Review Session. Ennan Zhai

Similar documents
Differential Privacy

CPSC 426/526. Reputation Systems. Ennan Zhai. Computer Science Department Yale University

UseNet and Gossip Protocol

CPSC 426/526. P2P Lookup Service. Ennan Zhai. Computer Science Department Yale University

CPSC 426/526. P2P Lookup Service. Ennan Zhai. Computer Science Department Yale University

Cryptographic Systems

Software Defined Networking

Kurose & Ross, Chapters (5 th ed.)

Recommendation/Reputation. Ennan Zhai

IP Security IK2218/EP2120

ח'/סיון/תשע "א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms

Cryptographic Protocols 1

Lecture 7 - Applied Cryptography

IPSec. Overview. Overview. Levente Buttyán

Presented by Yung-Ting Chuang

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Junos Security. Chapter 8: IPsec VPNs Juniper Networks, Inc. All rights reserved. Worldwide Education Services

CSCE 715: Network Systems Security

Bitcoin, Security for Cloud & Big Data

L13. Reviews. Rocky K. C. Chang, April 10, 2015

Set Up a Remote Access Tunnel (Client to Gateway) for VPN Clients on RV016, RV042, RV042G and RV082 VPN Routers

Latest Peer-to-Peer Technologies II Artjom Lind 1

IP/ICMP Translation Algorithm (IIT) Xing Li, Congxiao Bao, Fred Baker

Internet security and privacy

Configuration of an IPSec VPN Server on RV130 and RV130W

CPSC 424/624 Exam 2 Solutions closed book, notes, computer Spring 2015 (Note: there are no questions that are just for 624 students)

For example, if a message is both a virus and spam, the message is categorized as a virus as virus is higher in precedence than spam.

CS 161 Computer Security

Password. authentication through passwords

Computer Networks. Wenzhong Li. Nanjing University

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Introduction to Network Security Missouri S&T University CPE 5420 Network Access Control

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

CS Computer Networks 1: Authentication

14. Internet Security (J. Kurose)

Sample excerpt. Virtual Private Networks. Contents

Computer Security and Privacy

Introduction. Trusted Intermediaries. CSC/ECE 574 Computer and Network Security. Outline. CSC/ECE 574 Computer and Network Security.

Chapter 11 The IPSec Security Architecture for the Internet Protocol

Authentication Handshakes

Test 2 Review. 1. (10 points) Timestamps and nonces are both used in security protocols to prevent replay attacks.

Network Security: Network Flooding. Seungwon Shin GSIS, KAIST

20-CS Cyber Defense Overview Fall, Network Basics

Unit 4: Firewalls (I)

Control Plane Security Overview

Chapter 8 Security. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

CSC 474/574 Information Systems Security

AccessEnforcer Version 4.0 Features List

Peer-to-Peer Systems. Internet Computing Workshop Tom Chothia

The IPSec Security Architecture for the Internet Protocol

Peer-to-Peer Internet Applications: A Review

Sirindhorn International Institute of Technology Thammasat University

Operating Systems Design Exam 3 Review: Spring 2011

Trusted Intermediaries

AIT 682: Network and Systems Security

VPNs and VPN Technologies

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Virtual Private Network

Routing Protocol Framework Information Model. Operation Model Routing Information Exchange

Using NAT in Overlapping Networks

CS 393 Network Security. Nasir Memon Polytechnic University Module 12 SSL

Expert Reference Series of White Papers. Securing Layer 2

On the Difficulty of Scalably Detecting Network Attacks

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma


Computer Communication Networks Network Security

SDN-based Network Obfuscation. Roland Meier PhD Student ETH Zürich

Data Server for PC5200 as Remote Terminal V1.00 9/22/05

Chaum, Untraceable Electronic Mail, Return Addresses, and Digital Pseudonym, Communications of the ACM, 24:2, Feb. 1981

Network Security. Thierry Sans

Welcome to PHOENIX CONTACT Routing

UDP NAT Traversal. CSCI-4220 Network Programming Spring 2015

VNS3 IPsec Configuration. VNS3 to Cisco ASA ASDM 9.2

Table of Contents 1 IKE 1-1

The IPsec protocols. Overview

Computer Science 461 Final Exam May 22, :30-3:30pm

Security in Embedded Systems

Virtual Private Networks

Secure Networking with NAT Traversal for Enhanced Mobility

CS 356 Internet Security Protocols. Fall 2013

co Configuring PIX to Router Dynamic to Static IPSec with

Carnegie Mellon Computer Science Department Spring 2005 Final

IS-2150/TEL-2810 Introduction to Computer Security Quiz 2 Thursday, Dec 14, 2006

Network Interconnection

IP Security. Cunsheng Ding HKUST, Kong Kong, China

This release of the product includes these new features that have been added since NGFW 5.5.

Cryptography (Overview)

Security Issues In Mobile IP

Agenda of today s lecture. Firewalls in General Hardware Firewalls Software Firewalls Building a Firewall

(2½ hours) Total Marks: 75

The case for IPv6-only data centres...and how to pull it off in today's IPv4-dominated world

IKE and Load Balancing

Configuring Logging for Access Lists

Operating Systems Design Exam 3 Review: Spring Paul Krzyzanowski

INSTRUCTIONS TO CANDIDATES

Network Security: Firewalls. Tuomas Aura T Network security Aalto University, Nov-Dec 2013

Cisco Exam Questions & Answers

Software Defined Networking Security: Security for SDN and Security with SDN. Seungwon Shin Texas A&M University

Transcription:

Review Session Ennan Zhai ennan.zhai@yale.edu

Today s Mission USENET & Gossip Firewall & NATs Cryptographic tools Reputation Unstructured search Structured search

Today s Mission USENET & Gossip Firewall & NATs Cryptographic tools Reputation Unstructured search Structured search

USENET & Gossip USENET format (RFC1036) Gossip protocol - Rumor-mongering; - Anti-entropy; - Security problem.

USENET & Gossip USENET format (RFC1036) Gossip protocol - Rumor-mongering; - Anti-entropy; - Security problem.

USENET & Gossip If Alice reads a message locally on her machine containing the above headers, what can you infer is the name of Alice s machine?

USENET & Gossip If Alice reads a message locally on her machine containing the above headers, what can you infer is the name of Alice s machine?

USENET & Gossip If Alice reads a message locally on her machine containing the above headers, what can you infer is the name of Alice s machine? cbosgd

USENET & Gossip Alice sends a private message to Jerry s USENET post, but Jerry did not receive it. After several days, Alice sees some new posts from Jerry with a Path: header line of cbosgd!mhuxj!ucbvax!eagle!jerry. What do you expect happened to Alice s original message to Jerry?

USENET & Gossip Alice sends a private message to Jerry s USENET post, but Jerry did not receive it. After several days, Alice sees some new posts from Jerry with a Path: header line of cbosgd!mhuxj!ucbvax!eagle!jerry. What do you expect happened to Alice s original message to Jerry?

USENET & Gossip Alice sends a private message to Jerry s USENET post, but Jerry did not receive it. After several days, Alice sees some new posts from Jerry with a Path: header line of cbosgd!mhuxj!ucbvax!eagle!jerry. What do you expect happened to Alice s original message to Jerry?

USENET & Gossip USENET format (RFC1036) Gossip protocol - Rumor-mongering; - Anti-entropy; - Security problem.

USENET & Gossip If you are operating a malicious peerster in our lab1 and you want to achieve an evil target, how you do that?

Today s Mission USENET & Gossip Firewall & NATs Cryptographic tools Reputation Unstructured search Structured search

Firewalls & NATs NATs: - IP address. Firewall: - How it works; - Defending against bad guys or good guys? - Design.

Firewalls & NATs NATs: - IP address. Firewall: - How it works; - Defending against bad guys or good guys? - Design.

Firewalls & NATs A B

Firewalls & NATs A B

Firewalls & NATs A B

Firewalls & NATs NATs: - IP address. Firewall: - How it works; - Defending against bad guys or good guys? - Design.

Firewalls & NATs 192.168.2.1 Internet 61.172.201.194 192.168.2.2 172.27.20.240 61.172.201.180 set ffilter src-ip [ip-address] dst-ip [ip-address] icmp-protocol set ffilter src-ip 61.172.201.194 dst-ip 172.27.20.240 icmp-protocol

Firewalls & NATs 192.168.2.1 Internet 61.172.201.194 192.168.2.2 172.27.20.240 61.172.201.180 set ffilter src-ip 192.168.2.2 dst-ip 61.172.201.194 icmp-protocol set ffilter src-ip 61.172.201.194 dst-ip 172.27.20.240 icmp-protocol

Firewalls & NATs 192.168.2.1 Internet 61.172.201.194 192.168.2.2 172.27.20.240 61.172.201.180 set ffilter src-ip 192.168.2.2 dst-ip 61.172.201.194 icmp-protocol set ffilter src-ip 61.172.201.194 dst-ip 192.168.2.2 icmp-protocol

Today s Mission USENET & Gossip Firewall & NATs Cryptographic tools Reputation Unstructured search Structured search

Cryptographic Tools Public/private key encryption/signature Diffle-Hellman key exchange Hash function

Cryptographic Tools Alice uploads a file foo.txt to the Internet and computes MD5 value for the file. After a few days, Alice downloads the file but finds the file is not the one she uploaded. Interestingly, the MD5 value is the same. What happened? How we can deal with this situation?

Today s Mission USENET & Gossip Firewall & NATs Cryptographic tools Reputation Unstructured search Structured search

Reputation Systems Peer-based reputation systems: Object-based reputation systems: - Computing the reputation scores - Potential attacks

Reputation Systems Voter1 Voter3 +1 +1 File1-1 Voter2

Reputation Systems similarity? Voter1 Voter3 +1 +1 File1-1 Voter2

Reputation Systems Voter1 Voter3 Reputation? +1 +1 File1-1 Voter2

Today s Mission USENET & Gossip Firewall & NATs Cryptographic tools Reputation Unstructured search Structured search

Unstructured Search Flooding Random walk More

Unstructured Search Running algorithm A. What s the traffic?

Today s Mission USENET & Gossip Firewall & NATs Cryptographic tools Reputation Unstructured search Structured search

Structured Search Chord - The algorithm; - Complexity. Attacks

Structured Search Three objects: 1, 2, and 6

Structured Search Three objects: 1, 2, and 6

Structured Search Three objects: 1, 2, and 6

Structured Search Three objects: 1, 2, and 6

Structured Search

Structured Search

Structured Search

Structured Search

Structured Search

Question 2 in Example

Question 2 in Example

Question 2 in Example

Question 2 in Example