Network Security Protocols and Defensive Mechanisms
Spring 2016
CS 155
Network Security Protocols and
Defensive Mechanisms
John Mitchell
Network security
What is the network for?
What properties might attackers destroy?
n
n
n
2
Confidentiality : no information revealed to others
Integrity : communication remains intact
Availability : messages received in reasonable time
? Confidentiality
? Integrity
? Availability
Network Attacker
System
3
Intercepts and
controls network
communication
Plan for today
Protecting network connections
n
n
Wireless access¨C 802.11i/WPA2
IPSEC
Perimeter network defenses
n
Firewall
w Packet filter (stateless, stateful), Application layer proxies
n
Intrusion detection
w Anomaly and misuse detection
Network infrastructure security
n
n
4
BGP instability and S-BGP
DNS rebinding and DNSSEC
Last lecture
Basic network protocols
n
IP, TCP, UDP, BGP, DNS
Problems with them
n
TCP/IP
w No SRC authentication: can¡¯t tell where packet is from
w Packet sniffing
w Connection spoofing, sequence numbers
n
n
BGP: advertise bad routes or close good ones
DNS: cache poisoning, rebinding
w Web security mechanisms rely on DNS
5
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related download
- esg industry report card transportation aerospace and
- the military air transport service
- gao 14 375 defense transportation dod needs to take
- defense freight transportation services dfts part ii
- report no dodig 2021 093 audit of the department of
- jp 4 01 the defense transportation system
- defense transportation regulation
- transport and defense weebly
- dod logistics human capital strategy
- transport of defense compounds from source to sink
Related searches
- network user name and password
- mri protocols and planning
- mri thumb protocols and positioning
- telehealth protocols and guidelines
- network security engineer certifications
- network security certification jobs
- network security engineer certification
- chemotherapy protocols and guidelines
- network marketing tips and tricks
- wound care protocols and procedures
- social security income and supplemental security income
- windows 10 network security credentials