当前位置:网站首页>8、 Network security
8、 Network security
2022-07-29 06:38:00 【Burning clouds fly up】
The foundation of network security
Passive attack : monitor ( Flow analysis ), The prevention of , encryption
Take the initiative to attack : counterfeit , replay , cheating , Tampering with news , Denial of service testing A firewall ,IDS
DOS attack MAC Flooding,ARP Flooding,SYN Flooding
Modern encryption technology
Symmetric encryption algorithm 、 Shared key encryption algorithm
DES 64 Bit grouping secret key 56 position
3DES Two keys secret key 112 position
IDEA 64 Bit grouping secret key 128 position
AES secret key 128,192,256 position
RC4 Fast encryption ,WIFI scene
Asymmetric encryption algorithm 、 Public key encryption algorithm RSA
Public key encryption , Private key decryption Confidential communications
Private key encryption , Public key decryption digital signature
digital signature
Confirm the sender's identity and message integrity
Message summary Hash hash
MD5 512 Bit grouping 128 Bit message summary
SHA 512 Bit grouping 160 Bit hash value
HMAC = Hash( file +key)
The purpose of using message digest algorithm to generate message digest is to prevent the sent message from being tampered
Digital certificates and CA
digital certificate :CA The private key + Owner's public key
Certificate chain A obtain B The public key : X1 《X2》 X2 《B》
VPN
Virtual private network Virtual Private Network
On the second floor PVN:L2TP、PPTP( be based on PPP)
Three layers VPN:IPSec、GRE
four layers VPN:SSL
Realization VPN key technology : Tunnel technology 、 Encryption and decryption technology 、 Key management 、 Authentication technology
Access/Remote VPN Realize user remote access

PPP The protocol and HDLC All protocols are link layer protocols
- PPP Support upper layer multi protocol ,HDLC Only support IP
- PPP Address negotiation ,HDLC no way
- Both support error detection
PPP Protocol authentication function :
PAP Two handshakes
CHAP Three handshakes , Pass on HASH value HMAC
IPSec
Three layers VPN Working in The network layer
Data integrity
authentication
confidentiality
Application transparent security
IPSec function :
Certification head AH: Data integrity and data source authentication MD5,SHA
Package safety load ESP: Data encryption DES,3DES,AES
Internet Key exchange protocol IKE: Generate and distribute ESP and AH The key of

SSL and HTTPS
SSL(Secure Socket Layer) Secure socket layer , Transport layer Security protocols ( The fourth level ), Realization Web Secure communications . be based on TCP port 443
SSL/TLS stay Web Secure communication is called HTTPS
application layer S-HTTP(Security HTTP)
Syntax and HTTP equally , Message headers are different
BGP Email security package , Provide data encryption and data signature .
IDEA Data encryption
RSA Public key certificate Authentication
MD5 Data integrity verification
S/MIME Email security services
SET E-commerce security
Kerberos Carry out identity authentication security protocol ,AAA: authentication ( Sign in ), to grant authorization ( Get the ticket ), Audit
A firewall
Intranet and extranet or intranet Different area isolation and access control
Packet filtering ACL( The network layer ), State FW(TCP Transport layer ), Application layer gateway
IDS and IPS
Intrusion detection system is the second barrier behind the firewall Bypass deployment
Event generator : Data collection
Event analyzer : Pattern matching , Statistical analysis , Data integrity analysis
Classify according to data analysis technology and processing method :
Anomaly detection : Set the threshold , Can detect attacks that do not appear . Multiple false positives .
Misuse detection : The accuracy of known intrusion detection is high , Highly dependent on feature library . Expert system and pattern matching
Intrusion prevention system IPS Serial deployment
Hide internal network topology NAT
Computer virus and protection
System virus Win32/95 infection exe,dll file
worm-type virus Worm Poison mail ,
Trojans Trojan
Script virus Script
Macro virus Macro infection Word Excel
边栏推荐
猜你喜欢
随机推荐
What is DNS amplification attack
day02_基本语法
Understand the great changes of network security in five years
虹科Automation softPLC | MoDK运行环境与搭建步骤(1)——运行环境简介
day09_static&final&代码块&抽象类&接口&内部类
Solve the error that the simulation output is STX under the frequency division module Modelsim
八、 网络安全
基于udp通信的在线多人聊天室
day03_1_流程控制
Noi online 2022 popular group problem solving & personal understanding
HOG+SVM实现行人检测
什么是DNS放大攻击
RAW高级套接口实验
Webshell管理工具的流量特征
虹科分享 | 测试与验证复杂的FPGA设计(2)——如何在IP核中执行面向全局的仿真
虹科分享 | 带您全面认识“CAN总线错误”(一)——CAN总线错误与错误帧
[interview questions] the latest software test interview questions in 2022 (400) [with answers] continue to update
什么是撞库及撞库攻击的基本原理
2022 summer second day information competition learning achievement sharing 2
6898 changing matrix problem solution









