computer security prevention and detection of unauthorized actions by users of a computer system...

41
Computer Security Prevention and detection of unauthorized actions by users of a computer system • Confidentiality • Integrity • Availability

Post on 21-Dec-2015

225 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Computer Security

Prevention and detection of unauthorized actions by users of a computer system

• Confidentiality• Integrity• Availability

Page 2: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Access Control

• Limiting and controlling access to a shared resource

• Two approaches – 1) define what different subjects are allowed to do and 2) define what can be done to different objects

• Access permissions – Unix has read, write, and execute; Windows NT has read, write, execute, delete, change permission, and change ownership

Page 3: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Software Reliability

• How buggy software provides security vulnerability

• Why these problems are so common

Page 4: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

The Ubiquity of Faulty Code

• Estimates from SEI are 5-15 errors/1000 LOC

• WIN2000 has 35-60 million LOC• Capers Jones study of errors in

COBOL programs• Problem of getting people to install

bug fixes

Page 5: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Risk

• What is risk?– Magnitude of loss– Likelihood of loss– Exposure to loss

• How well do people understand probability?

Page 6: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Vulnerabilities

Five steps to an attack1) Identify the specific target to be attacked and

gather information about the target2) Analyze the information and identify a

vulnerability in the target that will accomplish the attack objectives

3) Gain the appropriate level of access to the target4) Perform the attack on the target5) Complete the attack, which may include erasing

evidence of the attack, and avoid retaliation

Page 7: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

The Vulnerability Landscape

• Physical• Virtual• Trust Model• System Life Cycle

Page 8: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Countermeasures

• Protection• Detection• Reaction

Page 9: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Threat Modeling

• What are the threats?• How would a hacker think about

attacking this system?

Page 10: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Use of Threat Modeling

• Risk Assessment• Security Design

1) Understand the real threats to the system and assess the risk of these threats

2) Describe the security policy necessary to defend against the threats

3) Describe the countermeasures that enforce the policy

Page 11: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Security Policies

• Good policies are appropriate for real threats

• Security policies should be written• Security policies should specify

security measures and who is responsible for their implementation, enforcement, audit, and review

Page 12: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Network

The Internet

Browser

Packet

Router

PacketRouter

Packet

Route

WebserverSoftware

Router

The globalInternet has

thousands of networks

Page 13: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Frames and Packets

ServerSwitch

Switch

RouterA

Router B

Client PC

Packet

Packet

Frame 1Carrying Packet

in Network 1

Frame 2Carrying Packet

in Network 2Frame 3Carrying Packet

in Network 3

Page 14: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Frames and Packets• Like passing a shipment (the packet) from

a truck (frame) to an airplane (frame) at an airport.

Truck

SameShipment

Airplane

Airport AirportTruck

Shipper Receiver

Page 15: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Network Layered Architecture

TCP/IP

Application

Transport

Internet

OSI

Subnet Access: UseOSI Standards Here

Hybrid TCP/IP-OSI

Application

Presentation

Session

Application

Transport Transport

Network Internet

Data Link Data Link

Physical Physical

Page 16: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Physical and Data Link Layers

• Physical (Layer 1): defines electrical signaling and media between adjacent devices

• Data link (Layer 2): control of a frame through a single network, across multiple switches

SwitchedNetwork 1

Data Link

Physical Link Frame

Page 17: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Internet Layer• Governs the transmission of a packet

across an entire internet. Path of the packet is its route

SwitchedNetwork 1

SwitchedNetwork 2

Switched Network 3 RouterRoute

Packet

Page 18: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Internet and Transport Layers

Transport LayerEnd-to-End (Host-to-Host)

Client PC ServerInternet Layer(Usually IP)

Hop-by-Hop (Host-Router or Router-Router)

Router 1 Router 2 Router 3

Page 19: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Hierarchical IP AddressNetwork Part (not always 16 bits)

Subnet Part (not always 8 bits)

Host Part (not always 8 bits)

Total always is 32 bits.

128.171.17.13

Host 13128.171.17.13

CBASubnet (17)

UH Network (128.171)The Internet

Page 20: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Domain Name Service

• Domain names and physical addresses

• The DNS is a database that shows domain names and physical addresses

Page 21: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

IP Address Spoofing

Trusted Server60.168.4.6

Victim Server60.168.47.47

1. Trust Relationship

2. Attack Packet

Spoofed Source IP Address60.168.4.6

Attacker’s Identity is Not Revealed

Attacker’s Client PC1.34.150.37

3. Server Accepts Attack Packet

Page 22: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Internet Protocol (IP)

• IP Addresses and Security

– IP address spoofing: Sending a message with a false IP address

– Gives sender anonymity so that attacker cannot be identified

– Can exploit trust between hosts if spoofed IP address is that of a host the victim host trusts

Page 23: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Transmission Control Protocol (TCP)

• TCP Messages are TCP Segments– Flags field has several one-bit flags:

ACK, SYN, FIN, RST, etc.

Window Size(16 bits)

Flag Fields(6 bits)

Reserved(6 bits)

HeaderLength(4 bits)

Page 24: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Communication During a TCP Session

PCTransport Process

WebserverTransport Process

1. SYN (Open)

2. SYN, ACK (1) (Acknowledgement of 1)

3. ACK (2)

Open(3)

3-Way Open

Page 25: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Communication During a TCP Session

PCTransport Process

WebserverTransport Process

Close(4)

13. FIN (Close)

14. ACK (13)

15. FIN

16. ACK (15)

Note: An ACK may be combined with the next message if the next messageis sent quickly enough

Normal Four-Way Close

Page 26: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Targeted System Penetration

• Unobtrusive Information Collection– Whois database Information about

responsible person

• Information about IP addresses of DNS servers, to find firm’s IP address block

Page 27: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Targeted System Penetration

• IP Address Spoofing Put false IP addresses in outgoing attack packets

• Attacker is blind to replies

– Use series of attack platforms

Page 28: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Using a Chain of Attack Hosts

Attacker1.4.5.6 Victim

60.77.8.32

CompromisedHost

123.67.8.23

CompromisedHost

123.67.33.4

Attack

Replies

Allows Reading of RepliesWithout Exposing Attacker

Page 29: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Using a Chain of Attack Hosts

Subsequent Trace Back

Successful

ConnectionBroken

ConnectionBroken

CompromisedHost

123.67.8.23

CompromisedHost

123.67.33.4

Attacker1.4.5.6

Victim60.77.8.32

Page 30: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Denial-of-Service (DoS) Attacks

• Flooding Denial-of-Service Attacks– SYN flooding

• Try to open many connections with SYN segments

• Victim must prepare to work with many connections

• Victim crashes if runs out of resources; at least slows down

• More expensive for the victim than the attacker

Page 31: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

SYN Flooding DoS Attack

SYN SYN SYN SYN SYN

Attacker 1.34.150.37

Victim 60.168.47.47

Attacker Sends Flood of SYN Segments Victim Sets Aside Resources for Each Victim Crashes or Victim Becomes Too

Overloaded to Respond to the SYNs from Legitimate Uses

Page 32: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Distributed Denial-of-Service (DDoS)

Attacker 1.34.150.37

Attack Command

Handler Attack Command

Zombie

Attack Packet

Victim 60.168.47.47Attack Packet

Attack Packet

Zombie

ZombieHandler

Attack Command

Attack Command

Attack Command

Page 33: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Types of Firewall Inspection

• Packet Inspection

– Examines IP, TCP,UDP, and ICMP header contents

– Static packet filtering looks at individual packets in isolation. Misses many attacks

– Stateful inspection inspects packets in the context of the packet’s role in an ongoing or incipient conversation

• Stateful inspection is the preferred packet inspection method today

Page 34: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Types of Firewall Inspection

• Denial-of-Service Inspection

– Recognizes incipient DoS attacks and takes steps to stop them

– Limited to a few common types of attacks

Page 35: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Drivers of Performance Requirements: Traffic Volume and

Complexity of Filtering

PerformanceRequirements

Traffic Volume (Packets per Second)

Complexityof Filtering:Number of

FilteringRules,

ComplexityOf rules, etc.

Page 36: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Stateful Inspection Firewalls

• State of Connection: Open or Closed

– State: Order of packet within a dialog

– Often simply whether the packet is part of an open connection

Page 37: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Stateful Inspection Firewalls

• Static Packet Filter Firewalls are Stateless

– Filter one packet at a time, in isolation

– If a TCP SYN/ACK segment is sent, cannot tell if there was a previous SYN to open a connection

– But stateful firewalls can

Page 38: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

DMZ

• Demilitarized Zone - Space between two firewalls

• For Servers That Must be Accessed From the Outside

Page 39: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Configuring, Testing, and Maintaining Firewalls

• Must test Firewalls with Security Audits

– Only way to tell if policies are being supported

– Must be driven by policies

• Maintaining Firewalls

– New threats appear constantly

– ACLs must be updated constantly if firewall is to be effective

Page 40: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Hardening Host Computers

• The Problem– Computers installed out of the box

have known vulnerabilities• Not just Windows computers

– Hackers can take them over easily

– They must be hardened—a complex process that involves many actions

Page 41: Computer Security Prevention and detection of unauthorized actions by users of a computer system Confidentiality Integrity Availability

Hardening Host Computers

• Elements of Hardening– Physical security– Secure installation and configuration– Fix known vulnerabilities– Turn off unnecessary services– Harden all remaining applications