SlideShare a Scribd company logo
Course 3: Network Security, Section 1 Pascal Meunier, Ph.D., M.Sc., CISSP May 2004; updated July 30, 2004 Developed thanks to the support of Symantec Corporation, NSF SFS Capacity Building Program (Award Number 0113725) and the Purdue e-Enterprise Center Copyright (2004) Purdue Research Foundation. All rights reserved.
Course 3 Learning Plan Architecture Physical and link layer Network layer Transport layer Application layer: DNS, RPC, NFS Application layer: Routing Wireless networks More secure protocols:  DNSSEC, IPSEC, IPv6
Learning objectives Understand the logical order of presentation for this course Understand the coverage and focus Understand how networks are organized by layers
Introduction Network architecture is layered Lower layer vulnerabilities are inherited at higher levels Describing exploitable features and vulnerabilities in the scope of each layer makes sense TCP/IP v.4 is dominant design in use Many vulnerabilities can't be prevented without a major transition to a completely new design, or are hard problems Most core vulnerabilities can't really be fixed This is an important design consideration for any application that needs to use networks
Strategies Prevention  Disabling features and functionality Disabling exploitation paths  Some choice of network application-level protocols Mitigation (limiting consequences and impact) Network configurations (de-militarized zones, etc...) Detection Response Providing guarantees at the application level Migrating to other, safer protocols
Focus on Prevention and Detection Identify features and functionality to be turned off or provided with limited availability Identify exploitation paths and attempt to block them Investigate choice of application-level protocols (e.g., DNS, BGP, etc...) Detect  Internal attackers Accountability When all the above was not sufficient Is there another exploitation path? Provide justification for continued or increased blocking
Labs and Tools Survey tools that help identify, block, control and detect Firewalls Filtering proxies Arp integrity tools Intrusion detection tools
Policies Policies define the accepted, normal states of the network Firewall rules encode a subset of the above Detection should ideally cover anything outside policy Low return on detecting blocked incoming attacks Many, expensive, no accountability (but statistics useful) Need to detect violations in the networks you control Should be inspired by The purpose of design decisions at each network layer The risks of the adopted designs We will review the above
What We Won't Cover Detailed firewall configurations See instead "Firewalls and Internet Security: Repelling the Wily Hacker", 2nd Edition, by William Cheswick, Steven M. Bellovin, Aviel D. Rubin. See CERT's Advanced Information Assurance Handbook, http://www.cert.org/archive/pdf/aia-handbook.pdf Exhaustive coverage of all network services and associated risks X11 SNMP etc...
Not Covered (cont.) Monitoring intrusion detection systems and tuning rules Incident response
Learning objectives Know the names and responsibilities of each layer in the TCP/IP model Understand that design limitations and vulnerabilities are inherited upwards
Network Models OSI Model 7 layers Old Applications often have properties of several layers at once Makes classification difficult, confusing TCP/IP Model a.k.a. "DoD" model (Department of Defense) 5 layers Often the two bottom layers are fused, yielding 4 layers Be wary of references to "layer 3" In which model? The 4-layer model makes the discussion of frames and the logical link sublayer more difficult, so we'll use 5 layers
The OSI 7-Layer Model OSI:  Open Systems Interconnection ISO standard Layered approach provides: Simplification Abstraction Each layer talks only to the equivalent layer somewhere else Division of responsibilities Standardization and interchangeability of equipment from different makers
The 7 Layers Application Presentation Session Transport Network Data Link Physical
Physical Layer Specifies the physical signals (electrical, optical, etc...) Type Levels Speed Cables if any Range Examples: 10-Base-2 Ethernet coaxial cable specification
Data Link Layer How to transmit data between two stations in the same segment Two components MAC (Media Access Control) Control which station receives which data Which station has permission to transmit  MAC addresses uniquely identify stations (in theory) LLC (Logical Link Control) frame synchronization Data unit is called a frame flow control error checking
Network Layer Routing between segments Forwarding Addressing Internetworking Error handling Congestion control Packet sequencing Data units are called "packets"
Transport Layer Reliability retransmissions, etc... Error recovery Flow control
Other Layers Session Handles connections between applications Presentation Handles encoding, encryption, etc... Application
Question How would you classify SSL (Secure Socket Layer) and TLS (Transport Layer Security), given that they: Provide encryption Are often implemented inside applications such as web browsers Provide sessions between hosts and servers Are responsible for data transport?
Answer SSL has been classified at all of those layers by different people: Transport Session Presentation Application
The TCP/IP Model 5 layers: Application (combines presentation and session) Transport Network Data Link Physical We will use this one as it is less ambiguous
Question Where would you classify SSH in the TCP/IP model?
Questions or Comments?
About These Slides You are free to copy, distribute, display, and perform the work; and to make derivative works, under the following conditions. You must give the original author and other contributors credit The work will be used for personal or non-commercial educational uses only, and not for commercial activities and purposes For any reuse or distribution, you must make clear to others the terms of use for this work Derivative works must retain and be subject to the same conditions, and contain a note identifying the new contributor(s) and date of modification For other uses please contact the Purdue Office of Technology Commercialization.  Developed thanks to the support of Symantec Corporation
Pascal Meunier [email_address] Contributors: Jared Robinson, Alan Krassowski, Craig Ozancin, Tim Brown, Wes Higaki, Melissa Dark, Chris Clifton, Gustavo Rodriguez-Rivera

More Related Content

PPTX
Cyber crime and security ppt
PPT
Firewals in Network Security NS10
PPTX
FIREWALLS BY SAIKIRAN PANJALA
PDF
LAN Design and implementation of Shanto Mariam University of Creative Technology
DOCX
Enhanced olsr for defense against dos attack in ad hoc networks
PDF
DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...
PPTX
Study of campus network security
DOCX
IEEE 2014 JAVA NETWORKING PROJECTS Hop by-hop message uthenticationand source...
Cyber crime and security ppt
Firewals in Network Security NS10
FIREWALLS BY SAIKIRAN PANJALA
LAN Design and implementation of Shanto Mariam University of Creative Technology
Enhanced olsr for defense against dos attack in ad hoc networks
DEH-DoSv6: A defendable security model against IPv6 extension headers denial ...
Study of campus network security
IEEE 2014 JAVA NETWORKING PROJECTS Hop by-hop message uthenticationand source...

Similar to 1.Architecture (20)

PPT
osi-tcp.ppt
PPTX
CISSP - Chapter 4 - Network Fundamental
PPTX
Viloria osi layer4-7
PPTX
osi-tcp ppt 1.pptx........................
PPT
OSI Model 2 .ppt
PPT
Network Security
PPT
The OSI (Open Systems Interconnection) model is a conceptual framework that d...
PPT
osi-tcposi-tcposi-tcposi-tcposi-tcposi-tcp.ppt
PPT
Reference models OSI and TCP/IP new differences
PPT
OSI TCP IP Protocol Layers description f
PPT
Open System Interface Transmission Control Protocol osi-tcp.ppt
PPT
Understanding how logical clocks (e.g., Lamport clocks, vector clocks) are us...
PPT
osi-tcp.ppt TCP/IP Modele OSI, TCPIP Pre
PPT
OSI Model, introduction, history,OSI layers andTCP/IP.ppt
PPTX
Lecture 1 Network Reference Models Final.pptx
PPT
osi and tcpip.ppt
PPT
Osi and tcpip
PPT
OSI Model.ppt
PPTX
OSI reference Model
PPT
Introduction_Network_lecture_ for begginers.ppt
osi-tcp.ppt
CISSP - Chapter 4 - Network Fundamental
Viloria osi layer4-7
osi-tcp ppt 1.pptx........................
OSI Model 2 .ppt
Network Security
The OSI (Open Systems Interconnection) model is a conceptual framework that d...
osi-tcposi-tcposi-tcposi-tcposi-tcposi-tcp.ppt
Reference models OSI and TCP/IP new differences
OSI TCP IP Protocol Layers description f
Open System Interface Transmission Control Protocol osi-tcp.ppt
Understanding how logical clocks (e.g., Lamport clocks, vector clocks) are us...
osi-tcp.ppt TCP/IP Modele OSI, TCPIP Pre
OSI Model, introduction, history,OSI layers andTCP/IP.ppt
Lecture 1 Network Reference Models Final.pptx
osi and tcpip.ppt
Osi and tcpip
OSI Model.ppt
OSI reference Model
Introduction_Network_lecture_ for begginers.ppt
Ad

More from phanleson (20)

PDF
Learning spark ch01 - Introduction to Data Analysis with Spark
PPT
Firewall - Network Defense in Depth Firewalls
PPT
Mobile Security - Wireless hacking
PPT
Authentication in wireless - Security in Wireless Protocols
PPT
E-Commerce Security - Application attacks - Server Attacks
PPT
Hacking web applications
PPTX
HBase In Action - Chapter 04: HBase table design
PPT
HBase In Action - Chapter 10 - Operations
PPT
Hbase in action - Chapter 09: Deploying HBase
PPTX
Learning spark ch11 - Machine Learning with MLlib
PPTX
Learning spark ch10 - Spark Streaming
PPTX
Learning spark ch09 - Spark SQL
PPT
Learning spark ch07 - Running on a Cluster
PPTX
Learning spark ch06 - Advanced Spark Programming
PPTX
Learning spark ch05 - Loading and Saving Your Data
PPTX
Learning spark ch04 - Working with Key/Value Pairs
PPTX
Learning spark ch01 - Introduction to Data Analysis with Spark
PPT
Hướng Dẫn Đăng Ký LibertaGia - A guide and introduciton about Libertagia
PPT
Lecture 1 - Getting to know XML
PPTX
Lecture 4 - Adding XTHML for the Web
Learning spark ch01 - Introduction to Data Analysis with Spark
Firewall - Network Defense in Depth Firewalls
Mobile Security - Wireless hacking
Authentication in wireless - Security in Wireless Protocols
E-Commerce Security - Application attacks - Server Attacks
Hacking web applications
HBase In Action - Chapter 04: HBase table design
HBase In Action - Chapter 10 - Operations
Hbase in action - Chapter 09: Deploying HBase
Learning spark ch11 - Machine Learning with MLlib
Learning spark ch10 - Spark Streaming
Learning spark ch09 - Spark SQL
Learning spark ch07 - Running on a Cluster
Learning spark ch06 - Advanced Spark Programming
Learning spark ch05 - Loading and Saving Your Data
Learning spark ch04 - Working with Key/Value Pairs
Learning spark ch01 - Introduction to Data Analysis with Spark
Hướng Dẫn Đăng Ký LibertaGia - A guide and introduciton about Libertagia
Lecture 1 - Getting to know XML
Lecture 4 - Adding XTHML for the Web
Ad

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPT
Teaching material agriculture food technology
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Cloud computing and distributed systems.
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Encapsulation theory and applications.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Electronic commerce courselecture one. Pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
NewMind AI Weekly Chronicles - August'25-Week II
Review of recent advances in non-invasive hemoglobin estimation
Building Integrated photovoltaic BIPV_UPV.pdf
Teaching material agriculture food technology
Digital-Transformation-Roadmap-for-Companies.pptx
Network Security Unit 5.pdf for BCA BBA.
Cloud computing and distributed systems.
Agricultural_Statistics_at_a_Glance_2022_0.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Encapsulation theory and applications.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
“AI and Expert System Decision Support & Business Intelligence Systems”
Programs and apps: productivity, graphics, security and other tools
sap open course for s4hana steps from ECC to s4
Electronic commerce courselecture one. Pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
A comparative analysis of optical character recognition models for extracting...
Dropbox Q2 2025 Financial Results & Investor Presentation
The Rise and Fall of 3GPP – Time for a Sabbatical?

1.Architecture

  • 1. Course 3: Network Security, Section 1 Pascal Meunier, Ph.D., M.Sc., CISSP May 2004; updated July 30, 2004 Developed thanks to the support of Symantec Corporation, NSF SFS Capacity Building Program (Award Number 0113725) and the Purdue e-Enterprise Center Copyright (2004) Purdue Research Foundation. All rights reserved.
  • 2. Course 3 Learning Plan Architecture Physical and link layer Network layer Transport layer Application layer: DNS, RPC, NFS Application layer: Routing Wireless networks More secure protocols: DNSSEC, IPSEC, IPv6
  • 3. Learning objectives Understand the logical order of presentation for this course Understand the coverage and focus Understand how networks are organized by layers
  • 4. Introduction Network architecture is layered Lower layer vulnerabilities are inherited at higher levels Describing exploitable features and vulnerabilities in the scope of each layer makes sense TCP/IP v.4 is dominant design in use Many vulnerabilities can't be prevented without a major transition to a completely new design, or are hard problems Most core vulnerabilities can't really be fixed This is an important design consideration for any application that needs to use networks
  • 5. Strategies Prevention Disabling features and functionality Disabling exploitation paths Some choice of network application-level protocols Mitigation (limiting consequences and impact) Network configurations (de-militarized zones, etc...) Detection Response Providing guarantees at the application level Migrating to other, safer protocols
  • 6. Focus on Prevention and Detection Identify features and functionality to be turned off or provided with limited availability Identify exploitation paths and attempt to block them Investigate choice of application-level protocols (e.g., DNS, BGP, etc...) Detect Internal attackers Accountability When all the above was not sufficient Is there another exploitation path? Provide justification for continued or increased blocking
  • 7. Labs and Tools Survey tools that help identify, block, control and detect Firewalls Filtering proxies Arp integrity tools Intrusion detection tools
  • 8. Policies Policies define the accepted, normal states of the network Firewall rules encode a subset of the above Detection should ideally cover anything outside policy Low return on detecting blocked incoming attacks Many, expensive, no accountability (but statistics useful) Need to detect violations in the networks you control Should be inspired by The purpose of design decisions at each network layer The risks of the adopted designs We will review the above
  • 9. What We Won't Cover Detailed firewall configurations See instead "Firewalls and Internet Security: Repelling the Wily Hacker", 2nd Edition, by William Cheswick, Steven M. Bellovin, Aviel D. Rubin. See CERT's Advanced Information Assurance Handbook, http://www.cert.org/archive/pdf/aia-handbook.pdf Exhaustive coverage of all network services and associated risks X11 SNMP etc...
  • 10. Not Covered (cont.) Monitoring intrusion detection systems and tuning rules Incident response
  • 11. Learning objectives Know the names and responsibilities of each layer in the TCP/IP model Understand that design limitations and vulnerabilities are inherited upwards
  • 12. Network Models OSI Model 7 layers Old Applications often have properties of several layers at once Makes classification difficult, confusing TCP/IP Model a.k.a. "DoD" model (Department of Defense) 5 layers Often the two bottom layers are fused, yielding 4 layers Be wary of references to "layer 3" In which model? The 4-layer model makes the discussion of frames and the logical link sublayer more difficult, so we'll use 5 layers
  • 13. The OSI 7-Layer Model OSI: Open Systems Interconnection ISO standard Layered approach provides: Simplification Abstraction Each layer talks only to the equivalent layer somewhere else Division of responsibilities Standardization and interchangeability of equipment from different makers
  • 14. The 7 Layers Application Presentation Session Transport Network Data Link Physical
  • 15. Physical Layer Specifies the physical signals (electrical, optical, etc...) Type Levels Speed Cables if any Range Examples: 10-Base-2 Ethernet coaxial cable specification
  • 16. Data Link Layer How to transmit data between two stations in the same segment Two components MAC (Media Access Control) Control which station receives which data Which station has permission to transmit MAC addresses uniquely identify stations (in theory) LLC (Logical Link Control) frame synchronization Data unit is called a frame flow control error checking
  • 17. Network Layer Routing between segments Forwarding Addressing Internetworking Error handling Congestion control Packet sequencing Data units are called "packets"
  • 18. Transport Layer Reliability retransmissions, etc... Error recovery Flow control
  • 19. Other Layers Session Handles connections between applications Presentation Handles encoding, encryption, etc... Application
  • 20. Question How would you classify SSL (Secure Socket Layer) and TLS (Transport Layer Security), given that they: Provide encryption Are often implemented inside applications such as web browsers Provide sessions between hosts and servers Are responsible for data transport?
  • 21. Answer SSL has been classified at all of those layers by different people: Transport Session Presentation Application
  • 22. The TCP/IP Model 5 layers: Application (combines presentation and session) Transport Network Data Link Physical We will use this one as it is less ambiguous
  • 23. Question Where would you classify SSH in the TCP/IP model?
  • 25. About These Slides You are free to copy, distribute, display, and perform the work; and to make derivative works, under the following conditions. You must give the original author and other contributors credit The work will be used for personal or non-commercial educational uses only, and not for commercial activities and purposes For any reuse or distribution, you must make clear to others the terms of use for this work Derivative works must retain and be subject to the same conditions, and contain a note identifying the new contributor(s) and date of modification For other uses please contact the Purdue Office of Technology Commercialization. Developed thanks to the support of Symantec Corporation
  • 26. Pascal Meunier [email_address] Contributors: Jared Robinson, Alan Krassowski, Craig Ozancin, Tim Brown, Wes Higaki, Melissa Dark, Chris Clifton, Gustavo Rodriguez-Rivera

Editor's Notes

  • #5: Dominant : có ảnh hưởng lớn, chi phối Transition : chuyển tiếp, chuyển giọng, thời kì quá độ
  • #6: Mitigation : sự làm nhẹ, xoa dịu Impact : sự va chạm, ảnh hưởng
  • #7: Investigate : nghiên cứu tỉ mỉ Justification : sự chứng minh là đúng
  • #10: Exhaustive : hết mọi khía cạnh, thấu đáo
  • #12: Limitations : sự hạn chế, sự hạn định Upwards : hướng lên, đi lên
  • #13: Classification : sự phân loại Confusing : khó hiểu, gây bối rối