31
Router Simulation System for mitigating Network Security attacks Rohan Choudhari BE(IT) AEC,Beed

network security / information security

Embed Size (px)

Citation preview

Page 1: network security / information security

Router Simulation System for mitigating Network Security

attacks

Rohan ChoudhariBE(IT)AEC,Beed

Page 2: network security / information security

Background for This Project?

Page 3: network security / information security

Basics of InfoSec

Confidentiality Integrity Availability

Prevents Unauthorized use or disclosure of information

Safeguards the accuracy and Completeness of information

Authorized users have reliable And timely access to the resources

Page 4: network security / information security

Why Security ? The internet was initially designed for connectivity

(ARPANET). Trust Assumed We do more with the internet nowadays Security protocols are added on the top of TCP/IP

Fundamental aspects of information must be protected . Confidential data Employee information Business models Protect identity and resources

We can’t keep ourselves isolated from the internet Most business communications are done online We provide online services We get services from 3rd party organizations

Page 5: network security / information security

Attacks on different layersLayer 7: DNS ,DHCP,HTTP,FTP,IMAP,LDAP,NTP,SSH,SMTP, SMNP, Telnet,TFTP

Layer 5 :SMB, NFS,Socks

Layer 3 :IPv4,IPv6,ICMP

Layer 2 :PPTP , Token Ring

DNS poisoning,phishing,SQL injection

TCP Attack , Routing attack, SYN flooding, Sniffing

Ping ,ICMP ,Flood

ARP Spoofing ,MAC Flooding

Page 6: network security / information security

TCP Attacks

Exploits the TCP 3 way handshake Attacker sends a series of SYN packets

without replying the ACK packetFinite queue size for incomplete

connectionsSYN

ACKSYN+ACK

SERVER

Page 7: network security / information security

TCP Attacks

Exploits the TCP 3 way handshake Attacker sends a series of SYN packets

without replying the ACK packetFinite queue size for incomplete

connectionsSYN

SYN+ACK

SERVER(victim)ACK ?

Page 8: network security / information security

DNS cache poisoning

client

I want to access www.example.com

DNS catching server

1

2

QID =64571

Root /GTLD

ns.example.comwebServer192.168.1.1

3

3

www.example.com192.168.1.1

QID =64571

QID=64569QID=64570QID=64571 Match !

(Pretending to be Authoritative zone)

www.example.com192.168.1.99

Page 9: network security / information security

Common Types of attacks Reconnaissance-ping sweeps and port scans

Sniffing –capture packet as they travel through the network

Man-in–the-middle-attack: intercepts messages that are intended for a valid device.

Spoofing –sets up a fake device and trick others to send messages to it.

Hijacking- taking control of session

Denial of service (DoS) Dynamic DoS (DDoS)attack

Page 10: network security / information security

Trusted Network

Standard defensive-oriented technologies Firewall-first line of defense Intrusion Detection

Build TRUST on top of the TCP/IP Infrastructure Strong authentication Two factor authentication Something you have + something you know

Public key infrastructure (PKI)

Page 11: network security / information security

Access control

Access control – ability to permit or deny the use of an object by a subject

It provide 3 essential services (known as AAA)-

Authentication-(who can login) Authorization - (what authorized users can do ) Accountability –(identifies what a user did )

Page 12: network security / information security

Important Steps to Security• Password Protection

• Protecting the network by filtering Network Access and Traffic (i.e. Firewall)

• Running Security Audits

• Examine and monitor log files

• Use commonense: avoid dumpster divers and social engineers

Page 13: network security / information security

FirewallsA firewall is a computer, hardware, or even a piece of software that sits between your network and the Internet, the firewall attempts to regulate and control the flow of information preventing an array of potential attacks.

A router utilizing Network Address Translation(NAT)

Software firewalls such as Zone Alarm, Kerio Firewall, Outpost, etc.

Hardware firewalls such as Sonic’s SOHO firewall.

Operating system firewalls Ex.Window XP’s built in filtering .

Page 14: network security / information security

Virtual Private NetworkCreates a secure tunnel over a public network Client-to-firewall , router-to-router , firewall-to-

firewallVPN protocol standards: PPTP-(Point-to-Point Tunneling protocol) L2F -(Layer to Forwarding Protocol) L2TP-(Layer to tunneling Protocol) IPSec(Internet Protocol Security)

Page 15: network security / information security
Page 16: network security / information security

Significance of this project It makes your computer a router !

And a Gateway router too!!Benefits:

Test new configurationsNew routing policiesNew protocols

Don’t disturb the production network Use cheap PCs instead of expensive routers.

Page 17: network security / information security

Screenshots of project

Page 18: network security / information security

Choosing simulation Environment

Page 19: network security / information security

Output screen showing proposed network infrastructure in a simulated environment

Page 20: network security / information security

Mesh Topology

Page 21: network security / information security

Bus Topology Simulation

Page 22: network security / information security
Page 23: network security / information security

Choosing various routing algorithms for simulaion

Page 24: network security / information security

Simulating Source Routing Algorithm

Page 25: network security / information security

Finding Algorithmic Efficiancy

Page 26: network security / information security

Magic Starts Here …

Page 27: network security / information security
Page 28: network security / information security
Page 29: network security / information security

conclusion The Simulator takes the configurations of

the subnet as Input and gives the different statistics of the routers and links. By changing the routing algorithms and the different network configurations and recording the results we obtain the optimal algorithm. The optimal algorithm for a particular network is obtained by analyzing the results obtained. Simulation helps to achieve an optimal path that reduces the cost of routing and helps to maintain network efficiency very easily.

Page 30: network security / information security

Conclusion And Future Scope The smaller networks can be analyzed and the results can be employed in larger networks to make routing efficient and economic. As the Simulator has provision for the crashing of routers, it gives an idea of which path is followed when a crash occurs. It can be employed in real networks to increase the performance of routers and links. As it not feasible in real networks to test algorithms and then implement a best one, Routing Simulation System can be helpful in maintaining Network Security. Hence it is useful for people who provide networking services and those who design networks.

Page 31: network security / information security

Thank You !

Rohan ChoudhariBE(IT)AEC,Beed