CSCE 181 Guest Lecture 2
« previous | Thursday, February 17, 2011 | next »
Dr. Guofei Gu: Networking Security
CSCE 465 "Computer & Network Security Spring 2012" Is your computer secure? Are you sure?
CSO can't even be sure (especially if using MS Windows)
Denial of Service Attack
Blocking out users from using a website
Rerouting
Data packets sent through a single route into pakistan
Other Malware
- 95% spam email traffic: 200 billion per day
- Phishing attacks rose 13% to over 28,000
- 294 hijacked brands
Bug in API
All above are result of Botnets
Computers used to be targets, but now they're resources for profit
Supercomputers are single machines with thousands of cores
Storm
Malware (botnet) that sends spam email
Storm Worm has 1-10 million 2.8 GHz processors with petabytes of RAM
"25% of Internet PCs are part of a botnet" (Vint Cerf; father of the Internet)
Client "bots" are infected, they network to a C&C server, and ultimately to a Bot-master
Broken assumptions of Internet Security
- Internet infrastructure (DNS, BGP) is trustworthy
- more vulnerable than you think
- Computers with AV are secure
- not really
- Attackers are for fun and fame
- profit!
- Attackers have limited computing power
- almost unbounded power
- Attacks are isolated
- The network has you, neo!
Security Basics
Security is the prevention of certain types of intentional actions from occurring. It is also a state of well-being in which the probability of attacks is kept low or tolerable
- potential violations of security are threats
- threats that succeeds in violating security are called attacks
- attacks are carried out by an attacker
- objects of attacks are assets
Basic Components
- Confidentiality
- keeping data hidden (privacy)
- Authenticiity
- identification of origin of information is assured
- Integrity
- prevention of data tampering
- Availability
- access to data and resources
Vulnerability
A systematic artifact that exposes the user, data, or system to a threat (buffer-overflow, WEP key leakage)
Sources:
- Bad software or hardware
- Bad design
- Bad policy or configuration
Eavesdropping
Attack on confidentiality: unauthorized access to information
- EX packet sniffers and wiretappers
packet sniffers: Wireshark, tcpdump (built-in command line)
Tampering
Attack on Integrity: stop flow of the message; delay and/or modify the message Rerouting through a middle-man
Fabrication
An intruder pretends to be a friend
Denial of Service
Attack on Availability:
- Destroy hardware (Cutting wires) or software
- Modify software using alias commands
- Corrupt packets
- Crash the server
Goals of Security
- Prevention - stop attackers in the first place
- Detection - detect current violations
- Recovery - cover up violations with secure options
- Survivability - continue computing as normal
How can we make our computer more secure?
- Prevent most threats.
- Detect threats that go through prevention
- React to threats that evade detection