Search for notes by fellow students, in your own course and all over the country.
Browse our notes for titles which look like what you need, you can preview any of the notes via a sample of the contents. After you're happy these are the notes you're after simply pop them into your shopping cart.
Title: Network Security
Description: Network Security: History, Importance, and Future
Description: Network Security: History, Importance, and Future
Document Preview
Extracts from the notes are below, to see the PDF you'll receive please use the links above
Network Security: History, Importance, and Future
University of Florida Department of Electrical and Computer Engineering
Bhavya Daya
ABSTRACT
of intellectual property that can be easily acquired
through the internet
...
The internet is considered a
data network
...
The
synchronous network that consists of switches
does not buffer data and therefore are not
threatened by attackers
...
The vast topic of network security is analyzed by
researching the following:
1
...
Internet architecture and vulnerable
security aspects of the Internet
3
...
Security for networks with internet access
5
...
New trends that are
emerging will also be considered to understand
where network security is heading
...
With the advent of the internet, security
became a major concern and the history of security
allows a better understanding of the emergence of
security technology
...
The
architecture of the internet, when modified can
reduce the possible attacks that can be sent across
the network
...
Many
businesses secure themselves from the internet by
means of firewalls and encryption mechanisms
...
The entire field of network security is vast and in an
evolutionary stage
...
In order to understand the
research being performed today, background
knowledge of the internet, its vulnerabilities, attack
methods through the internet, and security
technology is important and therefore they are
reviewed
...
There is a large amount of personal,
commercial, military, and government information
on networking infrastructures worldwide
...
Network Security
System and network technology is a key technology
for a wide variety of applications
...
Integrity – Ensure the message has not
been modified in transit
5
...
Although, network
security is a critical requirement in emerging
networks, there is a significant lack of security
methods that can be easily implemented
...
Network design is a well‐developed
process that is based on the Open Systems
Interface (OSI) model
...
It offers
modularity,
flexibility,
ease‐of‐use,
and
standardization of protocols
...
The
implementation of individual layers can be changed
later without making other adjustments, allowing
flexibility in development
...
There isn’t a methodology to
manage the complexity of security requirements
...
An effective network security plan is developed
with the understanding of security issues, potential
attackers, needed level of security, and factors that
make a network vulnerable to attack [1]
...
To lessen the vulnerability of the computer to the
network there are many products available
...
Businesses throughout the world are
using a combination of some of these tools
...
The internet
architecture itself leads to vulnerabilities in the
network
...
The types of attacks through the internet need to
also be studied to be able to detect and guard
against them
...
Network intrusions consist of
packets that are introduced to cause problems for
the following reasons:
• To consume resources uselessly
• To interfere with any system resource’s
intended function
• To gain system knowledge that can be
exploited in later attacks
The last reason for a network intrusion is most
commonly guarded against and considered by most
as the only intrusion motive
...
When considering network security, it must be
emphasized that the whole network is secure
...
When transmitting data the
communication channel should not be vulnerable
to attack
...
Securing the network
is just as important as securing the computers and
encrypting the message
...
Access – authorized users are provided the
means to communicate to and from a
particular network
2
...
Authentication – Ensure the users of the
network are who they say they are
2
Typical security currently exists on the computers
connected to the network
...
Current work
is being performed in using a layered approach to
secure network design
...
This
security approach leads to an effective and
efficient design which circumvents some of the
common security problems
...
It
can be seen that the cryptography occurs at the
application layer; therefore the application writers
are aware of its existence
...
Network security is mostly contained within the
physical layer
...
Authentication is performed on a
layer above the physical layer
...
Differentiating Data Security and
the physical layer requires failure detection, attack
Network Security
detection
mechanisms,
and
intelligent
countermeasure strategies [2]
...
Even if this unintelligible
data is intercepted, a key is needed to decode the HISTORY OF NETWORK SECURITY
message
...
Strong cryptography in the past can Recent interest in security was fueled by the crime
be easily broken today
...
Kevin Mitnick
have to continue to advance due to the committed the largest computer‐related crime in
U
...
history [3]
...
dollars in U
...
intellectual property and source code
When transferring ciphertext over a network, it is from a variety of companies [3]
...
This will allow for information security came into the spotlight
...
A secure network will also prevent financial and personal information
...
Therefore, hard ciphers are through the internet, information security is also
required to evolve
...
companies are emphasizing security for the
intellectual property
...
Internet protocols in the past were not developed
to secure themselves
...
This leaves the internet open to
attacks
...
Figure 1: Based on the OSI model, data security and network
security have a different security function [2]
...
Brief History of Internet
2
...
The
timeline can be started as far back as the 1930s
...
In 1930, Alan Turing, a brilliant
mathematician broke the code for the Enigma
...
In the 1960s, the term “hacker” is coined by a
couple of Massachusetts Institute of Technology
(MIT) students
...
This paves the way for the creation
of the carrier network known today as the Internet
...
This opened the door for public use of
data networks that were originally restricted to
government contractors and academic researchers
[3]
...
The 414
gang are raided by authorities after a nine‐day
cracking spree where they break into top‐secret
systems
...
A
graduate student, Robert Morris, was convicted for
unleashing the Morris Worm to over 6,000
vulnerable computers connected to the Internet
...
In the 1990s, Internet became public and the
security concerns increased tremendously
...
On any day, there are
approximately 225 major incidences of a security
The birth of the interne takes place in 1969 when
Advanced Research Projects Agency Network
(ARPANet) is commissioned by the department of
defense (DOD) for research in networking
...
Although originally designed to allow scientists to
share data and access remote computers, e‐mail
quickly becomes the most popular application
...
The
InterNetworking Working Group becomes the first
of several standards‐setting entities to govern the
growing network [10]
...
" [10]
In the 1980s, Bob Kahn and Vinton Cerf are key
members of a team that create TCP/IP, the
common language of all Internet computers
...
The mid‐80s marks a boom in the personal
computer and super‐minicomputer industries
...
Corporations begin to use the Internet to
communicate with each other and with their
customers
...
The World Wide Web was
born
...
Internet continues to grow and surfing
the internet has become equivalent to TV viewing
for many users
...
These security breaches could also
result in monetary losses of a large degree
...
The security architecture of the internet protocol,
known as IP Security, is a standardization of
internet security
...
Although new techniques, such as
IPsec, have been developed to overcome internet’s
best‐known deficiencies, they seem to be
insufficient [5]
...
IPSec is a point‐to‐point protocol, one side
encrypts, the other decrypts and both sides share
key or keys
...
INTERNET ARCHITECTURE AND
VULNERABLE SECURITY ASPECTS
Fear of security breaches on the Internet is causing
organizations to use protected private networks or
intranets [4]
...
These security mechanisms allow for the logical
protection of data units that are transferred across
the network
...
[17]
The current version and new version of the
Internet Protocol are analyzed to determine the
security implications
...
These attacks are analyzed to
determine other security mechanisms that may be
necessary
...
IPv4 and IPv6 Architectures
IPv4 was design in 1980 to replace the NCP
protocol on the ARPANET
...
The IPv6 protocol
was designed with IPv4’s shortcomings in mind
...
5
configuration hassles for the user but not the
network’s administrators
...
Mechanisms to secure IPv4 do exist, but there are
no requirements for their use [6]
...
IPsec
secures the packet payloads by means of
cryptography
...
This form of protection does not account for the
skilled hacker who may be able to break the
encryption method and obtain the key
...
The original transfer of information was
mostly text‐based
...
The
quality of service for streaming videos and music
are much different than the standard text
...
The internet protocol’s design is so vast and cannot
be covered fully
...
1
...
These problems do
not all relate to security
...
The causes
of problems with the protocol are:
1
...
Routing
3
...
Security
5
...
This limits the maximum number of
computers that can be connected to the internet
...
The problem of exceeding that number was not
foreseen when the protocol was created
...
Routing is a problem for this protocol because the
routing tables are constantly increasing in size
...
1 million entries [6]
...
This is helpful for a short period
of time, but drastic change needs to be made to
address this problem
...
Some of the information required is the
IP address, routing gateway address, subnet mask,
and DNS server
...
The
user can request appropriate network
configuration from a central server [6]
...
2 IPv6 Architecture
When IPv6 was being developed, emphasis was
placed on aspects of the IPv4 protocol that needed
to be improved
...
Routing and addressing
2
...
Security architecture
4
...
With 128 bit
addresses, the protocol can support up to
3
...
The address bits are used
less efficiently in this protocol because it simplifies
addressing configuration
...
The host
configuration is also simplified
...
This new
design allows ease of configuration for the user as
well as network administrator
...
IPsec is embedded within the IPv6
protocol
...
The only difference is that IPv6 can utilize
the security mechanism along the entire route [6]
...
The internet protocol allows for special handling of
certain packets with a higher quality of service
...
IPv6 also
offers other interesting features that are beyond
the scope of this paper
...
The approach to security is only
slightly better, not a radical improvement
...
Not all of the
methods in the table above are discussed
...
2
...
Attacks through the Current Internet
Protocol IPv4
Common internet attacks methods are broken
down into categories
...
Attacks can also
interfere with the system’s intended function, such
as viruses, worms and trojans
...
Other forms of network
intrusions also exist, such as land attacks, smurf
attacks, and teardrop attacks
...
There are four main computer security attributes
...
These security attributes are
confidentiality, integrity, privacy, and availability
...
Availability means the computer assets
can be accessed by authorized people [8]
...
Various
attack methods relate to these four security
attributes
...
7
personal data, such as credit card numbers, online
banking credentials, and other sensitive
Interception of communications by an information
...
Passive
eavesdropping is when the person only secretly 2
...
6 IP Spoofing Attacks
listens to the networked messages
...
This can lead to the in order to gain access to other computers
...
Sensitive information identity of the intruder is hidden by different
can be stolen this way [8]
...
With the current IP protocol technology, IP‐
2
...
2 Viruses
spoofed packets cannot be eliminated [8]
...
1
...
Once a file is opened,
the virus will activate within the system
...
1
...
2
...
The
system then consumes resources waiting for the
2
...
3 Worms
handshake to complete
...
file to allow it to propagate [8]
...
2 Technology for Internet Security
types of worms, mass‐mailing worms and network‐
aware worms
...
Network‐aware Internet threats will continue to be a major issue in
worms are a major problem for the Internet
...
worm accesses the target host, it can infect it by Different defense and detection mechanisms were
developed to deal with these attacks
...
2
...
4 Trojans
Trojans appear to be benign programs to the user,
but will actually have some malicious purpose
...
Cryptography is a useful and widely used tool in
security engineering today
...
2
...
2 Firewall
2
...
5 Phishing
Phishing is an attempt to obtain confidential A firewall is a typical border control mechanism or
information from an individual, group, or perimeter defense
...
Phishers trick users into disclosing block traffic from the outside, but it could also be
8
used to block traffic from the inside
...
It is a system designed to prevent
unauthorized access to or from a private network
...
areas of the IPv6 protocol still pose a potential
security issue
...
The possible security problems emerge due to the
following [5]:
1
...
Flooding issues
3
...
Extension headers
deter some common sources of attacks because of
header manipulation
...
The large number of extension
headers can overwhelm a certain node and is a
form of attack if it is deliberate
...
A type of attack called port scanning occurs when a
whole section of a network is scanned to find
potential targets with open services [5]
...
Mobility is a new feature that is incorporated into
the internet protocol IPv6
...
Network administrators
need to be aware of these security needs when
using IPv6’s mobility feature
...
2
...
IDS systems can be software and
hardware devices used to detect an attack
...
Some IDS systems just monitor and alert of an
attack, whereas others try to block the attack
...
2
...
Special
so‐called anti‐Malware tools are used to detect
them and cure an infected system
...
2
...
SSL
is designed to create a secure channel, or tunnel,
between a web browser and the web server, so
that any information exchanged is protected within
the secured tunnel
...
Clients present a certificate to the server to prove
their identity
...
Security Issues of IP Protocol IPv6
The businesses today use combinations of firewalls,
encryption, and authentication mechanisms to
create “intranets” that are connected to the
internet but protected from it at the same time
...
Despite the IPv6’s great security mechanisms, it
still continues to be vulnerable to threats
...
Intranets differ from
"Extranets" in that the former are generally
restricted to employees of the organization while
extranets can generally be accessed by customers,
suppliers, or other approved parties
...
When such access is provided it is
usually through a gateway with a firewall, along
with user authentication, encryption of messages,
and often makes use of virtual private networks
(VPNs)
...
The
disadvantage of a closed intranet is that vital data
might not get into the hands of those who need it
...
But for
broader data sharing, it might be better to keep
the networks open, with these safeguards:
1
...
Sophisticated virus checking at the firewall
3
...
Encryption for all connections and data
transfers
5
...
Intranets that exist across multiple locations
generally run over separate leased lines or a newer
approach of VPN can be utilized
...
Instead of using a dedicated, real‐world connection
such as leased line, a VPN uses "virtual"
connections routed through the Internet from the
company's private network to the remote site or
employee
...
Figure 3: A typical VPN might have a main LAN at the corporate
headquarters of a company, other LANs at remote offices or
facilities and individual users connecting from out in the field
...
The same methodologies are being
used with the addition of biometric identification
...
This might greatly
reduce the unauthorized access of secure systems
...
The software
aspect of network security is very dynamic
...
The research being performed assists in
understanding current development and projecting
the future developments of the field
...
Hardware Developments
Hardware developments are not developing
rapidly
...
10
The most obvious use of biometrics for network
security is for secure workstation logons for a
workstation connected to a network
...
The cost of hardware devices is
one thing that may lead to the widespread use of
voice biometric security identification, especially
among companies and organizations on a low
budget
...
These devices would be more expensive to
implement on several computers, as each machine
would require its own hardware device
...
S
...
At top of the range a
centralized voice biometric package can cost up to
$50,000 but may be able to manage the secure log‐
in of up to 5000 machines
...
Maintaining password security can be a major task
for even a small organization
...
Very often people write their password
down and keep it near their computer
...
Biometrics can replace this
security identification method
...
Smart cards are usually a credit‐card‐sized digital
electronic media
...
The main idea behind smart cards is to
provide undeniable proof of a user’s identity
...
It may seem that smart cards are nothing more
than a repository for storing passwords
...
Fortunately, there are safety
features built into smart cards to prevent someone
from using a stolen card
...
The
PIN is similar to the PIN used by ATM machines
...
This PIN was assigned to the user by the
administrator at the time the administrator issued
the card to the user
...
But the interesting thing is what happens when the
user inputs the PIN
...
Because the PIN is never
transmitted across the network, there’s absolutely
no danger of it being intercepted
...
There are other security issues of the smart card
...
2
...
It includes firewalls, antivirus, vpn, intrusion
detection, and much more
...
The goal is to obtain a view
11
of where the security software is heading based on
emphasis being placed now
...
When new viruses
emerge, the antivirus is updated to be able to
guard against those threats
...
Many research papers that have been skimmed
were based on analyzing attack patterns in order to
create smarter security software
...
Current research is
being performed on security software using neural
networks
...
Many small and complex devices can be connected
to the internet
...
This power,
however, is not available in small devices like
sensors
...
Research in this
area is currently being performed
...
The
future will possibly be that the security is similar to
an immune system
...
Similarly, the network security will be able to
function as an immune system
...
Many security developments that
are taking place are within the same set of security
technology that is being used today with some
minor adjustments
...
The security threats and internet protocol
were analyzed to determine the necessary security
technology
...
The current development in
network security is not very impressive
...
It was a surprise to see most of
the development taking place in the same
technologies being currently used
...
Although
some security issues were observed, the IPv6
internet protocol seems to evade many of the
current popular attacks
...
The network security field may have to
evolve more rapidly to deal with the threats further
in the future
...
W
...
T
...
31, no
...
24‐
28, Sep 1998
[2] Kartalopoulos, S
...
, "Differentiating Data Security
and Network Security," Communications, 2008
...
IEEE International Conference on, pp
...
redhat
...
html
...
, Institut Eurecom,“Internet Security
Architecture,” in Computer Networks & ISDN Systems
Journal, vol
...
787‐804, April 1999
12
[5] Sotillo, S
...
infosecwriters
...
...
, “IPv6: the next internet protocol,” April
2005, www
...
com/publications/login/2005‐
04/pdfs/andress0504
...
[7] Warfield M
...
iss
...
[8] Adeyinka, O
...
AICMS 08
...
, no
...
77‐82, 13‐15 May 2008
[9] Marin, G
...
, "Network security basics," Security &
Privacy, IEEE , vol
...
6, pp
...
‐Dec
...
baylor
...
h
tm
...
E
...
M
...
85, no
...
2034‐2051, Dec 1997
[12] "Intranet
...
23
Jun 2008, 10:43 UTC
...
2 Jul
2008
org/w/index
...
[13] "Virtual private network
...
30 Jun 2008, 19:32 UTC
...
2 Jul 2008
org/w/index
...
[14] Tyson, J
...
howstuffworks
...
htm
...
Y
...
, Proceedings of
the Sixth IEEE Computer Society Workshop on Future
Trends of , vol
...
, pp
...
“Introduction to Network Security,”
http://www
...
net/pubs/network‐security
...
cert
...
[18] Serpanos, D
...
; Voyiatzis, A
...
, "Secure network
design: A layered approach," Autonomous Decentralized
System, 2002
...
,
no
...
95‐100, 6‐7 Nov
...
; Chikaraishi, T
...
International Conference on
Information Engineering '93
...
2, no
...
507‐511 vol
Title: Network Security
Description: Network Security: History, Importance, and Future
Description: Network Security: History, Importance, and Future