Upload
md-nazmus-shakib-robin
View
202
Download
0
Embed Size (px)
Citation preview
Welcome to our Project
Course Name: Computer NetworksSection: ESemester: Summer 2015-2016
AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 1
AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 2
Our Project is onCAMPUS AREA NETWORK SECURITY
Submitted To:KHAZA NEWAZ MUHAMMAD SirLecturer,Faculty of Science, Information and Technology.
AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 3
Submitted By:Hossain, Md. Emtiaj
ID: 14-27042-2
Akter Nasrin
ID: 14-27810-3
Shakib, Md. Nazmus
ID: 14-27160-2
AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 4
Outline: Introduction
Description Obstacles Benefits & Necessity
Abstract Security Issue Network Attacks Networking Architecture
Ordinary design Proposed Networking Components
About our design Future scope Conclusion References Q&A Session
AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 5
IntroductionDescription:
As the computers and networked systems thrive in today’s world, the need for increase and strong computer and network security becomes increasingly necessary and important. The increase in the computer network system has exposed many networks to various kinds of internet threats and with this exposure. The security may include identification, authentication and authorization, and surveillance camera to protect integrity, availability, accountability, and authenticity of computer hardware or network equipment. There is no laid-down procedure for designing a secure network. Network security has to be designed to fit the needs of an organization .Obstacles: Doesn’t mesh well with research. Considered low priority (few resources). Not always taken seriously. Security implementers may not be appreciated.
Too little security, it’s your fault: “We got hacked, you should’ve done more”.
Too much security, it’s your fault: “I can’t get my work done, you should do less”.
When it works, no one notices.
AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 6
Benefits:Campus network is essential and it plays an important role for any organization. Network architecture and its security are as important as air, water, food, and shelter. Computer network security threat and network architecture are always serious issues. A campus network is an autonomous network under the control of a university which is within a local geographical place and sometimes it may be a metropolitan area network .
AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 7
Abstract
Security has been a pivotal issue in the design and deployment of an enterprise network. With the innovation and diffusion of new technology such as Universal computing, Enterprise mobility, E-commerce and Cloud computing, the network security has still remained as an ever increasing challenge. A Campus network is an important part of campus life and network security is essential for a campus. Campus network faces challenges to address core issues of security which are governed by network architecture. Secured network protects an institution from security attacks associated with network. A university network has a number of uses, such as teaching, learning, research, management, e-library, result publishing and connection with the external users. Network security will prevent the university network from different types of threats and attacks. The theoretical contribution of this study is a reference model architecture of the university campus network that can be followed or adapted to build a robust yet flexible network that responds to the next generation requirements. A hierarchical architecture of the campus network is configured with different types of security issues for ensuring the quality of service.
AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 8
Security IssueThere are a wide range of network attacks and security threats, network attack methodologies, and categorizations of network attacks. The query is: how do we minimize these network attacks? The type of attack, as specified by the categorization of reconnaissance, access, or DoS attack, determines the means of mitigating a network threat .
AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 9
Network AttacksClasses of attack might include passive monitoring of communications, active network attacks, close-in attacks, exploitation by insiders, and attacks through the service provider. Information systems and networks offer attractive targets and should be resistant to attack from the full range of threat agents, from hackers to nation-states. A system must be able to limit damage and recover rapidly when attacks occur. Here are some attacks types: Passive Attack Active Attack Distributed Attack Insider Attack Close-in Attack Phishing Attack Hijack attack Spoof attack Buffer overflow Exploit attack Password attack
AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 10
ARP Spoofing Attack:ARP spoofing is a type of attack in which a malicious actor sends falsified ARP (Address Resolution Protocol) messages over a local area network. This results in the linking of an attacker's MAC address with the IP address of a legitimate computer or server on the network.
DDoS Attack:A typical DDoS attack consists of amassing a large number of compromised hosts to send useless packets to jam a victim or its Internet connection or both.Can be done in following ways:
To exploit system design weaknesses such as ping to death . Impose computationally intensive tasks on the victim such
as encryption and decryption. Flooding-based DDoS Attack.
AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 11
Do not rely on particular network protocols or system design weaknesses.
Consist of sufficient number of compromised hosts amassed to send useless packets toward a victim around the same time.
Have become a major threat due to availability of a number of user-friendly attack tools on one hand and lack of effective solutions to defend against them on the other.
AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 12
DDoS Attack (Direct):
Consists of sending a large number of attack packets directly towards a victim.
Source addresses are usually spoofed so the response goes elsewhere.
Examples:
• TCP-SYN Flooding: The last message of TCP’s 3 way handshake never arrives from source.
• Congesting a victim’s incoming link using ICMP messages, RST packets or UDP packets.
Attacks use TCP packets (94%), UDP packets (2%) and ICMP packets(2%).
AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 13
DDoS Attack (Reflector): Uses innocent intermediary nodes (routers and servers)
known as reflectors.
An attacker sends packets that require responses to the reflectors with the packets’ inscribed source address set to victim’s address.
Can be done using TCP, UDP, ICMP as well as RST packets.
Examples: Smurf Attacks: Attacker sends ICMP echo request to a
subnet directed broadcast address with the victim’s address as the source address.
SYN-ACK flooding: Reflectors respond with SYN-ACK packets to victim’s address.
AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 14
Networking ArchitectureTraditional Campus Networking Diagram:
AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 15
Proposed Networking Components:
1) Proposed cost effective design of a Secure Campus Network.
2) Creation of VLANs (Virtual LAN) for security. 3) Implement firewall for internal and external security.4) Virtual private network use for branch campus.5) Wireless access network architecture
AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 16
(1) Implementation of Cost Effective Secure Campus Network:Several challenges confront the implementation of a secure network on a university campus, but the challenge central to this topic is security. Henceforth, we have outlined in detail several possible solutions in maintaining a network, the design of our network in order to encompass such solutions.
About our design
AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 17
(2) Creation of VLANs (Virtual LAN) for security:
It's easy to see why virtual LANs have become extremely popular on networks of all sizes. In practical terms, multiple VLANs are pretty much the same as having multiple separate physical networks within a single organization — without the headache of managing multiple cable plants and switches. Because VLANs segment a network, creating multiple broadcast domains, they effectively allow traffic from the broadcast domains to remain isolated while increasing the network's bandwidth, availability and security.
AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 18
(3) Implementing Firewall for Internal and External Security:
A firewall works to monitor and block or allow network traffic, both incoming and outgoing, on a private network. While there is a hardware firewall to help protect the campus network security, this firewall affects certain outbound traffic and prevents unauthorized inbound traffic. NetBIOS, SMTP and other miscellaneous ports determined to pose a security risk are blocked in the outgoing direction. This does not impact the majority of academic work related programs used on the campus.
AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 19
(4) Virtual Private Network (VPN) Use for branch campus:
A Virtual Private Network (VPN) extends a private network across a public network, such as the Internet. It enables a computer or network-enabled device to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security and management policies of the public network. A VPN is created by establishing a virtual point-to-point connection through the use of dedicated connections, virtual tunneling protocols, or traffic encryption. Major implementations of VPN include Open VPN and IPsec. Campus VPN - provides a full tunnel VPN service that is a secure (encrypted) connection to the network from off campus. Common uses of the Campus VPN include access to file sharing/shared drives and certain applications that require a Campus IP address. The Campus VPN has a 20-hour session limit.
AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 20
(5) Wireless Access Network Architecture:
Access to the wireless campus network will be based on thefollowing guidelines:1) User access should be granted after the user credentials areverified. (No one should be a able to send data to the wiredbackbone unless logged as a valid user).2) Wireless network data should be encrypted so that privacy iskept.3) Installation and connection procedures should be kept as easyas possible.Then, using both VLAN, VPN and WLAN technology thecomplete system was designed as shown in figure. It shows the complete set ofinteractions between the wireless users and the campus network.
AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 21
Future Scope
Perhaps the greatest concern companies have in doingbusiness over the Internet is the security risk. Hackers,denial-of-service (DoS) attacks, identity theft, and evencyber-terrorism are very real dangers. In addition, peoplemay wonder how to guarantee the performance andreliability of their Internet-based services. Or, they may notbe certain that they have the resources and support neededto deploy and manage e-commerce services and processes.
AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 22
Conclusion
Network architecture and its security are important any organization. If we follow the hierarchical network design, network will be scalable, performance and security will be increased, and the network will be easy to maintain. In this work, we proposed a compact cost effective secure campus network design based on the work environment and required scalability, security and other aspects.This proposed network infrastructure is realizable with adaptable infrastructure. It also provides an overview of the best practices in mitigating the known attacks and recommendation on how to prevent reoccurrence attacks.
AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 23
References
• www.ieee.org• www.springer.com• www.ijettcs.org• www.google.com• www.youtube.com
AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 24
Any Question ??
AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB)
25