You are on page 1of 17

7 LAYERS SECURITY

Security

Security of the OSI Model

Santosh baranwal
11089E071
B.Tech”I.T” 3rd Yr
Sec-B
9/30/2010
 ISO-International Standards Organisation

 Multinational body dedicated to worldwide agreement


on international standards

 An ISO standard that covers all aspects of network


communication is the OSI

 OSI-Open System Interconnection

 OSI is a model and not a protocol

 Vendor specific protocols close off communication


between unrelated systems

 OSI model is to open communication between


different systems without requiring changes to the
logic of the underlying hardware and software

OSI Layers
 The OSI model is built of seven ordered layers:

 Layer-1: Physical

 Layer-2: Data Link

 Layer-3: Network

 Layer-4: Transport

 Layer-5: Session

 Layer-6: Presentation

 Layer-7: Application

 The seven layers can be thought of as belonging to three sub


groups
 Network Support Layers (Layers 1-3)

 Deal with the physical aspects of moving data from


one device to another

 User Support Layers (Layers 5-7)

 Allow interoperability among unrelated software


systems

 Layer-4 ensures end to end reliable data transmission

Layer-1(Physical)
 First of three network support layers

 Concerned with physical transmission of data bits and


ensures that a bit entering at one end of the transmission
media reaches the other end

 Deals with the mechanical and electrical specifications of the


interface and transmission medium e.g. Optical, coax, RF,
twisted pair etc.

 Defines the type of encoding i.e. how 0s and 1s are changed


to signals

 Defines data rate / transmission rate i.e. defines the duration


of a bit

 Responsible for synchronisation of sender and the receiver


clocks

 Concerned with the connection of the devices to the medium

 Point-to-point configuration

 Multipoint configuration

 Physical topology

 Mesh; Star; Ring; Bus


 Transmission Mode

 Simplex; Half-Duplex; Full-Duplex

SECURITY ON (PHYSICAL LAYER)


Physically secure and mange the cable plant

– Wiring closets

– WAN connections

– CSU/DSU

Physically secure and control access to networking


equipment

– Routers

– Hubs

– Switches

Physically secure and control access to servers, mainframes

Provide redundant power and WAN connections

 LAYER 2(Data Link Layer)



 Second of three network support layers

 Divides the bit stream received from network layer into


manageable data units called frames

 Transforms the physical layer to a reliable link by adding


mechanism to detect and retransmit damaged frames

 Responsible for physical addressing of the devices

 Responsible for link-by-link flow control and error free


delivery of data

 Responsible for Media Access Control

SECURITY Framework ON(Data Link


Layer)
 VPNs protecting the links between networks

 Network Intrusion Detection Systems (NIDS)


watching traffic for attacks

 Host Intrusion Detection Systems (HIDS) protecting


connections to critical servers/hosts

 Virus scanning taking place on traffic coming in


from outside the customer’s network.

• Concerned with getting packets from source to


destination.
• The network layer must know the topology of the subnet
and choose appropriate paths through it.

• When source and destination are in different networks, the


network layer (IP) must deal with these differences.

* Key issue: what service does the network layer provide


to the transport layer (connection-oriented or
connectionless).

* The Security Framework--


Network
* Firewall performing stateful inspection of incoming and
outgoing packets

* Router Access Control Lists (ACLs) filtering packets bound


between networks

* Virus scanning of attachments at the e-mail gateways

1. The services provided by the network layer should be


independent of the subnet topology.
2. The Transport Layer should be shielded from the number,
type and topology of the subnets present.

Layer-4 (Transport)
 Responsible for Source-to-Destination delivery of the
entire message

 Uses service-point address (port address) for end-to-end


delivery

 Network layer gets each packet to correct computer,


transport layer gets the entire message to the correct
process

 Responsible for segmenting a message into transmittable


segments

 At the destination the message is correctly reassembled


 Utilises network layer to ensure reliable, sequenced data
exchange

 Transport layer can be connectionless or connection


oriented

 A connectionless transport layer treats each segment


as an independent packet

 A connection oriented transport layer makes a


connection with the transport layer at the destination
machine before delivering the packets

 After all the data is transmitted, the connection is


terminated

 Responsible for end-to-end flow control of data

 Responsible for end-to-end error control of data

 Error correction is usually achieved through


retransmission

Connection oriented Mux &


D’mux

• Connection oriented-TCP connection

• TCP socket and the TCP connection

• TCP socket is identified by 4 fields:

Source IP address

Source port number

Destination IP address

Destination port number


Security on( Transport Layer)
Developing a mechanism which enables the
transport layer security server to resume
sessions and avoid keeping per client session
state. The TLS server encapsulates the session
state into a ticket which is forwarded to the
client for it to resume the session.
A ‘TICKET’ is defined as a cryptographically
protected data structure that is created by a
server and consumed by it to rebuild session-
specific state.
The ticket is created by the TLS server and sent
to the TLS client, when the TLS client wants to
resume a session it presents the ticket to the TLS
server. The ticket is distributed to the client
using the “NewSessionTicket” TLS handshake
message, this message is sent during the TLS
handshake before the “ChangeCipherSpec”
message, after the server has successfully
verified the client's Finished message.

Diagram views
Expected Execution
It can be done using a single system where we can open
multiple CHILDS (clients) and using the connection
program we can restrict one of the child’s from
accessing the server and then we can resume the
connection using our mechanism.

Platform Usage: C, Linux

Layer-5(Session)
 First of the three user support layers

 It is the network dialog controller

 It establishes, maintains, and synchronises the interaction


between communicating systems

 It allows the communication between two processes to


take place either in half-duplex or full-duplex

Allows a process to add checkpoints (synchronisation points)


into a stream of data

• The session layer defines how to start, control, and end


conversations (called sessions). This includes the control
and management of multiple bidirectional messages so
that the application can be notified if only some of a series
of messages are completed. This allows the presentation
layer to have a seamless view of an incoming stream of
data. The presentation layer can be presented with data if
all flows occur in some cases. For example, an automated
teller machine transaction in which you withdraw cash
from your checking account should not debit your account,
and then fail, before handing you the cash, recording the
transaction even though you did not receive money. The
session layer creates ways to imply which flows are part of
the same session and which flows must complete before
any are considered complete.

– RPC, SQL, NFS,

– NetBIOS names,

– AppleTalk ASP, DECnet

– SCP
• Accounting, conversation control

– who can talk when, and session parameter


negotiation.

• Dialogue control and seperation

– enable applications to communicate between the


source and destination

Dialogue Control
• Two-way alternate communication
– Communication partners take turns while
sending messages to avoid interrupting each
other.
– For example; Internet Relay Chat (IRC)
• Two-way simultaneous communication
– Communication partners send each other
whatever they want without waiting turns.
– Synchronization Problem

• Network File System (NFS)

• Structured Query Language (SQL)

• Remote Procedure Call (RPC)

• X-Window System

• AppleTalk Session Protocol (ASP)

• Digital Network Architecture Session Control Protocol (DNA


SCP)
 Second of the three user support layers

 Concerned with the syntax and semantics of the


information exchanged between two systems

 At sender end, changes the information from sender


dependent format into a common format

 At the receiving end, changes the information from


common format into its receiver dependent format

 Responsible for encryption and decryption of sensitive


information

 Responsible for data compression of the data to be


transmitted

The Security Framework--Application


Layer
 OS and application hardening at the system level

 Conduct security health checking to determine if security


polices for types of applications allowed to run, password
composition and length, services allowed on hosts, etc.
are being followed

 Provide vulnerability scanning to test the configuration of


applications and systems, looking for vulnerabilities,
missing patches, etc.

 Conduct penetration tests to determine if machines can be


exploited and privileged access gained

 User account management on the network

 User account management on individual systems

 User account management for specific applications,


RDBMS, etc.

 Virus scanning and updates on individual machines and


user desktops

 Role & Rules Based Access Control (RBAC)

 PKI and digital certificates

Layer-7(Application)
 Top of the three user support layers

 Enables the user, human or software, to access the network

 It provides user interfaces and support for services e.g.


electronic mail, remote file access and transfer, shared
database management and other types of distributed
information services

No headers or trailers are added by this layer


 The application layer is the seventh level of the seven
layer OSI model. It’s the “highest layer” of the OSI model.

 The book and the course are organized and broken down
by the OSI model!

 Security of the application layer is critical.


 Review the “Guard the Application Layer”
document.
 Security frame work is same as presentation
layer.

You might also like