SlideShare une entreprise Scribd logo
1  sur  148
Télécharger pour lire hors ligne
Security+ Guide to Network Security Fundamentals, Third
Edition
11
1 1 tohttps://github.com/syaifulahdan/
INFORMATION SECURITY
Access Control Fundamentals II
 Acces Control
 Who Goes There
 Something you Know
 Trouble With Passwords
 Why Password
 Key vs Password
 Good and Bad Passwords
 Password Experiment
 Attacks on Password
 Password Retry
 Password File
 Dictionary Attack
 Password File
 Password Cracking do the Math
 Password Cracking
 Other Password Issues
 Password
 Password Cracking Tools

 Biometrics
 Finger Print
 Hand Geometry
 Iris Patterns
 Iris Recongnition History
 Iris Scan
 Password Generator
 2 Factor Authentication
 Single Sign on
 Web Cookies
 Authorization
 Authentication vs Authorization
 Lampson Access Control Matrix
 Access Control List
 Capabilities
 Confused Deputy
 Multilevel Security (MLS)
 Multilateral Security (Compartements)
 Convert Channel
 Inference Control
 Captcha
 Firewalls
 Packet Filter
 Application Proxy
 Firewal
 Intrusion Detection System
 Signature Detection
 Anomaly Detection
Security+ Guide to Network Security Fundamentals, Third
Edition
22
2 2 tohttps://github.com/syaifulahdan/
Access Control
 Two parts to access control
 Authentication: Who goes there?
Determine whether access is allowed
Authenticate human to machine
Authenticate machine to machine
 Authorization: Are you allowed to do that?
Once you have access, what can you do?
Enforces limits on actions
Note: Access control often used as synonym for
authorization
Security+ Guide to Network Security Fundamentals, Third
Edition
33
3 3 tohttps://github.com/syaifulahdan/
Who Goes There?
 How to authenticate a human to a machine?
 Can be based on…
Something you know
For example, a password
Something you have
For example, a smartcard
Something you are
For example, your fingerprint
Security+ Guide to Network Security Fundamentals, Third
Edition
44
4 4 tohttps://github.com/syaifulahdan/
Something You Know
 Passwords
 Lots of things act as passwords!
PIN
Social security number
Mother’s maiden name
Date of birth
Name of your pet, etc.
Security+ Guide to Network Security Fundamentals, Third
Edition
55
5 5 tohttps://github.com/syaifulahdan/
Trouble with Passwords
 “Passwords are one of the biggest practical problems
facing security engineers today.”
 “Humans are incapable of securely storing high-quality
cryptographic keys, and they have unacceptable speed
and accuracy when performing cryptographic
operations. (They are also large, expensive to maintain,
difficult to manage, and they pollute the environment. It
is astonishing that these devices continue to be
manufactured and deployed.)”
Security+ Guide to Network Security Fundamentals, Third
Edition
66
6 6 tohttps://github.com/syaifulahdan/
Why Passwords?
Why is “something you know” more
popular than “something you have” and
“something you are”?
Cost: passwords are free
Convenience: easier for SA to reset
pwd than to issue user a new thumb
Security+ Guide to Network Security Fundamentals, Third
Edition
77
7 7 tohttps://github.com/syaifulahdan/
Keys vs Passwords
 Crypto keys
 Spse key is 64 bits
 Then 264 keys
 Choose key at random
 Then attacker must try
about 263 keys
 Passwords
 Spse passwords are 8
characters, and 256
different characters
 Then 2568 = 264 pwds
 Users do not select
passwords at random
 Attacker has far less than
263 pwds to try (dictionary
attack)
Security+ Guide to Network Security Fundamentals, Third
Edition
88
8 8 tohttps://github.com/syaifulahdan/
Good and Bad Passwords
 Bad passwords
frank
Fido
password
4444
Pikachu
102560
AustinStamp
 Good Passwords?
jfIej,43j-EmmL+y
09864376537263
P0kem0N
FSa7Yago
0nceuP0nAt1m8
PokeGCTall150
Security+ Guide to Network Security Fundamentals, Third
Edition
99
9 9 tohttps://github.com/syaifulahdan/
Password Experiment
 Three groups of users  each group
advised to select passwords as follows
 Group A: At least 6 chars, 1 non-letter
 Group B: Password based on passphrase
 Group C: 8 random characters
 Results
 Group A: About 30% of pwds easy to crack
 Group B: About 10% cracked
 Passwords easy to remember
 Group C: About 10% cracked
 Passwords hard to remember
winner 
Security+ Guide to Network Security Fundamentals, Third
Edition
1010
10 10 tohttps://github.com/syaifulahdan/
Password Experiment
 User compliance hard to achieve
 In each case, 1/3rd did not comply (and
about 1/3rd of those easy to crack!)
 Assigned passwords sometimes best
 If passwords not assigned, best advice is
Choose passwords based on passphrase
Use pwd cracking tool to test for weak pwds
Require periodic password changes?
Security+ Guide to Network Security Fundamentals, Third
Edition
1111
11 11 tohttps://github.com/syaifulahdan/
Attacks on Passwords
 Attacker could…
Target one particular account
Target any account on system
Target any account on any system
Attempt denial of service (DoS) attack
 Common attack path
Outsider  normal user  administrator
May only require one weak password!
Security+ Guide to Network Security Fundamentals, Third
Edition
1212
12 12 tohttps://github.com/syaifulahdan/
Password Retry
Suppose system locks after 3 bad
passwords. How long should it lock?
5 seconds
5 minutes
Until SA restores service
What are +’s and -’s of each?
Security+ Guide to Network Security Fundamentals, Third
Edition
1313
13 13 tohttps://github.com/syaifulahdan/
Password File
 Bad idea to store passwords in a file
 But need a way to verify passwords
 Cryptographic solution: hash the passwords
Store y = h(password)
Can verify entered password by hashing
If attacker obtains password file, he does not
obtain passwords
But attacker with password file can guess x and
check whether y = h(x)
If so, attacker has found password!
Security+ Guide to Network Security Fundamentals, Third
Edition
1414
14 14 tohttps://github.com/syaifulahdan/
Dictionary Attack
 Attacker pre-computes h(x) for all x in a
dictionary of common passwords
 Suppose attacker gets access to password
file containing hashed passwords
Attacker only needs to compare hashes to his pre-
computed dictionary
Same attack will work each time
 Can we prevent this attack? Or at least make
attacker’s job more difficult?
Security+ Guide to Network Security Fundamentals, Third
Edition
1515
15 15 tohttps://github.com/syaifulahdan/
Password File
 Store hashed passwords
 Better to hash with salt
 Given password, choose random s, compute
y = h(password, s)
and store the pair (s,y) in the password
file
 Note: The salt s is not secret
 Easy to verify password
 Attacker must recompute dictionary
hashes for each user  lots more work!
Security+ Guide to Network Security Fundamentals, Third
Edition
1616
16 16 tohttps://github.com/syaifulahdan/
Password Cracking:
Do the Math
 Assumptions
 Pwds are 8 chars, 128 choices per character
Then 1288 = 256 possible passwords
 There is a password file with 210 pwds
 Attacker has dictionary of 220 common pwds
 Probability of 1/4 that a pwd is in dictionary
 Work is measured by number of hashes
Security+ Guide to Network Security Fundamentals, Third
Edition
1717
17 17 tohttps://github.com/syaifulahdan/
Password Cracking
 Attack 1 password without dictionary
Must try 256/2 = 255 on average
Just like exhaustive key search
 Attack 1 password with dictionary
Expected work is about
1/4 (219) + 3/4 (255) = 254.6
But in practice, try all in dictionary and quit if
not found  work is at most 220 and probability
of success is 1/4
Security+ Guide to Network Security Fundamentals, Third
Edition
1818
18 18 tohttps://github.com/syaifulahdan/
Password Cracking
 Attack any of 1024 passwords in file
 Without dictionary
Assume all 210 passwords are distinct
Need 255 comparisons before expect to find
password
If no salt, each hash computation gives 210
comparisons  the expected work (number of
hashes) is 255/210 = 245
If salt is used, expected work is 255 since each
comparison requires a new hash computation
Security+ Guide to Network Security Fundamentals, Third
Edition
1919
19 19 tohttps://github.com/syaifulahdan/
Password Cracking
 Attack any of 1024 passwords in file
 With dictionary
Probability at least one password is in dictionary is
1 - (3/4)1024 = 1
We ignore case where no pwd is in dictionary
If no salt, work is about 219/210 = 29
If salt, expected work is less than 222
Note: If no salt, we can precompute all dictionary
hashes and amortize the work
Security+ Guide to Network Security Fundamentals, Third
Edition
2020
20 20 tohttps://github.com/syaifulahdan/
Other Password Issues
 Too many passwords to remember
Results in password reuse
Why is this a problem?
 Who suffers from bad password?
Login password vs ATM PIN
 Failure to change default passwords
 Social engineering
 Error logs may contain “almost” passwords
 Bugs, keystroke logging, spyware, etc.
Security+ Guide to Network Security Fundamentals, Third
Edition
2121
21 21 tohttps://github.com/syaifulahdan/
Passwords
 The bottom line
 Password cracking is too easy!
One weak password may break security
Users choose bad passwords
Social engineering attacks, etc.
 The bad guy has all of the advantages
 All of the math favors bad guys
 Passwords are a big security problem
Security+ Guide to Network Security Fundamentals, Third
Edition
2222
22 22 tohttps://github.com/syaifulahdan/
Password Cracking Tools
 Popular password cracking tools
Password Crackers
Password Portal
L0phtCrack and LC4 (Windows)
John the Ripper (Unix)
 Admins should use these tools to test for
weak passwords since attackers will!
 Good article on password cracking
Passwords - Conerstone of Computer Security
Security+ Guide to Network Security Fundamentals, Third
Edition
2323
23 23 tohttps://github.com/syaifulahdan/
Biometrics
Security+ Guide to Network Security Fundamentals, Third
Edition
2424
24 24 tohttps://github.com/syaifulahdan/
Something You Are
 Biometric
“You are your key”  Schneier
Are
Know Have
 Examples
Fingerprint
Handwritten signature
Facial recognition
Speech recognition
Gait (walking) recognition
“Digital doggie” (odor recognition)
Many more!
Security+ Guide to Network Security Fundamentals, Third
Edition
2525
25 25 tohttps://github.com/syaifulahdan/
Why Biometrics?
 Biometrics seen as desirable replacement for
passwords
 Cheap and reliable biometrics needed
 Today, a very active area of research
 Biometrics are used in security today
Thumbprint mouse
Palm print for secure entry
Fingerprint to unlock car door, etc.
 But biometrics not too popular
Has not lived up to its promise (yet)
Security+ Guide to Network Security Fundamentals, Third
Edition
2626
26 26 tohttps://github.com/syaifulahdan/
Ideal Biometric
 Universal  applies to (almost) everyone
In reality, no biometric applies to everyone
 Distinguishing  distinguish with certainty
In reality, cannot hope for 100% certainty
 Permanent  physical characteristic being
measured never changes
In reality, want it to remain valid for a long time
 Collectable  easy to collect required data
Depends on whether subjects are cooperative
 Safe, easy to use, etc., etc.
Security+ Guide to Network Security Fundamentals, Third
Edition
2727
27 27 tohttps://github.com/syaifulahdan/
Biometric Modes
 Identification  Who goes there?
Compare one to many
Example: The FBI fingerprint database
 Authentication  Is that really you?
Compare one to one
Example: Thumbprint mouse
 Identification problem more difficult
More “random” matches since more comparisons
 We are interested in authentication
Security+ Guide to Network Security Fundamentals, Third
Edition
2828
28 28 tohttps://github.com/syaifulahdan/
Enrollment vs Recognition
 Enrollment phase
Subject’s biometric info put into database
Must carefully measure the required info
OK if slow and repeated measurement needed
Must be very precise for good recognition
A weak point of many biometric schemes
 Recognition phase
Biometric detection when used in practice
Must be quick and simple
But must be reasonably accurate
Security+ Guide to Network Security Fundamentals, Third
Edition
2929
29 29 tohttps://github.com/syaifulahdan/
Cooperative Subjects
 We are assuming cooperative subjects
 In identification problem often have
uncooperative subjects
 For example, facial recognition
Proposed for use in Las Vegas casinos to detect
known cheaters
Also as way to detect terrorists in airports, etc.
Probably do not have ideal enrollment conditions
Subject will try to confuse recognition phase
 Cooperative subject makes it much easier!
In authentication, subjects are cooperative
Security+ Guide to Network Security Fundamentals, Third
Edition
3030
30 30 tohttps://github.com/syaifulahdan/
Biometric Errors
 Fraud rate versus insult rate
Fraud  user A mis-authenticated as user B
Insult  user A not authenticate as user A
 For any biometric, can decrease fraud or insult,
but other will increase
 For example
99% voiceprint match  low fraud, high insult
30% voiceprint match  high fraud, low insult
 Equal error rate: rate where fraud == insult
The best measure for comparing biometrics
Security+ Guide to Network Security Fundamentals, Third
Edition
3131
31 31 tohttps://github.com/syaifulahdan/
Finger Print
Security+ Guide to Network Security Fundamentals, Third
Edition
3232
32 32 tohttps://github.com/syaifulahdan/
Fingerprint History
 1823  Professor Johannes Evangelist
Purkinje discussed 9 fingerprint patterns
 1856  Sir William Hershel used fingerprint
(in India) on contracts
 1880  Dr. Henry Faulds article in Nature
about fingerprints for ID
 1883  Mark Twain’s Life on the Mississippi
a murderer ID’ed by fingerprint
Security+ Guide to Network Security Fundamentals, Third
Edition
3333
33 33 tohttps://github.com/syaifulahdan/
Fingerprint History
 1888  Sir Francis Galton (cousin of Darwin)
developed classification system
His system of “minutia” is still in use today
Also verified that fingerprints do not change
 Some countries require a number of points
(i.e., minutia) to match in criminal cases
In Britain, 15 points
In US, no fixed number of points required
Security+ Guide to Network Security Fundamentals, Third
Edition
3434
34 34 tohttps://github.com/syaifulahdan/
Fingerprint Comparison
Loop (double) Whorl Arch
 Examples of loops, whorls and arches
 Minutia extracted from these features
Security+ Guide to Network Security Fundamentals, Third
Edition
3535
35 35 tohttps://github.com/syaifulahdan/
Fingerprint Biometric
 Capture image of fingerprint
 Enhance image
 Identify minutia
Security+ Guide to Network Security Fundamentals, Third
Edition
3636
36 36 tohttps://github.com/syaifulahdan/
Fingerprint Biometric
 Extracted minutia are compared with user’s
minutia stored in a database
 Is it a statistical match?
Security+ Guide to Network Security Fundamentals, Third
Edition
3737
37 37 tohttps://github.com/syaifulahdan/
Hand Geometry
Security+ Guide to Network Security Fundamentals, Third
Edition
3838
38 38 tohttps://github.com/syaifulahdan/
Hand Geometry
 Popular form of biometric
 Measures shape of hand
Width of hand, fingers
Length of fingers, etc.
 Human hands not unique
 Hand geometry sufficient
for many situations
 Suitable for authentication
 Not useful for ID problem
Security+ Guide to Network Security Fundamentals, Third
Edition
3939
39 39 tohttps://github.com/syaifulahdan/
Hand Geometry
 Advantages
Quick
1 minute for enrollment
5 seconds for recognition
Hands symmetric (use other hand backwards)
 Disadvantages
Cannot use on very young or very old
Relatively high equal error rate
Security+ Guide to Network Security Fundamentals, Third
Edition
4040
40 40 tohttps://github.com/syaifulahdan/
Iris Patterns
Security+ Guide to Network Security Fundamentals, Third
Edition
4141
41 41 tohttps://github.com/syaifulahdan/
Iris Patterns
 Iris pattern development is “chaotic”
 Little or no genetic influence
 Different even for identical twins
 Pattern is stable through lifetime
Security+ Guide to Network Security Fundamentals, Third
Edition
4242
42 42 tohttps://github.com/syaifulahdan/
Iris Recognition: History
1936  suggested by Frank Burch
1980s  James Bond films
1986  first patent appeared
1994  John Daugman patented best
current approach
Patent owned by Iridian Technologies
Security+ Guide to Network Security Fundamentals, Third
Edition
4343
43 43 tohttps://github.com/syaifulahdan/
Iris Scan
 Scanner locates iris
 Take b/w photo
 Use polar coordinates…
 Find 2-D wavelet trans
 Get 256 byte iris code
Security+ Guide to Network Security Fundamentals, Third
Edition
4444
44 44 tohttps://github.com/syaifulahdan/
Measuring Iris Similarity
 Based on Hamming distance
 Define d(x,y) to be
# of non match bits/# of bits compared
d(0010,0101) = 3/4 and d(101111,101001) = 1/3
 Compute d(x,y) on 2048-bit iris code
Perfect match is d(x,y) = 0
For same iris, expected distance is 0.08
At random, expect distance of 0.50
Accept as match if distance less than 0.32
Security+ Guide to Network Security Fundamentals, Third
Edition
4545
45 45 tohttps://github.com/syaifulahdan/
Iris Scan Error Rate
distance
0.29 1 in 1.31010
0.30 1 in 1.5109
0.31 1 in 1.8108
0.32 1 in 2.6107
0.33 1 in 4.0106
0.34 1 in 6.9105
0.35 1 in 1.3105
distance Fraud rate
: equal error rate
Security+ Guide to Network Security Fundamentals, Third
Edition
4646
46 46 tohttps://github.com/syaifulahdan/
Attack on Iris Scan
Good photo of eye can be scanned
Attacker could use photo of eye
Afghan woman was authenticated by
iris scan of old photo
Story is here
To prevent photo attack, scanner could
use light to be sure it is a “live” iris
Security+ Guide to Network Security Fundamentals, Third
Edition
4747
47 47 tohttps://github.com/syaifulahdan/
Equal Error Rate Comparison
 Equal error rate (EER): fraud == insult rate
 Fingerprint biometric has EER of about 5%
 Hand geometry has EER of about 10-3
 In theory, iris scan has EER of about 10-6
But in practice, hard to achieve
Enrollment phase must be extremely accurate
 Most biometrics much worse than fingerprint!
 Biometrics useful for authentication…
 But ID biometrics are almost useless today
Security+ Guide to Network Security Fundamentals, Third
Edition
4848
48 48 tohttps://github.com/syaifulahdan/
Biometrics: The Bottom Line
 Biometrics are hard to forge
 But attacker could
Steal Alice’s thumb
Photocopy Bob’s fingerprint, eye, etc.
Subvert software, database, “trusted path”, …
 Also, how to revoke a “broken” biometric?
 Biometrics are not foolproof!
 Biometric use is limited today
 That should change in the future…
Security+ Guide to Network Security Fundamentals, Third
Edition
4949
49 49 tohttps://github.com/syaifulahdan/
Something You Have
Something in your possession
Examples include
Car key
Laptop computer
Or specific MAC address
Password generator
We’ll look at this next
ATM card, smartcard, etc.
Security+ Guide to Network Security Fundamentals, Third
Edition
5050
50 50 tohttps://github.com/syaifulahdan/
Password Generator
 Alice gets “challenge” R from Bob
 Alice enters R into password generator
 Alice sends “response” back to Bob
 Alice has pwd generator and knows PINs
Alice Bob
1. “I’m Alice”
2. R
5. F(R)
3. PIN, R
4. F(R)
Password
generator
Security+ Guide to Network Security Fundamentals, Third
Edition
5151
51 51 tohttps://github.com/syaifulahdan/
2-factor Authentication
 Requires 2 out of 3 of
1. Something you know
2. Something you have
3. Something you are
 Examples
 ATM: Card and PIN
 Credit card: Card and signature
 Password generator: Device and PIN
 Smartcard with password/PIN
Security+ Guide to Network Security Fundamentals, Third
Edition
5252
52 52 tohttps://github.com/syaifulahdan/
Single Sign-on
 A hassle to enter password(s) repeatedly
Users want to authenticate only once
“Credentials” stay with user wherever he goes
Subsequent authentication is transparent to user
 Single sign-on for the Internet?
Microsoft: Passport
Everybody else: Liberty Alliance
Security Assertion Markup Language (SAML)
Security+ Guide to Network Security Fundamentals, Third
Edition
5353
53 53 tohttps://github.com/syaifulahdan/
Web Cookies
 Cookie is provided by a Website and stored on
user’s machine
 Cookie indexes a database at Website
 Cookies maintain state across sessions
 Web uses a stateless protocol: HTTP
 Cookies also maintain state within a session
 Like a single sign-on for a website
Though a very weak form of authentication
 Cookies and privacy concerns
Security+ Guide to Network Security Fundamentals, Third
Edition
5454
54 54 tohttps://github.com/syaifulahdan/
Authorization
Security+ Guide to Network Security Fundamentals, Third
Edition
5555
55 55 tohttps://github.com/syaifulahdan/
Authentication vs Authorization
 Authentication  Who goes there?
Restrictions on who (or what) can access system
 Authorization  Are you allowed to do that?
Restrictions on actions of authenticated users
 Authorization is a form of access control
 Authorization enforced by
Access Control Lists
Capabilities
Security+ Guide to Network Security Fundamentals, Third
Edition
5656
56 56 tohttps://github.com/syaifulahdan/
Lampson’s Access Control Matrix
rx rx r --- ---
rx rx r rw rw
rwx rwx r rw rw
rx rx rw rw rw
OS
Accounting
program
Accounting
data
Insurance
data
Payroll
data
Bob
Alice
Sam
Accounting
program
 Subjects (users) index the rows
 Objects (resources) index the columns
Security+ Guide to Network Security Fundamentals, Third
Edition
5757
57 57 tohttps://github.com/syaifulahdan/
Are You Allowed to Do That?
 Access control matrix has all relevant info
 But how to manage a large access control (AC)
matrix?
 Could be 1000’s of users, 1000’s of resources
 Then AC matrix with 1,000,000’s of entries
 Need to check this matrix before access to any
resource is allowed
 Hopelessly inefficient
Security+ Guide to Network Security Fundamentals, Third
Edition
5858
58 58 tohttps://github.com/syaifulahdan/
Access Control Lists (ACLs)
 ACL: store access control matrix by column
 Example: ACL for insurance data is in blue
rx rx r --- ---
rx rx r rw rw
rwx rwx r rw rw
rx rx rw rw rw
OS
Accounting
program
Accounting
data
Insurance
data
Payroll
data
Bob
Alice
Sam
Accounting
program
Security+ Guide to Network Security Fundamentals, Third
Edition
5959
59 59 tohttps://github.com/syaifulahdan/
Capabilities (or C-Lists)
 Store access control matrix by row
 Example: Capability for Alice is in red
rx rx r --- ---
rx rx r rw rw
rwx rwx r rw rw
rx rx rw rw rw
OS
Accounting
program
Accounting
data
Insurance
data
Payroll
data
Bob
Alice
Sam
Accounting
program
Security+ Guide to Network Security Fundamentals, Third
Edition
6060
60 60 tohttps://github.com/syaifulahdan/
ACLs vs Capabilities
Access Control List Capability
 Note that arrows point in opposite directions!
 With ACLs, still need to associate users to filess
file1
file2
file3
file1
file2
file3
r
---
r
Alice
Bob
Fred
w
r
---
rw
r
r
Alice
Bob
Fred
r
w
rw
---
r
r
r
---
r
Security+ Guide to Network Security Fundamentals, Third
Edition
6161
61 61 tohttps://github.com/syaifulahdan/
Confused Deputy
 Two resources
Compiler and BILL
file (billing info)
 Compiler can write
file BILL
 Alice can invoke
compiler with a
debug filename
 Alice not allowed to
write to BILL
 Access control matrix
x ---
rx rw
Compiler BILL
Alice
Compiler
Security+ Guide to Network Security Fundamentals, Third
Edition
6262
62 62 tohttps://github.com/syaifulahdan/
ACL’s and Confused Deputy
 Compiler is deputy acting on behalf of Alice
 Compiler is confused
Alice is not allowed to write BILL
 Compiler has confused its rights with Alice’s
Alice BILL
Compiler
debug
filename BILL
BILL
Security+ Guide to Network Security Fundamentals, Third
Edition
6363
63 63 tohttps://github.com/syaifulahdan/
Confused Deputy
 Compiler acting for Alice is confused
 There has been a separation of authority from
the purpose for which it is used
 With ACLs, difficult to avoid this problem
 With Capabilities, easier to prevent problem
Must maintain association between authority and
intended purpose
Capabilities make it easy to delegate authority
Security+ Guide to Network Security Fundamentals, Third
Edition
6464
64 64 tohttps://github.com/syaifulahdan/
ACLs vs Capabilities
 ACLs
 Good when users manage their own files
 Protection is data-oriented
 Easy to change rights to a resource
 Capabilities
 Easy to delegate
 Easy to add/delete users
 Easier to avoid the confused deputy
 More difficult to implement
 The “Zen of information security”
 Capabilities loved by academics
 Capability Myths Demolished
Security+ Guide to Network Security Fundamentals, Third
Edition
6565
65 65 tohttps://github.com/syaifulahdan/
Multilevel Security (MLS)
Models
Security+ Guide to Network Security Fundamentals, Third
Edition
6666
66 66 tohttps://github.com/syaifulahdan/
Classifications and Clearances
Classifications apply to objects
Clearances apply to subjects
US Department of Defense uses 4
levels of classifications/clearances
TOP SECRET
SECRET
CONFIDENTIAL
UNCLASSIFIED
Security+ Guide to Network Security Fundamentals, Third
Edition
6767
67 67 tohttps://github.com/syaifulahdan/
Clearances and Classification
 To obtain a SECRET clearance requires a
routine background check
 A TOP SECRET clearance requires extensive
background check
 Practical classification problems
Proper classification not always clear
Level of granularity to apply classifications
Aggregation  flipside of granularity
Security+ Guide to Network Security Fundamentals, Third
Edition
6868
68 68 tohttps://github.com/syaifulahdan/
Subjects and Objects
Let O be an object, S a subject
 O has a classification
 S has a clearance
 Security level denoted L(O) and L(S)
For DoD levels, we have
TOP SECRET > SECRET > CONFIDENTIAL > UNCLASSIFIED
Security+ Guide to Network Security Fundamentals, Third
Edition
6969
69 69 tohttps://github.com/syaifulahdan/
Multilevel Security (MLS)
 MLS needed when subjects/objects at
different levels use same system
 MLS is a form of Access Control
 Military/government interest in MLS for many
decades
Lots of funded research into MLS
Strengths and weaknesses of MLS relatively well
understood (theoretical and practical)
Many possible uses of MLS outside military
Security+ Guide to Network Security Fundamentals, Third
Edition
7070
70 70 tohttps://github.com/syaifulahdan/
MLS Applications
 Classified government/military information
 Business example: info restricted to
Senior management only
All management
Everyone in company
General public
 Network firewall
Keep intruders at low level to limit damage
 Confidential medical info, databases, etc.
Security+ Guide to Network Security Fundamentals, Third
Edition
7171
71 71 tohttps://github.com/syaifulahdan/
MLS Security Models
 MLS models explain what needs to be done
 Models do not tell you how to implement
 Models are descriptive, not prescriptive
High level description, not an algorithm
 There are many MLS models
 We’ll discuss simplest MLS model
Other models are more realistic
Other models also more complex, more difficult to
enforce, harder to verify, etc.
Security+ Guide to Network Security Fundamentals, Third
Edition
7272
72 72 tohttps://github.com/syaifulahdan/
Bell-LaPadula
 BLP security model designed to express
essential requirements for MLS
 BLP deals with confidentiality
To prevent unauthorized reading
 Recall that O is an object, S a subject
Object O has a classification
Subject S has a clearance
Security level denoted L(O) and L(S)
Security+ Guide to Network Security Fundamentals, Third
Edition
7373
73 73 tohttps://github.com/syaifulahdan/
Bell-LaPadula
BLP consists of
Simple Security Condition: S can read O if
and only if L(O)  L(S)
*-Property (Star Property): S can write O if
and only if L(S)  L(O)
No read up, no write down
Security+ Guide to Network Security Fundamentals, Third
Edition
7474
74 74 tohttps://github.com/syaifulahdan/
McLean’s Criticisms of BLP
 McLean: BLP is “so trivial that it is hard to
imagine a realistic security model for which it
does not hold”
 McLean’s “system Z” allowed administrator to
reclassify object, then “write down”
 Is this fair?
 Violates spirit of BLP, but not expressly
forbidden in statement of BLP
 Raises fundamental questions about the nature
of (and limits of) modeling
Security+ Guide to Network Security Fundamentals, Third
Edition
7575
75 75 tohttps://github.com/syaifulahdan/
B and LP’s Response
 BLP enhanced with tranquility property
 Strong tranquility property: security labels never change
 Weak tranquility property: security label can only change if it
does not violate “established security policy”
 Strong tranquility impractical in real world
 Often want to enforce “least privilege”
 Give users lowest privilege needed for current work
 Then upgrade privilege as needed (and allowed by policy)
 This is known as the high water mark principle
 Weak tranquility allows for least privilege (high water
mark), but the property is vague
Security+ Guide to Network Security Fundamentals, Third
Edition
7676
76 76 tohttps://github.com/syaifulahdan/
BLP: The Bottom Line
 BLP is simple, but probably too simple
 BLP is one of the few security models that
can be used to prove things about systems
 BLP has inspired other security models
Most other models try to be more realistic
Other security models are more complex
Other models difficult to analyze and/or apply in
practice
Security+ Guide to Network Security Fundamentals, Third
Edition
7777
77 77 tohttps://github.com/syaifulahdan/
Biba’s Model
 BLP for confidentiality, Biba for integrity
Biba is to prevent unauthorized writing
 Biba is (in a sense) the dual of BLP
 Integrity model
Spse you trust the integrity of O but not O
If object O includes O and O then you cannot trust
the integrity of O
 Integrity level of O is minimum of the integrity
of any object in O
 Low water mark principle for integrity
Security+ Guide to Network Security Fundamentals, Third
Edition
7878
78 78 tohttps://github.com/syaifulahdan/
Biba
 Let I(O) denote the integrity of object O and
I(S) denote the integrity of subject S
 Biba can be stated as
Write Access Rule: S can write O if and only if I(O)
 I(S)
(if S writes O, the integrity of O  that of S)
Biba’s Model: S can read O if and only if
I(S)  I(O)
(if S reads O, the integrity of S  that of O)
 Often, replace Biba’s Model with
Low Water Mark Policy: If S reads O, then
I(S) = min(I(S), I(O))
Security+ Guide to Network Security Fundamentals, Third
Edition
7979
79 79 tohttps://github.com/syaifulahdan/
BLP vs Biba
l
e
v
e
l
high
low
L(O)
L(O) L(O)
Confidentiality
BLP
I(O)
I(O)
I(O)
Biba
l
e
v
e
l
high
lowIntegrity
Security+ Guide to Network Security Fundamentals, Third
Edition
8080
80 80 tohttps://github.com/syaifulahdan/
Multilateral Security
(Compartments)
Security+ Guide to Network Security Fundamentals, Third
Edition
8181
81 81 tohttps://github.com/syaifulahdan/
Multilateral Security
 Multilevel Security (MLS) enforces access control up
and down
 Simple hierarchy of security labels may not be flexible
enough
 Multilateral security enforces access control across by
creating compartments
 Suppose TOP SECRET divided into TOP SECRET
{CAT} and TOP SECRET {DOG}
 Both are TOP SECRET but information flow restricted
across the TOP SECRET level
Security+ Guide to Network Security Fundamentals, Third
Edition
8282
82 82 tohttps://github.com/syaifulahdan/
Multilateral Security
 Why compartments?
Why not create a new classification level?
 May not want either of
TOP SECRET {CAT}  TOP SECRET {DOG}
TOP SECRET {DOG}  TOP SECRET {CAT}
 Compartments allow us to enforce the need to know
principle
Regardless of your clearance, you only have access
to info that you need to know
Security+ Guide to Network Security Fundamentals, Third
Edition
8383
83 83 tohttps://github.com/syaifulahdan/
Multilateral Security
 Arrows indicate “” relationship
 Not all classifications are comparable, e.g.,
TOP SECRET {CAT} vs SECRET {CAT, DOG}
TOP SECRET {CAT, DOG}
TOP SECRET {CAT}
TOP SECRET
SECRET {CAT, DOG}
SECRET {DOG}
SECRET
TOP SECRET {DOG}
SECRET {CAT}
Security+ Guide to Network Security Fundamentals, Third
Edition
8484
84 84 tohttps://github.com/syaifulahdan/
MLS vs Multilateral Security
 MLS can be used without multilateral security or vice-
versa
 But, MLS almost always includes multilateral
 Example
MLS mandated for protecting medical records of
British Medical Association (BMA)
AIDS was TOP SECRET, prescriptions SECRET
What is the classification of an AIDS drug?
Everything tends toward TOP SECRET
Defeats the purpose of the system!
 Multilateral security was used instead
Security+ Guide to Network Security Fundamentals, Third
Edition
8585
85 85 tohttps://github.com/syaifulahdan/
Covert Channel
Security+ Guide to Network Security Fundamentals, Third
Edition
8686
86 86 tohttps://github.com/syaifulahdan/
Covert Channel
 MLS designed to restrict legitimate channels
of communication
 May be other ways for information to flow
 For example, resources shared at different
levels may signal information
 Covert channel: “communication path not
intended as such by system’s designers”
Security+ Guide to Network Security Fundamentals, Third
Edition
8787
87 87 tohttps://github.com/syaifulahdan/
Covert Channel Example
 Alice has TOP SECRET clearance, Bob has
CONFIDENTIAL clearance
 Suppose the file space shared by all users
 Alice creates file FileXYzW to signal “1” to
Bob, and removes file to signal “0”
 Once each minute Bob lists the files
If file FileXYzW does not exist, Alice sent 0
If file FileXYzW exists, Alice sent 1
 Alice can leak TOP SECRET info to Bob!
Security+ Guide to Network Security Fundamentals, Third
Edition
8888
88 88 tohttps://github.com/syaifulahdan/
Covert Channel Example
Alice:
Time:
Create file Delete file Create file Delete file
Bob: Check file Check file Check file Check fileCheck file
Data: 1 0 1 01
Security+ Guide to Network Security Fundamentals, Third
Edition
8989
89 89 tohttps://github.com/syaifulahdan/
Covert Channel
 Other examples of covert channels
 Print queue
 ACK messages
 Network traffic, etc., etc., etc.
 When does a covert channel exist?
1. Sender and receiver have a shared resource
2. Sender able to vary property of resource that
receiver can observe
3. Communication between sender and receiver can
be synchronized
Security+ Guide to Network Security Fundamentals, Third
Edition
9090
90 90 tohttps://github.com/syaifulahdan/
Covert Channel
 Covert channels exist almost everywhere
 Easy to eliminate covert channels…
Provided you eliminate all shared resources and all
communication
 Virtually impossible to eliminate all covert
channels in any useful system
DoD guidelines: goal is to reduce covert channel
capacity to no more than 1 bit/second
Implication is that DoD has given up trying to
eliminate covert channels!
Security+ Guide to Network Security Fundamentals, Third
Edition
9191
91 91 tohttps://github.com/syaifulahdan/
Covert Channel
 Consider 100MB TOP SECRET file
Plaintext version stored in TOP SECRET place
Encrypted with AES using 256-bit key, ciphertext
stored in UNCLASSIFIED location
 Suppose we reduce covert channel capacity
to 1 bit per second
 It would take more than 25 years to leak
entire document thru a covert channel
 But it would take less than 5 minutes to leak
256-bit AES key thru covert channel!
Security+ Guide to Network Security Fundamentals, Third
Edition
9292
92 92 tohttps://github.com/syaifulahdan/
Real-World Covert Channel
 Hide data in TCP header “reserved” field
 Or use covert_TCP, tool to hide data in
Sequence number
ACK number
Security+ Guide to Network Security Fundamentals, Third
Edition
9393
93 93 tohttps://github.com/syaifulahdan/
Real-World Covert Channel
 Hide data in TCP sequence numbers
 Tool: covert_TCP
 Sequence number X contains covert info
A. Covert_TCP
sender
C. Covert_TCP
receiver
B. Innocent
server
SYN
Spoofed source: C
Destination: B
SEQ: X
ACK (or RST)
Source: B
Destination: C
ACK: X
Security+ Guide to Network Security Fundamentals, Third
Edition
9494
94 94 tohttps://github.com/syaifulahdan/
Inference Control
Security+ Guide to Network Security Fundamentals, Third
Edition
9595
95 95 tohttps://github.com/syaifulahdan/
Inference Control Example
 Suppose we query a database
Question: What is average salary of female CS
professors at SJSU?
Answer: $95,000
Question: How many female CS professors at
SJSU?
Answer: 1
 Specific information has leaked from
responses to general questions!
Security+ Guide to Network Security Fundamentals, Third
Edition
9696
96 96 tohttps://github.com/syaifulahdan/
Inference Control and
Research
For example, medical records are
private but valuable for research
How to make info available for research
and protect privacy?
How to allow access to such data
without leaking specific information?
Security+ Guide to Network Security Fundamentals, Third
Edition
9797
97 97 tohttps://github.com/syaifulahdan/
Naïve Inference Control
Remove names from medical records?
Still may be easy to get specific info from
such “anonymous” data
Removing names is not enough
As seen in previous example
What more can be done?
Security+ Guide to Network Security Fundamentals, Third
Edition
9898
98 98 tohttps://github.com/syaifulahdan/
Less-naïve Inference Control
 Query set size control
Don’t return an answer if set size is too small
 N-respondent, k% dominance rule
Do not release statistic if k% or more contributed
by N or fewer
Example: Avg salary in Bill Gates’ neighborhood
Used by the US Census Bureau
 Randomization
Add small amount of random noise to data
 Many other methods  none satisfactory
Security+ Guide to Network Security Fundamentals, Third
Edition
9999
99 99 tohttps://github.com/syaifulahdan/
Inference Control: The Bottom
Line
 Robust inference control may be impossible
 Is weak inference control better than no
inference control?
Yes: Reduces amount of information that leaks and
thereby limits the damage
 Is weak crypto better than no crypto?
Probably not: Encryption indicates important data
May be easier to filter encrypted data
Security+ Guide to Network Security Fundamentals, Third
Edition
100100
100 100 tohttps://github.com/syaifulahdan/
CAPTCHA
Security+ Guide to Network Security Fundamentals, Third
Edition
101101
101 101 tohttps://github.com/syaifulahdan/
Turing Test
 Proposed by Alan Turing in 1950
 Human asks questions to one other human
and one computer (without seeing either)
 If human questioner cannot distinguish the
human from the computer responder, the
computer passes the test
 The gold standard in artificial intelligence
 No computer can pass this today
Security+ Guide to Network Security Fundamentals, Third
Edition
102102
102 102 tohttps://github.com/syaifulahdan/
CAPTCHA
 CAPTCHA  Completely Automated Public
Turing test to tell Computers and Humans
Apart
 Automated  test is generated and scored by
a computer program
 Public  program and data are public
 Turing test to tell…  humans can pass the
test, but machines cannot pass the test
 Like an inverse Turing test (sort of…)
Security+ Guide to Network Security Fundamentals, Third
Edition
103103
103 103 tohttps://github.com/syaifulahdan/
CAPTCHA Paradox
 “…CAPTCHA is a program that can generate
and grade tests that it itself cannot pass…”
 “…much like some professors…”
 Paradox  computer creates and scores test
that it cannot pass!
 CAPTCHA used to restrict access to
resources to humans (no computers)
 CAPTCHA useful for access control
Security+ Guide to Network Security Fundamentals, Third
Edition
104104
104 104 tohttps://github.com/syaifulahdan/
CAPTCHA Uses?
 Original motivation: automated “bots” stuffed
ballot box in vote for best CS school
 Free email services  spammers used bots
sign up for 1000’s of email accounts
CAPTCHA employed so only humans can get accts
 Sites that do not want to be automatically
indexed by search engines
HTML tag only says “please do not index me”
CAPTCHA would force human intervention
Security+ Guide to Network Security Fundamentals, Third
Edition
105105
105 105 tohttps://github.com/syaifulahdan/
CAPTCHA: Rules of the Game
 Must be easy for most humans to pass
 Must be difficult or impossible for machines to
pass
Even with access to CAPTCHA software
 The only unknown is some random number
 Desirable to have different CAPTCHAs in
case some person cannot pass one type
Blind person could not pass visual test, etc.
Security+ Guide to Network Security Fundamentals, Third
Edition
106106
106 106 tohttps://github.com/syaifulahdan/
Do CAPTCHAs Exist?
 Test: Find 2 words in the following
q Easy for most humans
q Difficult for computers (OCR problem)
Security+ Guide to Network Security Fundamentals, Third
Edition
107107
107 107 tohttps://github.com/syaifulahdan/
CAPTCHAs
 Current types of CAPTCHAs
Visual
Like previous example
Many others
Audio
Distorted words or music
 No text-based CAPTCHAs
Maybe this is not possible…
Security+ Guide to Network Security Fundamentals, Third
Edition
108108
108 108 tohttps://github.com/syaifulahdan/
CAPTCHA’s and AI
 Computer recognition of distorted text is a
challenging AI problem
But humans can solve this problem
 Same is true of distorted sound
Humans also good at solving this
 Hackers who break such a CAPTCHA have
solved a hard AI problem
 Putting hacker’s effort to good use!
 May be other ways to defeat CAPTCHAs…
Security+ Guide to Network Security Fundamentals, Third
Edition
109109
109 109 tohttps://github.com/syaifulahdan/
Firewalls
Security+ Guide to Network Security Fundamentals, Third
Edition
110110
110 110 tohttps://github.com/syaifulahdan/
Firewalls
 Firewall must determine what to let in to
internal network and/or what to let out
 Access control for the network
Internet
Internal
networkFirewall
Security+ Guide to Network Security Fundamentals, Third
Edition
111111
111 111 tohttps://github.com/syaifulahdan/
Firewall as Secretary
 A firewall is like a secretary
 To meet with an executive
First contact the secretary
Secretary decides if meeting is reasonable
Secretary filters out many requests
 You want to meet chair of CS department?
Secretary does some filtering
 You want to meet President of US?
Secretary does lots of filtering!
Security+ Guide to Network Security Fundamentals, Third
Edition
112112
112 112 tohttps://github.com/syaifulahdan/
Firewall Terminology
 No standard terminology
 Types of firewalls
Packet filter  works at network layer
Stateful packet filter  transport layer
Application proxy  application layer
Personal firewall  for single user, home network,
etc.
Security+ Guide to Network Security Fundamentals, Third
Edition
113113
113 113 tohttps://github.com/syaifulahdan/
Packet Filter
 Operates at network layer
 Can filters based on
Source IP address
Destination IP address
Source Port
Destination Port
Flag bits (SYN, ACK, etc.)
Egress or ingress
application
transport
network
link
physical
Security+ Guide to Network Security Fundamentals, Third
Edition
114114
114 114 tohttps://github.com/syaifulahdan/
Packet Filter
 Advantage
Speed
 Disadvantages
No state
Cannot see TCP connections
Blind to application data
application
transport
network
link
physical
Security+ Guide to Network Security Fundamentals, Third
Edition
115115
115 115 tohttps://github.com/syaifulahdan/
Packet Filter
 Configured via Access Control Lists (ACLs)
Different meaning of ACL than previously
Allow Inside Outside Any 80 HTTP
Allow Outside Inside 80 > 1023 HTTP
Deny All All All All All
Action
Source
IP
Dest
IP
Source
Port
Dest
Port Protocol
 Intention is to restrict incoming packets to
Web responses
Any
ACK
All
Flag
Bits
Security+ Guide to Network Security Fundamentals, Third
Edition
116116
116 116 tohttps://github.com/syaifulahdan/
TCP ACK Scan
 Attacker sends packet with ACK bit set,
without prior 3-way handshake
 Violates TCP/IP protocol
 ACK packet pass thru packet filter firewall
Appears to be part of an ongoing connection
 RST sent by recipient of such packet
 Attacker scans for open ports thru firewall
Security+ Guide to Network Security Fundamentals, Third
Edition
117117
117 117 tohttps://github.com/syaifulahdan/
TCP ACK Scan
Packet
Filter
Trudy Internal
Network
ACK dest port 1207
ACK dest port 1208
ACK dest port 1209
RST
 Attacker knows port 1209 open thru firewall
 A stateful packet filter can prevent this (next)
 Since ACK scans not part of established connections
Security+ Guide to Network Security Fundamentals, Third
Edition
118118
118 118 tohttps://github.com/syaifulahdan/
Stateful Packet Filter
 Adds state to packet filter
 Operates at transport layer
 Remembers TCP connections and
flag bits
 Can even remember UDP packets
(e.g., DNS requests)
application
transport
network
link
physical
Security+ Guide to Network Security Fundamentals, Third
Edition
119119
119 119 tohttps://github.com/syaifulahdan/
Stateful Packet Filter
 Advantages
Can do everything a packet filter can
do plus...
Keep track of ongoing connections
 Disadvantages
Cannot see application data
Slower than packet filtering
application
transport
network
link
physical
Security+ Guide to Network Security Fundamentals, Third
Edition
120120
120 120 tohttps://github.com/syaifulahdan/
Application Proxy
 A proxy is something that acts on
your behalf
 Application proxy looks at
incoming application data
 Verifies that data is safe before
letting it in
application
transport
network
link
physical
Security+ Guide to Network Security Fundamentals, Third
Edition
121121
121 121 tohttps://github.com/syaifulahdan/
Application Proxy
 Advantages
Complete view of connections and
applications data
Filter bad data at application layer
(viruses, Word macros)
 Disadvantage
Speed
application
transport
network
link
physical
Security+ Guide to Network Security Fundamentals, Third
Edition
122122
122 122 tohttps://github.com/syaifulahdan/
Application Proxy
 Creates a new packet before sending it thru
to internal network
 Attacker must talk to proxy and convince it to
forward message
 Proxy has complete view of connection
 Prevents some attacks stateful packet filter
cannot  see next slides
Security+ Guide to Network Security Fundamentals, Third
Edition
123123
123 123 tohttps://github.com/syaifulahdan/
Firewalk
 Tool to scan for open ports thru firewall
 Known: IP address of firewall and IP address
of one system inside firewall
TTL set to 1 more than number of hops to firewall
and set destination port to N
If firewall does not let thru data on port N, no
response
If firewall allows data on port N thru firewall, get
time exceeded error message
Security+ Guide to Network Security Fundamentals, Third
Edition
124124
124 124 tohttps://github.com/syaifulahdan/
Firewalk and Proxy Firewall
Dest port 12345, TTL=4
Dest port 12344, TTL=4
Dest port 12343, TTL=4
Time exceeded
Trudy
Packet
filter
Router
 This will not work thru an application proxy
 The proxy creates a new packet, destroys old TTL
RouterRouter
Security+ Guide to Network Security Fundamentals, Third
Edition
125125
125 125 tohttps://github.com/syaifulahdan/
Personal Firewall
 To protect one user or home network
 Can use any of the methods
Packet filter
Stateful packet filter
Application proxy
Part 2  Access Control 125
Security+ Guide to Network Security Fundamentals, Third
Edition
126126
126 126 tohttps://github.com/syaifulahdan/
Firewalls and Defense in Depth
 Example security architecture
Internet
Intranet with
Personal
Firewalls
Packet
Filter
Application
Proxy
DMZ
FTP server
DNS server
WWW server
Security+ Guide to Network Security Fundamentals, Third
Edition
127127
127 127 tohttps://github.com/syaifulahdan/
Intrusion Detection Systems
Security+ Guide to Network Security Fundamentals, Third
Edition
128128
128 128 tohttps://github.com/syaifulahdan/
Intrusion Prevention
 Want to keep bad guys out
 Intrusion prevention is a traditional focus of
computer security
Authentication is to prevent intrusions
Firewalls a form of intrusion prevention
Virus defenses also intrusion prevention
 Comparable to locking the door on your car
Security+ Guide to Network Security Fundamentals, Third
Edition
129129
129 129 tohttps://github.com/syaifulahdan/
Intrusion Detection
 In spite of intrusion prevention, bad guys will
sometime get into system
 Intrusion detection systems (IDS)
Detect attacks
Look for “unusual” activity
 IDS developed out of log file analysis
 IDS is currently a very hot research topic
 How to respond when intrusion detected?
We don’t deal with this topic here
Security+ Guide to Network Security Fundamentals, Third
Edition
130130
130 130 tohttps://github.com/syaifulahdan/
Intrusion Detection Systems
 Who is likely intruder?
May be outsider who got thru firewall
May be evil insider
 What do intruders do?
Launch well-known attacks
Launch variations on well-known attacks
Launch new or little-known attacks
Use a system to attack other systems
Etc.
Security+ Guide to Network Security Fundamentals, Third
Edition
131131
131 131 tohttps://github.com/syaifulahdan/
IDS
 Intrusion detection approaches
Signature-based IDS
Anomaly-based IDS
 Intrusion detection architectures
Host-based IDS
Network-based IDS
 Most systems can be classified as above
In spite of marketing claims to the contrary!
Security+ Guide to Network Security Fundamentals, Third
Edition
132132
132 132 tohttps://github.com/syaifulahdan/
Host-based IDS
 Monitor activities on hosts for
Known attacks or
Suspicious behavior
 Designed to detect attacks such as
Buffer overflow
Escalation of privilege
 Little or no view of network activities
Security+ Guide to Network Security Fundamentals, Third
Edition
133133
133 133 tohttps://github.com/syaifulahdan/
Network-based IDS
 Monitor activity on the network for
Known attacks
Suspicious network activity
 Designed to detect attacks such as
Denial of service
Network probes
Malformed packets, etc.
 Can be some overlap with firewall
 Little or no view of host-base attacks
 Can have both host and network IDS
Security+ Guide to Network Security Fundamentals, Third
Edition
134134
134 134 tohttps://github.com/syaifulahdan/
Signature Detection Example
 Failed login attempts may indicate password
cracking attack
 IDS could use the rule “N failed login attempts
in M seconds” as signature
 If N or more failed login attempts in M
seconds, IDS warns of attack
 Note that the warning is specific
Admin knows what attack is suspected
Admin can verify attack (or false alarm)
Security+ Guide to Network Security Fundamentals, Third
Edition
135135
135 135 tohttps://github.com/syaifulahdan/
Signature Detection
 Suppose IDS warns whenever N or more
failed logins in M seconds
 Must set N and M so that false alarms not
common
 Can do this based on normal behavior
 But if attacker knows the signature, he can try
N-1 logins every M seconds!
 In this case, signature detection slows the
attacker, but might not stop him
Security+ Guide to Network Security Fundamentals, Third
Edition
136136
136 136 tohttps://github.com/syaifulahdan/
Signature Detection
 Many techniques used to make signature
detection more robust
 Goal is usually to detect “almost signatures”
 For example, if “about” N login attempts in
“about” M seconds
Warn of possible password cracking attempt
What are reasonable values for “about”?
Can use statistical analysis, heuristics, other
Must take care not to increase false alarm rate
Security+ Guide to Network Security Fundamentals, Third
Edition
137137
137 137 tohttps://github.com/syaifulahdan/
Signature Detection
 Advantages of signature detection
Simple
Detect known attacks
Know which attack at time of detection
Efficient (if reasonable number of signatures)
 Disadvantages of signature detection
Signature files must be kept up to date
Number of signatures may become large
Can only detect known attacks
Variation on known attack may not be detected
Security+ Guide to Network Security Fundamentals, Third
Edition
138138
138 138 tohttps://github.com/syaifulahdan/
Anomaly Detection
 Anomaly detection systems look for unusual
or abnormal behavior
 There are (at least) two challenges
What is normal for this system?
How “far” from normal is abnormal?
 Statistics is obviously required here!
The mean defines normal
The variance indicates how far abnormal lives from
normal
Security+ Guide to Network Security Fundamentals, Third
Edition
139139
139 139 tohttps://github.com/syaifulahdan/
How to Measure Normal?
 How to measure normal?
Must measure during “representative” behavior
Must not measure during an attack…
…or else attack will seem normal!
Normal is statistical mean
Must also compute variance to have any
reasonable chance of success
Security+ Guide to Network Security Fundamentals, Third
Edition
140140
140 140 tohttps://github.com/syaifulahdan/
How to Measure Abnormal?
 Abnormal is relative to some “normal”
Abnormal indicates possible attack
 Statistical discrimination techniques:
Bayesian statistics
Linear discriminant analysis (LDA)
Quadratic discriminant analysis (QDA)
Neural nets, hidden Markov models, etc.
 Fancy modeling techniques also used
Artificial intelligence
Artificial immune system principles
Many others!
Security+ Guide to Network Security Fundamentals, Third
Edition
141141
141 141 tohttps://github.com/syaifulahdan/
Anomaly Detection (1)
 Spse we monitor use of three commands:
 open, read, close
 Under normal use we observe that Alice
 open,read,close,open,open,read,close,…
 Of the six possible ordered pairs, four pairs are
“normal” for Alice:
 (open,read), (read,close), (close,open),
(open,open)
 Can we use this to identify unusual activity?
Security+ Guide to Network Security Fundamentals, Third
Edition
142142
142 142 tohttps://github.com/syaifulahdan/
Anomaly Detection (1)
 We monitor use of the three commands
 open, read, close
 If the ratio of abnormal to normal pairs is “too
high”, warn of possible attack
 Could improve this approach by
Also using expected frequency of each pair
Use more than two consecutive commands
Include more commands/behavior in the model
More sophisticated statistical discrimination
Security+ Guide to Network Security Fundamentals, Third
Edition
143143
143 143 tohttps://github.com/syaifulahdan/
Anomaly Detection Issues
 System constantly evolves and so must IDS
Static system would place huge burden on admin
But evolving IDS makes it possible for attacker to
(slowly) convince IDS that an attack is normal!
Attacker may win simply by “going slow”
 What does “abnormal” really mean?
Only that there is possibly an attack
May not say anything specific about attack!
How to respond to such vague information?
 Signature detection tells exactly which attack
Security+ Guide to Network Security Fundamentals, Third
Edition
144144
144 144 tohttps://github.com/syaifulahdan/
Anomaly Detection
 Advantages
Chance of detecting unknown attacks
May be more efficient (since no signatures)
 Disadvantages
Today, cannot be used alone
Must be used with a signature detection system
Reliability is unclear
May be subject to attack
Anomaly detection indicates something unusual
But lack of specific info on possible attack!
Security+ Guide to Network Security Fundamentals, Third
Edition
145145
145 145 tohttps://github.com/syaifulahdan/
Anomaly Detection: The
Bottom Line
 Anomaly-based IDS is active research topic
 Many security professionals have very high
hopes for its ultimate success
 Often cited as key future security technology
 Hackers are not convinced!
Title of a talk at Defcon 11: “Why Anomaly-based IDS
is an Attacker’s Best Friend”
 Anomaly detection is difficult and tricky
 Is anomaly detection as hard as AI?
Security+ Guide to Network Security Fundamentals, Third
Edition
146146
146 146 tohttps://github.com/syaifulahdan/
Access Control Summary
Authentication and authorization
Authentication  who goes there?
Passwords  something you know
Biometrics  something you are (or
“you are your key”)
Something you have
Security+ Guide to Network Security Fundamentals, Third
Edition
147147
147 147 tohttps://github.com/syaifulahdan/
Access Control Summary
 Authorization  are you allowed to do that?
Access control matrix/ACLs/Capabilities
MLS/Multilateral security
BLP/Biba
Covert channel
Inference control
CAPTCHA
Firewalls
IDS
Security+ Guide to Network Security Fundamentals, Third
Edition
148148
148 148 tohttps://github.com/syaifulahdan/
REFERENCE
 http://www.kau.edu.sa/GetFile.aspx?id=195241&fn=2_AccessControl.p
pt.

Contenu connexe

Tendances (20)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Web Application Security and Awareness
Web Application Security and AwarenessWeb Application Security and Awareness
Web Application Security and Awareness
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Broken access control
Broken access controlBroken access control
Broken access control
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Session Hijacking
Session HijackingSession Hijacking
Session Hijacking
 
Ceh v5 module 09 social engineering
Ceh v5 module 09 social engineeringCeh v5 module 09 social engineering
Ceh v5 module 09 social engineering
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
 
ETHICAL HACKING
ETHICAL HACKING ETHICAL HACKING
ETHICAL HACKING
 
Information security
Information securityInformation security
Information security
 
101 Basic concepts of information security
101 Basic concepts of information security101 Basic concepts of information security
101 Basic concepts of information security
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
 
ASP.NET Web Security
ASP.NET Web SecurityASP.NET Web Security
ASP.NET Web Security
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 

Similaire à Chapter 4 access control fundamental ii

Personal Internet Security System
Personal Internet Security SystemPersonal Internet Security System
Personal Internet Security SystemMatthew Bricker
 
Password hacking
Password hackingPassword hacking
Password hackingMr. FM
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force toolszeus7856
 
How to hide your browser 0-days
How to hide your browser 0-daysHow to hide your browser 0-days
How to hide your browser 0-daysZoltan Balazs
 
Secure programming with php
Secure programming with phpSecure programming with php
Secure programming with phpMohmad Feroz
 
Information security & ethical hacking
Information security & ethical hackingInformation security & ethical hacking
Information security & ethical hackingeiti panchkula
 
Passwords & security
Passwords & securityPasswords & security
Passwords & securityPer Thorsheim
 
How to 2FA-enable Open Source Applications
How to 2FA-enable Open Source ApplicationsHow to 2FA-enable Open Source Applications
How to 2FA-enable Open Source ApplicationsAll Things Open
 
Crypto failures every developer should avoid
Crypto failures every developer should avoidCrypto failures every developer should avoid
Crypto failures every developer should avoidOwaspCzech
 
Crypto failures every developer should avoid
Crypto failures every developer should avoidCrypto failures every developer should avoid
Crypto failures every developer should avoidFilip Šebesta
 
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...Felipe Prado
 
Defending Against Attacks With Rails
Defending Against Attacks With RailsDefending Against Attacks With Rails
Defending Against Attacks With RailsTony Amoyal
 
DMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal TricksDMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal TricksThreatReel Podcast
 
Top Five Internal Security Vulnerabilities
Top Five Internal Security VulnerabilitiesTop Five Internal Security Vulnerabilities
Top Five Internal Security VulnerabilitiesPeter Wood
 

Similaire à Chapter 4 access control fundamental ii (20)

Windows network
Windows networkWindows network
Windows network
 
Personal Internet Security System
Personal Internet Security SystemPersonal Internet Security System
Personal Internet Security System
 
Windows network security
Windows network securityWindows network security
Windows network security
 
Password hacking
Password hackingPassword hacking
Password hacking
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force tools
 
How to hide your browser 0-days
How to hide your browser 0-daysHow to hide your browser 0-days
How to hide your browser 0-days
 
Secure programming with php
Secure programming with phpSecure programming with php
Secure programming with php
 
Old Linux Security Talk
Old Linux Security TalkOld Linux Security Talk
Old Linux Security Talk
 
Information security & ethical hacking
Information security & ethical hackingInformation security & ethical hacking
Information security & ethical hacking
 
Passwords & security
Passwords & securityPasswords & security
Passwords & security
 
How to 2FA-enable Open Source Applications
How to 2FA-enable Open Source ApplicationsHow to 2FA-enable Open Source Applications
How to 2FA-enable Open Source Applications
 
Crypto failures every developer should avoid
Crypto failures every developer should avoidCrypto failures every developer should avoid
Crypto failures every developer should avoid
 
Crypto failures every developer should avoid
Crypto failures every developer should avoidCrypto failures every developer should avoid
Crypto failures every developer should avoid
 
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
DEF CON 27 - DANIEL ROMERO and MARIO RIVAS - why you should fear your mundane...
 
Defending Against Attacks With Rails
Defending Against Attacks With RailsDefending Against Attacks With Rails
Defending Against Attacks With Rails
 
DMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal TricksDMA - Stupid Cyber Criminal Tricks
DMA - Stupid Cyber Criminal Tricks
 
Top Five Internal Security Vulnerabilities
Top Five Internal Security VulnerabilitiesTop Five Internal Security Vulnerabilities
Top Five Internal Security Vulnerabilities
 
Encryption Primer por Cathy Nolan
Encryption Primer por Cathy NolanEncryption Primer por Cathy Nolan
Encryption Primer por Cathy Nolan
 
EthicalHacking.pptx
EthicalHacking.pptxEthicalHacking.pptx
EthicalHacking.pptx
 
" onclick="alert(1)
" onclick="alert(1)" onclick="alert(1)
" onclick="alert(1)
 

Plus de Syaiful Ahdan

Sertifikat EC00202128391
 Sertifikat EC00202128391 Sertifikat EC00202128391
Sertifikat EC00202128391Syaiful Ahdan
 
SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...
SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...
SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...Syaiful Ahdan
 
Sertifikat ec00202059774
Sertifikat ec00202059774Sertifikat ec00202059774
Sertifikat ec00202059774Syaiful Ahdan
 
Sertifikat ec00202059775
Sertifikat ec00202059775Sertifikat ec00202059775
Sertifikat ec00202059775Syaiful Ahdan
 
Sertifikat EC00202045078
Sertifikat EC00202045078Sertifikat EC00202045078
Sertifikat EC00202045078Syaiful Ahdan
 
Sertifikat EC00202044723
 Sertifikat EC00202044723 Sertifikat EC00202044723
Sertifikat EC00202044723Syaiful Ahdan
 
Sertifikat EC00202023523
Sertifikat EC00202023523Sertifikat EC00202023523
Sertifikat EC00202023523Syaiful Ahdan
 
Sertifikat EC00201826309
Sertifikat EC00201826309Sertifikat EC00201826309
Sertifikat EC00201826309Syaiful Ahdan
 
Sertifikat EC00202023149
Sertifikat EC00202023149Sertifikat EC00202023149
Sertifikat EC00202023149Syaiful Ahdan
 
Sertifikat EC00202022868
Sertifikat EC00202022868Sertifikat EC00202022868
Sertifikat EC00202022868Syaiful Ahdan
 
Sertifikat EC00202021343
Sertifikat EC00202021343Sertifikat EC00202021343
Sertifikat EC00202021343Syaiful Ahdan
 
Sertifikat EC00202022755
Sertifikat EC00202022755Sertifikat EC00202022755
Sertifikat EC00202022755Syaiful Ahdan
 
Sertifikat EC00201987196
Sertifikat EC00201987196Sertifikat EC00201987196
Sertifikat EC00201987196Syaiful Ahdan
 
Sertifikat EC00201856484
Sertifikat EC00201856484Sertifikat EC00201856484
Sertifikat EC00201856484Syaiful Ahdan
 
Sertifikat EC00201856352
Sertifikat EC00201856352Sertifikat EC00201856352
Sertifikat EC00201856352Syaiful Ahdan
 
Sertifikat EC00201856994
Sertifikat EC00201856994Sertifikat EC00201856994
Sertifikat EC00201856994Syaiful Ahdan
 
Sertifikat EC00201856895
Sertifikat EC00201856895Sertifikat EC00201856895
Sertifikat EC00201856895Syaiful Ahdan
 
Meeting 2 introdcution network administrator
Meeting 2   introdcution network administratorMeeting 2   introdcution network administrator
Meeting 2 introdcution network administratorSyaiful Ahdan
 

Plus de Syaiful Ahdan (20)

Sertifikat EC00202128391
 Sertifikat EC00202128391 Sertifikat EC00202128391
Sertifikat EC00202128391
 
SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...
SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...
SP2JPB - Aplikasi Sistem Pelayanan Pemesanan Jasa Perbaikan Pada Bengkel Alam...
 
Sertifikat ec00202059774
Sertifikat ec00202059774Sertifikat ec00202059774
Sertifikat ec00202059774
 
Sertifikat ec00202059775
Sertifikat ec00202059775Sertifikat ec00202059775
Sertifikat ec00202059775
 
Sertifikat EC00202045078
Sertifikat EC00202045078Sertifikat EC00202045078
Sertifikat EC00202045078
 
Sertifikat EC00202044723
 Sertifikat EC00202044723 Sertifikat EC00202044723
Sertifikat EC00202044723
 
Sertifikat EC00202023523
Sertifikat EC00202023523Sertifikat EC00202023523
Sertifikat EC00202023523
 
Sertifikat EC00201826309
Sertifikat EC00201826309Sertifikat EC00201826309
Sertifikat EC00201826309
 
Sertifikat EC00202023149
Sertifikat EC00202023149Sertifikat EC00202023149
Sertifikat EC00202023149
 
Sertifikat EC00202022868
Sertifikat EC00202022868Sertifikat EC00202022868
Sertifikat EC00202022868
 
Sertifikat EC00202021343
Sertifikat EC00202021343Sertifikat EC00202021343
Sertifikat EC00202021343
 
Sertifikat EC00202022755
Sertifikat EC00202022755Sertifikat EC00202022755
Sertifikat EC00202022755
 
Sertifikat EC00201987196
Sertifikat EC00201987196Sertifikat EC00201987196
Sertifikat EC00201987196
 
Sertifikat EC00201856484
Sertifikat EC00201856484Sertifikat EC00201856484
Sertifikat EC00201856484
 
Sertifikat EC00201856352
Sertifikat EC00201856352Sertifikat EC00201856352
Sertifikat EC00201856352
 
Sertifikat EC00201856994
Sertifikat EC00201856994Sertifikat EC00201856994
Sertifikat EC00201856994
 
Sertifikat EC00201856895
Sertifikat EC00201856895Sertifikat EC00201856895
Sertifikat EC00201856895
 
Meeting 2 introdcution network administrator
Meeting 2   introdcution network administratorMeeting 2   introdcution network administrator
Meeting 2 introdcution network administrator
 
Pertemuan 5
Pertemuan 5Pertemuan 5
Pertemuan 5
 
Pertemuan 4
Pertemuan 4Pertemuan 4
Pertemuan 4
 

Dernier

ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 

Dernier (20)

ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 

Chapter 4 access control fundamental ii

  • 1. Security+ Guide to Network Security Fundamentals, Third Edition 11 1 1 tohttps://github.com/syaifulahdan/ INFORMATION SECURITY Access Control Fundamentals II  Acces Control  Who Goes There  Something you Know  Trouble With Passwords  Why Password  Key vs Password  Good and Bad Passwords  Password Experiment  Attacks on Password  Password Retry  Password File  Dictionary Attack  Password File  Password Cracking do the Math  Password Cracking  Other Password Issues  Password  Password Cracking Tools   Biometrics  Finger Print  Hand Geometry  Iris Patterns  Iris Recongnition History  Iris Scan  Password Generator  2 Factor Authentication  Single Sign on  Web Cookies  Authorization  Authentication vs Authorization  Lampson Access Control Matrix  Access Control List  Capabilities  Confused Deputy  Multilevel Security (MLS)  Multilateral Security (Compartements)  Convert Channel  Inference Control  Captcha  Firewalls  Packet Filter  Application Proxy  Firewal  Intrusion Detection System  Signature Detection  Anomaly Detection
  • 2. Security+ Guide to Network Security Fundamentals, Third Edition 22 2 2 tohttps://github.com/syaifulahdan/ Access Control  Two parts to access control  Authentication: Who goes there? Determine whether access is allowed Authenticate human to machine Authenticate machine to machine  Authorization: Are you allowed to do that? Once you have access, what can you do? Enforces limits on actions Note: Access control often used as synonym for authorization
  • 3. Security+ Guide to Network Security Fundamentals, Third Edition 33 3 3 tohttps://github.com/syaifulahdan/ Who Goes There?  How to authenticate a human to a machine?  Can be based on… Something you know For example, a password Something you have For example, a smartcard Something you are For example, your fingerprint
  • 4. Security+ Guide to Network Security Fundamentals, Third Edition 44 4 4 tohttps://github.com/syaifulahdan/ Something You Know  Passwords  Lots of things act as passwords! PIN Social security number Mother’s maiden name Date of birth Name of your pet, etc.
  • 5. Security+ Guide to Network Security Fundamentals, Third Edition 55 5 5 tohttps://github.com/syaifulahdan/ Trouble with Passwords  “Passwords are one of the biggest practical problems facing security engineers today.”  “Humans are incapable of securely storing high-quality cryptographic keys, and they have unacceptable speed and accuracy when performing cryptographic operations. (They are also large, expensive to maintain, difficult to manage, and they pollute the environment. It is astonishing that these devices continue to be manufactured and deployed.)”
  • 6. Security+ Guide to Network Security Fundamentals, Third Edition 66 6 6 tohttps://github.com/syaifulahdan/ Why Passwords? Why is “something you know” more popular than “something you have” and “something you are”? Cost: passwords are free Convenience: easier for SA to reset pwd than to issue user a new thumb
  • 7. Security+ Guide to Network Security Fundamentals, Third Edition 77 7 7 tohttps://github.com/syaifulahdan/ Keys vs Passwords  Crypto keys  Spse key is 64 bits  Then 264 keys  Choose key at random  Then attacker must try about 263 keys  Passwords  Spse passwords are 8 characters, and 256 different characters  Then 2568 = 264 pwds  Users do not select passwords at random  Attacker has far less than 263 pwds to try (dictionary attack)
  • 8. Security+ Guide to Network Security Fundamentals, Third Edition 88 8 8 tohttps://github.com/syaifulahdan/ Good and Bad Passwords  Bad passwords frank Fido password 4444 Pikachu 102560 AustinStamp  Good Passwords? jfIej,43j-EmmL+y 09864376537263 P0kem0N FSa7Yago 0nceuP0nAt1m8 PokeGCTall150
  • 9. Security+ Guide to Network Security Fundamentals, Third Edition 99 9 9 tohttps://github.com/syaifulahdan/ Password Experiment  Three groups of users  each group advised to select passwords as follows  Group A: At least 6 chars, 1 non-letter  Group B: Password based on passphrase  Group C: 8 random characters  Results  Group A: About 30% of pwds easy to crack  Group B: About 10% cracked  Passwords easy to remember  Group C: About 10% cracked  Passwords hard to remember winner 
  • 10. Security+ Guide to Network Security Fundamentals, Third Edition 1010 10 10 tohttps://github.com/syaifulahdan/ Password Experiment  User compliance hard to achieve  In each case, 1/3rd did not comply (and about 1/3rd of those easy to crack!)  Assigned passwords sometimes best  If passwords not assigned, best advice is Choose passwords based on passphrase Use pwd cracking tool to test for weak pwds Require periodic password changes?
  • 11. Security+ Guide to Network Security Fundamentals, Third Edition 1111 11 11 tohttps://github.com/syaifulahdan/ Attacks on Passwords  Attacker could… Target one particular account Target any account on system Target any account on any system Attempt denial of service (DoS) attack  Common attack path Outsider  normal user  administrator May only require one weak password!
  • 12. Security+ Guide to Network Security Fundamentals, Third Edition 1212 12 12 tohttps://github.com/syaifulahdan/ Password Retry Suppose system locks after 3 bad passwords. How long should it lock? 5 seconds 5 minutes Until SA restores service What are +’s and -’s of each?
  • 13. Security+ Guide to Network Security Fundamentals, Third Edition 1313 13 13 tohttps://github.com/syaifulahdan/ Password File  Bad idea to store passwords in a file  But need a way to verify passwords  Cryptographic solution: hash the passwords Store y = h(password) Can verify entered password by hashing If attacker obtains password file, he does not obtain passwords But attacker with password file can guess x and check whether y = h(x) If so, attacker has found password!
  • 14. Security+ Guide to Network Security Fundamentals, Third Edition 1414 14 14 tohttps://github.com/syaifulahdan/ Dictionary Attack  Attacker pre-computes h(x) for all x in a dictionary of common passwords  Suppose attacker gets access to password file containing hashed passwords Attacker only needs to compare hashes to his pre- computed dictionary Same attack will work each time  Can we prevent this attack? Or at least make attacker’s job more difficult?
  • 15. Security+ Guide to Network Security Fundamentals, Third Edition 1515 15 15 tohttps://github.com/syaifulahdan/ Password File  Store hashed passwords  Better to hash with salt  Given password, choose random s, compute y = h(password, s) and store the pair (s,y) in the password file  Note: The salt s is not secret  Easy to verify password  Attacker must recompute dictionary hashes for each user  lots more work!
  • 16. Security+ Guide to Network Security Fundamentals, Third Edition 1616 16 16 tohttps://github.com/syaifulahdan/ Password Cracking: Do the Math  Assumptions  Pwds are 8 chars, 128 choices per character Then 1288 = 256 possible passwords  There is a password file with 210 pwds  Attacker has dictionary of 220 common pwds  Probability of 1/4 that a pwd is in dictionary  Work is measured by number of hashes
  • 17. Security+ Guide to Network Security Fundamentals, Third Edition 1717 17 17 tohttps://github.com/syaifulahdan/ Password Cracking  Attack 1 password without dictionary Must try 256/2 = 255 on average Just like exhaustive key search  Attack 1 password with dictionary Expected work is about 1/4 (219) + 3/4 (255) = 254.6 But in practice, try all in dictionary and quit if not found  work is at most 220 and probability of success is 1/4
  • 18. Security+ Guide to Network Security Fundamentals, Third Edition 1818 18 18 tohttps://github.com/syaifulahdan/ Password Cracking  Attack any of 1024 passwords in file  Without dictionary Assume all 210 passwords are distinct Need 255 comparisons before expect to find password If no salt, each hash computation gives 210 comparisons  the expected work (number of hashes) is 255/210 = 245 If salt is used, expected work is 255 since each comparison requires a new hash computation
  • 19. Security+ Guide to Network Security Fundamentals, Third Edition 1919 19 19 tohttps://github.com/syaifulahdan/ Password Cracking  Attack any of 1024 passwords in file  With dictionary Probability at least one password is in dictionary is 1 - (3/4)1024 = 1 We ignore case where no pwd is in dictionary If no salt, work is about 219/210 = 29 If salt, expected work is less than 222 Note: If no salt, we can precompute all dictionary hashes and amortize the work
  • 20. Security+ Guide to Network Security Fundamentals, Third Edition 2020 20 20 tohttps://github.com/syaifulahdan/ Other Password Issues  Too many passwords to remember Results in password reuse Why is this a problem?  Who suffers from bad password? Login password vs ATM PIN  Failure to change default passwords  Social engineering  Error logs may contain “almost” passwords  Bugs, keystroke logging, spyware, etc.
  • 21. Security+ Guide to Network Security Fundamentals, Third Edition 2121 21 21 tohttps://github.com/syaifulahdan/ Passwords  The bottom line  Password cracking is too easy! One weak password may break security Users choose bad passwords Social engineering attacks, etc.  The bad guy has all of the advantages  All of the math favors bad guys  Passwords are a big security problem
  • 22. Security+ Guide to Network Security Fundamentals, Third Edition 2222 22 22 tohttps://github.com/syaifulahdan/ Password Cracking Tools  Popular password cracking tools Password Crackers Password Portal L0phtCrack and LC4 (Windows) John the Ripper (Unix)  Admins should use these tools to test for weak passwords since attackers will!  Good article on password cracking Passwords - Conerstone of Computer Security
  • 23. Security+ Guide to Network Security Fundamentals, Third Edition 2323 23 23 tohttps://github.com/syaifulahdan/ Biometrics
  • 24. Security+ Guide to Network Security Fundamentals, Third Edition 2424 24 24 tohttps://github.com/syaifulahdan/ Something You Are  Biometric “You are your key”  Schneier Are Know Have  Examples Fingerprint Handwritten signature Facial recognition Speech recognition Gait (walking) recognition “Digital doggie” (odor recognition) Many more!
  • 25. Security+ Guide to Network Security Fundamentals, Third Edition 2525 25 25 tohttps://github.com/syaifulahdan/ Why Biometrics?  Biometrics seen as desirable replacement for passwords  Cheap and reliable biometrics needed  Today, a very active area of research  Biometrics are used in security today Thumbprint mouse Palm print for secure entry Fingerprint to unlock car door, etc.  But biometrics not too popular Has not lived up to its promise (yet)
  • 26. Security+ Guide to Network Security Fundamentals, Third Edition 2626 26 26 tohttps://github.com/syaifulahdan/ Ideal Biometric  Universal  applies to (almost) everyone In reality, no biometric applies to everyone  Distinguishing  distinguish with certainty In reality, cannot hope for 100% certainty  Permanent  physical characteristic being measured never changes In reality, want it to remain valid for a long time  Collectable  easy to collect required data Depends on whether subjects are cooperative  Safe, easy to use, etc., etc.
  • 27. Security+ Guide to Network Security Fundamentals, Third Edition 2727 27 27 tohttps://github.com/syaifulahdan/ Biometric Modes  Identification  Who goes there? Compare one to many Example: The FBI fingerprint database  Authentication  Is that really you? Compare one to one Example: Thumbprint mouse  Identification problem more difficult More “random” matches since more comparisons  We are interested in authentication
  • 28. Security+ Guide to Network Security Fundamentals, Third Edition 2828 28 28 tohttps://github.com/syaifulahdan/ Enrollment vs Recognition  Enrollment phase Subject’s biometric info put into database Must carefully measure the required info OK if slow and repeated measurement needed Must be very precise for good recognition A weak point of many biometric schemes  Recognition phase Biometric detection when used in practice Must be quick and simple But must be reasonably accurate
  • 29. Security+ Guide to Network Security Fundamentals, Third Edition 2929 29 29 tohttps://github.com/syaifulahdan/ Cooperative Subjects  We are assuming cooperative subjects  In identification problem often have uncooperative subjects  For example, facial recognition Proposed for use in Las Vegas casinos to detect known cheaters Also as way to detect terrorists in airports, etc. Probably do not have ideal enrollment conditions Subject will try to confuse recognition phase  Cooperative subject makes it much easier! In authentication, subjects are cooperative
  • 30. Security+ Guide to Network Security Fundamentals, Third Edition 3030 30 30 tohttps://github.com/syaifulahdan/ Biometric Errors  Fraud rate versus insult rate Fraud  user A mis-authenticated as user B Insult  user A not authenticate as user A  For any biometric, can decrease fraud or insult, but other will increase  For example 99% voiceprint match  low fraud, high insult 30% voiceprint match  high fraud, low insult  Equal error rate: rate where fraud == insult The best measure for comparing biometrics
  • 31. Security+ Guide to Network Security Fundamentals, Third Edition 3131 31 31 tohttps://github.com/syaifulahdan/ Finger Print
  • 32. Security+ Guide to Network Security Fundamentals, Third Edition 3232 32 32 tohttps://github.com/syaifulahdan/ Fingerprint History  1823  Professor Johannes Evangelist Purkinje discussed 9 fingerprint patterns  1856  Sir William Hershel used fingerprint (in India) on contracts  1880  Dr. Henry Faulds article in Nature about fingerprints for ID  1883  Mark Twain’s Life on the Mississippi a murderer ID’ed by fingerprint
  • 33. Security+ Guide to Network Security Fundamentals, Third Edition 3333 33 33 tohttps://github.com/syaifulahdan/ Fingerprint History  1888  Sir Francis Galton (cousin of Darwin) developed classification system His system of “minutia” is still in use today Also verified that fingerprints do not change  Some countries require a number of points (i.e., minutia) to match in criminal cases In Britain, 15 points In US, no fixed number of points required
  • 34. Security+ Guide to Network Security Fundamentals, Third Edition 3434 34 34 tohttps://github.com/syaifulahdan/ Fingerprint Comparison Loop (double) Whorl Arch  Examples of loops, whorls and arches  Minutia extracted from these features
  • 35. Security+ Guide to Network Security Fundamentals, Third Edition 3535 35 35 tohttps://github.com/syaifulahdan/ Fingerprint Biometric  Capture image of fingerprint  Enhance image  Identify minutia
  • 36. Security+ Guide to Network Security Fundamentals, Third Edition 3636 36 36 tohttps://github.com/syaifulahdan/ Fingerprint Biometric  Extracted minutia are compared with user’s minutia stored in a database  Is it a statistical match?
  • 37. Security+ Guide to Network Security Fundamentals, Third Edition 3737 37 37 tohttps://github.com/syaifulahdan/ Hand Geometry
  • 38. Security+ Guide to Network Security Fundamentals, Third Edition 3838 38 38 tohttps://github.com/syaifulahdan/ Hand Geometry  Popular form of biometric  Measures shape of hand Width of hand, fingers Length of fingers, etc.  Human hands not unique  Hand geometry sufficient for many situations  Suitable for authentication  Not useful for ID problem
  • 39. Security+ Guide to Network Security Fundamentals, Third Edition 3939 39 39 tohttps://github.com/syaifulahdan/ Hand Geometry  Advantages Quick 1 minute for enrollment 5 seconds for recognition Hands symmetric (use other hand backwards)  Disadvantages Cannot use on very young or very old Relatively high equal error rate
  • 40. Security+ Guide to Network Security Fundamentals, Third Edition 4040 40 40 tohttps://github.com/syaifulahdan/ Iris Patterns
  • 41. Security+ Guide to Network Security Fundamentals, Third Edition 4141 41 41 tohttps://github.com/syaifulahdan/ Iris Patterns  Iris pattern development is “chaotic”  Little or no genetic influence  Different even for identical twins  Pattern is stable through lifetime
  • 42. Security+ Guide to Network Security Fundamentals, Third Edition 4242 42 42 tohttps://github.com/syaifulahdan/ Iris Recognition: History 1936  suggested by Frank Burch 1980s  James Bond films 1986  first patent appeared 1994  John Daugman patented best current approach Patent owned by Iridian Technologies
  • 43. Security+ Guide to Network Security Fundamentals, Third Edition 4343 43 43 tohttps://github.com/syaifulahdan/ Iris Scan  Scanner locates iris  Take b/w photo  Use polar coordinates…  Find 2-D wavelet trans  Get 256 byte iris code
  • 44. Security+ Guide to Network Security Fundamentals, Third Edition 4444 44 44 tohttps://github.com/syaifulahdan/ Measuring Iris Similarity  Based on Hamming distance  Define d(x,y) to be # of non match bits/# of bits compared d(0010,0101) = 3/4 and d(101111,101001) = 1/3  Compute d(x,y) on 2048-bit iris code Perfect match is d(x,y) = 0 For same iris, expected distance is 0.08 At random, expect distance of 0.50 Accept as match if distance less than 0.32
  • 45. Security+ Guide to Network Security Fundamentals, Third Edition 4545 45 45 tohttps://github.com/syaifulahdan/ Iris Scan Error Rate distance 0.29 1 in 1.31010 0.30 1 in 1.5109 0.31 1 in 1.8108 0.32 1 in 2.6107 0.33 1 in 4.0106 0.34 1 in 6.9105 0.35 1 in 1.3105 distance Fraud rate : equal error rate
  • 46. Security+ Guide to Network Security Fundamentals, Third Edition 4646 46 46 tohttps://github.com/syaifulahdan/ Attack on Iris Scan Good photo of eye can be scanned Attacker could use photo of eye Afghan woman was authenticated by iris scan of old photo Story is here To prevent photo attack, scanner could use light to be sure it is a “live” iris
  • 47. Security+ Guide to Network Security Fundamentals, Third Edition 4747 47 47 tohttps://github.com/syaifulahdan/ Equal Error Rate Comparison  Equal error rate (EER): fraud == insult rate  Fingerprint biometric has EER of about 5%  Hand geometry has EER of about 10-3  In theory, iris scan has EER of about 10-6 But in practice, hard to achieve Enrollment phase must be extremely accurate  Most biometrics much worse than fingerprint!  Biometrics useful for authentication…  But ID biometrics are almost useless today
  • 48. Security+ Guide to Network Security Fundamentals, Third Edition 4848 48 48 tohttps://github.com/syaifulahdan/ Biometrics: The Bottom Line  Biometrics are hard to forge  But attacker could Steal Alice’s thumb Photocopy Bob’s fingerprint, eye, etc. Subvert software, database, “trusted path”, …  Also, how to revoke a “broken” biometric?  Biometrics are not foolproof!  Biometric use is limited today  That should change in the future…
  • 49. Security+ Guide to Network Security Fundamentals, Third Edition 4949 49 49 tohttps://github.com/syaifulahdan/ Something You Have Something in your possession Examples include Car key Laptop computer Or specific MAC address Password generator We’ll look at this next ATM card, smartcard, etc.
  • 50. Security+ Guide to Network Security Fundamentals, Third Edition 5050 50 50 tohttps://github.com/syaifulahdan/ Password Generator  Alice gets “challenge” R from Bob  Alice enters R into password generator  Alice sends “response” back to Bob  Alice has pwd generator and knows PINs Alice Bob 1. “I’m Alice” 2. R 5. F(R) 3. PIN, R 4. F(R) Password generator
  • 51. Security+ Guide to Network Security Fundamentals, Third Edition 5151 51 51 tohttps://github.com/syaifulahdan/ 2-factor Authentication  Requires 2 out of 3 of 1. Something you know 2. Something you have 3. Something you are  Examples  ATM: Card and PIN  Credit card: Card and signature  Password generator: Device and PIN  Smartcard with password/PIN
  • 52. Security+ Guide to Network Security Fundamentals, Third Edition 5252 52 52 tohttps://github.com/syaifulahdan/ Single Sign-on  A hassle to enter password(s) repeatedly Users want to authenticate only once “Credentials” stay with user wherever he goes Subsequent authentication is transparent to user  Single sign-on for the Internet? Microsoft: Passport Everybody else: Liberty Alliance Security Assertion Markup Language (SAML)
  • 53. Security+ Guide to Network Security Fundamentals, Third Edition 5353 53 53 tohttps://github.com/syaifulahdan/ Web Cookies  Cookie is provided by a Website and stored on user’s machine  Cookie indexes a database at Website  Cookies maintain state across sessions  Web uses a stateless protocol: HTTP  Cookies also maintain state within a session  Like a single sign-on for a website Though a very weak form of authentication  Cookies and privacy concerns
  • 54. Security+ Guide to Network Security Fundamentals, Third Edition 5454 54 54 tohttps://github.com/syaifulahdan/ Authorization
  • 55. Security+ Guide to Network Security Fundamentals, Third Edition 5555 55 55 tohttps://github.com/syaifulahdan/ Authentication vs Authorization  Authentication  Who goes there? Restrictions on who (or what) can access system  Authorization  Are you allowed to do that? Restrictions on actions of authenticated users  Authorization is a form of access control  Authorization enforced by Access Control Lists Capabilities
  • 56. Security+ Guide to Network Security Fundamentals, Third Edition 5656 56 56 tohttps://github.com/syaifulahdan/ Lampson’s Access Control Matrix rx rx r --- --- rx rx r rw rw rwx rwx r rw rw rx rx rw rw rw OS Accounting program Accounting data Insurance data Payroll data Bob Alice Sam Accounting program  Subjects (users) index the rows  Objects (resources) index the columns
  • 57. Security+ Guide to Network Security Fundamentals, Third Edition 5757 57 57 tohttps://github.com/syaifulahdan/ Are You Allowed to Do That?  Access control matrix has all relevant info  But how to manage a large access control (AC) matrix?  Could be 1000’s of users, 1000’s of resources  Then AC matrix with 1,000,000’s of entries  Need to check this matrix before access to any resource is allowed  Hopelessly inefficient
  • 58. Security+ Guide to Network Security Fundamentals, Third Edition 5858 58 58 tohttps://github.com/syaifulahdan/ Access Control Lists (ACLs)  ACL: store access control matrix by column  Example: ACL for insurance data is in blue rx rx r --- --- rx rx r rw rw rwx rwx r rw rw rx rx rw rw rw OS Accounting program Accounting data Insurance data Payroll data Bob Alice Sam Accounting program
  • 59. Security+ Guide to Network Security Fundamentals, Third Edition 5959 59 59 tohttps://github.com/syaifulahdan/ Capabilities (or C-Lists)  Store access control matrix by row  Example: Capability for Alice is in red rx rx r --- --- rx rx r rw rw rwx rwx r rw rw rx rx rw rw rw OS Accounting program Accounting data Insurance data Payroll data Bob Alice Sam Accounting program
  • 60. Security+ Guide to Network Security Fundamentals, Third Edition 6060 60 60 tohttps://github.com/syaifulahdan/ ACLs vs Capabilities Access Control List Capability  Note that arrows point in opposite directions!  With ACLs, still need to associate users to filess file1 file2 file3 file1 file2 file3 r --- r Alice Bob Fred w r --- rw r r Alice Bob Fred r w rw --- r r r --- r
  • 61. Security+ Guide to Network Security Fundamentals, Third Edition 6161 61 61 tohttps://github.com/syaifulahdan/ Confused Deputy  Two resources Compiler and BILL file (billing info)  Compiler can write file BILL  Alice can invoke compiler with a debug filename  Alice not allowed to write to BILL  Access control matrix x --- rx rw Compiler BILL Alice Compiler
  • 62. Security+ Guide to Network Security Fundamentals, Third Edition 6262 62 62 tohttps://github.com/syaifulahdan/ ACL’s and Confused Deputy  Compiler is deputy acting on behalf of Alice  Compiler is confused Alice is not allowed to write BILL  Compiler has confused its rights with Alice’s Alice BILL Compiler debug filename BILL BILL
  • 63. Security+ Guide to Network Security Fundamentals, Third Edition 6363 63 63 tohttps://github.com/syaifulahdan/ Confused Deputy  Compiler acting for Alice is confused  There has been a separation of authority from the purpose for which it is used  With ACLs, difficult to avoid this problem  With Capabilities, easier to prevent problem Must maintain association between authority and intended purpose Capabilities make it easy to delegate authority
  • 64. Security+ Guide to Network Security Fundamentals, Third Edition 6464 64 64 tohttps://github.com/syaifulahdan/ ACLs vs Capabilities  ACLs  Good when users manage their own files  Protection is data-oriented  Easy to change rights to a resource  Capabilities  Easy to delegate  Easy to add/delete users  Easier to avoid the confused deputy  More difficult to implement  The “Zen of information security”  Capabilities loved by academics  Capability Myths Demolished
  • 65. Security+ Guide to Network Security Fundamentals, Third Edition 6565 65 65 tohttps://github.com/syaifulahdan/ Multilevel Security (MLS) Models
  • 66. Security+ Guide to Network Security Fundamentals, Third Edition 6666 66 66 tohttps://github.com/syaifulahdan/ Classifications and Clearances Classifications apply to objects Clearances apply to subjects US Department of Defense uses 4 levels of classifications/clearances TOP SECRET SECRET CONFIDENTIAL UNCLASSIFIED
  • 67. Security+ Guide to Network Security Fundamentals, Third Edition 6767 67 67 tohttps://github.com/syaifulahdan/ Clearances and Classification  To obtain a SECRET clearance requires a routine background check  A TOP SECRET clearance requires extensive background check  Practical classification problems Proper classification not always clear Level of granularity to apply classifications Aggregation  flipside of granularity
  • 68. Security+ Guide to Network Security Fundamentals, Third Edition 6868 68 68 tohttps://github.com/syaifulahdan/ Subjects and Objects Let O be an object, S a subject  O has a classification  S has a clearance  Security level denoted L(O) and L(S) For DoD levels, we have TOP SECRET > SECRET > CONFIDENTIAL > UNCLASSIFIED
  • 69. Security+ Guide to Network Security Fundamentals, Third Edition 6969 69 69 tohttps://github.com/syaifulahdan/ Multilevel Security (MLS)  MLS needed when subjects/objects at different levels use same system  MLS is a form of Access Control  Military/government interest in MLS for many decades Lots of funded research into MLS Strengths and weaknesses of MLS relatively well understood (theoretical and practical) Many possible uses of MLS outside military
  • 70. Security+ Guide to Network Security Fundamentals, Third Edition 7070 70 70 tohttps://github.com/syaifulahdan/ MLS Applications  Classified government/military information  Business example: info restricted to Senior management only All management Everyone in company General public  Network firewall Keep intruders at low level to limit damage  Confidential medical info, databases, etc.
  • 71. Security+ Guide to Network Security Fundamentals, Third Edition 7171 71 71 tohttps://github.com/syaifulahdan/ MLS Security Models  MLS models explain what needs to be done  Models do not tell you how to implement  Models are descriptive, not prescriptive High level description, not an algorithm  There are many MLS models  We’ll discuss simplest MLS model Other models are more realistic Other models also more complex, more difficult to enforce, harder to verify, etc.
  • 72. Security+ Guide to Network Security Fundamentals, Third Edition 7272 72 72 tohttps://github.com/syaifulahdan/ Bell-LaPadula  BLP security model designed to express essential requirements for MLS  BLP deals with confidentiality To prevent unauthorized reading  Recall that O is an object, S a subject Object O has a classification Subject S has a clearance Security level denoted L(O) and L(S)
  • 73. Security+ Guide to Network Security Fundamentals, Third Edition 7373 73 73 tohttps://github.com/syaifulahdan/ Bell-LaPadula BLP consists of Simple Security Condition: S can read O if and only if L(O)  L(S) *-Property (Star Property): S can write O if and only if L(S)  L(O) No read up, no write down
  • 74. Security+ Guide to Network Security Fundamentals, Third Edition 7474 74 74 tohttps://github.com/syaifulahdan/ McLean’s Criticisms of BLP  McLean: BLP is “so trivial that it is hard to imagine a realistic security model for which it does not hold”  McLean’s “system Z” allowed administrator to reclassify object, then “write down”  Is this fair?  Violates spirit of BLP, but not expressly forbidden in statement of BLP  Raises fundamental questions about the nature of (and limits of) modeling
  • 75. Security+ Guide to Network Security Fundamentals, Third Edition 7575 75 75 tohttps://github.com/syaifulahdan/ B and LP’s Response  BLP enhanced with tranquility property  Strong tranquility property: security labels never change  Weak tranquility property: security label can only change if it does not violate “established security policy”  Strong tranquility impractical in real world  Often want to enforce “least privilege”  Give users lowest privilege needed for current work  Then upgrade privilege as needed (and allowed by policy)  This is known as the high water mark principle  Weak tranquility allows for least privilege (high water mark), but the property is vague
  • 76. Security+ Guide to Network Security Fundamentals, Third Edition 7676 76 76 tohttps://github.com/syaifulahdan/ BLP: The Bottom Line  BLP is simple, but probably too simple  BLP is one of the few security models that can be used to prove things about systems  BLP has inspired other security models Most other models try to be more realistic Other security models are more complex Other models difficult to analyze and/or apply in practice
  • 77. Security+ Guide to Network Security Fundamentals, Third Edition 7777 77 77 tohttps://github.com/syaifulahdan/ Biba’s Model  BLP for confidentiality, Biba for integrity Biba is to prevent unauthorized writing  Biba is (in a sense) the dual of BLP  Integrity model Spse you trust the integrity of O but not O If object O includes O and O then you cannot trust the integrity of O  Integrity level of O is minimum of the integrity of any object in O  Low water mark principle for integrity
  • 78. Security+ Guide to Network Security Fundamentals, Third Edition 7878 78 78 tohttps://github.com/syaifulahdan/ Biba  Let I(O) denote the integrity of object O and I(S) denote the integrity of subject S  Biba can be stated as Write Access Rule: S can write O if and only if I(O)  I(S) (if S writes O, the integrity of O  that of S) Biba’s Model: S can read O if and only if I(S)  I(O) (if S reads O, the integrity of S  that of O)  Often, replace Biba’s Model with Low Water Mark Policy: If S reads O, then I(S) = min(I(S), I(O))
  • 79. Security+ Guide to Network Security Fundamentals, Third Edition 7979 79 79 tohttps://github.com/syaifulahdan/ BLP vs Biba l e v e l high low L(O) L(O) L(O) Confidentiality BLP I(O) I(O) I(O) Biba l e v e l high lowIntegrity
  • 80. Security+ Guide to Network Security Fundamentals, Third Edition 8080 80 80 tohttps://github.com/syaifulahdan/ Multilateral Security (Compartments)
  • 81. Security+ Guide to Network Security Fundamentals, Third Edition 8181 81 81 tohttps://github.com/syaifulahdan/ Multilateral Security  Multilevel Security (MLS) enforces access control up and down  Simple hierarchy of security labels may not be flexible enough  Multilateral security enforces access control across by creating compartments  Suppose TOP SECRET divided into TOP SECRET {CAT} and TOP SECRET {DOG}  Both are TOP SECRET but information flow restricted across the TOP SECRET level
  • 82. Security+ Guide to Network Security Fundamentals, Third Edition 8282 82 82 tohttps://github.com/syaifulahdan/ Multilateral Security  Why compartments? Why not create a new classification level?  May not want either of TOP SECRET {CAT}  TOP SECRET {DOG} TOP SECRET {DOG}  TOP SECRET {CAT}  Compartments allow us to enforce the need to know principle Regardless of your clearance, you only have access to info that you need to know
  • 83. Security+ Guide to Network Security Fundamentals, Third Edition 8383 83 83 tohttps://github.com/syaifulahdan/ Multilateral Security  Arrows indicate “” relationship  Not all classifications are comparable, e.g., TOP SECRET {CAT} vs SECRET {CAT, DOG} TOP SECRET {CAT, DOG} TOP SECRET {CAT} TOP SECRET SECRET {CAT, DOG} SECRET {DOG} SECRET TOP SECRET {DOG} SECRET {CAT}
  • 84. Security+ Guide to Network Security Fundamentals, Third Edition 8484 84 84 tohttps://github.com/syaifulahdan/ MLS vs Multilateral Security  MLS can be used without multilateral security or vice- versa  But, MLS almost always includes multilateral  Example MLS mandated for protecting medical records of British Medical Association (BMA) AIDS was TOP SECRET, prescriptions SECRET What is the classification of an AIDS drug? Everything tends toward TOP SECRET Defeats the purpose of the system!  Multilateral security was used instead
  • 85. Security+ Guide to Network Security Fundamentals, Third Edition 8585 85 85 tohttps://github.com/syaifulahdan/ Covert Channel
  • 86. Security+ Guide to Network Security Fundamentals, Third Edition 8686 86 86 tohttps://github.com/syaifulahdan/ Covert Channel  MLS designed to restrict legitimate channels of communication  May be other ways for information to flow  For example, resources shared at different levels may signal information  Covert channel: “communication path not intended as such by system’s designers”
  • 87. Security+ Guide to Network Security Fundamentals, Third Edition 8787 87 87 tohttps://github.com/syaifulahdan/ Covert Channel Example  Alice has TOP SECRET clearance, Bob has CONFIDENTIAL clearance  Suppose the file space shared by all users  Alice creates file FileXYzW to signal “1” to Bob, and removes file to signal “0”  Once each minute Bob lists the files If file FileXYzW does not exist, Alice sent 0 If file FileXYzW exists, Alice sent 1  Alice can leak TOP SECRET info to Bob!
  • 88. Security+ Guide to Network Security Fundamentals, Third Edition 8888 88 88 tohttps://github.com/syaifulahdan/ Covert Channel Example Alice: Time: Create file Delete file Create file Delete file Bob: Check file Check file Check file Check fileCheck file Data: 1 0 1 01
  • 89. Security+ Guide to Network Security Fundamentals, Third Edition 8989 89 89 tohttps://github.com/syaifulahdan/ Covert Channel  Other examples of covert channels  Print queue  ACK messages  Network traffic, etc., etc., etc.  When does a covert channel exist? 1. Sender and receiver have a shared resource 2. Sender able to vary property of resource that receiver can observe 3. Communication between sender and receiver can be synchronized
  • 90. Security+ Guide to Network Security Fundamentals, Third Edition 9090 90 90 tohttps://github.com/syaifulahdan/ Covert Channel  Covert channels exist almost everywhere  Easy to eliminate covert channels… Provided you eliminate all shared resources and all communication  Virtually impossible to eliminate all covert channels in any useful system DoD guidelines: goal is to reduce covert channel capacity to no more than 1 bit/second Implication is that DoD has given up trying to eliminate covert channels!
  • 91. Security+ Guide to Network Security Fundamentals, Third Edition 9191 91 91 tohttps://github.com/syaifulahdan/ Covert Channel  Consider 100MB TOP SECRET file Plaintext version stored in TOP SECRET place Encrypted with AES using 256-bit key, ciphertext stored in UNCLASSIFIED location  Suppose we reduce covert channel capacity to 1 bit per second  It would take more than 25 years to leak entire document thru a covert channel  But it would take less than 5 minutes to leak 256-bit AES key thru covert channel!
  • 92. Security+ Guide to Network Security Fundamentals, Third Edition 9292 92 92 tohttps://github.com/syaifulahdan/ Real-World Covert Channel  Hide data in TCP header “reserved” field  Or use covert_TCP, tool to hide data in Sequence number ACK number
  • 93. Security+ Guide to Network Security Fundamentals, Third Edition 9393 93 93 tohttps://github.com/syaifulahdan/ Real-World Covert Channel  Hide data in TCP sequence numbers  Tool: covert_TCP  Sequence number X contains covert info A. Covert_TCP sender C. Covert_TCP receiver B. Innocent server SYN Spoofed source: C Destination: B SEQ: X ACK (or RST) Source: B Destination: C ACK: X
  • 94. Security+ Guide to Network Security Fundamentals, Third Edition 9494 94 94 tohttps://github.com/syaifulahdan/ Inference Control
  • 95. Security+ Guide to Network Security Fundamentals, Third Edition 9595 95 95 tohttps://github.com/syaifulahdan/ Inference Control Example  Suppose we query a database Question: What is average salary of female CS professors at SJSU? Answer: $95,000 Question: How many female CS professors at SJSU? Answer: 1  Specific information has leaked from responses to general questions!
  • 96. Security+ Guide to Network Security Fundamentals, Third Edition 9696 96 96 tohttps://github.com/syaifulahdan/ Inference Control and Research For example, medical records are private but valuable for research How to make info available for research and protect privacy? How to allow access to such data without leaking specific information?
  • 97. Security+ Guide to Network Security Fundamentals, Third Edition 9797 97 97 tohttps://github.com/syaifulahdan/ Naïve Inference Control Remove names from medical records? Still may be easy to get specific info from such “anonymous” data Removing names is not enough As seen in previous example What more can be done?
  • 98. Security+ Guide to Network Security Fundamentals, Third Edition 9898 98 98 tohttps://github.com/syaifulahdan/ Less-naïve Inference Control  Query set size control Don’t return an answer if set size is too small  N-respondent, k% dominance rule Do not release statistic if k% or more contributed by N or fewer Example: Avg salary in Bill Gates’ neighborhood Used by the US Census Bureau  Randomization Add small amount of random noise to data  Many other methods  none satisfactory
  • 99. Security+ Guide to Network Security Fundamentals, Third Edition 9999 99 99 tohttps://github.com/syaifulahdan/ Inference Control: The Bottom Line  Robust inference control may be impossible  Is weak inference control better than no inference control? Yes: Reduces amount of information that leaks and thereby limits the damage  Is weak crypto better than no crypto? Probably not: Encryption indicates important data May be easier to filter encrypted data
  • 100. Security+ Guide to Network Security Fundamentals, Third Edition 100100 100 100 tohttps://github.com/syaifulahdan/ CAPTCHA
  • 101. Security+ Guide to Network Security Fundamentals, Third Edition 101101 101 101 tohttps://github.com/syaifulahdan/ Turing Test  Proposed by Alan Turing in 1950  Human asks questions to one other human and one computer (without seeing either)  If human questioner cannot distinguish the human from the computer responder, the computer passes the test  The gold standard in artificial intelligence  No computer can pass this today
  • 102. Security+ Guide to Network Security Fundamentals, Third Edition 102102 102 102 tohttps://github.com/syaifulahdan/ CAPTCHA  CAPTCHA  Completely Automated Public Turing test to tell Computers and Humans Apart  Automated  test is generated and scored by a computer program  Public  program and data are public  Turing test to tell…  humans can pass the test, but machines cannot pass the test  Like an inverse Turing test (sort of…)
  • 103. Security+ Guide to Network Security Fundamentals, Third Edition 103103 103 103 tohttps://github.com/syaifulahdan/ CAPTCHA Paradox  “…CAPTCHA is a program that can generate and grade tests that it itself cannot pass…”  “…much like some professors…”  Paradox  computer creates and scores test that it cannot pass!  CAPTCHA used to restrict access to resources to humans (no computers)  CAPTCHA useful for access control
  • 104. Security+ Guide to Network Security Fundamentals, Third Edition 104104 104 104 tohttps://github.com/syaifulahdan/ CAPTCHA Uses?  Original motivation: automated “bots” stuffed ballot box in vote for best CS school  Free email services  spammers used bots sign up for 1000’s of email accounts CAPTCHA employed so only humans can get accts  Sites that do not want to be automatically indexed by search engines HTML tag only says “please do not index me” CAPTCHA would force human intervention
  • 105. Security+ Guide to Network Security Fundamentals, Third Edition 105105 105 105 tohttps://github.com/syaifulahdan/ CAPTCHA: Rules of the Game  Must be easy for most humans to pass  Must be difficult or impossible for machines to pass Even with access to CAPTCHA software  The only unknown is some random number  Desirable to have different CAPTCHAs in case some person cannot pass one type Blind person could not pass visual test, etc.
  • 106. Security+ Guide to Network Security Fundamentals, Third Edition 106106 106 106 tohttps://github.com/syaifulahdan/ Do CAPTCHAs Exist?  Test: Find 2 words in the following q Easy for most humans q Difficult for computers (OCR problem)
  • 107. Security+ Guide to Network Security Fundamentals, Third Edition 107107 107 107 tohttps://github.com/syaifulahdan/ CAPTCHAs  Current types of CAPTCHAs Visual Like previous example Many others Audio Distorted words or music  No text-based CAPTCHAs Maybe this is not possible…
  • 108. Security+ Guide to Network Security Fundamentals, Third Edition 108108 108 108 tohttps://github.com/syaifulahdan/ CAPTCHA’s and AI  Computer recognition of distorted text is a challenging AI problem But humans can solve this problem  Same is true of distorted sound Humans also good at solving this  Hackers who break such a CAPTCHA have solved a hard AI problem  Putting hacker’s effort to good use!  May be other ways to defeat CAPTCHAs…
  • 109. Security+ Guide to Network Security Fundamentals, Third Edition 109109 109 109 tohttps://github.com/syaifulahdan/ Firewalls
  • 110. Security+ Guide to Network Security Fundamentals, Third Edition 110110 110 110 tohttps://github.com/syaifulahdan/ Firewalls  Firewall must determine what to let in to internal network and/or what to let out  Access control for the network Internet Internal networkFirewall
  • 111. Security+ Guide to Network Security Fundamentals, Third Edition 111111 111 111 tohttps://github.com/syaifulahdan/ Firewall as Secretary  A firewall is like a secretary  To meet with an executive First contact the secretary Secretary decides if meeting is reasonable Secretary filters out many requests  You want to meet chair of CS department? Secretary does some filtering  You want to meet President of US? Secretary does lots of filtering!
  • 112. Security+ Guide to Network Security Fundamentals, Third Edition 112112 112 112 tohttps://github.com/syaifulahdan/ Firewall Terminology  No standard terminology  Types of firewalls Packet filter  works at network layer Stateful packet filter  transport layer Application proxy  application layer Personal firewall  for single user, home network, etc.
  • 113. Security+ Guide to Network Security Fundamentals, Third Edition 113113 113 113 tohttps://github.com/syaifulahdan/ Packet Filter  Operates at network layer  Can filters based on Source IP address Destination IP address Source Port Destination Port Flag bits (SYN, ACK, etc.) Egress or ingress application transport network link physical
  • 114. Security+ Guide to Network Security Fundamentals, Third Edition 114114 114 114 tohttps://github.com/syaifulahdan/ Packet Filter  Advantage Speed  Disadvantages No state Cannot see TCP connections Blind to application data application transport network link physical
  • 115. Security+ Guide to Network Security Fundamentals, Third Edition 115115 115 115 tohttps://github.com/syaifulahdan/ Packet Filter  Configured via Access Control Lists (ACLs) Different meaning of ACL than previously Allow Inside Outside Any 80 HTTP Allow Outside Inside 80 > 1023 HTTP Deny All All All All All Action Source IP Dest IP Source Port Dest Port Protocol  Intention is to restrict incoming packets to Web responses Any ACK All Flag Bits
  • 116. Security+ Guide to Network Security Fundamentals, Third Edition 116116 116 116 tohttps://github.com/syaifulahdan/ TCP ACK Scan  Attacker sends packet with ACK bit set, without prior 3-way handshake  Violates TCP/IP protocol  ACK packet pass thru packet filter firewall Appears to be part of an ongoing connection  RST sent by recipient of such packet  Attacker scans for open ports thru firewall
  • 117. Security+ Guide to Network Security Fundamentals, Third Edition 117117 117 117 tohttps://github.com/syaifulahdan/ TCP ACK Scan Packet Filter Trudy Internal Network ACK dest port 1207 ACK dest port 1208 ACK dest port 1209 RST  Attacker knows port 1209 open thru firewall  A stateful packet filter can prevent this (next)  Since ACK scans not part of established connections
  • 118. Security+ Guide to Network Security Fundamentals, Third Edition 118118 118 118 tohttps://github.com/syaifulahdan/ Stateful Packet Filter  Adds state to packet filter  Operates at transport layer  Remembers TCP connections and flag bits  Can even remember UDP packets (e.g., DNS requests) application transport network link physical
  • 119. Security+ Guide to Network Security Fundamentals, Third Edition 119119 119 119 tohttps://github.com/syaifulahdan/ Stateful Packet Filter  Advantages Can do everything a packet filter can do plus... Keep track of ongoing connections  Disadvantages Cannot see application data Slower than packet filtering application transport network link physical
  • 120. Security+ Guide to Network Security Fundamentals, Third Edition 120120 120 120 tohttps://github.com/syaifulahdan/ Application Proxy  A proxy is something that acts on your behalf  Application proxy looks at incoming application data  Verifies that data is safe before letting it in application transport network link physical
  • 121. Security+ Guide to Network Security Fundamentals, Third Edition 121121 121 121 tohttps://github.com/syaifulahdan/ Application Proxy  Advantages Complete view of connections and applications data Filter bad data at application layer (viruses, Word macros)  Disadvantage Speed application transport network link physical
  • 122. Security+ Guide to Network Security Fundamentals, Third Edition 122122 122 122 tohttps://github.com/syaifulahdan/ Application Proxy  Creates a new packet before sending it thru to internal network  Attacker must talk to proxy and convince it to forward message  Proxy has complete view of connection  Prevents some attacks stateful packet filter cannot  see next slides
  • 123. Security+ Guide to Network Security Fundamentals, Third Edition 123123 123 123 tohttps://github.com/syaifulahdan/ Firewalk  Tool to scan for open ports thru firewall  Known: IP address of firewall and IP address of one system inside firewall TTL set to 1 more than number of hops to firewall and set destination port to N If firewall does not let thru data on port N, no response If firewall allows data on port N thru firewall, get time exceeded error message
  • 124. Security+ Guide to Network Security Fundamentals, Third Edition 124124 124 124 tohttps://github.com/syaifulahdan/ Firewalk and Proxy Firewall Dest port 12345, TTL=4 Dest port 12344, TTL=4 Dest port 12343, TTL=4 Time exceeded Trudy Packet filter Router  This will not work thru an application proxy  The proxy creates a new packet, destroys old TTL RouterRouter
  • 125. Security+ Guide to Network Security Fundamentals, Third Edition 125125 125 125 tohttps://github.com/syaifulahdan/ Personal Firewall  To protect one user or home network  Can use any of the methods Packet filter Stateful packet filter Application proxy Part 2  Access Control 125
  • 126. Security+ Guide to Network Security Fundamentals, Third Edition 126126 126 126 tohttps://github.com/syaifulahdan/ Firewalls and Defense in Depth  Example security architecture Internet Intranet with Personal Firewalls Packet Filter Application Proxy DMZ FTP server DNS server WWW server
  • 127. Security+ Guide to Network Security Fundamentals, Third Edition 127127 127 127 tohttps://github.com/syaifulahdan/ Intrusion Detection Systems
  • 128. Security+ Guide to Network Security Fundamentals, Third Edition 128128 128 128 tohttps://github.com/syaifulahdan/ Intrusion Prevention  Want to keep bad guys out  Intrusion prevention is a traditional focus of computer security Authentication is to prevent intrusions Firewalls a form of intrusion prevention Virus defenses also intrusion prevention  Comparable to locking the door on your car
  • 129. Security+ Guide to Network Security Fundamentals, Third Edition 129129 129 129 tohttps://github.com/syaifulahdan/ Intrusion Detection  In spite of intrusion prevention, bad guys will sometime get into system  Intrusion detection systems (IDS) Detect attacks Look for “unusual” activity  IDS developed out of log file analysis  IDS is currently a very hot research topic  How to respond when intrusion detected? We don’t deal with this topic here
  • 130. Security+ Guide to Network Security Fundamentals, Third Edition 130130 130 130 tohttps://github.com/syaifulahdan/ Intrusion Detection Systems  Who is likely intruder? May be outsider who got thru firewall May be evil insider  What do intruders do? Launch well-known attacks Launch variations on well-known attacks Launch new or little-known attacks Use a system to attack other systems Etc.
  • 131. Security+ Guide to Network Security Fundamentals, Third Edition 131131 131 131 tohttps://github.com/syaifulahdan/ IDS  Intrusion detection approaches Signature-based IDS Anomaly-based IDS  Intrusion detection architectures Host-based IDS Network-based IDS  Most systems can be classified as above In spite of marketing claims to the contrary!
  • 132. Security+ Guide to Network Security Fundamentals, Third Edition 132132 132 132 tohttps://github.com/syaifulahdan/ Host-based IDS  Monitor activities on hosts for Known attacks or Suspicious behavior  Designed to detect attacks such as Buffer overflow Escalation of privilege  Little or no view of network activities
  • 133. Security+ Guide to Network Security Fundamentals, Third Edition 133133 133 133 tohttps://github.com/syaifulahdan/ Network-based IDS  Monitor activity on the network for Known attacks Suspicious network activity  Designed to detect attacks such as Denial of service Network probes Malformed packets, etc.  Can be some overlap with firewall  Little or no view of host-base attacks  Can have both host and network IDS
  • 134. Security+ Guide to Network Security Fundamentals, Third Edition 134134 134 134 tohttps://github.com/syaifulahdan/ Signature Detection Example  Failed login attempts may indicate password cracking attack  IDS could use the rule “N failed login attempts in M seconds” as signature  If N or more failed login attempts in M seconds, IDS warns of attack  Note that the warning is specific Admin knows what attack is suspected Admin can verify attack (or false alarm)
  • 135. Security+ Guide to Network Security Fundamentals, Third Edition 135135 135 135 tohttps://github.com/syaifulahdan/ Signature Detection  Suppose IDS warns whenever N or more failed logins in M seconds  Must set N and M so that false alarms not common  Can do this based on normal behavior  But if attacker knows the signature, he can try N-1 logins every M seconds!  In this case, signature detection slows the attacker, but might not stop him
  • 136. Security+ Guide to Network Security Fundamentals, Third Edition 136136 136 136 tohttps://github.com/syaifulahdan/ Signature Detection  Many techniques used to make signature detection more robust  Goal is usually to detect “almost signatures”  For example, if “about” N login attempts in “about” M seconds Warn of possible password cracking attempt What are reasonable values for “about”? Can use statistical analysis, heuristics, other Must take care not to increase false alarm rate
  • 137. Security+ Guide to Network Security Fundamentals, Third Edition 137137 137 137 tohttps://github.com/syaifulahdan/ Signature Detection  Advantages of signature detection Simple Detect known attacks Know which attack at time of detection Efficient (if reasonable number of signatures)  Disadvantages of signature detection Signature files must be kept up to date Number of signatures may become large Can only detect known attacks Variation on known attack may not be detected
  • 138. Security+ Guide to Network Security Fundamentals, Third Edition 138138 138 138 tohttps://github.com/syaifulahdan/ Anomaly Detection  Anomaly detection systems look for unusual or abnormal behavior  There are (at least) two challenges What is normal for this system? How “far” from normal is abnormal?  Statistics is obviously required here! The mean defines normal The variance indicates how far abnormal lives from normal
  • 139. Security+ Guide to Network Security Fundamentals, Third Edition 139139 139 139 tohttps://github.com/syaifulahdan/ How to Measure Normal?  How to measure normal? Must measure during “representative” behavior Must not measure during an attack… …or else attack will seem normal! Normal is statistical mean Must also compute variance to have any reasonable chance of success
  • 140. Security+ Guide to Network Security Fundamentals, Third Edition 140140 140 140 tohttps://github.com/syaifulahdan/ How to Measure Abnormal?  Abnormal is relative to some “normal” Abnormal indicates possible attack  Statistical discrimination techniques: Bayesian statistics Linear discriminant analysis (LDA) Quadratic discriminant analysis (QDA) Neural nets, hidden Markov models, etc.  Fancy modeling techniques also used Artificial intelligence Artificial immune system principles Many others!
  • 141. Security+ Guide to Network Security Fundamentals, Third Edition 141141 141 141 tohttps://github.com/syaifulahdan/ Anomaly Detection (1)  Spse we monitor use of three commands:  open, read, close  Under normal use we observe that Alice  open,read,close,open,open,read,close,…  Of the six possible ordered pairs, four pairs are “normal” for Alice:  (open,read), (read,close), (close,open), (open,open)  Can we use this to identify unusual activity?
  • 142. Security+ Guide to Network Security Fundamentals, Third Edition 142142 142 142 tohttps://github.com/syaifulahdan/ Anomaly Detection (1)  We monitor use of the three commands  open, read, close  If the ratio of abnormal to normal pairs is “too high”, warn of possible attack  Could improve this approach by Also using expected frequency of each pair Use more than two consecutive commands Include more commands/behavior in the model More sophisticated statistical discrimination
  • 143. Security+ Guide to Network Security Fundamentals, Third Edition 143143 143 143 tohttps://github.com/syaifulahdan/ Anomaly Detection Issues  System constantly evolves and so must IDS Static system would place huge burden on admin But evolving IDS makes it possible for attacker to (slowly) convince IDS that an attack is normal! Attacker may win simply by “going slow”  What does “abnormal” really mean? Only that there is possibly an attack May not say anything specific about attack! How to respond to such vague information?  Signature detection tells exactly which attack
  • 144. Security+ Guide to Network Security Fundamentals, Third Edition 144144 144 144 tohttps://github.com/syaifulahdan/ Anomaly Detection  Advantages Chance of detecting unknown attacks May be more efficient (since no signatures)  Disadvantages Today, cannot be used alone Must be used with a signature detection system Reliability is unclear May be subject to attack Anomaly detection indicates something unusual But lack of specific info on possible attack!
  • 145. Security+ Guide to Network Security Fundamentals, Third Edition 145145 145 145 tohttps://github.com/syaifulahdan/ Anomaly Detection: The Bottom Line  Anomaly-based IDS is active research topic  Many security professionals have very high hopes for its ultimate success  Often cited as key future security technology  Hackers are not convinced! Title of a talk at Defcon 11: “Why Anomaly-based IDS is an Attacker’s Best Friend”  Anomaly detection is difficult and tricky  Is anomaly detection as hard as AI?
  • 146. Security+ Guide to Network Security Fundamentals, Third Edition 146146 146 146 tohttps://github.com/syaifulahdan/ Access Control Summary Authentication and authorization Authentication  who goes there? Passwords  something you know Biometrics  something you are (or “you are your key”) Something you have
  • 147. Security+ Guide to Network Security Fundamentals, Third Edition 147147 147 147 tohttps://github.com/syaifulahdan/ Access Control Summary  Authorization  are you allowed to do that? Access control matrix/ACLs/Capabilities MLS/Multilateral security BLP/Biba Covert channel Inference control CAPTCHA Firewalls IDS
  • 148. Security+ Guide to Network Security Fundamentals, Third Edition 148148 148 148 tohttps://github.com/syaifulahdan/ REFERENCE  http://www.kau.edu.sa/GetFile.aspx?id=195241&fn=2_AccessControl.p pt.