PowerPoint Presentation

Published on Slideshow
Static slideshow
Download PDF version
Download PDF version
Embed video
Share video
Ask about this video

Scene 1 (0s)

[Audio] 2017 Chapter- 10 L05: " Internet of Things " , Raj Kamal, Publs.: McGraw-Hill Education 1 Lesson 5 Security Tomography and Layer Attack Models.

Scene 2 (22s)

[Audio] Computational Tomography •A computing method of producing a three-dimensional picture of the internal structures of an object • Observation and recording of the differences in effects on passage of energy waves impinging on those structures 2017 Chapter- 10 L05: " Internet of Things " , Raj Kamal, Publs.: McGraw-Hill Education 2.

Scene 3 (55s)

[Audio] Computational Security Tomography •Identifying the network vulnerabilities •Used in computational security in complex set of networks •Needed for the design of efficient attack strategies 2017 Chapter- 10 L05: " Internet of Things " , Raj Kamal, Publs.: McGraw-Hill Education 3.

Scene 4 (1m 27s)

[Audio] Security Tomography •Means finding attack vulnerable sections/ subsections • Observations for behaviours using a finite number of objects or threats in a complex set of subsystems 2017 Chapter- 10 L05: " Internet of Things " , Raj Kamal, Publs.: McGraw-Hill Education 4.

Scene 5 (1m 58s)

[Audio] Network Tomography •Refers to study of vulnerabilities and security aspects for network monitoring in a complex system • WSNs • RFIDs networks • IoT networks •Allocating resources and ensuring the network reliability and security 2017 Chapter- 10 L05: " Internet of Things " , Raj Kamal, Publs.: McGraw-Hill Education 5.

Scene 6 (2m 37s)

[Audio] Layered attacker model • Gives possible attacks on the layers 2017 Chapter- 10 L05: " Internet of Things " , Raj Kamal, Publs.: McGraw-Hill Education 6.

Scene 7 (2m 59s)

[Audio] Fig. 10.4 Layered Attacker Model and possible attacks in IoT/ M2M Packet sniffing and DoS attacks such as Ping floods and ICMP attacks Physical or Service disruption/ Attacks on Wireless networks 4: Transport 6: Applications/ Services 5: Application Support 3: Network Insecure in Protocols DHCP or STP, LAN node attack using MAC flooding or ARP poisoning Vulnerabilities in Application/Service can be exploited through attacks such as SQL injection, where the developer has failed to ensure that user input is validated against a defined schema Vulnerable ports 2: Data Adaptation 1: Physical cum data-link layer Un-encrypted Data Store, Tempering or Sniffing.

Scene 8 (4m 14s)

[Audio] Layer 1 Attacks Solution •Depends on the devices used •For example, link level provisioning of security • Uses—BT LE link level AES- CCM 128 authenticated encryption algorithm for confidentiality and authentication, and • ZigBee at link level security using AES- CCM- 128. 2017 Chapter- 10 L05: " Internet of Things " , Raj Kamal, Publs.: McGraw-Hill Education 8.

Scene 9 (4m 57s)

[Audio] Layer 2 Attacks Solution •Programming the network switches to prevent internal node attacks during use of DHCP or Spanning Tree Protocol ( STP) • Additional controls: 1. ARP inspection, 2. Disabling unused ports and 3. Enforcing effective security on VLAN's (Virtual LAN) to prevent VLAN hopping. 2017 Chapter- 10 L05: " Internet of Things " , Raj Kamal, Publs.: McGraw-Hill Education 9.

Scene 10 (5m 45s)

[Audio] Layer 2 Attacks Solution • Provisions for MAS for security, root key data store, and devices and data authentication in LWM2M OMA specification for device gateway to Internet 2017 Chapter- 10 L05: " Internet of Things " , Raj Kamal, Publs.: McGraw-Hill Education 10.

Scene 11 (6m 15s)

[Audio] Layer 3 Attacks Solution • Use of temper resistant router •Use of packet filtering •A firewall for controlling routing messages and packets data between layers 3 and 4 for reducing the risks. 2017 Chapter- 10 L05: " Internet of Things " , Raj Kamal, Publs.: McGraw-Hill Education 11.

Scene 12 (6m 48s)

[Audio] Layer 4 Attacks Solution • Port scanning method to Identify the vulnerable port •Effective firewall configuring and opening of network ports and locking down ports only to those required 2017 Chapter- 10 L05: " Internet of Things " , Raj Kamal, Publs.: McGraw-Hill Education 12.

Scene 13 (7m 18s)

[Audio] Layer 4 Attacks Solution • DTLS between layers 5 and 4 •The DTLS three types of security services: integrity, authentication and confidentiality. • Inclusion of SASL ( Simple Authentication and Security Layer) for security when using the XMPP protocol. 2017 Chapter- 10 L05: " Internet of Things " , Raj Kamal, Publs.: McGraw-Hill Education 13.

Scene 14 (8m 1s)

[Audio] Layer 5 and 6 Attacks Solution • Results of poor coding practices of Application programmer •Use HTTPS communication link for Web applications/ services can use. 2017 Chapter- 10 L05: " Internet of Things " , Raj Kamal, Publs.: McGraw-Hill Education 14.

Scene 15 (8m 32s)

[Audio] HTTPS • Content privacy domain header: • Allows use of digital signatures and encryption, various encryption options • Server-client negotiations • Cryptographic scheme is a Property assigned for the link • Specific algorithm is the Value assigned • Direction specification done: One-way or two-way security 2017 Chapter- 10 L05: " Internet of Things " , Raj Kamal, Publs.: McGraw-Hill Education 15.

Scene 16 (9m 18s)

[Audio] CISO Suggested Layered Framework Solutions • Layers 1– 6: Role-based security •Layers 1– 4 Anti-temper and detection-based security •Layers 1–6: Data protection and confidentiality •Layers 1–6: IP protection 2017 Chapter- 10 L05: " Internet of Things " , Raj Kamal, Publs.: McGraw-Hill Education 16.

Scene 17 (10m 1s)

[Audio] 2017 Chapter- 10 L05: " Internet of Things " , Raj Kamal, Publs.: McGraw-Hill Education 17 Summary We learnt • Network tomography help in observing each network sections and subsections • Security tomography finding the attack vulnerable sections/subsections on observations for behaviours using a finite number of objects or threats in a complex set of subsystems.

Scene 18 (10m 38s)

[Audio] Summary We learnt • Layers 1 to 6 attacks • HTTPS • CISCO security solutions framework 2017 Chapter- 10 L05: " Internet of Things " , Raj Kamal, Publs.: McGraw-Hill Education 18.

Scene 19 (11m 7s)

[Audio] 2017 Chapter- 10 L05: " Internet of Things " , Raj Kamal, Publs.: McGraw-Hill Education 19 End of Lesson 5 on Security Tomography and Layer Attack Models.