Download Fundamentals of Computer Security

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Multilevel security wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Next-Generation Secure Computing Base wikipedia , lookup

Airport security wikipedia , lookup

Trusted Computing wikipedia , lookup

Information security wikipedia , lookup

Access control wikipedia , lookup

Security and safety features new to Windows Vista wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Wireless security wikipedia , lookup

Cyber-security regulation wikipedia , lookup

Distributed firewall wikipedia , lookup

Mobile security wikipedia , lookup

Unix security wikipedia , lookup

Computer security wikipedia , lookup

Security-focused operating system wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Transcript
Fundamentals of
Computer Security
Geetika Sharma
Fall 2008
Outline





Fundamentals of Computer Security
Security Threats and Protection Methods
Security Models and Mechanisms
Security Issues in Distributed systems
Latest Techniques


Agent Based Approach
Grid Specific Host Based Intrusion Detection
System
Fundamentals of Computer
Security[1]

Computer Systems

Can be represented by:
 Subjects


Objects




Active entities that access objects
Passive entities that must be protected
Examples: data, hardware, software and communication links
Access Control Policy
 Describes how objects are accessed by subjects
Flow Control Policy
 Regulates the information flow between objects and
subjects
Security Threats[1]

Interruption (availability)


Interception


Loss of data and denial of service
Related to secrecy
Modification and Fabrication are violations of
system integrity
Threats from Web/Network[4]

Client Side


What can the server do to the client?
Fool it


Server Side

What can the client do to the server?
 Bring it down (denial of service)


Install or run unauthorized software, inspect/alter
files
Gain access (break-in)
Network


Is anyone listening? (Sniffing)
Is the information genuine? Are the parties genuine?
Security Mechanisms[1]





Authentication
 Verification
Authorization
 Extending permission
Fault Tolerance
 Sustaining faults
Encryption
 Prevents exposure of information and maintains
privacy
Auditing
 Passive form of protection
Security Models[1]

Discretionary



Provides separation of users and data
E.g. access control matrix
Mandatory


Requires access control of all subjects and orders
under its control on a system wide basis
E.g. multilevel security, all subjects and objects in
the system are assigned a sensitivity label. The
labels are used as the basis for mandatory access
control decisions.
Security Issues in Distributed
Systems[1]

Interoperability and Transparency


Gives rise to security issues
Approaches to Implementing New Services


Add an additional layer of software that runs on top of
the existing system to provide the new services
Redesign the system so that the new services can be
executed more efficiently in the kernel mode
Security Issues in Distributed
Systems[1]

Client/Server Security
 A client initiates an access to an object through the
kernel
 Kernel authenticates the client and then invokes the
object server
 Implemented via Interprocess Communication at
transport layer
 Supported by secure host-to-host communications at the
network layer and node to node communication at the
link layer
 Secure distributed system consists of communicating
security servers using trusted gateway.
Security Issues in Distributed
Systems[1]
Client processes
request
response
Other OS Servers
response
Authentication
Server
Authorization
Server
Other Security
Servers
request
Trusted Secure Kernel
Client/Server Distributed Security Architecture
Latest Techniques


Majority of information security incidents is
perpetrated by insiders i.e. internal computer users
constitute the largest threat to the computer
systems security[2].
Traditional methods (such as identification and
authentication, access restriction, etc.) do not solve
this problem
Drawbacks; among them are



low ability of internal malicious users detection,
inability to process large amounts of information,
low productivity
Agent Approach for Security in
Distributed Systems[2]
Intelligent Security System for Computers users’
activity monitoring
 Online and off-line monitoring allowing to detect
anomalies and irregularities in user behavior.
 On-line monitoring is carried in real time, and is
used to predict user actions (use neural networks)
 Off-line monitoring is done after the user has
ended his work, and is based on the analysis of
statistical information obtained during user's work.
Agent Approach for Security in
Distributed Systems[2]
Win
98
On-line User
Agent
On-line User
Agent
Free
BSD
Dbase
Off-line User
Agent
Win
2000
On-line User
Agent
Controller
Agent
On-line User
Agent
Linux
System Architecture for Agent Based Security in Distributed systems
GHIDS: Defending Computational Grids
Against Misusing of Shared Resources [3]

Grid Specific Host Based Intrusion Detection System

Design
 Performance Impact
 Central Control
 Leverage Existing Software
 Configurability
 Effectiveness

Approach/Services
 Uses Bottleneck Verification (Host)
 Detects users that go from user to super user improperly
 Monitors process creation, modification and destruction (Host)
 Monitors accessing of critical resources (Host)
 Grid User ID and Host Level ID stores when Grid services used

Architecture
 Host and Grid level deployment
 Virtual Kernel Device created
 Grid Middleware modified
 Data Analyzer
 User Interface
References
1. Randy Chow, Theodore Jognson. Distributed Operating Systems and
Algorithms, Addison-Wesley 1997
2. Agent Approach for Providing Security in Distributed Systems;
TCSET'2006, February 28-March 4, 2006, Lviv-Slavsko, Ukraine
3. GHIDS:Defending Computational Grids Against Misusing of Shared
Resources”, Feng et all, IEEE 2006
4. www.cse.sc.edu/~farkas/csce522-2003/lectures/csce522lect22.ppt (2003)
Thanks!