Appeared in ISPCS 2011 Tal Mizrahi Israel ing Seminar May 2012 Time Synchronization Time synchronization is used for various applications. Securing the time

More information

Detection of Malicious Nodes in Mobile Adhoc Network

Detection of Malicious Nodes in Mobile Adhoc Network Detection of Malicious Nodes in Mobile Adhoc Network s Vijendra Pratap Singh 1 & 2 ABSTRACT Mobile Ad hoc Networks (MANET) consists of mobile nodes so the network topology may change rapidly and unpredictably

More information

G Telecom Profile

G Telecom Profile This document provides information on the support for G.8275.2 telecom profile and how to configure Cisco cbr series routers to avail the support. Finding Feature Information Your software release may

More information

Precision Time Protocol Software Configuration Guide for IE 4000, IE 4010, and IE 5000 Switches

Precision Time Protocol Software Configuration Guide for IE 4000, IE 4010, and IE 5000 Switches Precision Time Protocol Software Configuration Guide for IE 4000, IE 4010, and IE 5000 Switches Configuring PTP 2 Information About Precision Time Protocol 2 Information About NTP to PTP Time Conversion

More information

Standards Update IEEE 1588

Standards Update IEEE 1588 VOICE & TIMING SOLUTIONS For a New Global Network Standards Update IEEE 1588 Silvana Rodrigues silvana.rodrigues@zarlink.com The 6th Time & Synchronisation in Telecoms Conference November 4 to 6, 2008

More information

Certificate reputation. Dorottya Papp

Certificate reputation. Dorottya Papp Certificate reputation Dorottya Papp Motivation Verification on a digital certificate does not reveal important factors Is it a fake certificate? (Hash collision) Was it mistakenly issued? (Comodo scandal)

More information

Security Issues In Mobile IP

Security Issues In Mobile IP Security Issues In Mobile IP Zhang Chao Tsinghua University Electronic Engineering 1 OUTLINE 1.Introduction 2.Typical threats 3. Mobile IPv6 and new threats 4.Open issues 2 OUTLINE 1.Introduction 2.Typical

More information

NETWORK INTRUSION. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

NETWORK INTRUSION. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006 NETWORK INTRUSION Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Learning Objectives Students should be able to: Recognize different

More information

IEEE1588 profile development in ITU-T

IEEE1588 profile development in ITU-T IEEE1588 profile development in ITU-T Michael Mayer Ciena Corporation March, 2012 Ciena 2011 Outline -General approach to Profile development in ITU-T -Review of IEEE1588 -Telecom architecture: how it

More information

ISO/IEC Common Criteria. Threat Categories

ISO/IEC Common Criteria. Threat Categories ISO/IEC 15408 Common Criteria Threat Categories 2005 Bar Biszick-Lockwood / QualityIT Redmond, WA 2003 Purpose This presentation introduces you to the threat categories contained in ISO/IEC 15408, used

More information

Authorization Recycling in RBAC Systems

Authorization Recycling in RBAC Systems Authorization Recycling in RBAC Systems Qiang Wei 1, Jason Crampton 2, Konstantin Beznosov 1, Matei Ripeanu 1 1 Laboratory for Education and Research in Secure Systems Engineering (LERSSE), University

More information

Ruijie Anti-ARP Spoofing

Ruijie Anti-ARP Spoofing White Paper Contents Introduction... 3 Technical Principle... 4 ARP...4 ARP Spoofing...5 Anti-ARP Spoofing Solutions... 7 Non-Network Device Solutions...7 Solutions...8 Application Cases of Anti-ARP Spoofing...11

More information

CTS2134 Introduction to Networking. Module 08: Network Security

CTS2134 Introduction to Networking. Module 08: Network Security CTS2134 Introduction to Networking Module 08: Network Security Denial of Service (DoS) DoS (Denial of Service) attack impacts system availability by flooding the target system with traffic or by exploiting

More information

IEEE1588 Frequently Asked Questions (FAQs)

IEEE1588 Frequently Asked Questions (FAQs) IEEE1588 Frequently Asked Questions (FAQs) LAN Access Division December 2011 Revision 1.0 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED,

More information

Secure Initial Access Authentication in WLAN

Secure Initial Access Authentication in WLAN International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1299-1303 International Research Publications House http://www. irphouse.com Secure Initial

More information

Authentication Handshakes

Authentication Handshakes AIT 682: Network and Systems Security Topic 6.2 Authentication Protocols Instructor: Dr. Kun Sun Authentication Handshakes Secure communication almost always includes an initial authentication handshake.

More information

Nimbra - communication platform for the SmartGRID

Nimbra - communication platform for the SmartGRID Nimbra - communication platform for the SmartGRID Real-Time and High Integrity communication for SmartGrid applications Dr. Christer Bohm, Net Insight AB Nimbra MSR Our background is real-time but for

More information

Evaluating the performance of Network Equipment. Presenter: Tommy Cook, CEO Calnex Solutions Ltd

Evaluating the performance of Network Equipment. Presenter: Tommy Cook, CEO Calnex Solutions Ltd Evaluating the performance of Network Equipment Presenter: Tommy Cook, CEO Calnex Solutions Ltd Presentation overview Proving performance of; EEC Synchronous Ethernet Devices. 1588v2 Boundary s. 1588v2

More information

Distributed Systems. 05. Clock Synchronization. Paul Krzyzanowski. Rutgers University. Fall 2017

Distributed Systems. 05. Clock Synchronization. Paul Krzyzanowski. Rutgers University. Fall 2017 Distributed Systems 05. Clock Synchronization Paul Krzyzanowski Rutgers University Fall 2017 2014-2017 Paul Krzyzanowski 1 Synchronization Synchronization covers interactions among distributed processes

More information

Chapter 24 Wireless Network Security

Chapter 24 Wireless Network Security Chapter 24 Wireless Network Security Wireless Security Key factors contributing to higher security risk of wireless networks compared to wired networks include: o Channel Wireless networking typically

More information

Mobile Security Fall 2013

Mobile Security Fall 2013 Mobile Security 14-829 Fall 2013 Patrick Tague Class #6 More WiFi Security & Privacy Issues WiFi Security Issues A Scenario Internet Open AP SSID Network X Open OpenAP AP SSID Attacker Network X LaptopLaptop

More information

CSC 474/574 Information Systems Security

CSC 474/574 Information Systems Security CSC 474/574 Information Systems Security Topic 3.3: Security Handshake Pitfalls CSC 474/574 Dr. Peng Ning 1 Authentication Handshakes Secure communication almost always includes an initial authentication

More information

IEEE 1588v2 Technology White Paper

IEEE 1588v2 Technology White Paper IEEE 1588v2 Technology White Paper Issue 02 Date 2016-09-30 HUAWEI TECHNOLOGIES CO., LTD. 2016. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means

More information

Security in Ad Hoc Networks Attacks

Security in Ad Hoc Networks Attacks Security in Ad Hoc Networks Attacks Nie Pin niepin(at)cc.hut.fi T-79.5401 Special Course in Mobility Management: Ad hoc networks 2007-3-28 NiePin/HUT/CS/TML 1 Agenda Objectives of attacks Target selection

More information

Rogue Access Points and UBC s Wi-Fi Network

Rogue Access Points and UBC s Wi-Fi Network Rogue Access Points and UBC s Wi-Fi Network Arunkumar Chebium, Pawittar Dhillon, Kaveh Farshad, Farhan Masud Department of Electrical and Computer Engineering, University of British Columbia Vancouver,

More information

Internet Protocol and Transmission Control Protocol

Internet Protocol and Transmission Control Protocol Internet Protocol and Transmission Control Protocol CMSC 414 November 13, 2017 Internet Protcol Recall: 4-bit version 4-bit hdr len 8-bit type of service 16-bit total length (bytes) 8-bit TTL 16-bit identification

More information

Technical Brief Implementing IEEE 1588v2 for use in the mobile backhaul

Technical Brief Implementing IEEE 1588v2 for use in the mobile backhaul Technical Brief Implementing IEEE 1588v2 for use in the mobile backhaul For most, the migration to an all-ethernet or all-ip network will be a gradual process as network operators endeavour to maximise

More information

PTP Implementation Challenges and Best Practices

PTP Implementation Challenges and Best Practices 28 MAY 2018 PTP Implementation Challenges and Best Practices Karl J. Kuhn Sr. Applications Engineer karl.j.kuhn@tektronix.com SDI Video Plant 2 IP Video Plant 3 Low-Jitter on Video over IP IP packets carrying

More information

Distributed Systems Exam 1 Review. Paul Krzyzanowski. Rutgers University. Fall 2016

Distributed Systems Exam 1 Review. Paul Krzyzanowski. Rutgers University. Fall 2016 Distributed Systems 2016 Exam 1 Review Paul Krzyzanowski Rutgers University Fall 2016 Question 1 Why does it not make sense to use TCP (Transmission Control Protocol) for the Network Time Protocol (NTP)?

More information

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis

CS-435 spring semester Network Technology & Programming Laboratory. Stefanos Papadakis & Manolis Spanakis CS-435 spring semester 2016 Network Technology & Programming Laboratory University of Crete Computer Science Department Stefanos Papadakis & Manolis Spanakis CS-435 Lecture preview 802.11 Security IEEE

More information

Powering Next-Generation IP Broadcasting using QFX Series Switches. Tech Note

Powering Next-Generation IP Broadcasting using QFX Series Switches. Tech Note Powering Next-Generation IP Broadcasting using QFX Series Switches Tech Note March 2018 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks

More information

Cooperative Secondary Authorization Recycling

Cooperative Secondary Authorization Recycling Cooperative Secondary Authorization Recycling Qiang Wei, Matei Ripeanu, Konstantin Beznosov Laboratory for Education and Research in Secure Systems Engineering (lersse.ece.ubc.ca) University of British

More information

802.1AS Fast Master Clock Selection

802.1AS Fast Master Clock Selection 802.1AS Fast Master Clock Selection Moving 802.1AS closer to RSTP Version 2 Norman Finn Cisco Systems 1 Introduction 2 Introduction IEEE 1588 networks that contain transparent clocks and the current draft

More information

Denial of Service and Distributed Denial of Service Attacks

Denial of Service and Distributed Denial of Service Attacks Denial of Service and Distributed Denial of Service Attacks Objectives: 1. To understand denial of service and distributed denial of service. 2. To take a glance about DoS techniques. Distributed denial

More information

Synchronization of Television, Audio and Moving Pictures in a Digital Age. Tim Frost, Symmetricom Inc.,

Synchronization of Television, Audio and Moving Pictures in a Digital Age. Tim Frost, Symmetricom Inc., Synchronization of Television, Audio and Moving Pictures in a Digital Age Tim Frost, Symmetricom Inc., tfrost@symmetricom.com ITSF 2009 Contents Synchronization Requirements in a Digital TV Studio SMPTE/EBU

More information

Process groups and message ordering

Process groups and message ordering Process groups and message ordering If processes belong to groups, certain algorithms can be used that depend on group properties membership create ( name ), kill ( name ) join ( name, process ), leave

More information

IEEE 1588 PTP clock synchronization over a WAN backbone

IEEE 1588 PTP clock synchronization over a WAN backbone Whitepaper IEEE 1588 PTP clock synchronization over a WAN backbone A field study comparing PTP clock synchronization accuracy against GPS external time reference in a live production WAN environment Contents

More information

IEEE 1588 Hardware Assist

IEEE 1588 Hardware Assist Freescale Technology Forum, June 2007 IEEE 1588 Hardware Assist Session ID: AZ317 Satoshi Iida Applications Engineering Manager Agenda IEEE 1588 Protocol Overview Synchronization Overview Why Create Another

More information

Session key establishment protocols

Session key establishment protocols our task is to program a computer which gives answers which are subtly and maliciously wrong at the most inconvenient possible moment. -- Ross Anderson and Roger Needham, Programming Satan s computer Session

More information

G Telecom Profile

G Telecom Profile Precision Time Protocol (PTP) is a protocol for distributing precise time and frequency over packet networks. PTP is defined in the IEEE Standard 588. It defines an exchange of timed messages. PTP allows

More information

NETLMM Security Threats on the MN-AR Interface draft-kempf-netlmm-threats-00.txt

NETLMM Security Threats on the MN-AR Interface draft-kempf-netlmm-threats-00.txt Draft summary Reviewers' comments Mailing-list discussion NETLMM Security Threats on the MN-AR Interface draft-kempf-netlmm-threats-00.txt New Terminology 1 MN authentication: Initial authentication of

More information

TIME SYNCHRONIZATION TEST SOLUTION FROM VERYX TECHNOLOGIES

TIME SYNCHRONIZATION TEST SOLUTION FROM VERYX TECHNOLOGIES TIME SYNCHRONIZATION TEST SOLUTION FROM VERYX TECHNOLOGIES CONTENTS Introduction... 1 1588v2 Overview... 1 SyncE overview... 2 VERYX capability... 2 1588v2 Test Coverage... 2 Time Sync Application Test

More information

High Available Synchronization with IEEE 802.1AS bt

High Available Synchronization with IEEE 802.1AS bt High Available Synchronization with IEEE 802.1AS bt 2013-03-19 IEEE 802 Meeting - TSN-TG Orlando / USA Franz-Josef Goetz, Siemens AG Structure of this Presentation 1. Methods in IEEE 1588 v2 and IEEE 802.1AS

More information

Threat Modeling. Bart De Win Secure Application Development Course, Credits to

Threat Modeling. Bart De Win Secure Application Development Course, Credits to Threat Modeling Bart De Win bart.dewin@ascure.com Secure Application Development Course, 2009 Credits to Frank Piessens (KUL) for the slides 2 1 Overview Introduction Key Concepts Threats, Vulnerabilities,

More information

Session key establishment protocols

Session key establishment protocols our task is to program a computer which gives answers which are subtly and maliciously wrong at the most inconvenient possible moment. -- Ross Anderson and Roger Needham, Programming Satan s computer Session

More information

Understanding PTP. A network device physically attached to the primary time source. All clocks are synchronized to the grandmaster clock.

Understanding PTP. A network device physically attached to the primary time source. All clocks are synchronized to the grandmaster clock. The Precision Time Protocol (PTP), as defined in the IEEE 1588 standard, synchronizes with nanosecond accuracy the real-time clocks of the devices in a network. The clocks in are organized into a master-slave

More information

Secure PTP - Protecting PTP with MACsec without losing accuracy. ITSF 2014 Thomas Joergensen Vitesse Semiconductor

Secure PTP - Protecting PTP with MACsec without losing accuracy. ITSF 2014 Thomas Joergensen Vitesse Semiconductor Secure PTP - Protecting PTP with MACsec without losing accuracy ITSF 2014 Thomas Joergensen Vitesse Semiconductor Security issues with PTP It is possible to spoof time and attack PTP if the PTP traffic

More information

WIRELESS sensor networks have received a lot of attention

WIRELESS sensor networks have received a lot of attention IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 2, FEBRUARY 2006 395 Secure and Resilient Clock Synchronization in Wireless Sensor Networks Kun Sun, Peng Ning, Member, IEEE, and Cliff Wang,

More information

Network Security. Chapter 0. Attacks and Attack Detection

Network Security. Chapter 0. Attacks and Attack Detection Network Security Chapter 0 Attacks and Attack Detection 1 Attacks and Attack Detection Have you ever been attacked (in the IT security sense)? What kind of attacks do you know? 2 What can happen? Part

More information

CSCI 667: Concepts of Computer Security. Lecture 9. Prof. Adwait Nadkarni

CSCI 667: Concepts of Computer Security. Lecture 9. Prof. Adwait Nadkarni CSCI 667: Concepts of Computer Security Lecture 9 Prof. Adwait Nadkarni 1 Derived from slides by William Enck, Micah Sherr, Patrick McDaniel, Peng Ning, and Vitaly Shmatikov Authentication Alice? Bob?

More information

Security Engineering. Lecture 16 Network Security Fabio Massacci (with the courtesy of W. Stallings)

Security Engineering. Lecture 16 Network Security Fabio Massacci (with the courtesy of W. Stallings) Security Lecture 16 Network Security Fabio Massacci (with the courtesy of W. Stallings) Lecture Outline Network Attacks Attive Attacks Passive Attacks TCP Attacks Contermeasures IPSec SSL/TLS Firewalls

More information

CIS 6930/4930 Computer and Network Security. Topic 8.1 IPsec

CIS 6930/4930 Computer and Network Security. Topic 8.1 IPsec CIS 6930/4930 Computer and Network Security Topic 8.1 IPsec 1 IPsec Objectives Why do we need IPsec? IP V4 has no authentication IP spoofing Payload could be changed without detection. IP V4 has no confidentiality

More information

User Authentication Protocols

User Authentication Protocols User Authentication Protocols Class 5 Stallings: Ch 15 CIS-5370: 26.September.2016 1 Announcement Homework 1 is due today by end of class CIS-5370: 26.September.2016 2 User Authentication The process of

More information

Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs

Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs by Charikleia Zouridaki Charikleia Zouridaki 1, Marek Hejmo 1, Brian L. Mark 1, Roshan K. Thomas 2, and Kris Gaj 1 1 ECE

More information

Configuring attack detection and prevention 1

Configuring attack detection and prevention 1 Contents Configuring attack detection and prevention 1 Overview 1 Attacks that the device can prevent 1 Single-packet attacks 1 Scanning attacks 2 Flood attacks 3 TCP fragment attack 4 Login DoS attack

More information

Streamware Workbench Release

Streamware Workbench Release Streamware Workbench Release 2.6.16 info@echoavb.com Introduction Streamware Workbench is a software suite for generating, receiving, measuring, and stress testing IEEE Std 802.1AS -2011 gptp time synchronization

More information

PtpHybridClock. Reference Manual. Product Info. Product Manager. Author(s) Reviewer(s) - Version 1.0. Date Sven Meier.

PtpHybridClock. Reference Manual. Product Info. Product Manager. Author(s) Reviewer(s) - Version 1.0. Date Sven Meier. PtpHybridClock Reference Manual Product Info Product Manager Author(s) Sven Meier Sven Meier Reviewer(s) - Version.0 Date 07.0.206 PtpHybridClock Reference Manual.0 Page of 8 Copyright Notice Copyright

More information

The IEEE 1588 Standard

The IEEE 1588 Standard The IEEE 1588 Standard The IEEE 1588 Standard Synchronizing time between multiple computers in the network has always been a challenge. What is, in the first step, a trivial requirement to equip two or

More information

Frequently Asked Questions WPA2 Vulnerability (KRACK)

Frequently Asked Questions WPA2 Vulnerability (KRACK) Frequently Asked Questions WPA2 Vulnerability (KRACK) Release Date: October 20, 2017 Document version: 1.0 What is the issue? A research paper disclosed serious vulnerabilities in the WPA and WPA2 key

More information

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report

National Information Assurance Partnership. Common Criteria Evaluation and Validation Scheme Validation Report National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Blue Ridge Networks BorderGuard Centrally Managed Embedded PKI Virtual Private Network (VPN)

More information

A Survey On Attacks, Challenges and Security Mechanisms In Wireless Sensor Network

A Survey On Attacks, Challenges and Security Mechanisms In Wireless Sensor Network IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 8 January 2015 ISSN (online): 2349-6010 A Survey On Attacks, Challenges and Security Mechanisms In Wireless Sensor

More information

How Insecure is Wireless LAN?

How Insecure is Wireless LAN? Page 1 of 7 How Insecure is Wireless LAN? Abstract Wireless LAN has gained popularity in the last few years due to its enormous benefits such as scalability, mobile access of the network, and reduced cost

More information

Interoperability with a One-Step Clock on Receive in 802.1ASbt

Interoperability with a One-Step Clock on Receive in 802.1ASbt Interoperability with a One-Step Clock on Receive in 802.1ASbt Geoffrey M. Garner Consultant IEEE 802.1 AVB TG 2013.11.12 gmgarner@alum.mit.edu Introduction 1 This presentation describes changes needed

More information

CISNTWK-440. Chapter 4 Network Vulnerabilities and Attacks

CISNTWK-440. Chapter 4 Network Vulnerabilities and Attacks CISNTWK-440 Intro to Network Security Chapter 4 Network Vulnerabilities and Attacks Objectives Explain the types of network vulnerabilities List categories of network attacks Define different methods of

More information

Attacking Networks. Joshua Wright LightReading LIVE! October 1, 2003

Attacking Networks. Joshua Wright LightReading LIVE! October 1, 2003 Attacking 802.11 Networks Joshua Wright Joshua.Wright@jwu.edu LightReading LIVE! October 1, 2003 Attention The material presented here reflects the personal experience and opinions of the author, and not

More information

ITU-T G /Y

ITU-T G /Y I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU G.8271.1/Y.1366.1 (10/2017) SERIES G: TRANSMISSION SYSTEMS AND MEDIA, DIGITAL

More information

Security in Mobile Ad-hoc Networks. Wormhole Attacks

Security in Mobile Ad-hoc Networks. Wormhole Attacks Security in Mobile Ad-hoc Networks Wormhole Attacks What are MANETs Mobile Ad-hoc Network (MANET) is a collection of wireless mobile hosts without fixed network infrastructure and centralized administration.

More information

Gossiping Ad-hoc Wireless networking for First Responders GAWFR

Gossiping Ad-hoc Wireless networking for First Responders GAWFR Gossiping Ad-hoc Wireless networking for First Responders GAWFR Design Project 2 Report Predrag Gruevski (predrag@mit.edu, T11) Anton Anastasov (aanastasov@mit.edu, R12) Logan Mercer (lmercer@mit.edu,

More information

Automation the process of unifying the change in the firewall performance

Automation the process of unifying the change in the firewall performance Automation the process of unifying the change in the firewall performance 1 Kirandeep kaur, 1 Student - Department of Computer science and Engineering, Lovely professional university, Phagwara Abstract

More information

MULTICAST SECURITY. Piotr Wojciechowski (CCIE #25543)

MULTICAST SECURITY. Piotr Wojciechowski (CCIE #25543) MULTICAST SECURITY Piotr Wojciechowski (CCIE #25543) ABOUT ME Senior Network Engineer MSO at VeriFone Inc. Previously Network Solutions Architect at one of top polish IT integrators CCIE #25543 (Routing

More information

Distributed Systems Exam 1 Review Paul Krzyzanowski. Rutgers University. Fall 2016

Distributed Systems Exam 1 Review Paul Krzyzanowski. Rutgers University. Fall 2016 Distributed Systems 2015 Exam 1 Review Paul Krzyzanowski Rutgers University Fall 2016 1 Question 1 Why did the use of reference counting for remote objects prove to be impractical? Explain. It s not fault

More information

Wireless LAN Security (RM12/2002)

Wireless LAN Security (RM12/2002) Information Technology in Education Project Reference Materials Wireless LAN Security (RM12/2002) Infrastructure Division Education Department The Government of HKSAR www.ited.ed.gov.hk December 2002 For

More information

Identifier Binding Attacks and Defenses in Software-Defined Networks

Identifier Binding Attacks and Defenses in Software-Defined Networks Identifier Binding Attacks and Defenses in Software-Defined Networks Samuel Jero 1, William Koch 2, Richard Skowyra 3, Hamed Okhravi 3, Cristina Nita-Rotaru 4, and David Bigelow 3 1 Purdue University,

More information

A Simulation Framework for IEEE 1588

A Simulation Framework for IEEE 1588 This full text paper was peer-reviewed at the direction of IEEE Instrumentation and Measurement Society prior to the acceptance and publication. A Simulation Framework for IEEE 1588 Wolfgang Wallner Vienna

More information

Overview and Timing 802.1AS. Geoffrey M. Garner. Broadcom Corporation

Overview and Timing 802.1AS. Geoffrey M. Garner. Broadcom Corporation Overview and Timing Performance of IEEE 802.1AS Geoffrey M. Garner Consultant Michael D Johas Teener Michael D. Johas Teener Broadcom Corporation Outline Introduction ti Overview of IEEE 802.1AS PTP profile

More information

Network Security. The Art of War in The LAN Land. Mohamed Sabt Univ Rennes, CNRS, IRISA Thursday, September 27th, 2018

Network Security. The Art of War in The LAN Land. Mohamed Sabt Univ Rennes, CNRS, IRISA Thursday, September 27th, 2018 Network Security The Art of War in The LAN Land Mohamed Sabt Univ Rennes, CNRS, IRISA Thursday, September 27th, 2018 Part I MAC Attacks MAC Address/CAM Table Review 48 Bit Hexadecimal Number Creates Unique

More information

Evaluating 1588v2 Performance

Evaluating 1588v2 Performance Evaluating 1588v2 Performance Rev 2 How to evaluate the performance of both 1588v2 Boundary clocks (BCs) and 1588v2 Transparent clocks (TCs) based on solutions from Calnex and Xena Networks. APPLICATION

More information

Best Practices for IEEE 1588/ PTP Network Deployment

Best Practices for IEEE 1588/ PTP Network Deployment YOUR NETWORK. OPTIMIZED. Best Practices for IEEE 1588/ PTP Deployment WHITE PAPER IEEE 1588-2008 means that precise timing and synchronization over is now a reality but the solution is only as good as

More information

COMPUTER NETWORK SECURITY

COMPUTER NETWORK SECURITY COMPUTER NETWORK SECURITY Prof. Dr. Hasan Hüseyin BALIK (1 st Week) Outline Course Information and Policies Course Syllabus 1. Overview Course Information Instructor: Prof. Dr. Hasan H. BALIK, balik@yildiz.edu.tr,

More information

Technical Brief Implementing IEEE 1588v2 for use in the mobile backhaul

Technical Brief Implementing IEEE 1588v2 for use in the mobile backhaul Technical Brief Implementing IEEE 1588v2 for use in the mobile backhaul For most, the migration to an all-ethernet or all-ip network will be a gradual process as network operators endeavour to maximise

More information

CIS 6930/4930 Computer and Network Security. Topic 6.2 Authentication Protocols

CIS 6930/4930 Computer and Network Security. Topic 6.2 Authentication Protocols CIS 6930/4930 Computer and Network Security Topic 6.2 Authentication Protocols 1 Authentication Handshakes Secure communication almost always includes an initial authentication handshake. Authenticate

More information

Improving Mobile Backhaul Network Reliability with Carrier-Class IEEE 1588 (PTP) WHITE PAPER

Improving Mobile Backhaul Network Reliability with Carrier-Class IEEE 1588 (PTP) WHITE PAPER Improving Mobile Backhaul Network Reliability with Carrier-Class IEEE 1588 (PTP) WHITE PAPER Improving Mobile Backhaul Network Reliability with Carrier-Class IEEE 1588 (PTP) Grandmaster Hardware Redundancy

More information

User Authentication Protocols Week 7

User Authentication Protocols Week 7 User Authentication Protocols Week 7 CEN-5079: 2.October.2017 1 Announcement Homework 1 is posted on the class webpage Due in 2 weeks 10 points (out of 100) subtracted each late day CEN-5079: 2.October.2017

More information

Chapter 7 Internet Protocol Version 4 (IPv4) Kyung Hee University

Chapter 7 Internet Protocol Version 4 (IPv4) Kyung Hee University Chapter 7 Internet Protocol Version 4 (IPv4) 1 7.1 Introduction The transmission mechanism used by the TCP/IP Unreliable and connectionless datagram protocol Best-effort delivery service IP packets can

More information

AUTHENTICATION SCHEME FOR DISTRIBUTED, UBIQUITOUS, REAL-TIME PROTOCOLS 1,2 David L. Mills University of Delaware Newark, DE 19716

AUTHENTICATION SCHEME FOR DISTRIBUTED, UBIQUITOUS, REAL-TIME PROTOCOLS 1,2 David L. Mills University of Delaware Newark, DE 19716 AUTHENTICATION SCHEME FOR DISTRIBUTED, UBIQUITOUS, REAL-TIME PROTOCOLS 1,2 David L. Mills University of Delaware Newark, DE 19716 ABSTRACT Cryptographic authentication methodology proposed for use in the

More information

Overview of Information Security

Overview of Information Security Overview of Information Security Lecture By Dr Richard Boateng, UGBS, Ghana Email: richard@pearlrichards.org Original Slides by Elisa Bertino CERIAS and CS &ECE Departments, Pag. 1 and UGBS Outline Information

More information

Configuring Clocking and Timing

Configuring Clocking and Timing CHAPTER 5 Clock synchronization is important for a variety of applications, including synchronization of radio cell towers. While legacy TDM protocols incorporate timing features, packet-switched networks

More information

VoIP Security Threat Analysis

VoIP Security Threat Analysis 2005/8/2 VoIP Security Threat Analysis Saverio Niccolini, Jürgen Quittek, Marcus Brunner, Martin Stiemerling (NEC, Network Laboratories, Heidelberg) Introduction Security attacks taxonomy Denial of Service

More information

The Revolution Evolution of the IEEE 1588 Standard

The Revolution Evolution of the IEEE 1588 Standard Accurate time. Worldwide. The Revolution Evolution of the IEEE 1588 Standard Doug Arnold Meinberg USA Agenda Backward compatibility New Optional features Modular transparent clock Profile Isolation Interdomain

More information

Time synchronization via IEE 1588

Time synchronization via IEE 1588 Time synchronization via IEE 1588 www.siemens.com/siprotec5 APN-028, Edition 2 Content 1... 3 1.1 Introduction... 3 1.2 Example of Set-Up... 3 1.3 Verification of the configuration... 11 1.4 Summary...

More information