home | articles | links | fun | about
Up to: CS432 Information Security

Network Security - 11/19/02

Network Security: Protecting the infrastructure

Physical security of wires and routers

Routing: tough security problems

DNS

But beware... there are legit reasons for a DNS mapping change, like moving a web site.

Dealing with spoofing

Use digital sig on DNS responses. Special key distribution method, piggyback on DNS.

Each response contains address of server + key (not much overhead, since must authenticate server anyway)

DNS SEC

DNS security. Logical, well-designed protocol, not much overhead. But slow adoption!

Solves lying proxy problem.

Dealing with lying servers:

TCP sessions

Vulnerabilities: address spoofing, tampering, eavesdropping, jamming

  1. Address spoofing
  2. Tampering and eavesdropping: use std. crypto methods
  3. Jamming (Denial of service)

Paper: analyze backscatter of DoS... reply packets to my network. Result: lots of small DoS attacks, personal vendettas.

Attack can send ata from one computer

Distributed attack