The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Reports and Papers Archive


Browse All Papers »       Submit A Paper »

Is Your Computer Insecure?

Charles W. Beardsley

Sleepless nights face the data-processing manager who attempts to identify the many destructive fates that can await his computer center: fraud, hardware and software failures, operator errors, input errors, programming errors, magnetic erasure, electromagnetic and acoustic monitoring. . . Hardware and software techniques to prevent such disasters as leakage of private information, penetration of a computerized information center, and the alteration or destruction of a data base are surveyed in this article. Areas of concern include remote-terminal access, cryptography, the communication subsystem, threat monitoring, processing controls, certification, and the internal audit.

Added 2002-07-26

A Critical Analysis of Vulnerability Taxonomies

Matt Bishop,David Bailey

Computer vulnerabilities seem to be omnipresent. In every system fielded, programming errors, configuration errors, and operation errors have allowed unauthorized users to enter systems, or authorized users to take unauthorized actions. Efforts to eliminate the flaws have failed miserably; indeed, sometimes attempts to patch a vulnerability have increased the danger. Further, designers and implementers rarely learn from the mistakes of others, in part because these security holes are so rarely documented in the open literature.

Added 2002-07-26

A Taxonomy of UNIX System and Network

Matt Bishop

In this paper, we shall build on prior work to present another taxonomy, and argue that this classification scheme highlights characteristics of the vulnerablilities it classifies in a more useful way than other work. We shall then examine vulnerabilities in the UNIX operating system, its system and ancillary software, and classify the security-related problems several axes, after which we shall examine the earlier work to see if this taxonomy holds for other systems. The unique contribution of this work is an analysis of how to use the Protection Analysis work to improve security of exsisting systems, and how to write programs with minimal exploitable security flaws. This contrasts the work [4], which argued that a preventative approach using formal methods to design secure systems is appropriate. We emphatically agree; however, as nonsecure systems continue to be used, our work is presented with hope it will guide maintainers and software implementers to improve the security of these flawed systems and software.

Added 2002-07-26

Asynchronous Transfer Mode Security

Mohammad Peyravian,Thomas D. Tarman

It is envisioned that asynchronous transfer mode (ATM) will provide scalable and high-performance application-independent security services. The ATM Forum Security Working Group is currently developing its phase one security specification, which defines a number of security services for the ATM user plane and control plane. In addition, mechanisms for carrying security-related messages and required security infrastructure are being defined. These mechanisms will allow an organization to build an ATM network which not only meets its performance objectives, but also its information protection requirements as specified in its site security policy. This article provides an overview of ATM security as specified by the ATM Forum Security Working Group. First, the ATM user and control planes’ security services and mechanisms are described. Then the security messaging mechanisms at connectionn establishment and during connection lifetime phases are discussed.

Added 2002-07-26

Securing Data Transfer In Asynchronous Transfer Mode Networks

Robert H. Deng,Aurel A. Lazar

Asynchonous Transfer Mode (ATM), which can provide integrated services of various media types and bit rates, is rapidly becoming the dominant technology for local and wide area information transport. In this paper we present a network security architecture for secure data transfer in ATM networks. The proposed architecture facilitaes seamless integration of security services into the existing ATM architecture and confirms to the ATM B-ISDN PRM: security related signaling functionality, such as mutual end system authentication, establishment of security associations, and cryptographic key distributions are carried out in the control plane, while protection of traffic is achieved by defining a Data Protection Layer in the user plane.

Added 2002-07-26

A Certification Infrastructure for ATM

Mohammad Peyravian,Gene Tsudik,Els Van Herreweghen

This contribution proposes a public-key infrastructure for ATM. It defines a framework for a certificate-based public key management and addresses inter- domain certification and certificate revocation. It also proposes a scheme for distribution of certificates and certificate revocation lists in the absense of directory services.

Added 2002-07-26

A Framework for Authenticated Key Distribution in ATM Networks

Mohammad Peyravian,Gene Tsudik,Els Van Herreweghen

This contibThis contribution proposes a framework for authenticated key distribution in ATM networks in endpoint-to-endpoint, switch-to-switch, and endpoint-to-switch settings. The proposal is for a two-tiered hierarchy with initial pairwise key distribution based on public key cryptography and subsequent session key distribution based on conventional cryptography. All protocols are derived from exsisting international standards and offer flexiblity with respect to the number of message flows and the use of encryption.

Added 2002-07-26

A Brief Overview of ATM: Protocol Layers, LAN Emulation, and Traffic Management

Kai-Yeung,Raj Jain

Asynchronous Transfer Mode (ATM) has emerged as the most promising technology in supporting future broadband multimedia communication services. To accelerate the deployment of ATM technology, the ATM forum, which is a consortium of service providers and equipment vendors in the communication industries, has been created to develop implementation and specification agreements. In this article, we present a brief overview on ATM protocol layers and current progress on LAN Emulation and Traffic Management in the ATM forum.

Added 2002-07-26

ATM Internetworking

Anthony Alles

It is clear that Asychronous Transfer Mode (ATM) technology will play a central role in the evolution of current workgroup, campus and enterprise networks. ATM delivers important advantages over existing LAN and WAN technologies, including the promise of scalable bandwidths at unprecedented price and performance points and Quality of Service (QoS) guarantees, which facilitate new classes of applications such as multimedia.

Added 2002-07-26

Asynchronous Transfer Mode: Security Issues

Richard Taylor,Greg Findlow

Security issues relevant to communications across Asynchronous Transfer Mode (ATM) based public networks are considered, with particular attention paid to the needs of defence users. A security architecture based on a defence submission to an ATM standards committee is sketched out, and traffic analysis and covert channel threats and countermeasures discussed.

Added 2002-07-26

ATM: Dangerous At Any Speed?

Henning Schulzrinne

Since ATM has been the object of much hyperbole as “the” or even “the one-and-only” future network technology, it is tempting to summarize some of the open issues and, more importantly, principal limitations of the technology. Surprisingly, there has been little published in the technology literature concerning the demerits and problems of ATM. Some of the problem areas are shared with its two older siblings: X.25 and ISDN (Q.931) signalling. In the following, we summarize some of the issues that may interfere with widespread deployment, ease of high-speed implementation or present architectural concerns. Due to the limited space, the arguments are by necessity abbreviated, omitting the necessary qualifiers, counter arguments. Hopefully, these will be added at the workshop.

Added 2002-07-26

ATM Security Scope and Requirements

Mohammad Peyravian,Els Van Herreweghen

This contribution identifies security scope and requirements in ATM networks. It first discusses general network security services and identifies the security service required in ATM. It then considers three scenarios: the end-to-end case (securing ATM connections between the ATM endpoints), the edge-to-edge case (securing the part of a connection crossing a public network), and the endpoint-to-switch case (securing ATM connection between and ATM endpoint and a switch). It further elaborates on the issue of authenticated (and other security related) signalling treated in previous contributions and suggests a clear separation between the authentication needed at the ATM level on one side and the higher-level (end-user) authentication needed by network and service providers on the other side. Finally, it is suggested how to include different levels of authentication information in ATM signalling messages.

Added 2002-07-26

Securing ATM Networks

Shaw-Cheng Chuang

In this paper we identify and address the challenges unique to providing a secure ATM network. We analyse the network environment and consider the correct placement of security mechanisms, with particular attention to data transfer protection, in such an environment. We then introduce and describe a key agile cryptographic device for ATM networks. We present the techniques to provide data confidentiality, synchronisation, dynamic key change, dynamic initialisation vector change, data integrity and replay ’ protection on ATM data transfer. Finally, we discuss the corresponding control functions for setting up such a secure channel. We examine the impact of key exchange protocols on the design of ATM signalling protocols. Our efforts in providing novel security services in ATM signalling systems has also been presented.

Added 2002-07-26

Secure Communications in ATM Networks

Daniel Stevenson,Nathan Hillery,Greg Byrd

High-speed networking technology and standards have progressed dramatically in the past few years and much attention is now focused on deployment efforts, such as the North Carolina Information Highway (NCIH) [7], and applications. With this shift in emphasis, concerns have been raised about information security. Examples of abuse of the Internet abound and unfortunately ATM networks are subject to many of these same abuses. This is of substantial concern when thinking about extending the reach of public data networking to broad segments of society.

Added 2002-07-26

Managing POLICE Organizations - Trends and Experiences in Computer-Related Crime

David L Carter,Andra J Katz

A national study of corporate security directors was conducted to examine their experiences with computer crime. using established survey research methods, the authors assessed the extent of victimization, the character of computer crimes, who the perpetrators were, the introduction of viruses, unauthorized access to computer files, harassment via computers, destruction of virtual property, telecommunications fraud via computers, and computer security conter measures. The results showed the 98.5

Added 2002-07-26