1 / 34

Lecture 4 Networking Concepts ( cont )

University of Nevada – Reno Computer Science & Engineering Department Fall 2011 CPE 400 / 600 Computer Communication Networks. Lecture 4 Networking Concepts ( cont ). slides are modified from J. Kurose & K. Ross. Chapter 1: roadmap. 1.1 What is the Internet? 1.2 Network edge

norrisc
Download Presentation

Lecture 4 Networking Concepts ( cont )

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. University of Nevada – Reno Computer Science & Engineering Department Fall 2011 CPE 400 / 600Computer Communication Networks Lecture 4 Networking Concepts (cont) slides are modified from J. Kurose & K. Ross Introduction

  2. Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge • end systems, access networks, links 1.3 Network core • circuit switching, packet switching, network structure 1.4 Delay, loss and throughput in packet-switched networks 1.5Protocol layers, service models 1.6 Networks under attack: security 1.7 History Introduction 2

  3. Why layering? Dealing with complex systems: • explicit structure allows identification, relationship of complex system’s pieces • layered reference model for discussion • modularization eases maintenance, updating of system • change of implementation of layer’s service transparent to rest of system • e.g., change in gate procedure doesn’t affect rest of system • layering considered harmful? Introduction 3

  4. application: supporting network applications FTP, SMTP, HTTP transport: process-process data transfer TCP, UDP network: routing of datagrams from source to destination IP, routing protocols link: data transfer between neighboring network elements Ethernet, 802.111 (WiFi), PPP physical: bits “on the wire” Internet protocol stack application transport network link physical Introduction 4

  5. presentation: allow applications to interpret meaning of data, e.g., encryption, compression, machine-specific conventions session: synchronization, checkpointing, recovery of data exchange Internet stack “missing” these layers! these services, if needed, must be implemented in application needed? ISO/OSI reference model application presentation session transport network link physical Introduction 5

  6. network link physical link physical M M M Ht M Hn Hn Hn Hn Ht Ht Ht Ht M M M M Hn Ht Ht Hl Hl Hl Hn Hn Hn Ht Ht Ht M M M source Encapsulation message application transport network link physical segment datagram frame switch destination application transport network link physical router Introduction 6

  7. Chapter 1: roadmap 1.1What is the Internet? 1.2 Network edge • end systems, access networks, links 1.3 Network core • circuit switching, packet switching, network structure 1.4Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History Introduction 7

  8. Network Security • field of network security: • how bad guys can attack computer networks • how we can defend networks against attacks • how to design architectures that are immune to attacks • Internet not originally designed with (much) security in mind • original vision: “a group of mutually trusting users attached to a transparent network”  • Internet protocol designers playing “catch-up” • security considerations in all layers! Introduction 8

  9. The Cast of Characters • Alice and Bob are the good guys • Trudy is the bad guy • Trudy is our generic “intruder” • Who might Alice, Bob be? • … well, real-life Alices and Bobs • Web browser/server for electronic transactions • on-line banking client/server • DNS servers • routers exchanging routing table updates

  10. Alice’s Online Bank • Alice opens Alice’s Online Bank (AOB) • AOB must prevent Trudy from learning Bob’s balance • Confidentiality (prevent unauthorized reading of information) • Trudy must not be able to change Bob’s balance • Bob must not be able to improperly change his own account balance • Integrity (prevent unauthorized writing of information)

  11. Alice’s Online Bank • AOB’s information must be available when needed • Availability (data is available in a timely manner when needed) • How does Bob’s computer know that “Bob” is really Bob and not Trudy? • When Bob logs into AOB, how does AOB know that “Bob” is really Bob? • Authentication (assurance that other party is the claimed one) • Bob can’t view someone else’s account info • Bob can’t install new software, etc. • Authorization (allowing access only to permitted resources)

  12. Think Like Trudy • Good guys must think like bad guys! • A police detective • Must study and understand criminals • In network security • We must try to think like Trudy • We must study Trudy’s methods • We can admire Trudy’s cleverness • Often, we can’t help but laugh at Alice and Bob’s carelessness • But, we cannot act like Trudy

  13. Aspects of Security • Security Services • Enhance the security of data processing systems and information transfers of an organization. • Counter security attacks. • Security Attack • Action that compromises the security of information owned by an organization. • Security Mechanisms • Designed to prevent, detect or recover from a security attack.

  14. Security Services • Enhance security of data processing systems and information transfers • Authentication • Assurance that the communicating entity is the one claimed • Authorization • Prevention of the unauthorized use of a resource • Availability • Data is available in a timely manner when needed

  15. Security Services • Confidentiality • Protection of data from unauthorized disclosure • Integrity • Assurance that data received is as sent by an authorized entity • Non-Repudiation • Protection against denial by one of the parties in a communication

  16. malware can get in host from a virus, worm, or trojan horse. spyware malware can record keystrokes, web sites visited, upload info to collection site. infected host can be enrolled in botnet, used for spam and DDoS attacks. malware often self-replicating: from one infected host, seeks entry into other hosts Bad guys: put malware into hosts via Internet Introduction 16

  17. Trojan horse hidden part of some otherwise useful software today often in Web page (Active-X, plugin) virus infection by receiving object (e.g., e-mail attachment), actively executing self-replicating: propagate itself to other hosts, users Bad guys: put malware into hosts via Internet worm: • infection by passively receiving object that gets itself executed • self- replicating: propagates to other hosts, users Sapphire Worm: aggregate scans/sec in first 5 minutes of outbreak (CAIDA, UWisc data) Introduction 17

  18. target Bad guys: attack server, network infrastructure Denial of Dervice (DoS): attackers make resources (server, bandwidth) unavailable to legitimate traffic by overwhelming resource with bogus traffic 1. select target 2. break into hosts around the network (see botnet) 3. send packets to target from compromised hosts Introduction 18

  19. src:B dest:A payload The bad guys can sniff packets Packet sniffing: • broadcast media (shared Ethernet, wireless) • promiscuous network interface reads/records all packets (e.g., including passwords!) passing by C A B • Wireshark software used for end-of-chapter labs is a (free) packet-sniffer Introduction 19

  20. src:B dest:A payload The bad guys can use false source addresses IP spoofing:send packet with false source address C A B Introduction 20

  21. The bad guys can record and playback record-and-playback: sniff sensitive info (e.g., password), and use later • password holder is that user from system point of view C A src:B dest:A user: B; password: foo B … lots more on security (throughout, Chapter 8) Introduction 21

  22. Early Hacking – Phreaking • In1957, a blind seven-year old, Joe Engressia Joybubbles, discovered a whistling tone that resets trunk lines • Blow into receiver – free phone calls • Cap’n Crunch cereal prize • Giveaway whistle produces 2600 MHz tone

  23. The Eighties • Robert Morris worm - 1988 • Developed to measure the size of the Internet • However, a computer could be infected multiple times • Brought down a large fraction of the Internet • ~ 6K computers • Academic interest in network security

  24. The Nineties • Kevin Mitnick • First hacker on FBI’s Most Wanted list • Hacked into many networks • including FBI • Stole intellectual property • including 20K credit card numbers • In 1995, caught 2nd time • served five years in prison

  25. The Twenties • Code Red worm • Jul 19, 2001: infected more than 359K computers in less than 14 hours • Sapphire worm • Jan 31, 2003: infected more than 75K computers (most in 10 minutes) • DoS attack on sco.com • Dec 11, 2003: SYN flood of 50K packet-per-second • Nyxem/Blackworm virus • Jan 15, 2006: infected about 1M computers within two weeks

  26. Security Trends www.cert.org (Computer Emergency Readiness Team)

  27. What is network security about ? • It is about secure communication • Everything is connected by the Internet • There are eavesdroppers that can listen on the communication channels • Information is forwarded through packet switches which can be reprogrammed to listen to or modify data in transit • Tradeoff between security and performance

  28. Chapter 1: roadmap 1.1What is the Internet? 1.2 Network edge • end systems, access networks, links 1.3 Network core • circuit switching, packet switching, network structure 1.4 Delay, loss and throughput in packet-switched networks 1.5Protocol layers, service models 1.6 Networks under attack: security 1.7 History Introduction 28

  29. 1961:Kleinrock - queueing theory shows effectiveness of packet-switching 1964:Baran - packet-switching in military nets 1967:ARPAnet conceived by Advanced Research Projects Agency 1969: first ARPAnet node operational 1972: ARPAnet public demonstration NCP (Network Control Protocol) first host-host protocol first e-mail program ARPAnet has 15 nodes Internet History 1961-1972: Early packet-switching principles Introduction 29

  30. 1970:ALOHAnet satellite network in Hawaii 1974: Cerf and Kahn - architecture for interconnecting networks 1976: Ethernet at Xerox PARC late70’s: proprietary architectures: DECnet, SNA, XNA late 70’s: switching fixed length packets (ATM precursor) 1979:ARPAnet has 200 nodes Cerf and Kahn’s internetworking principles: minimalism, autonomy - no internal changes required to interconnect networks best effort service model stateless routers decentralized control define today’s Internet architecture Internet History 1972-1980: Internetworking, new and proprietary nets Introduction 30

  31. 1983: deployment of TCP/IP 1982:smtp e-mail protocol defined 1983: DNS defined for name-to-IP-address translation 1985: ftp protocol defined 1988: TCP congestion control new national networks: Csnet, BITnet, NSFnet, Minitel 100,000 hosts connected to confederation of networks Internet History 1980-1990: new protocols, a proliferation of networks Introduction 31

  32. early 1990’s:ARPAnet decommissioned 1991:NSF lifts restrictions on commercial use of NSFnet (decommissioned, 1995) early 1990s: Web hypertext [Bush 1945, Nelson 1960’s] HTML, HTTP: Berners-Lee 1994: Mosaic, later Netscape late 1990’s: commercialization of the Web late 1990’s – 2000’s: more killer apps: instant messaging, P2P file sharing network security to forefront est. 50 million host, 100 million+ users backbone links running at Gbps Internet History 1990, 2000’s: commercialization, the Web, new apps Introduction 32

  33. 2010: ~750 million hosts voice, video over IP P2P applications: BitTorrent (file sharing) Skype (VoIP), PPLive (video) more applications: YouTube, gaming, Twitter wireless, mobility Internet History Introduction 33

  34. Covered a “ton” of material! Internet overview what’s a protocol? network edge, core, access network packet-switching versus circuit-switching Internet structure performance: loss, delay, throughput layering, service models security history You now have: context, overview, “feel” of networking more depth, detail to follow! Introduction: Summary Introduction 34

More Related