network security s642 computer security adam everspaugh

Similar documents
Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

Packet Header Formats

Hands-On Ethical Hacking and Network Defense

Single Network: applications, client and server hosts, switches, access links, trunk links, frames, path. Review of TCP/IP Internetworking

TCP /IP Fundamentals Mr. Cantu

Link layer security. CS642: Computer Security. Professor Ristenpart h9p:// rist at cs dot wisc dot edu

Introduction to TCP/IP networking

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

network security cs642 computer security adam everspaugh

Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS

Dan Boneh, John Mitchell, Dawn Song. Denial of Service

Transport Layer. Gursharan Singh Tatla. Upendra Sharma. 1

Introduction to Network. Topics

Lecture 6. Internet Security: How the Internet works and some basic vulnerabilities. Thursday 19/11/2015

ELEC5616 COMPUTER & NETWORK SECURITY

TSIN02 - Internetworking

NETWORK PROGRAMMING. Instructor: Junaid Tariq, Lecturer, Department of Computer Science

Configuring attack detection and prevention 1

Link layer security. CS642: Computer Security. Professor Ristenpart h9p:// rist at cs dot wisc dot edu

Introduction to Internet. Ass. Prof. J.Y. Tigli University of Nice Sophia Antipolis

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

Networking Technologies and Applications

ECE 650 Systems Programming & Engineering. Spring 2018

OSI Transport Layer. objectives

surveillance & anonymity cs642 computer security adam everspaugh

Network Security. Thierry Sans

ch02 True/False Indicate whether the statement is true or false.

Internet Protocol and Transmission Control Protocol

Transport Layer. <protocol, local-addr,local-port,foreign-addr,foreign-port> ϒ Client uses ephemeral ports /10 Joseph Cordina 2005

Computer and Network Security

Interconnecting Networks with TCP/IP

TSIN02 - Internetworking

CHAPTER-2 IP CONCEPTS

TSIN02 - Internetworking

Sirindhorn International Institute of Technology Thammasat University

Review of Important Networking Concepts

TSIN02 - Internetworking

CSCI-GA Operating Systems. Networking. Hubertus Franke

ECE4110 Internetwork Programming. Introduction and Overview

Configuring attack detection and prevention 1

CCNA R&S: Introduction to Networks. Chapter 7: The Transport Layer

TCP : Fundamentals of Computer Networks Bill Nace

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)

Internet. Organization Addresses TCP/IP Protocol stack Forwarding. 1. Use of a globally unique address space based on Internet Addresses

TCP TCP/IP: TCP. TCP segment. TCP segment. TCP encapsulation. TCP encapsulation 1/25/2012. Network Security Lecture 6

Transport: How Applications Communicate

ARP, IP, TCP, UDP. CS 166: Introduction to Computer Systems Security 4/7/18 ARP, IP, TCP, UDP 1

QUIZ: Longest Matching Prefix

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

DDoS Testing with XM-2G. Step by Step Guide

CSE 565 Computer Security Fall 2018

CIT 380: Securing Computer Systems. Network Security Concepts

Module : ServerIron ADX Packet Capture

20-CS Cyber Defense Overview Fall, Network Basics

Applied Networks & Security

ICS 351: Networking Protocols

User Datagram Protocol

EE 610 Part 2: Encapsulation and network utilities

6. The Transport Layer and protocols

TCP/IP Transport Layer Protocols, TCP and UDP

CCNA Exploration Network Fundamentals. Chapter 04 OSI Transport Layer

Network Security. Introduction to networks. Radboud University, The Netherlands. Autumn 2015

Software Engineering 4C03 Answer Key

Assignment - 1 Chap. 1 Wired LAN s

Internet Infrastructure

Denial of Service. EJ Jung 11/08/10

ENEE 457: Computer Systems Security 11/07/16. Lecture 18 Computer Networking Basics

CSc 466/566. Computer Security. 18 : Network Security Introduction

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1

Business Data Networks and Security 10th Edition by Panko Test Bank

Computer and Network Security

Table of Contents. 1 Intrusion Detection Statistics 1-1 Overview 1-1 Displaying Intrusion Detection Statistics 1-1

The Transport Layer. Internet solutions. Nixu Oy PL 21. (Mäkelänkatu 91) Helsinki, Finland. tel fax.

Transport layer. UDP: User Datagram Protocol [RFC 768] Review principles: Instantiation in the Internet UDP TCP

Transport layer. Review principles: Instantiation in the Internet UDP TCP. Reliable data transfer Flow control Congestion control

Unit 2.

ECE 358 Project 3 Encapsulation and Network Utilities

Computer Networks (Introduction to TCP/IP Protocols)

The Transport Layer: TCP & Reliable Data Transfer

The Transport Layer. Part 1

Network Technology 1 5th - Transport Protocol. Mario Lombardo -

ECE 435 Network Engineering Lecture 15

Cloudflare Advanced DDoS Protection

EE 122: Transport Protocols. Kevin Lai October 16, 2002

Lesson 5 TCP/IP suite, TCP and UDP Protocols. Chapter-4 L05: "Internet of Things ", Raj Kamal, Publs.: McGraw-Hill Education

INF5290 Ethical Hacking. Lecture 3: Network reconnaissance, port scanning. Universitetet i Oslo Laszlo Erdödi

Denial of Service and Distributed Denial of Service Attacks

CIS 551 / TCOM 401 Computer and Network Security

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8

CS 3640: Introduction to Networks and Their Applications

Lab - Using Wireshark to Examine TCP and UDP Captures

Chapter 5 End-to-End Protocols

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Threat Pragmatics. Target 6/19/ June 2018 PacNOG 22, Honiara, Solomon Islands Supported by:

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16

ECE 435 Network Engineering Lecture 9

9. Security. Safeguard Engine. Safeguard Engine Settings

Computer Security. 11. Network Security. Paul Krzyzanowski. Rutgers University. Spring 2018

CSC 574 Computer and Network Security. TCP/IP Security

Configuring Flood Protection

Transcription:

network security s642 adam everspaugh ace@cs.wisc.edu computer security

today Announcement: HW3 to be released WiFi IP, TCP DoS, DDoS, prevention

802.11 (wifi) STA = station AP = access point BSS = basic service set DS = distribution service ESS = extended service set SSID (service set identifier) identifies the 802.11 network http://technet.microsoft.com/en-us/library/cc757419(ws.10).aspx Typical WiFi modes: Unsecured Wireless Protected Access (WPA2) - password authenticated, encrypted

802.11 association AP 802.11 association AP Probe request SSID: linksys, BSSID: MAC1 Auth request MAC1 Auth response Associate request MAC1 Associate response

802.11 association AP1 AP2 Choose one of MAC1, MAC2 Two APs for same network Probe request SSID: linksys, BSSID: MAC1 SSID: linksys, BSSID: MAC2 Auth request MAC2 MAC1 MAC2

802.11 evil twins Basic idea: - Attacker pretends to be an AP to intercept traffic or collect data AP1 Evil twin Choose one of MAC1, MAC2 Basic attack: rogue AP Probe request SSID: linksys, BSSID: MAC1 SSID: linksys, BSSID: MAC2 Auth request MAC2 MAC1 MAC2 What if client choose MAC1? Attacker may try to send a forged reset message and force re-connect

Parrot ARdrone Drone is a WiFi access point Uses unsecured 802.11 connection (WiFi) Controlled from ipad or iphone with an app Uses MAC address for security

Internet protocol stack user data Application TCP IP Appl hdr user data Ethernet TCP hdr Appl hdr user data TCP segment IP hdr TCP hdr Appl hdr user data IP datagram ENet hdr IP hdr TCP hdr Appl hdr user data ENet tlr Ethernet frame 14 20 20 46 to 1500 bytes

IP protocol (IPv4) Connectionless no state Unreliable no guarantees ICMP (Internet Control Message Protocol) often used by tools such as ping, traceroute

IPv4 ENet hdr IP hdr data ENet tlr Ethernet frame containing IP datagram 4-bit version 4-bit hdr len 8-bit time to live (TTL) 16-bit identification 8-bit type of service 8-bit protocol 3-bit flags 32-bit source IP address 32-bit destination IP address options (optional) 16-bit total length (in bytes) 13-bit fragmentation offset 16-bit header checksum

Security issues with IP 5.6.7.8 ISP1 ISP2 1.2.3.4 backbone Routing has issues, we ll get to that later What else? - No source address authentication in general

Denial of Service (DoS) attacks 5.6.7.8 ISP1 Backbone ISP2 1.2.3.4 Goal is to prevent legitimate users from accessing victim (1.2.3.4) ICMP ping flood - Attacker sends ICMP pings as fast as possible to victim - When will this work as a DoS? think-pair-share Attacker resources > victim s - How can this be prevented? Ingress filtering near victim

Denial of Service (DoS) attacks 5.6.7.8 ISP1 Backbone ISP2 1.2.3.4 ISP3 How can attacker avoid ingress filtering? 8.7.3.4 Attacker can send packet with fake source IP (packet spoofing) Packet will get routed correctly Replies will not Send IP packet with source: 8.7.3.4 from 5.6.7.8 dest: 1.2.3.4 Filter based on source may be incorrect

DoS reflection attacks echo request 5.6.7.8 ISP1 Backbone ISP2 1.2.3.4 ISP3 echo reply 8.7.3.4 Note: echo request, DEST IP=8.7.3.4, SRC IP=1.2.3.4 - Attacker can bounce an attack against 1.2.3.4 off 8.7.3.4 - Avoid source filtering

Denial of Service (DoS) attacks 5.6.7.8 ISP1 Backbone ISP2 1.2.3.4 DoS works best when there is asymmetry between victim and attacker - Attacker uses few resources to cause victim to consume lots of resources

DoS Amplification Short DNS request 5.6.7.8 ISP1 Backbone ISP2 1.2.3.4 ISP3 DoS works best when there is asymmetry between victim and attacker Longer DNS reply 8.7.3.4 Example: DNS reflection attacks Send DNS request with spoofed source IP (~65 byte request) DNS replies sent to target (~512 byte response) Reflect + amplify the attack

Estonia attack Distributed DoS (DDoS) April 2007 Used army of bots Attacks continued for weeks with varying intensities Targeted government, banks, news, university web sites [ATLAS 2007] From analysis of 2 weeks of attack traffic 120+ distinct attacks 115 ICMP floods, 4 TCP SYN floods 12 attacks: 70-95 Mbps for 10+ hrs All attack traffic from outside Estonia Solution: Block all foreign traffic until attacks subsided

Internet protocol stack Application Transport Network Link HTTP, FTP, SMTP, SSH, etc. TCP, UDP IP, ICMP, IGMP 802x (802.11, Ethernet) Application Transport Network Link Network Link Application Transport Network Link

TCP (transport control protocol) Connection-oriented state initialized during handshake and maintained Goal: reliable, ordered, error-checked delivery of a stream of bytes generates segments timeout segments that aren t acknowledged reorders received segments when necessary

TCP (transport control protocol) IP hdr TCP hdr data 4-bit hdr len 16-bit source port number 16-bit destination port number 32-bit sequence number 32-bit acknowledgement number 6-bits 6-bits reserved flags 16-bit TCP checksum 16-bit window size 16-bit urgent pointer options (optional) data (optional)

TCP (transport control protocol) IP hdr TCP hdr data TCP flags URG ACK PSH RST SYN FIN urgent pointer valid acknowledgement number valid pass data to app ASAP reset connection synchronize sequence # s finished sending data

TCP handshake Client SYN seqc,0 SYN/ACK seqs,seqc+1 Server ACK seqc+1,seqs+1 TCP connection established SYN = syn flag set ACK = ack flag set x,y = x is sequence #, y is acknowledge #

TCP SYN floods 5.6.7.8 ISP1 Backbone ISP2 1.2.3.4 ISP3 Send lots of TCP SYN packets to 1.2.3.4, no ACK 1.2.3.4 maintains state for each SYN packet for some time window What asymmetry is being abused? What SRC IP does attacker use? If attackers sets SRC IP=8.7.3.4, what does 8.7.3.4 receive? 8.7.3.4

Preventing DDoS Lots of SYNs 1.2.3.4 Lots of SYN/ACKs Few ACKs Filtering servers Large number of front-end servers absorb traffic Forward legitimate-looking traffic to back-end servers Companies and web sites pay for this: CloudFlare, Arbor Networks, Akamai, and many others

recap WiFi Evil Twins DoS / ICMP Flood / DDoS / DNS reflection, amplification / TCP SYN Flooding / Preventing DDoS Exit slips / 1 thing you learned / 1 thing you didn't understand