Network Security

  • Combination of low-cost powerful computing and high-performance networks is a two-edged sword:

    • Many powerful new services and applications are enabled
    • But computer systems and networks become highly susceptible(敏感) to a wide variety of security threats
    • Openness vs Security
  • Network security involves countermeasures(对策) to protect computer systems from intruders(入侵者)
    • Firewalls, security protocols, security practices, etc.

Eavesdropping

  • Information transmitted over network can be observed and recorded by eavesdroppers (using a packet sniffer)
  • Information can be replayed(重播) in attempts to access server
  • Requirements: privacy, authentication(认证), non-repudiation(否认)

Client Imposter

  • client imposter(冒名顶替者)

  • Imposters attempt to gain unauthorized(未经授权的) access to server
    • Ex. bank account or database of personal records
    • For example, in IP spoofing(戏弄) imposter sends packets with false source IP address
  • Requirements: privacy, authentication

Server Imposter

  • An imposter impersonates(模拟) a legitimate(合法的) server to gain sensitive information from a client

    • E.g. bank account number and associated user password
  • Requirements: privacy, authentication, non-repudiation

Denial of Service (DoS) Attack

  • Attacker can flood a server with requests, overloading the server resources (er. TCP Three-way handshake)

    • Results in denial of service to legitimate clients
  • Distributed denial of service attack on a server involves coordinated attack from multiple (usually hijacked) computers
  • Requirement: availability

TCP SYN Flood

  • The attacker sends a repeated same packet, to every port on the target server over using a fake IP address.
  • The server will send back ack continunously, prevents other client sending syn.

Man-in-the-Middle Attack

  • An imposter manages to place itself as man in the middle

    • convincing the server that it is legitimate client
    • convincing legitimate client that it is legitimate server
    • gathering sensitive information and possibly hijacking(劫持) session
  • Requirements: integrity, authentication

Malicious Code

  • A client becomes infected with malicious code
  • Virus: code that when executed, inserts itself in other programs
  • Worms: code that installs copies of itself in other machines attached to a network
  • Requirements: privacy, integrity, availability

Security Requirements

Security threats motivate requirements:

  • Privacy: information should be readable only by intended recipient(接受者)
  • Integrity: recipient can confirm that a message has not been altered during transmission
  • Authentication: it is possible to verify that sender or receiver is who he claims to be
  • Non-repudiation*(不可抵赖性): sender cannot deny having sent a given message.
  • Availability: of information and services

Countermeasures

  • Secure communication channels

    • Encryption
    • Cryptographic checksums and hashes (加密校验和和散列)
    • Authentication
    • Digital Signatures
  • Secure borders
    • Firewalls
    • Virus checking
    • Intrusion detection(入侵检测)
    • Authentication
    • Access Control (访问控制)

Network Security Threats的更多相关文章

  1. android9.0适配HTTPS:not permitted by network security policy'

    app功能接口正常,其他手机运行OK,但是在Android9.0的手机上报错 CLEARTEXT communication to 192.168.1.xx not permitted by netw ...

  2. Android版本28使用http请求报错not permitted by network security policy

    Android版本28使用http请求报错not permitted by network security policy android模拟器调试登录的时候报错 CLEARTEXT communic ...

  3. 《Network Security A Decision and Game Theoretic Approach》阅读笔记

    网络安全问题的背景 网络安全研究的内容包括很多方面,作者形象比喻为盲人摸象,不同领域的网络安全专家对网络安全的认识是不同的. For researchers in the field of crypt ...

  4. Azure PowerShell (13) 批量设置Azure ARM Network Security Group (NSG)

    <Windows Azure Platform 系列文章目录> 刚刚在帮助一个合作伙伴研究需求,他们的虚拟机全面的网络安全组(Network Security Group, NSG)会经常 ...

  5. Network Security Services If you want to add support for SSL, S/MIME, or other Internet security standards to your application, you can use Network Security Services (NSS) to implement all your securi

    Network Security Services | MDN https://developer.mozilla.org/zh-CN/docs/NSS 网络安全服务 (NSS) 是一组旨在支持支持安 ...

  6. Firewall & Network Security

    Firewall & Network Security 防火墙 & 网络安全 NAT Gateway VPC Virtual Private Cloud refs https://en ...

  7. 网络安全服务(Network Security Services, NSS

    网络安全服务(Network Security Services, NSS)是一套为网络安全服务而设计的库 支持支持安全的客户端和 服务器应用程序.使用NSS构建的应用程序可以支持SSL v2 和v3 ...

  8. Network Security final project---War Game

    项目介绍: 为自己的网段设置防火墙并尝试攻击其他组 网络结构: 每组有3个机器,包含一个gateway和两个workstation,其中gateway是可以连接到其他组的gateway,但是无法连接到 ...

  9. Mozilla Network Security Services拒绝服务漏洞

    解决办法: 运行 yum update nss yum update nss

随机推荐

  1. Java温故而知新(5)设计模式详解(23种)

    一.设计模式的理解 刚开始“不懂”为什么要把很简单的东西搞得那么复杂.后来随着软件开发经验的增加才开始明白我所看到的“复杂”恰恰就是设计模式的精髓所在,我所理解的“简单”就是一把钥匙开一把锁的模式,目 ...

  2. python--boto3 之 与dynamoDB 的基本交互,表的备份与恢复

    最近因工作需要,研究了一下boto3中dynamoDB部分,略有心得,在此总结一下. 首先是boto3的安装,在装有python和pip的机器上,运行 sudo pip install boto3 官 ...

  3. Java CAS总结

    文章目录 1. CPU指令对CAS的支持(CPU的cas指令是原子的) 或许我们可能会有这样的疑问,假设存在多个线程执行CAS操作并且CAS的步骤很多,有没有可能在判断V和E相同后,正要赋值时,切换了 ...

  4. HTML5拖拽功能中 dataTransfer对象详解

    有了HTML5,老板再也不用担心我们的上传了,再加上有拖拽上传是不是很酷.百度一下,有关HTML5拖拽上传的文章和实例不少,都缺不了一个至关重要的东东DataTransfer.但是详细介绍的不多,尤其 ...

  5. Mysql与web之间的数据、查询等个问题

    Mysql与web之间的数据.查询等个问题 在自己写的一个jsp主页连接数据库出现的各种问题,写记下来与大家分享,共勉.最后附jdbc代码. ---DanlV Error 1---错误代码: java ...

  6. vue2.0 生命周期 简析

    Vue2.0 生命周期钩子函数: <template> <div id='app'> {{message}} </div> </template> va ...

  7. Netty入门2之----手动搭建HttpServer

    在上一章中我们认识了netty,他有三大优点:并发高,传输快,封装好.在这一章我们来用Netty搭建一个HttpServer,从实际开发中了解netty框架的一些特性和概念. netty.png 认识 ...

  8. 使用 Azure CLI 将 IaaS 资源从经典部署模型迁移到 Azure Resource Manager 部署模型

    以下步骤演示如何使用 Azure 命令行接口 (CLI) 命令将基础结构即服务 (IaaS) 资源从经典部署模型迁移到 Azure Resource Manager 部署模型. 本文中的操作需要 Az ...

  9. tpcc-mysql安装测试与使用生成对比图

    1:下载tpcc-mysql的压缩包,从下面的网站进行下载 https://github.com/Percona-Lab/tpcc-mysql 也可直接从叶总博客直接下载: http://imysql ...

  10. MySQL MHA搭建

    MHA算是业内比较成熟的MySQL高可用解决方案,在MySQL故障切换过程中,MHA能做到自动完成数据库的故障切换操作,并且在进行故障切换的过程中,MHA能在最大程度上保证数据的一致性,以达到真正意义 ...