Network Security

  • Combination of low-cost powerful computing and high-performance networks is a two-edged sword:

    • Many powerful new services and applications are enabled
    • But computer systems and networks become highly susceptible(敏感) to a wide variety of security threats
    • Openness vs Security
  • Network security involves countermeasures(对策) to protect computer systems from intruders(入侵者)
    • Firewalls, security protocols, security practices, etc.

Eavesdropping

  • Information transmitted over network can be observed and recorded by eavesdroppers (using a packet sniffer)
  • Information can be replayed(重播) in attempts to access server
  • Requirements: privacy, authentication(认证), non-repudiation(否认)

Client Imposter

  • client imposter(冒名顶替者)

  • Imposters attempt to gain unauthorized(未经授权的) access to server
    • Ex. bank account or database of personal records
    • For example, in IP spoofing(戏弄) imposter sends packets with false source IP address
  • Requirements: privacy, authentication

Server Imposter

  • An imposter impersonates(模拟) a legitimate(合法的) server to gain sensitive information from a client

    • E.g. bank account number and associated user password
  • Requirements: privacy, authentication, non-repudiation

Denial of Service (DoS) Attack

  • Attacker can flood a server with requests, overloading the server resources (er. TCP Three-way handshake)

    • Results in denial of service to legitimate clients
  • Distributed denial of service attack on a server involves coordinated attack from multiple (usually hijacked) computers
  • Requirement: availability

TCP SYN Flood

  • The attacker sends a repeated same packet, to every port on the target server over using a fake IP address.
  • The server will send back ack continunously, prevents other client sending syn.

Man-in-the-Middle Attack

  • An imposter manages to place itself as man in the middle

    • convincing the server that it is legitimate client
    • convincing legitimate client that it is legitimate server
    • gathering sensitive information and possibly hijacking(劫持) session
  • Requirements: integrity, authentication

Malicious Code

  • A client becomes infected with malicious code
  • Virus: code that when executed, inserts itself in other programs
  • Worms: code that installs copies of itself in other machines attached to a network
  • Requirements: privacy, integrity, availability

Security Requirements

Security threats motivate requirements:

  • Privacy: information should be readable only by intended recipient(接受者)
  • Integrity: recipient can confirm that a message has not been altered during transmission
  • Authentication: it is possible to verify that sender or receiver is who he claims to be
  • Non-repudiation*(不可抵赖性): sender cannot deny having sent a given message.
  • Availability: of information and services

Countermeasures

  • Secure communication channels

    • Encryption
    • Cryptographic checksums and hashes (加密校验和和散列)
    • Authentication
    • Digital Signatures
  • Secure borders
    • Firewalls
    • Virus checking
    • Intrusion detection(入侵检测)
    • Authentication
    • Access Control (访问控制)

最新文章

  1. c#smtp多线程
  2. julia的优化?
  3. Eclipse+Tomcat+MAVEN+SVN项目完整环境搭建
  4. 多台linux服务器时间同步
  5. C#基础知识系列一(goto、i++、三元运算符、ref和out、String和string、重载运算符)
  6. 用javascript在客户端删除某一个cookie键值对
  7. C#中通过Selenium定位<a>标签的问题
  8. Maven依赖范围及依赖传递
  9. 手把手教你Windows下Go语言的环境搭建
  10. SQLHELPER 帮助类
  11. App热补丁动态修复技术介绍
  12. MongoDB之Java测试代码(DAO层)
  13. Revit通过API创建共享参数
  14. POJ 2728 Desert King (01分数规划)
  15. linux部署Web项目总结
  16. java 分布式与集群的区别和联系(转)
  17. 第8章 传输层(2)_UDP协议
  18. Ubuntu下配置PHP和CakePHP记录
  19. Get方法和post方法有何不同?
  20. 20155315 2016-2017-2 《Java程序设计》第九周学习总结

热门文章

  1. poi-word导出,导出多图片到word
  2. CSS3之盒模型
  3. 11.6NOIP模拟赛解题报告
  4. QQ 聊天机器人小薇发布!
  5. javax.swing.JComponent 调用顺序
  6. GitHub教程(二) 删除已有仓库
  7. LINUX下 informatica9.0.1 启动与关闭
  8. 页面引入(include)方式的研究及性能比较
  9. .net通过代码发送邮件
  10. 什么是封装? ----------------php中"public"类似的访问修饰符分别有什么作用?----什么是抽象?抽象的关键字以及用法----- 什么是接口?接口的关键字以及用法-------------