Final Presentation of Network Securityyy.pptx

muhammadibrahimzaina 7 views 15 slides Sep 01, 2024
Slide 1
Slide 1 of 15
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15

About This Presentation

final presentation of networking


Slide Content

Group Name : Bakht Muhammad & Muhammad Ibrahim Subject : Network Security Session : 2022 – 2024 Deptt : Computer Science University of Balochistan Final Presentation of Network Security

Control plane   A control plane is a type of network that’s responsible for making decisions on how data should be managed, routed, and processed.   Some examples of control planes include routing protocols (like BGP, OSPF), network management protocols (SNMP), and application layer protocols (HTTP and FTP).

Data plane  A data plane is responsible for the actual movement of data from one system to another. Delivering data to end users from systems and vice versa.  Examples of data planes include: Ethernet networks Wi-Fi networks Cellular networks Satellite communications

Control plane Determines how datagram is routed among routers along end-end path from source host to destination host Data plane Determines how datagram arriving on router input port is forwarded to router output port Routing Algorithm 1 2 3 data plane control plane

Data plane can be secured in Wired Network by Internet Protocol Security ( IPSec ) Transmission Control Protocol (TCP) Secure Control Transmission Protocol (SCTP) Data plane can be secured in Wireless Network by Secure Single Path protocol (SSP) Secure Message Transmission Protocol (SMT) Continuously Adapting Secure Topology-Oblivious Routing (CASTOR)

Secure Message Transmission (SMT) is a two-party cryptographic protocol by which the sender can securely and reliably transmit messages to the receiver using multiple channels. Data plane can be secured in Wireless Network by Secure Message Transmission Protocol (SMT) Secure Single Path protocol (SSP) Continuously Adapting Secure Topology-Oblivious Routing (CASTOR)

Data plane can be secured in Wireless Network by Secure Message Transmission Protocol (SMT) Secure Single Path protocol (SSP) Continuously Adapting Secure Topology-Oblivious Routing (CASTOR) Secure Single-path Protocol relies on an end-to-end security association It transmits packets across a route, calculated over the connectivity The destination validates received data and responds with acknowledgements If not, the source detects a packet loss.

The route rating is increased each time an acknowledgement is received, and it is reduced when a timeout occurs (no ACK) Once the rating drops below a threshold, the route is discarded and the source switches to another one (invoking a new route discovery if needed). SSP is robust to any attack (e.g., wormholes, tunnels, other collusion attacks) that causes a packet to be dropped; if so, the route is discarded. Data plane can be secured in Wireless Network by Secure Message Transmission Protocol (SMT) Secure Single Path protocol (SSP) Continuously Adapting Secure Topology-Oblivious Routing (CASTOR)

Data plane can be secured in Wireless Network by Secure Message Transmission Protocol (SMT) Secure Single Path protocol (SSP) Continuously Adapting Secure Topology-Oblivious Routing (CASTOR) Castor is a routing protocol for wireless ad hoc networks. One of its main goals is to secure the routing process. The protocol also supports node mobility but was primarily designed for networks of static nodes. Castor design is agnostic to the exact network layer it is running on top of, Implementations are usually based on the Transport Layer (OSI Layer 3)

Data plane can be secured in Wireless Network by Secure Message Transmission Protocol (SMT) Secure Single Path protocol (SSP) Continuously Adapting Secure Topology-Oblivious Routing (CASTOR) How CASTOR Works The core routing metric of Castor is reliability, followed by response time. Nodes determine metrics independently from each other, and take routing decisions with their own locally-collected information. The routing state is determined per-flow at each node. Each node has a unique ID that can be cryptographically validated if needed. The source of a packet must not only know this ID but also the public key of the destination

Data plane can be secured in Wireless Network by Secure Message Transmission Protocol (SMT) Secure Single Path protocol (SSP) Continuously Adapting Secure Topology-Oblivious Routing (CASTOR) Packet structure A  data packet  contains the following fields: s: source identifier d: destination identifier H: flow identifier b k : packet identifier f k  = [x 1 , x 2 , ..., x l ]: flow authenticator e k : encrypted ACK authenticator M: payload

An acknowledgement packet contains a single field ak , the ACK authenticator. ek is ak  encrypted with the public key of the destination (or the pre-shared key between sender and destination). This ensures that only the correct recipient can acknowledge the delivery of a packet. Data plane can be secured in Wireless Network by Secure Message Transmission Protocol (SMT) Secure Single Path protocol (SSP) Continuously Adapting Secure Topology-Oblivious Routing (CASTOR)

Packet generation For each flow, the sender generates the following: A set of packet identifiers bk = h( ak ), where h is a cryptographic hash function (i.e. a hash function practically impossible to invert) A Merkle tree with root H and h(b1), ..., h( bw ) as leaves The flow authenticators x1, ..., xk  form a sequence of siblings of the vertices on the path from a leaf h(bk) up to the root H. Data plane can be secured in Wireless Network by Secure Message Transmission Protocol (SMT) Secure Single Path protocol (SSP) Continuously Adapting Secure Topology-Oblivious Routing (CASTOR)

Forwarding For every neighbor and for every flow, a node stores a reliability estimator. When it receives a packet, it determines the next hop based on the reliability estimator for that particular flow. If no neighbor is deemed reliable, the node broadcasts the packet to all neighbor nodes and starts a timer limited by some specified timeout value. Data plane can be secured in Wireless Network by Secure Message Transmission Protocol (SMT) Secure Single Path protocol (SSP) Continuously Adapting Secure Topology-Oblivious Routing (CASTOR)

The reliability threshold can be adjusted for how much bandwidth we can invest in route discovery, thus impacting the packet delivery rates. If a node receives a duplicate packet, it does not forward it. However, multiple acknowledgements of a packet are rebroadcasted. Data plane can be secured in Wireless Network by Secure Message Transmission Protocol (SMT) Secure Single Path protocol (SSP) Continuously Adapting Secure Topology-Oblivious Routing (CASTOR)