




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、Chapter 4Network security高天寒Timothygao78Reviewü Introductionü Message authenticationü MD5ü SHA-1ü Digital signatureü PKI高天寒Timothygao78Contentsü Network securityü Security attackü Architecture and mü Firewallü IDSüü Other security tech
2、niques高天寒Timothygao78Network securityü Network security, 泛指网络系统的硬件、软件及其系统中的数据不受偶然或的破坏、更改、泄露,系统连续可靠正常运行,网络服务不中断ü 狭义,指网络的运行安全ü 因特网的特性nnnn界无主管不设防无法律约束ü成为影响Internet发展的主要因素高天寒Timothygao78Network security (Cont.)ü 缺乏用户鉴别机制n 使用IP作为节点主要标识n TCP/IP没有对IP地址真实性的鉴别机制n 网络拓扑ü 缺乏路由协议鉴别认
3、证机制ü 缺乏性ü TCP/UDP缺陷nnn三次握手缺陷初始序列号缺陷UDP易受源路由和DoSü TCP/IP服务的脆弱性高天寒Timothygao78Security attackü Security attack,任何以干扰、破坏网络系统为目的的非ü 对网络行为的两种理解nnü发生在行为完全完成且者在目标系统内从者开始在目标机上工作时刻起,已开始方式多种多样,环境越发广泛n 可以是n 可以是n 可以是ü 网络安全策略的特征的行为行为正常行为特征的异常行为总有一定规律可寻高天寒Timothygao78Attack char
4、acterü Attackerü Timeü Goalp Small networkp Universityp Multi-user networkp Government高天寒Timothygao78Attack method高天寒Timothygao78Attack method (Cont.)Interruption: This is an attack on availabilityInterception: This is an attack onityModification: This is an attack on integrityFabrica
5、tion: This is an attack on reliability and accountability高天寒Timothygao78Attack method (Cont.)Attacks can be from two categories: "Passive" when a network intruder intercepts data traveling through the network, and "Active" in which an intruder initiates commands to disrupt the ne
6、twork's normal operation.高天寒Timothygao78Typical Attacksü TCP SYN floodingü ICMP floodingü Smurfü Fragment attackü Teardropü IP spoofingü DNS spoofing高天寒Timothygao78Security ArchitectureApplicationTransportNetworkLinkPhysical高天寒Timothygao78S-Http、S/MIME、SETSSLIP
7、SecTPMC&AMechanismsü Firewallüü IDSü Scannerü Isolationü Audition高天寒Timothygao78Firewallü A firewall is a hardware/software combination that restricts access to or from a network resourceü A network resource is any addressable entity on a computer network&
8、#252; Two control policiesnnTrust all that should not be trustedDistrust all that should be trusted高天寒Timothygao78Characteristics of FWü All traffic from inside to outside must pass through the firewall (physically blocking all access to the local network)ü Only authorized traffic (defined
9、 by the local securitypolicy) will be allowed to pass高天寒Timothygao78Characteristics of FWü The firewall is inserted between the premises network and the Internet高天寒Timothygao78Types of FWü 按物理实体分类nnn软件硬件级ü 按性能分类nnn百兆千兆Tbit高天寒Timothygao78Types of FW (Cont.)ü 按部署位置分类nnn边界个人分布式级
10、2; 按工作方式分类nnPacket-filtering routerApplication-level gateway高天寒Timothygao78Packet filteringü Packet-filtering Routern Applies a set of rules to each incoming IP packet and then forwards or discards the packetn Filter packets going in both directionsn The packet filter is typically set up as a l
11、ist of rules based on matches to fields in the IP or TCP headern Two default policies (discard or forward)高天寒Timothygao78Packet filtering (Cont.)Screening RouterExternal NetworkInternal Network/24Filter RulesMail ServerWeb ServerOther HostsSource IPSourcePortDestinat
12、ionIPDestinationPortProtoFlagsActionDescription /24Any Any Any AnyAny Any Any Any AnyAnyAnyAnyAny> 10242580AnyTCP TCP TCP TCPAnyAnyACKAny Any AnyAllow Allow Allow Allow RejectAllow Allow Allow Allowall ofourtraffic outour callsreplies totraffic to traffic toour ma
13、il server our web serverDisallow all other traffic高天寒Timothygao78Application-level Gatewayü Application-level GatewaynnAlso called proxy serverActs as a relay of application-level traffic高天寒Timothygao78Application gateway高天寒Timothygao78IDSü Anintrusiondetectionsystem(IDS)isadeviceorsoftwar
14、e activitiesapplicationthatmonitorsnetworkorsystemformaliciousactivitiesorpolicyviolationsandproduces electronic reports to a management station.ü Passive and reactive defense techniqueü是的合理补充,后的第二道ü The combination of hardware and softwareü Based on sniff techniqueü Bypass
15、deployment高天寒Timothygao78NIDSü Network IDS (NIDS): NIDS are placed at a strategic point or points within the network to monitor traffic to and from all devices on the network.ü On-line and Off-line NIDS.高天寒Timothygao78SNORTü Snort is a free and open source NIDS created by Martin Roesc
16、h in 1998.ü Snort has the ability to perform real-time traffic analysis and packetlogging IP networks, and performs protocol analysis, content searching andmatching.高天寒Timothygao78HIDSü Host IDS (HIDS): HIDS run on individual hosts or devices on the network.ü HIDS monitors the inbound
17、 and outbound packets from the device only and will alert the user or administrator if suspicious activity is detected.ü The object:DIDSpppppNetwork File Process System log高天寒Timothygao78Techniqueü 静态配置分析nnnn通过检查当前系统配置等静态特征,检测系统是否遭到发现并痕迹可以及时发现潜在威胁要求对系统有全面、深入了解ü 误用检测技术(模式匹配)nnnn通过已知行为检
18、测已知系统模式匹配法IDIOT (Intrusion Detection In Our Time)对未知为力高天寒Timothygao78Technique (Cont.)ü 异常检测技术nnn为用户正常行为模式建立特征轮廓采用基于规则描述或统计方法及神经原网络方法能够发现未知ü 基于系统关键程序的安全规格描述方法n 为系统安全关键程序编写安全规格说明n 安全规格说明,是关于一个或多个程序执行时合法操作序列的描述,用于程序执行轨迹是否合法n 安全规格说明与程序缺陷无关,能检测出利用程序未知缺陷的行为高天寒Timothygao78Evaluation检测网络内部检测未知ppp
19、pNIDS不占用系统,对透明同时也是审计系统pppp交换机大量使用,使网络IDS失去对全网的NIDS处理速度慢HIDS占用系统缺乏防御能力高天寒Timothygao78IPSü IPS,是一种智能化的检测和防御ü 不但能检测发生,而且能通过一定的响应方式,实时终止行为的产生和发展ü 使IDS与统一ü 提供对的实时预防和分析ü 实施深度防御高天寒Timothygao78ü A virtualprivatenetwork()extendsaprivatenetwork across a public network, such as th
20、e Internet.üenables users to send and receive data acrossshared or public networks as if their computing deviceswere directly connected to the private networküAis created by establishing a virtual point-to-pointconnection through the use of tunnelling protocols.üscanallow employeestos
21、ecurelyaccessacorporate Similarly, separatedintranetwhiletravellingoutsidetheoffice.scan securelyconnect geographicallyofficesofanorganization,creatingonecohesive network.高天寒Timothygao78ütechnologyisalsousedbyindividualInternetusers to secure their wireless transactions, to circumvent geo-restr
22、ictions, and to connect to proxy servers for thepurpose of protectingal identity and vides:that even if the network traffic isü Thesniffedsecurity mity: suchatthepacketanattackerwouldonlyseeencrypted data Sender authentication: to prevent unauthorized users from accessing the Messag
23、e integrity to detect any instances of tamperingwith transmitted messages高天寒Timothygao78techniquesü Tunnelü Cryptologyü Key managementü Authentication高天寒Timothygao78IPSecIPSecisnotasingleprotocol.Instead,IPSec provides a set of security algorithmsplus a general framework that all
24、ows a pair of communicating entities to use whicheveralgorithmsprovidesecurityappropriateforthe communication.高天寒Timothygao78IPSec Servicesü Access Controlü Connectionless integrityü Data origin authenticationü Rejection of replayed packetsüity (encryption)ü Limited tra
25、ffic flowlity高天寒Timothygao78IPv4 vs. IPv6 header高天寒Timothygao78Destination AddressOptions & PaddingDestination AddressSource AddressSource AddressChecksumProtocolTTLFlow LabelHopLimitNextHeaderPayload LengthTraffic ClassVerVerPayload LengthOffsetFlagsIdentiferTOSIHLIPv6 vs. IPv4 Packet Data Unit
26、um 65535 octetsminimum 20 octetsIPv4 HeaderData FieldIPv4 PDUum65535 octetsFixed40 octets0 or moreExtension HeaderExtension HeaderIPv6 PDUTransport-level PDUIPv6 Header高天寒Timothygao78IPv6 extension headerHop-by-hop header Routing header Fragment HeaderAuthentication headerEncapsulating security payl
27、oad headerDestination header高天寒Timothygao78目的地处理 (60)加密(50)认证 (51)分段 (44)源路由 (43)所有中间Router检查 (0)Authenticationü Before applying AH高天寒Timothygao78Authentication (Cont.)ü Transport Mode (AH Authentication)高天寒Timothygao78Authentication (Cont.)ü Tunnel Mode (AH Authentication)高天寒Timothyg
28、ao78ESP Encryption andAuthenticationESP Encryption andAuthenticationHoneynetü Honeynet,是一个网络系统,隐蔽在后ü 所有进出数据都受到关注及ü 学习了解者思路、工具和目的ü 目标是通过熟悉理解所遇威胁,更好地防止威胁ü 建立Honeynet需解决的问题n 信息n 信息捕获高天寒Timothygao78Vulnerability scanü 漏洞,Vulnerability,“脆弱性”,是指硬件、软件或策略上存在的安全缺陷ü 威胁体现在行为对系统的威胁ü 3万个站点,800种ü 中国95%中心遭到过漏洞ü
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025年双端面磨床合作协议书
- 2025年GPS接收设备及其综合应用系统合作协议书
- 2025年轮式装甲车玻璃系列合作协议书
- 2025年空中交通管制设备项目发展计划
- 2025年变频与逆变电源装置项目发展计划
- 共同研发新能源汽车技术协议
- 餐饮业员工培训与晋升协议
- 健康产业人才培训协议
- 农村智能水肥一体化应用协议
- 数字创意内容开发合作协议
- 市场调查与分析(完全)
- 临床专业考试试题及答案
- 2024年黑龙江帕弗尔能源产业管理有限公司高校毕业生招聘笔试真题
- 初中家长学校父母课堂课件与教案
- 2025年软件设计师模拟试卷:操作系统与计算机网络核心知识点精讲
- 裸眼3D研究报告裸眼3D项目商业计划书(2025年)
- 计算机组成原理练习题(含参考答案)
- 新人教版数学六年级下册6.2.1 平面图形的认识与测量课件
- 2025-2030中国剑麻行业市场发展趋势与前景展望战略研究报告
- 2025浙江温州市公用事业发展集团有限公司招聘54人(第一批)笔试参考题库附带答案详解
- 高速公路执法培训
评论
0/150
提交评论