networking and security issues in digital library dr. r. radhakrishna pillai iim kozhikode

42

Upload: carmel-wood

Post on 01-Jan-2016

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode
Page 2: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

Networking and Security Issues in Digital Library

Dr. R. Radhakrishna Pillai

IIM Kozhikode

Page 3: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

What is the Internet?• The largest computer network in the world (a

network of networks)• Information exchange is seamless using open, non-

proprietary standards and protocols, within interconnected networks

• Spirit of information sharing and open access underlies the Internet.

Page 4: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

• Hosts (end Systems)

• Server

• Packet Switch/Router

• Modem

• Mobile

• Base Station

• Satellite link

Networking Components

Page 5: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

• The rule for exchanging information between two

computers

Networking Protocol

Page 6: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

• The communication always takes place

between two end systems (hosts)

End-to-end Communication

Page 7: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

• The network core comprises of switches

or routers

Network Core

Page 8: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

• In Circuit Switching the network resources (e.g., capacity/bandwidth) are

reserved for communication

Circuit Switching

Page 9: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

• In Circuit Switching the network resources (e.g., capacity/bandwidth) are

reserved for communication

Circuit Switching

Page 10: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

• In Packet Switching the network resources (e.g., capacity/bandwidth) are

NOT reserved for communication. Packets between various hosts

share common resources

Packet Switching

Page 11: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

• Packet switched networks have “Efficient” utilization

of resources (e.g. The Internet) compared to

circuit switched networks (e.g., The Telephone

Network)

Classification of Networks

Page 12: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

• Access networks connect the end-systems to the core

network. Different technologies are used for

access

Access Networks

Page 13: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

• Access networks connect the end-systems to the core

network. Different technologies are used for access (e.g. Hybrid fiber-

coaxial access)

Access Networks

Page 14: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

• Access networks connect the end-systems to the core

network. Different technologies are used for

access (e.g. Home Network)

Access Networks

Page 15: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

• Various components of packet delay include

– Nodal processing delay

– Queueing delay

– Transmission delay

– Propagation delay

Delays in Networks

Page 16: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

• Dependence of Queueing delay on traffic intensity

Delays in Networks

Page 17: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

• Smaller sized packets result in smaller end-to-end

delays

Delays in Networks

Page 18: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

• Layers of functions with standardised interface

between them

Protocol Stack

Page 19: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

• Layers of functions with standardised interface between them

Protocol Stack

Page 20: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

Storage Area Networks (SAN)

• Storage use is growing explosively Storage use is growing explosively • Managing locally attached storage is difficultManaging locally attached storage is difficult

– Backup Backup – Access by multiple serversAccess by multiple servers

• Combines the best of storage and networking Combines the best of storage and networking technologies to provide low latency, high technologies to provide low latency, high bandwidth, high availability interconnectbandwidth, high availability interconnect

• ComponentsComponents– ServersServers– Storage FabricStorage Fabric

Page 21: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

Storage Area Networks (SAN)• SAN enables storage resources and server SAN enables storage resources and server

resources to grow independentlyresources to grow independently • Storage on a given server can be increased or

decreased as needed without complex reconfiguring or re-cabling of devices.

• Enforcing security policies for access rights to a given device is a core part of the infrastructure

• Data can be transferred directly from device to device without server intervention

• The primary technology used in storage area networks today is Fibre Channel.

Page 22: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

Fibre Channel Technologies

• Arbitrated LoopArbitrated Loop

Host A Host B

DeviceE

DeviceC

DeviceD

Page 23: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

The Infrastructure of the Internet

Page 24: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

• An application that uses the Internet transport functions

• A system with universally accepted standards for storing, retrieving, formatting, and displaying information via a client/server architecture

• Based on HTML - standard hypertext language used in Web

• Handles text, hypermedia, graphics, and sound

Internet Services – World Wide Web

Page 25: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

Internet Challenges• Internet Regulation

– Technical organizations (e.g., World Wide Web Consortium) develop standards governing the Internet’s functionality

– These organizations are not formally charged in any legal or operational sense with responsibility for the Internet

– How to control controversial content on the Web?

Page 26: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

Internet Challenges (continued)• Internet Expansion

– Tremendous Internet traffic growth has strained some elements of the network

• Slower retrieval times

• Unreliable data transmission

• Denial of service by overloaded servers

– Approaches to overcoming this congestion include• Improved hardware technology

• Improved Web management software

Page 27: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

Internet Challenges (continued)• Internet Privacy - Web sites collect information with and

without consumers’ knowledge– Cookie - small data file placed on users’ hard drives when a

site is first visited. Collects data on pages visited and content viewed.

– Three potential approaches to the privacy issue• Government lets groups develop voluntary privacy standards;

does not take any action now unless real problems arise• Government recommends privacy standards for the Internet;

does not pass laws at this time• Government passes laws now for how personal information can

be collected and used on the Internet

– Financial transaction security also a concern

Page 28: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

Intranets• A private network that uses Internet

software and TCP/IP protocols– Provide employees with easy access to

corporate information– Used to deploy corporate applications

• Examples – policies and procedures manuals; human resource forms; product catalogs

– Security is a concern• Security measures include – public key security,

encryption, digital certificates, firewalls

Page 29: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

Extranets• An extension of an intranet to selected outside

business partners, such as suppliers, distributors, and key customers– Provide business partners with easy access to corporate

information and easy collaboration

• Security– Critical to prevent unwanted entry into internal systems– Virtual private networks (VPNs) are often used to add

security to Internet communication

Page 30: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

Operational Characteristics of Internet

• Internetworking technologies are based on open standards

• Internetworking technologies operate asynchronously

• Internet communications have inherent latency

• Naturally decentralised• Scalable

Page 31: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

The rise of Internetworking: Business Implications

• Network becomes a computer• Quicker realization of economic value• Emergence of real-time infrastructure: Better data

better decisions, improved process visibility, Improved process efficiency, From make-to-sell to sense-and-respond

• Broader exposure to operational threats• New models of service delivery• Managing legacies

Page 32: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

Future Internet Initiatives• Internet2

– A collaboration among more than 180 U.S. universities to develop leading-edge networking and advanced applications for learning and research.

– A group of very high bandwidth networks on the Internet.

– Partnership between universities, industry, and government.

• Next Generation Internet (NGI)– Federal government led initiative to advance Internet

technology and applications.

Page 33: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

Securing Infrastructure against Malicious Threats

• Threats: – External attacks – DoS attacks, DDoS,

Spoofing– Intrusion– Viruses and Worms

Page 34: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

DoS/DDoS

• Easy to execute, difficult to defend against

• Abrupt termination of conversation

• Attack from different sites – monitoring difficult

• Degradation of service attack

Page 35: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

Chapter 6 Figure 6-6

Normal and DoS Handshakes

WebUser’s PC

WebsiteServer

WebsiteServer

WebUser’s PC

SYN: User’s PC says “hello”

ACK-SYN: Server says “Do you want to talk”

ACK: User’s PC says “Yes, let’s talk”

Normal Handshake

DoS Handshake

SYN: User’s PC says “hello” repeatedly

ACK-SYN: Server says “Do you want to talk” repeatedly

No Response: User’s PC waits for server to “timeout”

Source: Austin, Robert D. "The iPremier Company, The (A), (B), and (C): Denial of Service Attack." Harvard Business School Teaching Note 602-033.

Page 36: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

Chapter 6 Figure 6-7

A Distributed Denial of Service Attack

Source: Austin, Robert D. "The iPremier Company, The (A), (B), and (C): Denial of Service Attack." Harvard Business School Teaching Note 602-033.

W ebsiteServer

Attacker 1

Attacker 3

Attacker 2

Attacker 5

Attacker 4

Attacker 6

Attacker 7

Attacker 8

Attack Leader

Attack Leader facilitates SYN floods from multiple sources.

Page 37: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

Chapter 6 Figure 6-8

“Spoofing”

Source: Austin, Robert D. "The iPremier Company, The (A), (B), and (C): Denial of Service Attack." Harvard Business School Teaching Note 602-033.

A ttacker

A ddress: 12345

T arget

A ddress: 54321

Inform ation Packets

N orm al

“Spoofing”

90817 54321

5432112345

SenderA ddress

D estinationA ddress

Target server correctly interprets sender address

Target server incorrectly interprets sender address

Page 38: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

Intrusion

• Get access to company’s internal IT infrastructure– User name, password– Sniffer software– Vulnerabilities left in the software

• Difficult to figure out what intruders might have done inside

Page 39: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

Viruses and Worms

• Replicate and spread themselves (worms)

• Virus needs assistance to replicate

• The Code Red Worm (2001)

Page 40: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

Securing Infrastructure against Malicious Threats

• Defensive Measures– Security Policies– Firewalls– Authentication– Encryption– Patching and Change management– Intrusion detection and network monitoring

Page 41: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

Securing Infrastructure against Malicious Threats

A HOLISTIC APPROACH IS THE NEED OF THE DAY

Page 42: Networking and Security Issues in Digital Library Dr. R. Radhakrishna Pillai IIM Kozhikode

Thank You