tcp/ip vulnerabilities

32
TCP/IP Vulnerabilities

Upload: alyssa-duke

Post on 30-Dec-2015

107 views

Category:

Documents


0 download

DESCRIPTION

TCP/IP Vulnerabilities. Outline. Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS. Internet design goals. Interconnection Failure resilience Multiple types of service Variety of networks Management of resources Cost-effective Low entry-cost - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: TCP/IP Vulnerabilities

TCP/IP Vulnerabilities

Page 2: TCP/IP Vulnerabilities

OutlineSecurity Vulnerabilities

Denial of Service

Worms

Countermeasures: Firewalls/IDS

Page 3: TCP/IP Vulnerabilities

Internet design goals1. Interconnection

2. Failure resilience

3. Multiple types of service

4. Variety of networks

5. Management of resources

6. Cost-effective

7. Low entry-cost

8. Accountability for resources

Where is security issues?

Page 4: TCP/IP Vulnerabilities

Why did they leave it out?Designed for simple connectivity

Network designed with implicit trustNo “bad” guys

Security may be provided at the edgeEncryptionAuthentication

Page 5: TCP/IP Vulnerabilities

Security VulnerabilitiesUnfortunately at every layer in the

protocol stack!

Network-layer attacks IP-level vulnerabilities Routing attacks

Transport-layer attacks TCP vulnerabilities

Application-layer attacks

Page 6: TCP/IP Vulnerabilities

Where do the problems come from?

Protocol-level vulnerabilities Implicit trust assumptions in design

Implementation vulnerabilitiesBoth on routers and end-hosts

Incomplete specificationsOften left to the imagination of programmers

Page 7: TCP/IP Vulnerabilities

IP-level vulnerabilitiesIP addresses are provided by the source

Spoofing attacks

Use of IP address for authenticationRemote command (rsh, rlogin) allows remote login

without explicit password authentication

Some known exploited IPARP SpoofingFragmentation Traffic amplification

Page 8: TCP/IP Vulnerabilities

Routing attacksDivert traffic to malicious nodes

Black-hole attackEavesdropping

Routing attacksNo authenticationsAnnounce lower cost route in Distance-Vector

BGP vulnerabilitiesPrefix hijacking

Page 9: TCP/IP Vulnerabilities

TCP-level attacksSYN-Flooding

Flood with incomplete connection to hold service resources

Session hijackSequence number guessingPretend to be a trusted host

Session TerminationForge packet to close a legitimate connection

Page 10: TCP/IP Vulnerabilities

Application VulnerabilitiesApplication Protocol Attack

SPAM

Phishing

etc.

Page 11: TCP/IP Vulnerabilities

OutlineSecurity Vulnerabilities

Denial of Service

Worms

Countermeasures: Firewalls/IDS

Page 12: TCP/IP Vulnerabilities

Denial of ServiceMake a service unusable by overloading the

server or network

Disrupt service by taking down hostse.g., ping-of-death

Consume host-level resourcese.g., SYN-floods

Consume network resourcese.g., UDP/ICMP floods

Page 13: TCP/IP Vulnerabilities

OutlineSecurity Vulnerabilities

Denial of Service

Worms

Countermeasures: Firewalls/IDS

Page 14: TCP/IP Vulnerabilities

Worm OverviewSelf-propagate through network

Typical Steps in Worm Propagation Probe host for vulnerable software Exploit the vulnerability Launches copy of itself on compromised host

Very fast spreading with short windows to react

Page 15: TCP/IP Vulnerabilities

The Case of Code-Red 1212thth July 2001 : Code-Red Worm (CRv1) began July 2001 : Code-Red Worm (CRv1) began

1919thth July 2001 : Code-Red Worm (CRv2) began July 2001 : Code-Red Worm (CRv2) began 359,104 hosts were compromised in approximately 24 hours359,104 hosts were compromised in approximately 24 hours

The total number of inactive hosts over time The number of newly inactive hosts per minute

http://www.caida.org/analysis/security/code-red/coderedv2_analysis.xml

Worm growth: Slow-start, Exponential phase, Slow decay

Page 16: TCP/IP Vulnerabilities

Code Red Spreads (I)July 19, Midnight – 159 hosts infectedJuly 19, Midnight – 159 hosts infected

Page 17: TCP/IP Vulnerabilities

Code Red Spreads (II)July 19, 11:40 am – 4,920 hosts infectedJuly 19, 11:40 am – 4,920 hosts infected

Page 18: TCP/IP Vulnerabilities

Code Red Spreads (III)July 20, Midnight – 341,015 hosts infectedJuly 20, Midnight – 341,015 hosts infected

Page 19: TCP/IP Vulnerabilities

Animation of Code Red Spreads

Page 20: TCP/IP Vulnerabilities

Animation SQL Slammer Spreads

Page 21: TCP/IP Vulnerabilities

OutlineSecurity, Vulnerabilities

Denial of Service

Worms

Countermeasures: Firewalls/IDS

Page 22: TCP/IP Vulnerabilities

Firewall A Firewall is a system or group of systems used to control A Firewall is a system or group of systems used to control

access between two networks using pre-configured rules or access between two networks using pre-configured rules or filtersfilters

Page 23: TCP/IP Vulnerabilities

How to filter?What to filter based on?

Packet Header FieldsIP source and destination addressesApplication port numbersICMP message types/ Protocol options etc.

Packet contents (payloads)

Page 24: TCP/IP Vulnerabilities

Some examplesBlock all packets from outside except for SMTP

servers

Block all traffic to/from a list of domains

Ingress filteringDrop all packets from outside with addresses inside

the network

Egress filteringDrop all packets from inside with addresses outside

the network

Page 25: TCP/IP Vulnerabilities

Typical Firewall Configuration• Internal hosts can access DMZ

and Internet

• External hosts can access DMZ only, not Intranet

• DMZ hosts can access Internet only

• Advantages?

• If a service gets compromised in DMZ it cannot affect internal hosts

InternetInternet

IntranetIntranet

DMZDMZ

XX

Page 26: TCP/IP Vulnerabilities

Sample Firewall Rule

Dst Port

Alow

Allow

Yes

Any

> 1023

22

TCP22

TCP> 1023

ExtIntOutSSH-2

IntExtInSSH-1

Dst Addr

ProtoAck Set?

ActionSrc PortSrc Addr

DirRule

Allow SSH from external hosts to internal hostsTwo rules

Inbound and outboundHow to know a packet is for SSH?

Inbound: src-port>1023, dst-port=22Outbound: src-port=22, dst-port>1023Protocol=TCP

Ack Set?

SYN

SYN/ACK

ACK

Client Server

Page 27: TCP/IP Vulnerabilities

Intrusion Detection IDS is an automated system intended to detect IDS is an automated system intended to detect

computer intrusionscomputer intrusions

To identify, preferably in real-time, unauthorized To identify, preferably in real-time, unauthorized use, misuse, and abuse of computer systemuse, misuse, and abuse of computer system

Page 28: TCP/IP Vulnerabilities

Basic IDS Architecture

Detector

System

Countermeasure

Database

Configuration

Audits

Alarm

Action

Page 29: TCP/IP Vulnerabilities

Detection MethodMisuse DetectionMisuse Detection

Looking for the attempts to exploit known vulnerabilities or Looking for the attempts to exploit known vulnerabilities or attack patternsattack patterns

Typically low false alarmsTypically low false alarms Difficult to gather all attack signaturesDifficult to gather all attack signatures

Anomaly DetectionAnomaly Detection Observing a deviation of normal behavior of system or user to Observing a deviation of normal behavior of system or user to

detect intrusionsdetect intrusions Can detect a new or unseen vulnerabilities or attack patternsCan detect a new or unseen vulnerabilities or attack patterns Typically a lot of false alarmsTypically a lot of false alarms

Page 30: TCP/IP Vulnerabilities

Audit Source LocationHost/IDSHost/IDS HostHost HostHost

IDSIDS HostHost HostHost

Host based IDSHost based IDS

Network based IDSNetwork based IDS

Page 31: TCP/IP Vulnerabilities

Next Generation FirewallLayer 7 Content InspectionLayer 7 Content Inspection

Integration of Firewall/IDS Integration of Firewall/IDS

Page 32: TCP/IP Vulnerabilities

SummarySecurity vulnerabilities are real!

Protocol or implementation or bad specs Poor programming practices At all layers in protocol stack

DoS/DDoS Resource utilization

Worm Exponential spread Scanning strategies

Firewall/IDS Counter-measures to protect hosts Fail-open vs. Fail-close?