security architecture for the internet protocol(ipsec)

12
INTERNET PROTOCOL SECURITY BY- SWAPNIL B. PATIL

Upload: swapnil-patil

Post on 29-Nov-2014

275 views

Category:

Technology


1 download

DESCRIPTION

INTERNET PROTOCOL SECURITY ISSUES AND ATTACKS

TRANSCRIPT

Page 1: Security architecture for the internet protocol(IPsec)

INTERNET PROTOCOL SECURITY

BY-

SWAPNIL B. PATIL

Page 2: Security architecture for the internet protocol(IPsec)

INTRODUCTION

Internet Protocol Security (IPsec) is a protocol suite for securing internet protocol communications by authentication and encryption each IP packet of a communication session. IPsec includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic key to be used during the session. IPsec can be used in protecting data flows between a pair of hosts (host-to-host), between a pair of security gateways (network-to-network), or between a security gateway and a host (network-to-host)

Page 3: Security architecture for the internet protocol(IPsec)

OBJECTIVE IPsec is designed to provide interoperable, high quality,

cryptographically-based security for IPv4 and IPv6. The set of security services offered includes access

control, connectionless layer protocols, integrity, data origin authentication, protection against replays, confidentiality and limited traffic flow confidentiality.

These objectives are met through the use of two traffic security protocols, the Authentication Header (AH) and the Encapsulating Security Payload (ESP), and through the use of cryptographic key management procedures and protocols.

Page 4: Security architecture for the internet protocol(IPsec)

ABSTRACTThe goal of this architecture is to provide various security services

for traffic at the IP layer, in both the IPv4 and IPv6 Environments. IPSec security properties are critically depend on the underlying

key exchange protocols, known as IKE (Internet Key Exchange).The IP security protocols (IPsec) may be used via security

gateways that apply cryptographic operations to provide security services to datagrams, and this mode of use is supported by an increasing number of commercial products. Goal that IPsec is capable of achieving, and we provide criteria that entail that a network with particular IPsec processing achieves its security goals.

Page 5: Security architecture for the internet protocol(IPsec)

SECURITY AT DIFFERENT LAYERS

Link layer: WEP / 802.11iApplication layer: PGPTransport layer: SSLNetwork layer: IPsec

Page 6: Security architecture for the internet protocol(IPsec)

IP SECURITY IP datagrams have no inherent security

IP source address can be spoofed Content of IP datagrams can be sniffed, modified and replayed.

IPSec is a method for protecting IP datagrams Standardized by IETF: dozens of RFCs. Only sender and receiver have to be IPsec compliant Rest of network can be regular IP

Page 7: Security architecture for the internet protocol(IPsec)

IPSEC ARCHITECTURE

Page 8: Security architecture for the internet protocol(IPsec)

PROS AND CONS OF IPSEC

PROS

Transparency to applications

Diffie-Hellman groups

Authentication method

Firewall packet filtering

CONS

IPSec Remote-Access Approach

No Portable Transmission

Page 9: Security architecture for the internet protocol(IPsec)

SECURITY ISSUES WITH IP

Eavesdropping

Data modification

Identity spoofing (IP address spoofing)

Denial-of-service attack

Man-in-the-middle attack

Sniffer attack

Page 10: Security architecture for the internet protocol(IPsec)

PROTECTION AGAINST ATTACKS ESP

Checksum

Mutual Verification 

Mutual Authentication

Filtering Methodology

Page 12: Security architecture for the internet protocol(IPsec)

THANK YOU