Internetsec

Internetsec - Internet Security: An Introduction Giovanni...

Info iconThis preview shows pages 1–14. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Internet Security: An Introduction Giovanni Vigna vigna@cs.ucsb.edu http://www.cs.ucsb.edu/~vigna Internet A network of networks A logic network composed of a set of autonomous subnetworks connected by gateways Open architecture Different protocols for physical transmission A single protocol suite for the network and transport layers History (70s-80s) The Defense Advanced Research Project Agency (DARPA) develops ARPANET First four nodes (1969): UC Los Angeles UC Santa Barbara Stanford Research Institute University of Utah Based on the Network Control Protocol (NCP) ARPANET moves to TCP/IP (January 1st 1983) 7 History (90s and 00s) Fast growth (size and traffic volume) 1991: Tim Berners-Lee (CERN) creates the World-Wide Web Creating services and publishing information becomes easier The Internet explodes... Security issues explode History ( 90) Fast growth (size and traffic volume) 1991: Tim Berners-Lee (CERN) creates the World- Wide Web 9 The Internet - http://www.opte.org/ 10 A Brief History of Hacking 1972, John Draper builds a blue box and starts the phone phreaking phenomenon Dec 1973, Bob Metcalfe, The Stockings Were Hung by the Chimney with Care, Request for Comments no. 602 August 1986: German hackers penetrate Lawrence Berkeley Laboratory systems and try to obtain secrets to be sold to the KGB November 1988: The Internet worm brings down the Internet December 1994: Kevin Mitnick attacks the Supercomputer Center in San Diego using a TCP spoofing attack March 2010, Albert Gonzales receives a twenty-year sentence for hacking millions of credit card numbers The TCP/IP Protocol Suite Network protocols (OSI level 3) IP ( Internet Protocol ) ICMP ( Internet Control Message Protocol ) Transport protocols (OSI level 4) TCP ( Transfer Control Protocol ) UDP ( User Datagram Protocol ) Application protocols SMTP, FTP, SSH, The TCP/IP protocol suite was designed to be simple, open, and efficient What about security? TCP UDP IP ICMP TELNET RPC Physical Layer SMTP DNS Internet Addressing Internet 192.168.1.29 192.168.1.1 192.168.2.170 192.168.2.1 192.168.14.173 111.10.20.14 192.168.1.15 192.168.1.23 192.168.1.45 192.168.1.99 192.168.2.11 192.168.2.23 192.168.2.78 192.168.2.67 192.176.15.56 192.168.14.1 111.10.20.76 111.10.20.123 111.10.20.121 111.10.20.135 111.12.23.145 111.10.20.1 Subnetwork 192.168.1 Subnetwork 192.168.2 Subnetwork 111.10.20 Subnetwork 192.168.14 Internet Protocol (IP) The IP protocol represents the glue of the Internet The IP protocol provides a connectionless , unreliable, best-effort datagram delivery service (delivery, integrity, ordering, non-duplication, and bandwidth is not guaranteed) IP datagrams can be exchanged between any two nodes (provided they both have an IP address) For direct communication IP relies on a number of different lower-level protocols, e.g., Frame Relay, different lower-level protocols, e....
View Full Document

This note was uploaded on 12/27/2011 for the course CMPSC 117 taught by Professor Kemm during the Fall '09 term at UCSB.

Page1 / 56

Internetsec - Internet Security: An Introduction Giovanni...

This preview shows document pages 1 - 14. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online