25
Welcome to our Project Course Name: Computer Networks Section: E Semester: Summer 2015-2016 AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 1

Campus Area Network Security

Embed Size (px)

Citation preview

Page 1: Campus Area Network Security

Welcome to our Project

Course Name: Computer NetworksSection: ESemester: Summer 2015-2016

AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 1

Page 2: Campus Area Network Security

AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 2

Our Project is onCAMPUS AREA NETWORK SECURITY

Submitted To:KHAZA NEWAZ MUHAMMAD SirLecturer,Faculty of Science, Information and Technology.

Page 3: Campus Area Network Security

AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 3

Submitted By:Hossain, Md. Emtiaj

ID: 14-27042-2

Akter Nasrin

ID: 14-27810-3

Shakib, Md. Nazmus

ID: 14-27160-2

Page 4: Campus Area Network Security

AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 4

Outline: Introduction

Description Obstacles Benefits & Necessity

Abstract Security Issue Network Attacks Networking Architecture

Ordinary design Proposed Networking Components

About our design Future scope Conclusion References Q&A Session

Page 5: Campus Area Network Security

AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 5

IntroductionDescription:

As the computers and networked systems thrive in today’s world, the need for increase and strong computer and network security becomes increasingly necessary and important. The increase in the computer network system has exposed many networks to various kinds of internet threats and with this exposure. The security may include identification, authentication and authorization, and surveillance camera to protect integrity, availability, accountability, and authenticity of computer hardware or network equipment. There is no laid-down procedure for designing a secure network. Network security has to be designed to fit the needs of an organization .Obstacles: Doesn’t mesh well with research. Considered low priority (few resources). Not always taken seriously. Security implementers may not be appreciated.

Too little security, it’s your fault: “We got hacked, you should’ve done more”.

Too much security, it’s your fault: “I can’t get my work done, you should do less”.

When it works, no one notices.

Page 6: Campus Area Network Security

AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 6

Benefits:Campus network is essential and it plays an important role for any organization. Network architecture and its security are as important as air, water, food, and shelter. Computer network security threat and network architecture are always serious issues. A campus network is an autonomous network under the control of a university which is within a local geographical place and sometimes it may be a metropolitan area network .

Page 7: Campus Area Network Security

AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 7

Abstract

Security has been a pivotal issue in the design and deployment of an enterprise network. With the innovation and diffusion of new technology such as Universal computing, Enterprise mobility, E-commerce and Cloud computing, the network security has still remained as an ever increasing challenge. A Campus network is an important part of campus life and network security is essential for a campus. Campus network faces challenges to address core issues of security which are governed by network architecture. Secured network protects an institution from security attacks associated with network. A university network has a number of uses, such as teaching, learning, research, management, e-library, result publishing and connection with the external users. Network security will prevent the university network from different types of threats and attacks. The theoretical contribution of this study is a reference model architecture of the university campus network that can be followed or adapted to build a robust yet flexible network that responds to the next generation requirements. A hierarchical architecture of the campus network is configured with different types of security issues for ensuring the quality of service.

Page 8: Campus Area Network Security

AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 8

Security IssueThere are a wide range of network attacks and security threats, network attack methodologies, and categorizations of network attacks. The query is: how do we minimize these network attacks? The type of attack, as specified by the categorization of reconnaissance, access, or DoS attack, determines the means of mitigating a network threat .

Page 9: Campus Area Network Security

AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 9

Network AttacksClasses of attack might include passive monitoring of communications, active network attacks, close-in attacks, exploitation by insiders, and attacks through the service provider. Information systems and networks offer attractive targets and should be resistant to attack from the full range of threat agents, from hackers to nation-states. A system must be able to limit damage and recover rapidly when attacks occur. Here are some attacks types: Passive Attack Active Attack Distributed Attack Insider Attack Close-in Attack Phishing Attack Hijack attack Spoof attack Buffer overflow Exploit attack Password attack

Page 10: Campus Area Network Security

AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 10

ARP Spoofing Attack:ARP spoofing is a type of attack in which a malicious actor sends falsified ARP (Address Resolution Protocol) messages over a local area network. This results in the linking of an attacker's MAC address with the IP address of a legitimate computer or server on the network.

DDoS Attack:A typical DDoS attack consists of amassing a large number of compromised hosts to send useless packets to jam a victim or its Internet connection or both.Can be done in following ways:

To exploit system design weaknesses such as ping to death . Impose computationally intensive tasks on the victim such

as encryption and decryption. Flooding-based DDoS Attack.

Page 11: Campus Area Network Security

AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 11

Do not rely on particular network protocols or system design weaknesses.

Consist of sufficient number of compromised hosts amassed to send useless packets toward a victim around the same time.

Have become a major threat due to availability of a number of user-friendly attack tools on one hand and lack of effective solutions to defend against them on the other.

Page 12: Campus Area Network Security

AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 12

DDoS Attack (Direct):

Consists of sending a large number of attack packets directly towards a victim.

Source addresses are usually spoofed so the response goes elsewhere.

Examples:

• TCP-SYN Flooding: The last message of TCP’s 3 way handshake never arrives from source.

• Congesting a victim’s incoming link using ICMP messages, RST packets or UDP packets.

Attacks use TCP packets (94%), UDP packets (2%) and ICMP packets(2%).

Page 13: Campus Area Network Security

AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 13

DDoS Attack (Reflector): Uses innocent intermediary nodes (routers and servers)

known as reflectors.

An attacker sends packets that require responses to the reflectors with the packets’ inscribed source address set to victim’s address.

Can be done using TCP, UDP, ICMP as well as RST packets.

Examples: Smurf Attacks: Attacker sends ICMP echo request to a

subnet directed broadcast address with the victim’s address as the source address.

SYN-ACK flooding: Reflectors respond with SYN-ACK packets to victim’s address.

Page 14: Campus Area Network Security

AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 14

Networking ArchitectureTraditional Campus Networking Diagram:

Page 15: Campus Area Network Security

AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 15

Proposed Networking Components:

1) Proposed cost effective design of a Secure Campus Network.

2) Creation of VLANs (Virtual LAN) for security. 3) Implement firewall for internal and external security.4) Virtual private network use for branch campus.5) Wireless access network architecture

Page 16: Campus Area Network Security

AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 16

(1) Implementation of Cost Effective Secure Campus Network:Several challenges confront the implementation of a secure network on a university campus, but the challenge central to this topic is security. Henceforth, we have outlined in detail several possible solutions in maintaining a network, the design of our network in order to encompass such solutions.

About our design

Page 17: Campus Area Network Security

AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 17

(2) Creation of VLANs (Virtual LAN) for security:

It's easy to see why virtual LANs have become extremely popular on networks of all sizes. In practical terms, multiple VLANs are pretty much the same as having multiple separate physical networks within a single organization — without the headache of managing multiple cable plants and switches. Because VLANs segment a network, creating multiple broadcast domains, they effectively allow traffic from the broadcast domains to remain isolated while increasing the network's bandwidth, availability and security.

Page 18: Campus Area Network Security

AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 18

(3) Implementing Firewall for Internal and External Security:

A firewall works to monitor and block or allow network traffic, both incoming and outgoing, on a private network. While there is a hardware firewall to help protect the campus network security, this firewall affects certain outbound traffic and prevents unauthorized inbound traffic. NetBIOS, SMTP and other miscellaneous ports determined to pose a security risk are blocked in the outgoing direction. This does not impact the majority of academic work related programs used on the campus.

Page 19: Campus Area Network Security

AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 19

(4) Virtual Private Network (VPN) Use for branch campus:

A Virtual Private Network (VPN) extends a private network across a public network, such as the Internet. It enables a computer or network-enabled device to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security and management policies of the public network. A VPN is created by establishing a virtual point-to-point connection through the use of dedicated connections, virtual tunneling protocols, or traffic encryption. Major implementations of VPN include Open VPN and IPsec. Campus VPN - provides a full tunnel VPN service that is a secure (encrypted) connection to the network from off campus. Common uses of the Campus VPN include access to file sharing/shared drives and certain applications that require a Campus IP address. The Campus VPN has a 20-hour session limit.

Page 20: Campus Area Network Security

AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 20

(5) Wireless Access Network Architecture:

Access to the wireless campus network will be based on thefollowing guidelines:1) User access should be granted after the user credentials areverified. (No one should be a able to send data to the wiredbackbone unless logged as a valid user).2) Wireless network data should be encrypted so that privacy iskept.3) Installation and connection procedures should be kept as easyas possible.Then, using both VLAN, VPN and WLAN technology thecomplete system was designed as shown in figure. It shows the complete set ofinteractions between the wireless users and the campus network.

Page 21: Campus Area Network Security

AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 21

Future Scope

Perhaps the greatest concern companies have in doingbusiness over the Internet is the security risk. Hackers,denial-of-service (DoS) attacks, identity theft, and evencyber-terrorism are very real dangers. In addition, peoplemay wonder how to guarantee the performance andreliability of their Internet-based services. Or, they may notbe certain that they have the resources and support neededto deploy and manage e-commerce services and processes.

Page 22: Campus Area Network Security

AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 22

Conclusion

Network architecture and its security are important any organization. If we follow the hierarchical network design, network will be scalable, performance and security will be increased, and the network will be easy to maintain. In this work, we proposed a compact cost effective secure campus network design based on the work environment and required scalability, security and other aspects.This proposed network infrastructure is realizable with adaptable infrastructure. It also provides an overview of the best practices in mitigating the known attacks and recommendation on how to prevent reoccurrence attacks.

Page 23: Campus Area Network Security

AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 23

References

• www.ieee.org• www.springer.com• www.ijettcs.org• www.google.com• www.youtube.com

Page 24: Campus Area Network Security

AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB) 24

Any Question ??

Page 25: Campus Area Network Security

AMERICAN INTERNATIONAL UNIVERSITY - BANGLADESH (AIUB)

25