当前位置:网站首页>8、 Network security
8、 Network security
2022-07-29 06:38:00 【Burning clouds fly up】
The foundation of network security
Passive attack : monitor ( Flow analysis ), The prevention of , encryption
Take the initiative to attack : counterfeit , replay , cheating , Tampering with news , Denial of service testing A firewall ,IDS
DOS attack MAC Flooding,ARP Flooding,SYN Flooding
Modern encryption technology
Symmetric encryption algorithm 、 Shared key encryption algorithm
DES 64 Bit grouping secret key 56 position
3DES Two keys secret key 112 position
IDEA 64 Bit grouping secret key 128 position
AES secret key 128,192,256 position
RC4 Fast encryption ,WIFI scene
Asymmetric encryption algorithm 、 Public key encryption algorithm RSA
Public key encryption , Private key decryption Confidential communications
Private key encryption , Public key decryption digital signature
digital signature
Confirm the sender's identity and message integrity
Message summary Hash hash
MD5 512 Bit grouping 128 Bit message summary
SHA 512 Bit grouping 160 Bit hash value
HMAC = Hash( file +key)
The purpose of using message digest algorithm to generate message digest is to prevent the sent message from being tampered
Digital certificates and CA
digital certificate :CA The private key + Owner's public key
Certificate chain A obtain B The public key : X1 《X2》 X2 《B》
VPN
Virtual private network Virtual Private Network
On the second floor PVN:L2TP、PPTP( be based on PPP)
Three layers VPN:IPSec、GRE
four layers VPN:SSL
Realization VPN key technology : Tunnel technology 、 Encryption and decryption technology 、 Key management 、 Authentication technology
Access/Remote VPN Realize user remote access

PPP The protocol and HDLC All protocols are link layer protocols
- PPP Support upper layer multi protocol ,HDLC Only support IP
- PPP Address negotiation ,HDLC no way
- Both support error detection
PPP Protocol authentication function :
PAP Two handshakes
CHAP Three handshakes , Pass on HASH value HMAC
IPSec
Three layers VPN Working in The network layer
Data integrity
authentication
confidentiality
Application transparent security
IPSec function :
Certification head AH: Data integrity and data source authentication MD5,SHA
Package safety load ESP: Data encryption DES,3DES,AES
Internet Key exchange protocol IKE: Generate and distribute ESP and AH The key of

SSL and HTTPS
SSL(Secure Socket Layer) Secure socket layer , Transport layer Security protocols ( The fourth level ), Realization Web Secure communications . be based on TCP port 443
SSL/TLS stay Web Secure communication is called HTTPS
application layer S-HTTP(Security HTTP)
Syntax and HTTP equally , Message headers are different
BGP Email security package , Provide data encryption and data signature .
IDEA Data encryption
RSA Public key certificate Authentication
MD5 Data integrity verification
S/MIME Email security services
SET E-commerce security
Kerberos Carry out identity authentication security protocol ,AAA: authentication ( Sign in ), to grant authorization ( Get the ticket ), Audit
A firewall
Intranet and extranet or intranet Different area isolation and access control
Packet filtering ACL( The network layer ), State FW(TCP Transport layer ), Application layer gateway
IDS and IPS
Intrusion detection system is the second barrier behind the firewall Bypass deployment
Event generator : Data collection
Event analyzer : Pattern matching , Statistical analysis , Data integrity analysis
Classify according to data analysis technology and processing method :
Anomaly detection : Set the threshold , Can detect attacks that do not appear . Multiple false positives .
Misuse detection : The accuracy of known intrusion detection is high , Highly dependent on feature library . Expert system and pattern matching
Intrusion prevention system IPS Serial deployment
Hide internal network topology NAT
Computer virus and protection
System virus Win32/95 infection exe,dll file
worm-type virus Worm Poison mail ,
Trojans Trojan
Script virus Script
Macro virus Macro infection Word Excel
边栏推荐
猜你喜欢
![Self study understanding of [chain forward star]](/img/b4/7f66026a482540bf27f088c321a840.png)
Self study understanding of [chain forward star]

虹科Automation softPLC | 虹科KPA MoDK运行环境与搭建步骤(3)——MoDK例程测试

Arrays & object & System & Math & random & Packaging

day13_ Under multithreading

基于TCP的在线词典

FIR filter design (1) -- using the FDATool toolbox of MATLAB to design FIR filter parameters

使用STP生成树协议解决网络中的二层环路问题

虹科分享 | 带你全面了解“CAN总线错误”(四)——在实践中生产和记录CAN错误

基于FPGA的4位减法器设计及仿真代码

What is the lifecycle of automated testing?
随机推荐
三、广域通信网
Raw advanced socket experiment
虹科Automation softPLC | 虹科KPA MoDK运行环境与搭建步骤(2)——MoDK运行环境搭建
THINKPHP5 常见问题
多路IO用法
TCP socket communication experiment
钓鱼邮件处置
Why are the job requirements for software testing in 2022 getting higher and higher? Is there any secret in it?
Hog+svm for pedestrian detection
UDP套接口通信实验
Explain the difference between FIR filter and IIR filter in detail
NoClassDefFoundError processing
Vivado IP核之RAM Block Memery Generator
网络安全学习(二)
使用STP生成树协议解决网络中的二层环路问题
Noi online 2022 popular group problem solving & personal understanding
Solve the error that the simulation output is STX under the frequency division module Modelsim
How to judge whether a business is attacked by DDoS? What harm will it cause?
Idea practical shortcut key novice must see
Vivado IP核之浮点数开方 Floating-point