Presentation is loading. Please wait.

Presentation is loading. Please wait.

网络安全威胁与防御策略. TCP/IP Protocols  Contains Five Layers  Top three layers contains many protocols  Actual transmission at the physical layer.

Similar presentations


Presentation on theme: "网络安全威胁与防御策略. TCP/IP Protocols  Contains Five Layers  Top three layers contains many protocols  Actual transmission at the physical layer."— Presentation transcript:

1 网络安全威胁与防御策略

2 TCP/IP Protocols  Contains Five Layers  Top three layers contains many protocols  Actual transmission at the physical layer

3 TCP/IP Layers Fig 9.1 Application Presentation Session Applications SMTPFTPDNSTELNETHTTP Transport TCPUDP Network ICMP ARPRARP Data Link Physical Protocols specific to the underlying physical media used for data communication at the hardware level IP

4 Message Transfer using TCP/IP Fig 9.2 Original Message TCP header IP header Original MessageTCP headerIP headerFrame header Original Message TCP header IP header Original MessageTCP headerIP headerFrame header Source Destination

5 TCP  Reliable transport layer communication  Establishes a logical connection between the communicating hosts  Socket-to-socket communication (Socket = Port + IP address)

6 TCP Segment Format Fig 9.3 Source Port number Destination Port number Sequence Number Acknowledgement Number Data 2 bytes 4 bytes 20-to-60 bytes header consisting of the following fields Header Length 4 bits Reserved 6 bits Flag 6 bits Window size 2 bytes ChecksumUrgent pointer 2 bytes Options 0 to 40 bytes

7 IP  Best effort delivery  Does not guarantee success  Leaves error checking to higher layers (e.g. to TCP)

8 IP Datagram Format Fig 9.4 Version HLEN Service Type Total Length (4 bits) (4 bits) (8 bits) (16 bits) Identification Flags Fragmentation Offset (16 bits) (3 bits) (13 bits) Time to live Protocol Header Checksum (8 bits) (8 bits) (16 bits) Source IP address (32 bits) Destination IP address (32 bits) Data Options

9 Network Aspects 网络问题  Internal network (e.g. LAN) 内部网络  External Network (e.g. Internet) 外部网络  Threats from the External Network to the Internal Network 来自公司网络内外的威胁

10 Network Threats 网络威胁 Fig 9.5 N e t w o r k B a c k b o n e Router To Internet Outside dangers can come in from here Inside information can leak out from here Corporate network

11 Firewall 防火墙  Special type of router 一类特殊的路由器  provides perimeter defence 提供边界防御  imposes restrictions on network services 限制网络服务  only authorized traffic is allowed 只有授权的通信流允许通过  is itself immune to penetration 自身免疫

12 Firewall Concept 防火墙概念 N e t w o r k B a c k b o n e To Internet Corporate network Firewall

13 Firewall Types 防火墙类型 Firewalls Packet FiltersApplication Gateways 分组过 滤器 应用 网关

14 Packet Filter(Screening filter ) 分组过滤器 ( 扫描过滤器 ) Internet Internal (Private) Network Packet filter Protected zone

15 Packet Filters 分组过滤器 foundation of any firewall system 任何防火墙系统的基础 examine each IP packet (no context) and permit or deny according to rules 检查每个 IP 分组根据规则决定允许或拒绝通过 hence restrict access to services (ports) 对服务(端口)限制访问 possible default policies (可能的默认策略) –that not expressly permitted is prohibited –that not expressly prohibited is permitted

16 Packet Filters 分组过滤器

17 Packet Filter Operation 分组过滤器操作 Outgoing packets Incoming packets Receive each packet. Apply rules. If no rules, apply default rules.

18 Attacks to security of packer filter 对分组过滤器的攻击 IP address spoofing IP 地址伪装 Source routing attacks 源路由攻击 Tiny fragment attacks 分片攻击

19 Packet Filter Defeating IP Spoofing Attack 分组过滤器对付 IP 伪装攻击 Incoming packet  178.29.10.89 178.29.10.90 178.29.10.91 Internal network and the IP addresses of the hosts Packet filter Source address: 178.29.10.91 STOP!

20 Application Gateway 应用网关 HTTP SMTP FTP TELNET Outside connection Inside connection Application gateway

21 Application Level Gateway (or Proxy) 应用网关(代理服务器) has full access to protocol (全访问协议) –user requests service from proxy 用户从代理请求服务 –proxy validates request as legal 代理验证请求合法性 –then actions request and returns result to user 返回结果 need separate proxies for each service 每个服务需要分别代理 –some services naturally support proxying –others are more problematic –custom services generally not supported

22 Circuit Gateway 电路网关 HTTP SMTP FTP TELNET Application gateway IP address = 178.29.10.90 IP address = 178.29.10.70 Source address = 178.29.10.90 Source address = 178.29.10.70 IP packet Inside host Outside host

23 Application Gateway – Illusion 应用网关示意图 HTTP SMTP FTP TELNET External host Internal host Application gateway User’s illusion Real connection

24 Firewall Configurations 防火墙配置 Firewall Configurations Screened host firewall, Single-homed bastion Screened host firewall, Dual-homed bastion Screened subnet firewall 单宿堡垒扫 描主机防火 墙 双宿堡垒扫 描主机防火 墙 扫描子网 防火墙

25 Screened Host Firewall, Single-homed Bastion 单宿堡垒扫描主机防火墙  Packet filter HTTP SMTP FTP TELNET Internet Application gateway Internal network

26 Screened Host Firewall, Single-homed Bastion 单宿堡垒扫描主机防火墙

27 Screened Host Firewall, Dual-homed Bastion 双宿堡垒扫描主机防火墙  Packet filter HTTP SMTP FTP TELNET Internet Application gateway Internal network

28 Screened Host Firewall, Dual-homed Bastion 双宿堡垒扫描主机防火墙

29 Screened Subnet Firewall 扫描子网防火墙  Packet filter HTTP SMTP FTP TELNET Internet Application gateway Internal network Packet filter

30 Demilitarized Zone (DMZ) Fig 9.19  Internet Internal private network Demilitarized Zone (DMZ) Firewall

31 Security at multiple Layers 多层安全机制 Application Layer Transport Layer Internet Layer Data Link Layer Physical Layer First level of security Second level of security

32 IPSec IP 安全性  Not concerned with application layer security 不需要考虑应用层安全  would like security implemented by the network for all applications 通过 IP 级安全实现对所有应用的安全保证  More effective in IPv6 在 IPv6 中提供更多的安全

33 IPSec IP 安全性  general IP Security mechanisms  Provides ( IP 级安全机制提供)  Authentication (认证 / 鉴别)  Confidentiality (保密)  key management (密钥管理)  applicable to use over LANs, across public & private WANs, & for the Internet 应用可以通过 LANs ,公共和专用 WANs ,或 Internet 接受 IPSec 提供的安全保护

34 IP Security Architecture IP 安全体系结构  specification is quite complex 规范相当复杂  defined in numerous RFC ’ s 在众多 RFC’s 中有定义  mandatory in IPv6, optional in IPv4 在 IPV6 中强制支持,在 IPV4 中选择支持

35 IPSec Processing Result IPSec 处理的结果 Fig 9.22 Actual data (Encrypted) Transport header (Encrypted) Internet header (Not encrypted)

36 IPSec in TCP/IP TCP/IP 协议堆栈中的 IPSec Original message Transmission medium Application Transport IPSec Internet Data link Original message Application Transport IPSec Internet Data link Sender Receiver

37 IPSec Uses IPSec 的应用

38 IPSec Protocols IPSec 协议 IPSec Authentication Header (AH)Encapsulating Security Payload (ESP)

39 AH and ESP Operation Modes AH 和 ESP 的操作模式 AH and ESP modes of operation Tunnel modeTransport mode 隧道模式传输模式

40 Tunnel Mode 隧道模式 X  P1 Proxy P2 Proxy  Y Network 1 Network 2 Tunnel

41 Tunnel Mode Implementation 隧道模式的实现 A BP1 P2 … Internal IP header and data (encrypted) External IP header (not encrypted)

42 IPSec steps Fig 9.28 Step 1 Algorithm and Key negotiations using IKE Step 2 Actual AH and ESP operations

43 Authentication Header (AH) 认证头( AH ) provides support for data integrity & authentication of IP packets (支持数据完整性和 IP 包的认证) –end system/router can authenticate user/app –prevents address spoofing attacks by tracking sequence numbers based on use of a MAC (基于消息认证码) –HMAC-MD5-96 or HMAC-SHA-1-96 parties must share a secret key (双方必须共享同一 个密钥匙)

44 AH Format AH 格式 Bit 0 8 16 31 Next header Payload length Reserved Security Parameter Index (SPI) Sequence number Authentication data (Variable size)

45 Receiver ’ s Sliding Window Fig 9.33 Receiver’s sliding window (W = 8) N – W Marked if a valid packet is received Unmarked if a valid packet is not yet received N

46 AH Transport Mode AH 的传输模式 IP header TCP header Original data (a) Before applying AH IP header TCP header Original data (b) After applying AH AH

47 AH Tunnel Mode AH 的隧道模式 IP header TCP header Original data (a) Before applying AH Original IP header TCP header Original data (b) After applying AH AH New IP header

48 Encapsulating Security Payload 封装安全载荷 provides message content confidentiality & limited traffic flow confidentiality 提供内容和流量限制保密 can optionally provide the same authentication services as AH 可以提供和 AH 相同的认证服务 supports range of ciphers, modes, padding –incl. DES, Triple-DES, RC5, IDEA etc –CBC most common –pad to meet blocksize, for traffic flow

49 ESP Format ESP 格式 Bit 0 16 24 31 Security Parameter Index (SPI) Sequence Number Padding (0-255 bytes) Payload data (Variable size) Padding lengthNext header Authentication data (Variable size)

50 ESP Transport Mode ESP 传输模式 IP header TCP header Original data (a) Before applying ESP TCP header Original data (b) After applying ESP ESP header Original IP header ESP trailer ESP auth Encrypted Authenticated

51 ESP Tunnel Mode ESP 隧道模式 IP header TCP header Original data (a) Before applying ESP TCP header Original data (b) After applying ESP ESP header Original IP header ESP trailer ESP auth Encrypted Authenticated New IP header

52 ISAKMP Header Format Fig 9.41 Bit 0 8 16 24 31 Initiator cookie Responder cookie Next payload Major version Minor version Exchange type Flags Message ID Length

53 Virtual Private Network (VPN) 虚拟专用网  Uses the Internet as if it is a private network 将 Internet 当成专用网络  Far less expensive than a leased line 比租用线路省钱  Uses IPSec protocol 使用 IP 安全协议

54 VPN Between Two Networks 两个网络间的 VPN X  Network 1 Y  Network 2 Firewall 1 Firewall 2 VPN tunnel Internet

55 Original Packet 原始分组

56 Firewall I changes the packet contents Firewall I 改变分组内容

57 Firewall II retrieves the original packet contents Firewall II 取回原分组内容


Download ppt "网络安全威胁与防御策略. TCP/IP Protocols  Contains Five Layers  Top three layers contains many protocols  Actual transmission at the physical layer."

Similar presentations


Ads by Google