Five network security

xiaoxiao2021-03-06  118

2.5 Network Security

2.5.1 Correct understanding of network security issues

Information security has developed from the initial communication security, developing the computer security, developing to the current network security, has

It has entered the third stage.

Network security is in the distributed network environment, for information carriers (processing vectors, storage vectors, transport carriers) and letters

Treatment, transmission, storage, and access providing security to prevent data, information content or capabilities are unauthorized

, Tampering and refusing service. Network security with similar information security properties: confidentiality, integrity, availability, audit

Sex.

With the high-speed development of computer networks around the world, network security issues are increasingly exposed more and more.

The people pay attention. Due to the mechanism characteristics of the network itself, the attacks of the network can be remote, and the attack technology

The propagation speed is grown in an index mode. A large number of automated attack tools appear, once a tool is public,

Anyone can download and use it so that it becomes uncontrollable.

There are two wrong understandings for network security: one is to ignore the role of network security, simplify the problem, think

Keep the network for a long time with some common means. This kind of understanding does not see the importance and responsibility of network security.

Another error understanding is more common, it is believed that information security is network security, and the two are equal, this is exaggerated.

Network security issues, this understanding is particularly common in a general computer user population. In fact, you must see network security asking

It is important that network security is only a small part of the information security field, not all of information security. root

According to the principle of the wooden bucket, the safety of the system depends on the weaker part of the system security, so the components of information security

It is very important, there is no possibility of nothing to do with a part, and you can ignore the possibilities.

2.5.2 Network Security Model

A common network security model, that is, the PPDRR processing model is shown below. It includes security strategy, anti-defense

Protency, intrusion detection, attack reaction (response), disaster recovery (Restore)

(Survival technology) and other parts.

2.5.3 Security Enhancement Agreement

Now the most popular heterogeneous network interconnection protocol TCP / IP protocol clusters do not consider security issues at the beginning of design. Objective

For security considerations, some security protocols for TCP / IP have been developed, and the purpose is to enhance the special

The security of the protocol level. Of course, these are just some form of repair and cannot guarantee network security from essentially.

See the figure below for security services available from different levels of networks:

Link layer security

The following measures can be taken to enhance the security of the link layer: install or rent specialized communication facilities; implement points to point identity

Authentication, provide confidentiality; providing data stream security but does not provide end user authentication and user confidentiality.

Network layer security

Most importantly IP security (IPSec), including three aspects of certification, confidentiality and key management.

IPSec runs between the IP layer and the transport layer TCP, UDP, provides secure communication in the LAN, WAN, and the Internet

ability. IPSec can support various applications in that it can be encrypted and / or authenticated all traffic in IP layer, so

To protect all distributed applications, including remote login, client / server, email, file transfer, web access, etc.

The important advantage of IPSec is transparent to end users.

IPsec determines the algorithm used by the service and providing any service needs by allowing the system to select the security protocol required for the system.

Key to provide IP level security services. Both agreements provide security: one is a certification association using ah protocol header

The other is the encryption / authentication protocol ESP designed for the packet. It provides the following services: access control, no connection

Integrity, data source authentication, reject packet reproduction, confidentiality, limit traffic confidentiality, and AH and ESP support transmission mode and tunnel mode. IPsec's problem is to establish standard key management (difficult to implement) and reduce network

can.

Safety jacket and transport layer security

SSL (Secure Socket Layer) is an open protocol designed by Netscape, which specifies a use of application

The program protocol (such as HTTP, Telnet, NNTP, FTP), and TCP / IP provide data security hierarchical mechanisms. It is

TCP / IP connection provides data encryption, server authentication, message integrity, and optional client authentication. SSL is designed

Use TCP to provide a reliable end-to-end security service. A secure TCP connection can be established between two communication nodes.

Negotiate the layer and recording layer. The SSL record protocol provides SSL with confidentiality and message integrity.

The advantage of SSL is that based on the process of the process and encrypted transmission channel for the process, identity authentication with public key system

. Its shortcomings are also obvious: it is opaque to the application layer, does not apply to UDP-based communications, requiring the certificate authority center CA,

Access control is not available.

In April 1996, IETF authorized a transport layer safety (TLS) working group to set up a transport layer security protocol (TLS

P) In order to be officially submitted to IESG as a standard proposal. TLSP will look like SSL in many places.

Application layer safety technology

Application layer security technology is very rich.

Common dedicated application layer security services are: for email S / MIME and OpenPGP; private enhanced mail PEM

In public key infrastructure PKI); hypertext transmission protocol security enhanced version S-HTTP, providing file level security mechanism; security

Electronic trading set, is an open encryption safety specification for protecting credit card transactions on the Internet,

Security channels provide trust by using X.509V digital certificates.

Common Universal Application Layer Security Services include: General Security Services API-GSS-API; MIT's Kerberos for distributed

The computing environment provides a certification method for verifying the user, a two-way body that proves to be very safe.

Certification technology, its identity has emphasized the client's certification of the client, and other identity authentication technology often only solves.

The server is certified to the client; OSF's DCE-Web; HP Corba-web, etc.

2.5.4 Important Issues of Network Security

To date, many network security technologies have been successfully applied to a large and small computer network. These technologies

It has played a positive role in improving network security and defending invaders.

Firewall

Firewall is an effective defense tool that accesses internal hosts or networks via WAN and Internet

And when accessing external systems through internal hosts or networks, firewalls can protect the system from network security

Less, equivalent to isolating an internal network and an Internet network. The firewall is embedded between the station network and the Internet, thus

Establish a controlled connection and form an external security wall or a boundary. The purpose of this boundary is to prevent the station from being affected.

From the Internet attack, and the safety will form an obstruction point where the security will be affected.

The firewall is the first barrier of network security, although the firewall provides a variety of capacities, but overall

Speaking, the existing IP firewall technology can be generally divided into the following:

(1) Packing the filter firewall

The safety of the filtered firewall is based on the check of the IP address of the package. It will send all the information packets and accept

The information such as the IP address, port, TCP link state is read, and the packet is filtered according to a predetermined filtering principle. that

Some packages that do not meet the prescribed package are filtered out by the firewall to ensure the security of the network system.

(2) Agent firewall

Agent service is an application that runs on the host (Fort Host) between internal networks and external networks. As a user

When you need to access the other side of the proxy server, the proxy server is responsive to the host response and re-emits an identical request. When this connection is established, the pass between the internal host and the external host

Letter will be implemented through the connection mapping of the agent. Agent's transparent letter to users, guarantee internal network topology

The interest is limited to the inside of the proxy gateway, thereby reducing the necessary information required when hacker attacks.

(3) state monitoring technology

Network status monitoring technology is generally considered to be a next-generation network security technology. It uses the method of capturing network packets

The various levels of network communications have been inspected and the basis for security decisions. The monitoring module supports multiple network protocols and should

With an agreement, you can easily achieve application and service expansion. Status Monitoring Service You can monitor RPC and UDP port information, and

Packing filtration and proxy services cannot be done.

Early firewall constructs a safe network boundary such as a single device (such as filtering router and fortress host), such as shielding

Subnet structure or single point of fortress host. Now, construct a safe service of the security service to complete the control

Fine safety services. General related services include authentication servers, authorization servers, central policy management devices

And the corresponding remote management services, status monitoring servers, etc.

The limitations of firewalls are: can't defend against its attack; can't eliminate threats from internal;

The procedures and documents of the virus infected and documents are often easy to penetrate the firewall easily.

The general working principle of the firewall is based on the filtering rule, determines whether a package allows or if a connection is allowed. Objective

The front firewall does not have enough intelligence, and the hacker's carefully designed scan and intrusion methods may also penetrate the firewall.

Intrusion detection

If the firewall is the first defense line of the system, then intrusion detection is the second defense line of the system, which is also the most

One of the hotspots in recent years of network security research.

Intrusion detection technology is established in a basic hypothesis, that is, the behavior of intruders is different in some cases.

The behavior of legal users. Of course, the difference between the invasive attack and legal users normally use resources is very obvious, even

There is also similar to their behavior, which is also the main difficulty in invasive detection.

Intrusion detection generally has two methods, namely, statistical abnormal detection and rule-based detection.

(1) Statistical abnormal detection

Statistical abnormal detection is divided into two categories: value detection and profile-based detection.

The number of criteria detection is related to the number of special incidents in a period of time. If the number of times exceeds the expected reasonable

The number of times is considered possible to have an intrusion. The value analysis itself is a detector that is rough and the efficiency is not high. Because of the value and time

The interval must be selected in advance, and the user is constantly changing, and the value detection is very likely to cause a lot of errors or wrong negation.

.

Outline-based abnormal detection summarizes the feature of each user's past behavioral characteristics or user group past behavior, for

It is found that there is a behavior of major deviations. The contour may contain multiple parameter sets, so only one parameter is not enough to produce

A warning.

(2) based on rules-based intrusion detection

Rule-based intrusion detection is to determine a given activity mode by observing the time in the system.

Whether it is suspicious. In general, we divide all methods into abnormal detection and penetration identification, although these two types of methods

There are overlapping parts.

Rule-based abnormal detection is similar to the similar statistical abnormality detection. Use rule-based method analysis

History audit record, determine the mode of use, and automatically generate rules that describe this mode. The rule is to represent the user program privilege

The mode of the pendant interrupts such as the interrupt. By observing the current behavior, each behavior is matched with the matching rule set, sentenced

Do it meet a historical behavior mode.

As with statistical abnormal detection, the abnormality detection gives rules does not know the knowledge of safety fragile inside the system.

. Moreover, this method is built on the observation of past behavior, assuming future behavior is similar to past behavior. This one

Methods To be valid, you need to include a large number of rules.

Rule-based penetration identification is different from intrusion detection, which is established above the expert system technology. This department

The key characteristic is to use rules to identify consistent penetration or utilize the penetration of known weaknesses. Rule can be used to identify

Suspicious behavior, even if this behavior meets the established model. Typically, the rules in these systems are in specific machines

And the operating system is related. Moreover, these rules are not generated by the analysis audit record, but is defined by experts. therefore

The quality of this method depends on the technique of establishing these rules.

Intrusion detection system wants to be practical, it must be guaranteed to detect a large amount of invasion at an acceptable false alarm rate.

. If you can only detect a small amount of invasion, the system gives people a safe fake phase, if there is no intrusion, the system frequently alarms,

System administrators may begin to ignore these alarms, or waste a lot of time to analyze this false alarm. Unfortunately, due to probability

It is difficult to meet the characteristics of both high detection rates to have a low false alarm rate. Current intrusion detection system

There is no error problem based on the ratio.

Relatively new innovation in intrusion detection technology is a honeypot. Honeymas is a potential attacker away from important systems

A circle. The function of the honeypot is: transfer attack important system attackers, collect information about attacker activities, hope attack

The person stays for a long time so that the administrator responds to this attack.

The honeypot is full of legitimate users unable to access, but the surface looks valuable false information. Therefore, any honeypot

Access is possible. Tools used by honeypot systems include sensitive monitors and time logs. Any attacker for honeypots

Hit, the system will give an illusion of success.

Recent studies are concentrated in building a honeypot network, used to simulate a business, which will use actual activities

Simulated traffic and data. Once hackers enter this network, administrators can observe their behavior in detail, find out

Fan measures.

Virtual private network

VPN refers to the technology of establishing a private network on the public network, which is called the virtual network. It is mainly because of the entire VPN network.

The connection between any two nodes of the network does not have the end-to-end physical link required for the traditional private network, but the architecture in public

The logical network on the network platform (such as Internet, ATM, Frame Relay, etc.) provided by the web service provider.

VPN has the following advantages: reduce costs, companies do not have to rent long-distance special line construction network, do not have to have a lot of network maintenance

Personnel and equipment investment; easy to expand, network routing equipment configuration is simple, no need to add too many devices, save time;

All control initiative, VPN's facilities and services are fully grasped in business hands.

VPN is unified by using tunnel technology and the IPSec standards developed in the Internet or ITW Engineering Working Group

Under the public network, enterprises form a company safe, confidential, and smooth dedicated link. Common VPN protocols have IPsec and PPTP

.

Refusal service attack

Refusal service attacks and distributed denial of service attacks begin to become a common means of hackers. If you can mobilize enough

The controlled computer is attacked, and the server is difficult to defend, thus threats to computer networks. 2000, Yahoo, Asia

Massiass, electronic port, CNN, etc. have been fell into a paralyzed service attack. On the other hand, distributed refusal service attack

Hit often uses counterfeit boycots and involves multiple attack sources, so it is very difficult to track the attacker's tracking positioning. Currently

There is no good solution in two attack methods. The fundamental reason is that there is no reasonable mathematical model for them.

Not implemented in a corresponding security mechanism.

Service refusal to attack attempts to block your service computer or block you from providing services, service refuses

The absolute attack is the most easy to implement attack behavior, including: Ping of Death, teardrop (

TEARDROP, UDP Flood, SYN Flood, Land Attack, Smurf

Hit, Fraggle attack, email bomb, malformation message attack, etc.

NSUN 2004

转载请注明原文地址:https://www.9cbs.com/read-102257.html

New Post(0)