Identification: Who are you? Associating an identity with a subject.
Authentication: Establishing the valid of something.
Authorisation: Associating rights or capabilities with a subject.
Authentication is a process of verifing the identity of a user, device, or other entire computer system.
Authentication is used for the purpose of performing trusted communications between parties for computing and telecommunications applications.
Classfication:
Human vs Machine: Human is much less secure than machine authentication, but a good security guard can prove invaluable
Password
Password: a word, or a phase, or a personal identification number to kept as a secure and is used for authentication.
Advantages:
Disadvantages:
Token:
Physical token is a physical device which perform or help authentication.
Token is based on what you have.
Disadvantages:
Multi-factor authentication techniques
New Type of Attack
Cache attack: Based on attacker’s ability to monitor cache access made by the victim in a shared physical system as in a virtualized environment or a type of cloud service.
Timing attack: Based on measuring various computations take to perform.
Power-monitoring attack: Attack that make use of varying power comsumption by the hardware during computation.
Biometrics
A biometric is a feature measured from the human body that is distinguish enough to be used for user authentication. Example: Fingle print, retina scan.
Advantages:
Disadvantages:
Terminology
Privacy threat on anonymized information
Open Source Intelligence Gathering (OSINT)
Source of personal and private information
Anonymized in communications.
Anonymizer
It can provide:
Advantages:
Disadvantages:
Crows:
Mix-Network:
Processes:
Advantages:
Disadvantages:
Crowds vs Mix-Network
An attacker can compromise anonymity of all users in crowds.
Crowds does not provide anonymity against a global adversary able to observe all communications. But Mix-Network can provide anonymity in this scene.
Crowds admit very efficient implementations because it have not encryption/decryption operations.
Tor-Networks:
Description:
Main princpile: Combining Crowd and Mix-network
Use a set of nodes (Crowd)
Routing use random choice (Crowd)
Encrypted connections between neighbouring nodes. (Mix-network)
Use share secret keys to perform symmetric encryption in further communications between neighbours.
DC-Networks:
Example:
Anonymity by DC-Network
It provides a sender anonymity because attacker is unable to know whether the package is contain a message or not.
It can be used in combination with other protection methods such as mix-network.
Disadvantages:
Every round of communication requires a new set of keys
Every node needs to participate every time a message is broadcasted
Information of protection
Level | What to protect | Method |
---|---|---|
3 | Existance of message | Steganography |
2 | Metadata of message | privacy-enhancing technology |
1 | content of message | encryption |
0 | Nothing | None |
Anti-intruction methods
Intrusion detection is the most important of Anti-intruction methods.
Elements of IDS
Types of IDS
Network-based IDS
Host-based IDS:
Application-based IDS: deal with the events appearing inside of a particular application.
IDS Methods
Anomaly based intrusion detection (基于异常)
System reacts abnormal behavious. Behaviour profiles are used and system is able to learn what is a “normal” behaviour
Advantages:
Disadvantages:
Knowledge based detection
Systems tries to match the explicit policies/signatures with the data collected to find an evidence of the suspicious behaviour.
Advantages:
Disadvantages:
Statistical analysis
Neural networks and machine learning
Neural networks use their learning algorithms to learn about the relationship between input and output data.
Purpose: To learn the behaviour of actors in the system.
Advantages:
Disadvantages:
It can be used to predict behaviour of users and super-users.
Rule based
State-transition analysis
An attack is described with a set of goals and transitions that must be achieved by an intruder to compromise a system.
Transitions are represents on state-transition diagrams.
Immune system based techniques
The model consists two parts:
Description: Store patterns are used for monitoring of system calls to check whether the sequence generated is listed in the knowledge base. If not, an alarm is generated.
Advantages:
Disadvantages:
Signature based method
Example: alert icmp $EXTERNAL_NET any -> $HOME_NET any (msg:"MISC large ICMP"; dsize: >800; reference:arachnids,246; classtype:bad-unknown; sid:499;)
Advantages:
Disadvantages:
User intention identification
Data mining
The main factors of protocol is:
Cryptography is a collect of mathmatical techniques for protecting information.
Type of cryptography:
Type of operations used:
The way in which plaintext is processed
Symmetric encryption: Encryption and Decryption are use a same secret key. Example: DES, AES, 3DES
Asymmetric encryption: Encryption uses public key, while decryption uses pricate key. Example: RSA
Block ciphers modes
ECB (electronic Codebook)
CBC (Cipher Block Chaining)
CFB (Cipher Feedback)
The process of Feistel cipher algorithm:
DES (Data Encryption Standard):
3DES: Use DES for 3 times
C = E_k3[D_k2[E_k1[P]]] P = D_k1[E_k2[D_k3[C]]]
AES (Advanced Encryption Standard):
Security protocols: it is a set of rules that is in order to ensure achieving various security or privcy goals.
The correctness of protocols depends on the assumption on capabilities of possible intruder.
Assumptions are often left implicit(入侵者).
Logical representation: Logical representation and analysis of the security protocols is a particular successful approach for the protocols verification.
Protocol analysis using logic
Protocol analysis using a logic
formula of BAN logic
Example of formula of BAN logic
If P believes that it shares a secret key K with Q, and if P receives a message containing X encrypted with K then P believes that Q once said X.
P believes P <-key-> Q, P sees {X}K ==> P believes (Q said X)
If P believes that Q once said X, then P believes that Q once believed X (by main assumption). If additionally P believes X is fresh then P must believe that Q currently believes X.
P believes Fresh(X), P believes (Q saids X) ==> P believes (Q believes X)
If P believes that Q has control over whether or not X true and if P believes that Q believes it to be true, then P must believe in it also. The reason is Q is an authority on the matter as far as P is concerned.
P believes (Q controls X), P believes (Q believes X) ==> P believes X
Encryption: Symmetric encryption: DES, 3DES, AES Asymmetric encryption: RSA
RSA
It is a block cipher in which the plaintext and ciphertext are integers between 1 and n - 1.
based on hardness of factoring big numbers.
Encryption: C = M^e mod n, in which M is plaintext, e is a random number, and n is a prime number
Decreption: M = C^d mod n = (M^e)^d mod n = M^ed mod n
Requirements:
Key Generation
x
, y
--------- (17, 11).O(n)
= (x - 1)(y - 1) ---- (16 * 10) = 160.e
that less than O(n) ---- 7.d
, use de mod O(n) = 1 and d < O(n) ---- 7d mod 160 = 1, d = 23.Discussion
Diffie-Hellman key exchange
Message authentication and hash function(消息认证)
One way Hash Functions Hash Function don’t use secret key
Identification
3-colorability
Requirements
Inactive and Non-inactive
Features | Inactive | Non-inactive |
---|---|---|
Inactive | Need | No |
Efficient | Slow | Fast |
Security | High security | Low security |
Scene | Suitable for high security scene | Suitable for high efficient scene |
Rapid developments computer systems, networks and give rise for
Restriction on Cryptography
Patent system
Trade secret Law
National and International regulations
Clipper chip
Escrowed Encryption Standard:
Potential Problems with Clipper chip
International agreements on Cryptograph
Digital Rights Management
the Organization for Economic Development and Cooperation adopted a set of privacy guidelines:
Collection Limitation Principle: there should be limits to the collection of personal data, and any such data should be obtained by lawful and fair means;
Data Quality Principle: personal data should be relevant to the purposes for which it is to be used, should be accurate, complete, and kept up to date.
Purpose Specification Principle: the purposes for which personal data is collected should be specified not later that at the time of data collection and the subsequent use limited to the fulfilment of those purposes;
Use Limitation Principle: Personal data should not be disclosed, made available, or otherwise used for purposes others that those specified in advance.
Security Safeguards Principle: personal data should be protected by reasonable security safeguards again such risks as loss, unauthorized access, destruction.
Openess Principle: there should be a general policy of openess about developments, practices and policies with respect to personal data.
Individual Participation Principle:
Accountability principle: a data controller should be accountable for complying with measures which give effect to the principle stated
The firewalls implement hardware or software solutions beased on the control of network connection between local network and other networks.
OSI
Firewall characteristics:
Types of control used by firewalls
Limitations of the firewalls
Types of firewall
Packet filtering route: applies a set of rules to each incoming IP packet and then forwards or discards the packet.
Filtering rules based on:
Advantages:
Disadvantages:
Circuit-level gateway
Based on specified session rules
It sets up two connections:
Once connections are established and security criteria are met , both connections are linked by the gateway;
Advantages:
Disadvantages:
Application-level gateway
They can filter packets in the application layer of the OSI model.
Advantages:
Disadvantages:
Firewall benefits and problems
Benefits
Problems
Key next-generation firewall requirements