Information and Network Security: Ms. Hansa Vaghela, Assistant Professor
Information and Network Security: Ms. Hansa Vaghela, Assistant Professor
Traffic Analysis[3}
2) Traffic Analysis (Passive Attack)
Masquerade Attack[1}
1) Masquerade Attack (Active Attack)
Replay Attack[4}
2) Replay Attack (Active Attack)
• Replay attack involves the passive capture of a data unit and its
subsequent retransmission to produce an unauthorized effect.
3) Modification of messages Attack (Active Attack)
Security Attacks[4}
Security Services (X.800)
Security Services[3}
Authentication
• Authentication is the assurance that the communicating entity is
the one that it claims to be. Who you are ?
1. Peer Entity Authentication: Used (biometrics)
in association with a logical
connection to provide confidence Physical Authentication[3}
Access Control[2}
Access Control
Data Confidentiality[4}
Data Confidentiality
Data Integrity[3}
Data Integrity
• Connection Integrity with Recovery: Provides integrity of all
user data on a connection and detects any modification,
insertion, deletion, or replay of any data with recovery
attempted.
• Connection Integrity without Recovery: As above, but provides
only detection without recovery.
• Selective-Field Connection Integrity: Provides integrity of
selected fields within the user data and takes the form of
determination of whether the selected fields have been
modified, inserted, deleted, or replayed.
Data Integrity
• Connectionless Integrity: Provides integrity of a single
connectionless data block and may take the form of detection
of data modification. Additionally, a limited form of replay
detection may be provided.
• Selective-Field Connectionless Integrity: Provides integrity of
selected fields within a single connectionless data block; takes
the form of determination of whether the selected fields have
been modified.
Non Repudiation
• Nonrepudiation is the assurance that someone cannot deny
something.
Non Repudiation[1}
Non Repudiation
• Typically, nonrepudiation refers to the ability to ensure that a
communication cannot deny the authenticity of their signature
on a document or the sending of a message that they
originated.
• Nonrepudiation-Origin: Proof that the message was sent by
the specified party.
• Nonrepudiation-Destination: Proof that the message was
received by the specified party.
Security Mechanisms (X.800)
• Specific security mechanisms: Integrated into the appropriate
protocol layer in order to provide some of the OSI security
services.
• Pervasive security mechanisms: Not integrated to any
particular OSI security service or protocol layer
Security Mechanism (Specific Security)
• Encipherment: Hiding or covering data using mathematical
algorithms.
• Digital Signature: The sender can electronically sign the data
and the receiver can electronically verify the signature.
• Access Control: A variety of mechanisms that enforce access
rights to resources.
• Data Integrity: A variety of mechanisms used to assure the
integrity of a data unit or stream of data units.
• Authentication Exchange: Two entities exchange some
messages to prove their identity to each other.
Security Mechanism (Specific Security)
• Traffic Padding: The insertion of bits into gaps in a data stream
to frustrate traffic analysis attempts.
• Routing Control: Selecting and continuously changing routes
between sender and receiver to prevent opponent from
eavesdropping.
• Notarization: The use of a trusted third party to assure and
control the communication.
Model for Network Security