Karshi branch of tashkent university of information technologies named after mukhammad al-khorezmi
Download 1.05 Mb. Pdf ko'rish
|
MAIN DIPLOMA WORK (2)....
- Bu sahifa navigatsiya:
- 2.1. About security protocols used network configurations on Banking systems.
Picture 1.7. Percentage compromised by at least one successful attack in 2020, by
country. 44 CHAPTER 2. IMPLEMENTATION OF MODERN TECHNOLOGIES IN THE FIGHT AGAINST CYBER ATTACKS IN BANKING SYSTEMS. 2.1. About security protocols used network configurations on Banking systems. Cyber security protocols are plans, protocols, actions and measures that aim to keep your organization safe from malicious attacks, data breaches and other security incidents. In order to make sure that your organization is protected, you need to employ various protocols and software that work well together. Since there are multiple ways through which an attacker can gain access to your networks, systems and sensitive data, you need to employ more than one security measure. Additionally, you must review and update these measures regularly. Why are cyber security protocols necessary? You might think that protecting your organization is costly, involved or unnecessary. Yet bearing in mind that in today’s business environment, the information is one of the most vital assets an organization has. Considering that developments in technology allows us to conduct our business in cyber environments, it is easy to see that a valuable asset of an organization, information , is open to threats. That is why it is key that you take necessary measures to make sure that your organization’s valuable information and hard-earned reputation is safe. You might think that having a small business keeps you under the radar, yet according to The Cybersecurity and Infrastructure Security Agency’s report, most hackers aim relatively tiny businesses since most of them are not protected properly. The number of protocols are uncountable. And here, I’d like to describe some important ones (Ssl, Ipsec, IDS, TLS, SHTTP, SSH). Let me start: 1.About SSL Protocol: SSL stands for Secure Socket Layer protocol, is an Internet protocol used for exchanging the information over a web browser and web server in a secure manner, provides two basic services like authentication and 45 confidentiality. SSL protocol is located between the application layer and transport layer. There are three subprotocol Handshake Protocol, Record Protocol and Alert Protocol. These three SSL protocols constitute the overall working of Secure Socket Layer. The development of Secure Socket Layer (SSL) was started by Taher Elgamal an Egyptian cryptographer who was also a scientist at Netscape Corporation a popular organization of its time. SSL (Secured Sockets Layer) is a web protocol developed by Netscape in the 90s for enhancing web security. TLS (Transport Layer Security) was developed by the Internet Engineering Task Force (IETF) as an improvement on SSL. Usually, SSL is used to refer to both SSL and TLS. [16] SSL allows web clients and servers to: 1. Verify each other’s identity. 2. Encrypt messages they send to each other. 3. Ensure the integrity of messages sent between them. It works through a combination of symmetric and asymmetric encryption using cryptographic keys tied to an SSL certificate. What is Symmetric Encryption and Asymmetric Encryption? Encryption can be usually classified as two types: symmetric and asymmetric (also known as public key encryption). Symmetric encryption means the ability to encrypt a message automatically confers the ability to decrypt. This is because it encrypts and decrypts using the same secret key. For instance, an ancient symmetric encryption scheme is the Caesar Cipher. Modern symmetric encryption schemes include: Data Encryption Standard(DES), and Advanced Encryption Standard(AES). Asymmetric encryption, aka public key encryption, is an encryption scheme that uses a public key and a private key. The public key is used for encryption while the private key is used for decryption. Unlike symmetric encryption, asymmetric encrypting does 46 not automatically confer the ability to decrypt. Latest asymmetric encryption schemes include RSA, which relies on the challenge of factoring large primes and Diffie- Hellman, which relies on the difficulty of solving discrete logarithms. Asymmetric encryption can also be used to generate digital signatures. Much like their analog counterparts, digital signatures verify that a party approves of a document. Generating the signature is done with the private key, while verifying the authenticity of the signature is done using the public key. SSL uses these digital signatures to authenticate the identity of web servers. In other words, this SSL can be considered a SECURITY PROTOCOL. The SSL has two keys one • Public Key. • Private Key. Public Keys are known to the sender as well as the receiver. Private Keys are known to receivers only. You can easily distinguish whether a website is using SSL or not. If a website’s URL starts with HTTP this denotes they are not using SSL whereas if the URL starts with HTTPS the website has installed SSL. For Example • http://www.chtips.com SSL Disabled • https://www.chtips.com SSL Enabled [8] 2. About IPSec protocol: Internet Protocol Security aka IPSec is a secure network protocol suite that authenticate and encrypt data packets in internet. It has two vital roles: Encryption and Authentication. Additionally, IPSec can work in two modes — transport mode and tunnel mode. In transport mode, IPSec encrypts traffic between two hosts. Here, there will be encryption solely for the data packet and not the IP header. 47 But, in Tunnel mode, IPSec create virtual tunnels among two subnets. This mode encrypts the information as well as the IP header. That’s why, our Dedicated Engineers prefer Tunnel mode in most VPNs. In simple words, IPSec offers higher security than old and vulnerable protocols like Point to Point protocol. IPSec (Internet Protocol Security) is a set of open network security protocols formulated by IETF (Internet Engineering Task Force). It is not a single protocol, but a collection of protocols and services that provide security for IP networks. It supplies high-quality, interoperable, and cryptographic-based security guarantees for information transmitted on the Internet. IPSec mostly includes security protocols AH (Authentication Header) and ESP (Encapsulating Security Payload), key management exchange protocol IKE (Internet Key Exchange), and some algorithms for network authentication and encryption. IPSec mostly uses encryption and verification methods. The authentication mechanism enables the data receiver of IP communication to confirm the true identity of the data sender and whether the information has been tampered with during transmission. The encryption mechanism guarantees the confidentiality of the information by encrypting the data to prevent the data from being eavesdropped during transmission. To supply security services for IP data packets. In actual network communication, you can use these two protocols at the same time or choose to use one of them according to actual security requirements. Both AH and ESP could supply authentication services, but the authentication services provided by AH are stronger than those provided by ESP. basic concepts: 1. Security alliance: IPsec supplies secure communication among two endpoints, which are called IPsec peers. It is the foundation of IPsec and the essence of IPsec. 48 2. Encapsulation mode: IPsec has two working modes, one is tunnel mode and the other is transmission mode. The tunnel mode is used in the communication between a couple of security gateways, and the transmission mode is used in the communication between two hosts. 3. Authentication algorithm and encryption algorithm: The realization of authentication algorithm is mostly through the hash function. The hash function is an algorithm that can accept an arbitrarily long message input and produce a fixed-length output. The output is called a message digest. The encryption algorithm is mainly realized through a symmetric key system, which uses the same key to encrypt and decrypt data. 4. Negotiation mode: There are two negotiation modes for SA establishment, one is manual mode, and the other is IKE auto-negotiation mode. The working principle of IPSec is similar to that of a packet filtering firewall and could be regarded as an extension of the packet filtering firewall. When a matching rule is found, the packet filtering firewall will process the received IP data packet according to the method established by the rule. IPSec determines the processing of received IP data packets by querying the SPD (Security Policy Database). But IPSec is different from packet filtering firewalls in that, in addition to discarding, IP data packets are directly forwarded (bypassing IPSec). There is another, that is, IPSec processing. IPSec processing means encrypting and authenticating IP data packets. Only after the IP data packets are encrypted and authenticated, can the confidentiality, authenticity, and integrity of the data packets transmitted on the external network be guaranteed, and secure communication via the Internet becomes possible. IPSec can either solely encrypt IP data packets, or solely authenticate, or it can be implemented at the same time. IPSec provides the following security services: 49 1. Data encryption: The IPsec sender encrypts the packet before transmitting it through the network. 2. Data integrity: The IPsec receiver authenticates the packet sent by the sender to ensure that the information has not been tampered with during transmission. 3. Data source authentication: IPsec at the receiving end can authenticate whether the sending end of the IPsec message is legal. 4. Anti-replay: The IPsec receiver can detect and refuse to receive outdated or duplicate messages. The way that IPsec protects IPv6 routing protocol messages is different from the current interface-based IPsec process. It is service-based IPsec, that is, IPsec protects all messages of a certain service. In this mode, all IPv6 routing protocol packets used by the device that require IPsec protection must be encapsulated, and the IPv6 routing protocol packets received by the device that are not protected by IPsec and that fail to decapsulate must be discarded. Since the key exchange mechanism of IPsec is only suitable for communication protection among two points, in the case of one-to-many broadcast networks, IPsec cannot realize automatic key exchange, so manual key configuration must be used. Similarly, due to the one-to-many nature of the broadcast network, each device is required to use the same SA parameters (same SPI and key) for the received and sent messages. Therefore, only SAs generated by manual security policies are supported to protect IPv6 routing protocol packets. [10] 3. TLS Protocol: • Same as SSL, TLS which stands for Transport Layer Security is widely used for the privacy and security of data over the internet. • TLS uses a pseudo-random algorithm to generate the master secret which is a key used for the encryption between the protocol client and protocol server. 50 • TLS is basically used for encrypting communication between online servers like a web browser loading a web page in the online server. TLS also has three sub-protocols the same as SSL protocol – Handshake Protocol, Record Protocol, and Alert Protocol. TLS or Transport Layer Security is a crucial aspect of your website. It protects clients’ information from security threats like malware and denial-of-service (DoS) attacks. Having TLS ensures that solely authorized clients can access data through encryption. For instance, using TLS encryption for an online store will secure your consumers’ transactions by converting their sensitive information into secret code. This way, third parties will not be able to read the data. Transport Layer Security (TLS) is a cryptographic protocol that secures the connection between a web server and a web application using data encryption. It applies to all information exchanged over the network, including emails, web browsing sessions, and file transfers. As a result, hackers cannot access clients’ sensitive data like login credentials and credit card numbers. Established by the Internet Engineering Task Force (IETF), TLS uses encryption for the user and server to generate a secure connection among the applications. It starts when clients access a secured website by specifying the TLS encryption method like the advanced encryption standard (AES). It works with two security layers – the TLS record protocol and the TLS handshake protocol. These protocols use symmetric and asymmetric cryptography methods to secure data transfer and communications among the users and web servers. The TLS handshake protocol, for instance, uses asymmetric cryptography to generate public and private keys that encrypt and decrypt data. Then, the overall process is as follows: 51 1. The client sends a list of all TLS versions along with recommendations for a cipher suite and generates a random number that will be used later. 2. The server confirms which options it will use to initiate the connection. 3. The server sends a TLS certificate to the user for the authentication process. 4. After validating the certificate, the client creates and sends a pre-master key encrypted by the server’s public key and decrypted by the server’s private key. 5. The client and server generate session keys using the previously generated random numbers and the pre-master key. 6. Both the client and server have a finished message that has been encrypted with a session key. 7. The TLS handshake process is finished, and both the client and server have created secure symmetric encryption. Moreover, the record protocol uses symmetric encryption to generate unique session keys for each connection during the handshake process. It also adds all information exchanged with a hash-based message authentication code (HMAC) to verify the data authenticity. Nowadays, TLS is becoming a standard practice for most modern browsers and other applications, where it serves three purposes: • Encryption. It hides the data transferred from third parties through encoded data. • Authentication. TLS connection ensures both parties’ identities are who they claim to be by providing a certificate. • Integrity. Eventually, it verifies that the data transmitted has not been forged or tampered with during the delivery process. 4. SHTTP : 52 a. SHTTP stands for Secure Hyper Text Transfer Protocol, which is a collection of security measures like Establishing strong passwords, setting up a firewall, thinking of antivirus protection, and so on designed to secure internet communication. b. SHTTP includes information entry forms that are used to input data, which has previously been collected into a database. As well as internet-based transactions. c. SHTTP’s services are quite comparable to those of the SSL protocol. d. Secure Hyper Text Transfer Protocol works at the application layer (that defines the shared communications protocols and interface methods used by hosts in a network) and is thus closely linked with HTTP. e. SHTTP could authenticate and encrypt HTTP traffic between the user and the server. f. SHTTP operates on a message-by-message basis. It can encrypt and sign individual messages. 5.About SSH protocol. What is SSH? The SSH Protocol or Secure Shell Protocol is a mechanized convention that is intended to safely interface one PC framework to one more over a public unstable organization. This convention interfaces the two players by building up a concession to how interchanges will be taken care of. SSH is an application-level convention, which distinguishes the seventh layer the OSI model. SSH is a truly valuable convention since it doesn't need actual admittance to interface with an alternate machine. The association can just be set up over the web. It's a basic and clear system to empower you to control servers from a far-off area. The SSH Protocol was a framework created during the 90s. It was made as a trade for Telnet, which was additionally an application layer convention that guarantees information moves without encryption. Sending information without security was very tricky and was indistinguishable from sending a plain message over an unstable 53 interface. Anybody with but much a bundle sniffer would have the option to intrude on your message. They will approach see each one of the data you has sent, including different exercises you are doing. SSH is a special idea that can be utilized to move: • Information • Orders • Text • Records Strategies Used in SSH SSH takes on an assortment of information control strategies when information is being communicated. Three procedures took on in Secure Shell Protocol, include: • Symmetrical security • Asymmetrical Encryption • Hashing Symmetrical Encryption Even security is a basic strategy used to ensure information is being sent. In this procedure, a solitary key is utilized to encode the messages shipped off the server and a similar key is utilized to decode the information at its objective. This encryption method may likewise be alluded to as shared key encryption or shared mystery encryption. The two gadgets utilize a solitary key to encode and decode the messages as they are shipped off and for. In this strategy, each SSH meeting utilizes an extraordinary key. This sort of security is utilized to encode the whole association to keep away from any assaults in the organization. It will be difficult for anybody to capture this payload, and in any event, when they do decoding would be inconceivable because an ordinary key is intended for it. 54 A typical challenge for this kind of trade is the underlying key trade. On the off chance that an outsider figures out how to tune in during the underlying key trade, they would acquire the key and access the substance of the payload. A decent way of forestalling this type of obstruction is by utilizing a Key Exchange Algorithm. The Key Exchange Algorithm is a viable strategy to trade these mystery keys without interference by noxious outsiders. The trade calculation includes two PCs trading information freely, before controlling the data autonomously to make the encryption- decoding key. Be that as it may, a key trade algorithm needs topsy-turvy security to work. Download 1.05 Mb. Do'stlaringiz bilan baham: |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling