SlideShare a Scribd company logo
4
Most read
5
Most read
6
Most read
Application Layer Security
Protocol
By Prof. Kirti Ahirrao
Index:
• Introduction to Application Layer
• Types of Application Layer Protocols
• Security-Enhanced Application Layer Protocol
• Authentication & Key Distribution System
• AKA in CDMA & UMTS
• Layering Security Protocol above the Application Layer
Prof. Kirti Ahirrao 2
Application
Layer
• It is an abstraction layer.
• It specifies the
shared communications protocols.
• It uses interface methods
by hosts in a communications
network.
• The application layer abstraction
used in both of the standard models
: TCP/IP suite & OSI model.
Prof. Kirti Ahirrao 3
Application
Layer
• It is the closest layer to the end user,
• It provides hackers with the largest threat
surface.
• Poor app layer security can lead to
performance and stability issues, data theft,
and in some cases the network being taken
down.
• Application layer attacks include distributed
denial-of-service attacks (DDoS) attacks,
HTTP floods, SQL injections, cross-site
scripting, parameter tampering.
• Most organizations have application layer
security protections, such as web
application firewalls (WAFs), secure web
gateway services, and others.
Prof. Kirti Ahirrao 4
Types of Application Layer Protocol
• Remote login to hosts: Telnet.
• File transfer: File Transfer Protocol (FTP) & Trivial File Transfer
Protocol (TFTP).
• Electronic mail transport: Simple Mail Transfer Protocol (SMTP).
• Networking support: Domain Name System (DNS).
• Host initialization: BOOTP.
• Remote host management: Simple Network Management
Protocol (SNMP), Common Management Information Protocol over TCP
(CMOT).
Prof. Kirti Ahirrao 5
Security-Enhanced Application Layer Protocol
• Secure Shell (SSH) is a widely used and deployed protocol that serves as a secure replacement for
terminal access and file transfer.
• DNS Security, or DNSSEC in short, refers to a set of security extensions and enhancements for DNS.
• Furthermore, there are several cryptographic file systems that have been developed and proposed in
the past, e.g: Cryptographic File System (CFS) and the Andrew File System (AFS).
• The starting point was the specification of the Secure Hypertext Transfer Protocol (S-HTTP) that had
been developed and was originally proposed by Eric Rescorla and Allan Schiffman on behalf of the
CommerceNet consortium in the early 1990s.
• S-HTTP version 1.0 was publicly released in June 1994 and distributed by the CommerceNet
consortium.
• Since 1995, the S-HTTP specification has been further refined under the auspices of the IETF WTS
WG.
Prof. Kirti Ahirrao 6
Authentication & Key Agreement System(AKA)
• It is a security protocol used in 3G networks.
• It is used for one-time password generation mechanism
for digest access authentication.
• AKA is a challenge-response based mechanism that uses symmetric cryptography.
• AKA also called as 3G Authentication or Enhanced Subscriber Authorization (ESA).
• AKA works in CDMA(Code Division Multiplex Access) & UMTS(Universal Mobile
telecommunications System).
Prof. Kirti Ahirrao 7
AKA in CDMA
1. It provides procedures for mutual authentication of the Mobile Station (MS) and serving system.
2. The successful execution of AKA results in the establishment of a security association (i.e., set of
security data) between the MS and serving system that enables a set of security services to be
provided.
3. Major advantages of AKA over CAVE-based authentication include:
• Larger authentication keys (128-bit )
• Stronger hash function (SHA-1)
• Support for mutual authentication
• Support for signaling message data integrity
• Support for signaling information encryption
• Support for user data encryption
Prof. Kirti Ahirrao 8
AKA in UMTS
• This performs authentication and session key distribution
in Universal Mobile Telecommunications System (UMTS) networks.
• It is a challenge-response based mechanism that uses symmetric
cryptography.
• It is typically run in a UMTS IP Multimedia Services Identity
Module (ISIM), which is an application on a UICC (Universal
Integrated Circuit Card).
• AKA is defined in RFC 3310
Prof. Kirti Ahirrao 9
Layered Security Protocol
• Layered security, also known as layered defense.
• It describes the practice of combining multiple mitigating security controls to protect resources and
data.
• Layered security can be used in any environment, from military operations, to individuals, and
community residents (homeowners, neighborhood watch groups, etc).
• In other words, "layered security is the practice of using many different security controls at different
levels to protect assets.
• This provides strength and depth to reduce the effects of a threat.
• Your goal is to create redundancies (backups) in case security measures fail, are bypassed, or
defeated. Placing assets in the innermost perimeter will provide layers of security measures at
increasing distances from the protected asset.
• The number of layers and the security measures you use, will depend on the threat and importance
of the asset".
Prof. Kirti Ahirrao 10
Layered security
Prof. Kirti Ahirrao 11
References:
• en.wikipedia.org/wiki/
• www.f5.com/services/
Prof. Kirti Ahirrao 12
Thank You
Prof. Kirti Ahirrao 13

More Related Content

PPTX
MD5 ALGORITHM.pptx
PPT
Message authentication
 
PPT
Message Authentication Code & HMAC
PDF
Web Security
PDF
2. public key cryptography and RSA
PPTX
Security services and mechanisms
PPT
Message Authentication
PPT
Symmetric & Asymmetric Cryptography
MD5 ALGORITHM.pptx
Message authentication
 
Message Authentication Code & HMAC
Web Security
2. public key cryptography and RSA
Security services and mechanisms
Message Authentication
Symmetric & Asymmetric Cryptography

What's hot (20)

PPT
Pretty good privacy
PPTX
Trusted systems
PPT
Message authentication and hash function
PDF
Network security - OSI Security Architecture
PPTX
Modern symmetric cipher
PPTX
Confidentiality using symmetric encryption.pptx
PPTX
Public Key Cryptography
PPT
Symmetric and Asymmetric Encryption.ppt
PPTX
Transposition cipher techniques
PPT
Transport layer security.ppt
PPTX
Steganography
PPT
Cryptography and Network Security William Stallings Lawrie Brown
PPTX
Secure Socket Layer (SSL)
PDF
IP Security
PPTX
Intrusion detection
 
PPT
Block Cipher and its Design Principles
PDF
Asymmetric Cryptography
PPTX
Database security
PDF
Block Cipher Modes of Operation And Cmac For Authentication
PPT
Email Security : PGP & SMIME
Pretty good privacy
Trusted systems
Message authentication and hash function
Network security - OSI Security Architecture
Modern symmetric cipher
Confidentiality using symmetric encryption.pptx
Public Key Cryptography
Symmetric and Asymmetric Encryption.ppt
Transposition cipher techniques
Transport layer security.ppt
Steganography
Cryptography and Network Security William Stallings Lawrie Brown
Secure Socket Layer (SSL)
IP Security
Intrusion detection
 
Block Cipher and its Design Principles
Asymmetric Cryptography
Database security
Block Cipher Modes of Operation And Cmac For Authentication
Email Security : PGP & SMIME
Ad

Similar to Application layer security protocol (20)

PPT
saag-3.ppt
PPTX
Safe and secure autonomous systems
DOCX
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
PPT
Chapter 1.ppt
PPT
computer architecture.ppt
PPTX
asdas dwasdasf adasdasasdasd asdasdasdasdqwq
PPT
security of the information and the technoogy
PDF
Multilayer security mechanism in computer networks (2)
PPT
SecurityBasics.ppt a good thing by pakiza
PDF
Sfa community of practice a natural way of building
PPT
security issue
PPTX
Chapter 2 Overview of Commercial Issues.pptx
PDF
Multilayer security mechanism in computer networks
PDF
11.multilayer security mechanism in computer networks
PPTX
CRYPTOGRAPHY & NETWORK SECURITY [Autosaved].pptx
PPTX
cns unit 1.pptx
PPTX
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
DOC
Network security
PPTX
Lecture 07 networking
PDF
Implement a novel symmetric block
saag-3.ppt
Safe and secure autonomous systems
Types of Networks Week7 Part4-IS RevisionSu2013 .docx
Chapter 1.ppt
computer architecture.ppt
asdas dwasdasf adasdasasdasd asdasdasdasdqwq
security of the information and the technoogy
Multilayer security mechanism in computer networks (2)
SecurityBasics.ppt a good thing by pakiza
Sfa community of practice a natural way of building
security issue
Chapter 2 Overview of Commercial Issues.pptx
Multilayer security mechanism in computer networks
11.multilayer security mechanism in computer networks
CRYPTOGRAPHY & NETWORK SECURITY [Autosaved].pptx
cns unit 1.pptx
Slide Deck – Session 6 – FRSecure CISSP Mentor Program 2017
Network security
Lecture 07 networking
Implement a novel symmetric block
Ad

More from Kirti Ahirrao (6)

PPTX
BusTopolgy.pptx
PDF
Attack on Sony
PDF
Firewall traversals
PDF
Internet layer security protocol & IPsec
PDF
Network access layer security protocol
PDF
Chapter 1 introduction(web security)
BusTopolgy.pptx
Attack on Sony
Firewall traversals
Internet layer security protocol & IPsec
Network access layer security protocol
Chapter 1 introduction(web security)

Recently uploaded (20)

PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Business Ethics Teaching Materials for college
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Insiders guide to clinical Medicine.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Institutional Correction lecture only . . .
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Basic Mud Logging Guide for educational purpose
Renaissance Architecture: A Journey from Faith to Humanism
Business Ethics Teaching Materials for college
Supply Chain Operations Speaking Notes -ICLT Program
STATICS OF THE RIGID BODIES Hibbelers.pdf
Microbial disease of the cardiovascular and lymphatic systems
O5-L3 Freight Transport Ops (International) V1.pdf
Insiders guide to clinical Medicine.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Microbial diseases, their pathogenesis and prophylaxis
Institutional Correction lecture only . . .
FourierSeries-QuestionsWithAnswers(Part-A).pdf
TR - Agricultural Crops Production NC III.pdf
01-Introduction-to-Information-Management.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Week 4 Term 3 Study Techniques revisited.pptx
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
102 student loan defaulters named and shamed – Is someone you know on the list?
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Basic Mud Logging Guide for educational purpose

Application layer security protocol

  • 2. Index: • Introduction to Application Layer • Types of Application Layer Protocols • Security-Enhanced Application Layer Protocol • Authentication & Key Distribution System • AKA in CDMA & UMTS • Layering Security Protocol above the Application Layer Prof. Kirti Ahirrao 2
  • 3. Application Layer • It is an abstraction layer. • It specifies the shared communications protocols. • It uses interface methods by hosts in a communications network. • The application layer abstraction used in both of the standard models : TCP/IP suite & OSI model. Prof. Kirti Ahirrao 3
  • 4. Application Layer • It is the closest layer to the end user, • It provides hackers with the largest threat surface. • Poor app layer security can lead to performance and stability issues, data theft, and in some cases the network being taken down. • Application layer attacks include distributed denial-of-service attacks (DDoS) attacks, HTTP floods, SQL injections, cross-site scripting, parameter tampering. • Most organizations have application layer security protections, such as web application firewalls (WAFs), secure web gateway services, and others. Prof. Kirti Ahirrao 4
  • 5. Types of Application Layer Protocol • Remote login to hosts: Telnet. • File transfer: File Transfer Protocol (FTP) & Trivial File Transfer Protocol (TFTP). • Electronic mail transport: Simple Mail Transfer Protocol (SMTP). • Networking support: Domain Name System (DNS). • Host initialization: BOOTP. • Remote host management: Simple Network Management Protocol (SNMP), Common Management Information Protocol over TCP (CMOT). Prof. Kirti Ahirrao 5
  • 6. Security-Enhanced Application Layer Protocol • Secure Shell (SSH) is a widely used and deployed protocol that serves as a secure replacement for terminal access and file transfer. • DNS Security, or DNSSEC in short, refers to a set of security extensions and enhancements for DNS. • Furthermore, there are several cryptographic file systems that have been developed and proposed in the past, e.g: Cryptographic File System (CFS) and the Andrew File System (AFS). • The starting point was the specification of the Secure Hypertext Transfer Protocol (S-HTTP) that had been developed and was originally proposed by Eric Rescorla and Allan Schiffman on behalf of the CommerceNet consortium in the early 1990s. • S-HTTP version 1.0 was publicly released in June 1994 and distributed by the CommerceNet consortium. • Since 1995, the S-HTTP specification has been further refined under the auspices of the IETF WTS WG. Prof. Kirti Ahirrao 6
  • 7. Authentication & Key Agreement System(AKA) • It is a security protocol used in 3G networks. • It is used for one-time password generation mechanism for digest access authentication. • AKA is a challenge-response based mechanism that uses symmetric cryptography. • AKA also called as 3G Authentication or Enhanced Subscriber Authorization (ESA). • AKA works in CDMA(Code Division Multiplex Access) & UMTS(Universal Mobile telecommunications System). Prof. Kirti Ahirrao 7
  • 8. AKA in CDMA 1. It provides procedures for mutual authentication of the Mobile Station (MS) and serving system. 2. The successful execution of AKA results in the establishment of a security association (i.e., set of security data) between the MS and serving system that enables a set of security services to be provided. 3. Major advantages of AKA over CAVE-based authentication include: • Larger authentication keys (128-bit ) • Stronger hash function (SHA-1) • Support for mutual authentication • Support for signaling message data integrity • Support for signaling information encryption • Support for user data encryption Prof. Kirti Ahirrao 8
  • 9. AKA in UMTS • This performs authentication and session key distribution in Universal Mobile Telecommunications System (UMTS) networks. • It is a challenge-response based mechanism that uses symmetric cryptography. • It is typically run in a UMTS IP Multimedia Services Identity Module (ISIM), which is an application on a UICC (Universal Integrated Circuit Card). • AKA is defined in RFC 3310 Prof. Kirti Ahirrao 9
  • 10. Layered Security Protocol • Layered security, also known as layered defense. • It describes the practice of combining multiple mitigating security controls to protect resources and data. • Layered security can be used in any environment, from military operations, to individuals, and community residents (homeowners, neighborhood watch groups, etc). • In other words, "layered security is the practice of using many different security controls at different levels to protect assets. • This provides strength and depth to reduce the effects of a threat. • Your goal is to create redundancies (backups) in case security measures fail, are bypassed, or defeated. Placing assets in the innermost perimeter will provide layers of security measures at increasing distances from the protected asset. • The number of layers and the security measures you use, will depend on the threat and importance of the asset". Prof. Kirti Ahirrao 10
  • 13. Thank You Prof. Kirti Ahirrao 13