Network Security, Administration and Management: Advancing Technology and Practice Dulal Chandra Kar Texas A&M University-Corpus Christi, USA Mahbubur Rahman Syed Minnesota State University, Mankato, USA Senior Editorial Director: Kristin Klinger Director of Book Publications: Julia Mosemann Editorial Director: Lindsay Johnston Acquisitions Editor: Erika Carter Development Editor: Joel Gamon Production Editor: Sean Woznicki Typesetters: Natalie Pronio, Jennifer Romanchak, Milan Vracarich Jr Print Coordinator: Jamie Snavely Cover Design: Nick Newcomer Published in the United States of America by Information Science Reference (an imprint of IGI Global) 701 E. Chocolate Avenue Hershey PA 17033 Tel: 717-533-8845 Fax: 717-533-8661 E-mail: [email protected] Web site: http://www.igi-global.com/reference Copyright © 2011 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher. Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark. Library of Congress Cataloging-in-Publication Data Network security, administration and management: advancing technology and practice / Dulal Chandra Kar and Mahbubur Rahman Syed, editors. p. cm. Includes bibliographical references and index. Summary: “This book identifies the latest technological solutions, practices and principles on network security while exposing possible security threats and vulnerabilities of contemporary software, hardware, and networked systems”-- Provided by publisher. ISBN 978-1-60960-777-7 (hardcover) -- ISBN 978-1-60960-778-4 (ebook) -- ISBN 978-1-60960-779-1 (print & perpetual access) 1. Computer networks-- Management. 2. Computer networks--Security measures. I. Kar, Dulal Chandra, 1960- II. Syed, Mahbubur Rahman, 1952- TK5105.5.N466724 2011 005.8--dc22 2011010430 British Cataloguing in Publication Data A Cataloguing in Publication record for this book is available from the British Library. All work contributed to this book is new, previously-unpublished material. The views expressed in this book are those of the authors, but not necessarily of the publisher. Editorial Advisory Board Luther Troell, Rochester Institute of Technology, USA Iuon-Chang Lin, National Chung Hsing University, Taiwan, R.O.C. Christos Bouras, University of Patras, Greece Gregorio Martinez, University of Murcia, Spain Timothy J. McGuire, Sam Houston State University, USA Chuan-Kun Wu, Chinese Academy of Sciences, China Muhammad Nadzir Marsono, Universiti Teknologi, Malaysia Mario Garcia, Texas A&M University-Corpus Christi, USA Jim Holt, Freescale Semiconductor, Inc., USA John Fernandez, Texas A&M University-Corpus Christi, USA List of Reviewers Aftab Ahmad, Norfolk State University, USA Christos Bouras, University of Patras, Greece Bruce Hartpence, Rochester Institute of Technology, USA Jim Holt, Freescale Semiconductor, Inc., USA Dijiang Huang, Arizona State University, USA Ajay Katangur, Texas A&M University-Corpus Christi, USA David Lee, The Ohio State University, USA Salvador Mandujano, Intel Corporation, USA B. Dawn Medlin, Appalachian State University, USA Sumita Mishra, Rochester Institute of Technology, USA Clifton Mulkey, Texas A&M University-Corpus Christi, USA Yin Pan, Rochester Institute of Technology, USA Remzi Seker, University of Arkansas at Little Rock, USA Christophe Veltsos, Minnesota State University, Mankato, USA Chuan-Kun Wu, Chinese Academy of Sciences, China Xun Yi, Victoria University, Australia Table of Contents Foreword ............................................................................................................................................xiii Preface ................................................................................................................................................xiv Acknowledgment ................................................................................................................................xxi Section 1 Network Systems Security Chapter 1 Basic Device and Protocol Security ........................................................................................................1 Bruce Hartpence, Rochester Institute of Technology, USA Chapter 2 Mitigating the Blended Threat: Protecting Data and Educating Users .................................................20 Christophe Veltsos, Minnesota State University, Mankato, USA Chapter 3 Security Issues for Multi-Domain Resource Reservation .....................................................................38 Christos Bouras, Research Academic Computer Technology Institute (CTI) & University of Patras, Greece Kostas Stamos, Research Academic Computer Technology Institute (CTI) & University of Patras, Greece Section 2 Authentication and Data Privacy: Passwords and Keys Chapter 4 Healthcare Employees and Passwords: An Entry Point for Social Engineering Attacks .....................52 B. Dawn Medlin, Appalachian State University, USA Douglas May, Appalachian State University, USA Ken Corley, Appalachian State University, USA Chapter 5 Public Key Infrastructure ......................................................................................................................65 Reed Petty, University of Arkansas at Little Rock, USA Jiang Bian, University of Arkansas at Little Rock, USA Remzi Seker, University of Arkansas at Little Rock, USA Chapter 6 Key Management ..................................................................................................................................88 Chuan-Kun Wu, Chinese Academy of Sciences, China Section 3 Network Security Auditing, Assessment, and Manageability Security Chapter 7 Security Assessment of Networks .......................................................................................................115 Aftab Ahmad, Norfolk State University, USA Chapter 8 Network Security Auditing .................................................................................................................131 Yin Pan, Rochester Institute of Technology, USA Bo Yuan, Rochester Institute of Technology, USA Sumita Mishra, Rochester Institute of Technology, USA Chapter 9 Network Manageability Security ........................................................................................................158 Salvador Mandujano, Intel Corporation, USA Section 4 Sensor Network Security Chapter 10 Security and Attacks in Wireless Sensor Networks ............................................................................183 Murat Al, University of Arkansas at Little Rock, USA Kenji Yoshigoe, University of Arkansas at Little Rock, USA Chapter 11 Wireless Sensor Networks: Emerging Applications and Security Solutions ......................................217 Sumita Mishra, Rochester Institute of Technology, USA Chapter 12 Privacy Preserving Data Gathering in Wireless Sensor Networks .....................................................237 Md. Golam Kaosar, Victoria University, Australia Xun Yi, Victoria University, Australia Section 5 Security Architectures, Algorithms, and Protocols Chapter 13 BANBAD: A Centralized Anomaly Detection Technique for Ad Hoc Networks ..............................253 Rajeev Agrawal, North Carolina A&T State University, USA Chaoli Cai, Western Michigan University, USA Ajay Gupta, Western Michigan University, USA Rajib Paul, Western Michigan University, USA Raed Salih, Western Michigan University, USA Chapter 14 Data Regulation Protocol for Source-End Mitigation of Distributed Denial of Service ....................277 Nirav Shah, Arizona State University, USA Dijiang Huang, Arizona State University, USA Chapter 15 Instant Messaging Security .................................................................................................................288 Zhijun Liu, The Ohio State University, USA Guoqiang Shu, The Ohio State University, USA David Lee, The Ohio State University, USA Compilation of References ..............................................................................................................324 About the Contributors ...................................................................................................................348 Index ...................................................................................................................................................356 Detailed Table of Contents Foreword ............................................................................................................................................xiii Preface ................................................................................................................................................xiv Acknowledgment ................................................................................................................................xxi Section 1 Network Systems Security Chapter 1 Basic Device and Protocol Security ........................................................................................................1 Bruce Hartpence, Rochester Institute of Technology, USA This is an introductory chapter that addresses security issues of all common networking devices such as hubs, switches, access points, and routers, as well as vulnerable network protocols such as ARP (Address Resolution Protocol), SRP (Spanning Tree Protocol), ICMP (Internet Control Message Pro- tocol), and DHCP (Dynamic Host Configuration Protocol). In addition, the chapter critically examines security issues in common routing protocols such as RIP (Routing Information Protocol), BGP (Border Gateway Protocol), and OSPF (Open Shortest Path First), as well as some network management pro- tocols such as SNMP (Simple Network Management Protocol) and CDP (Cisco Discovery Protocol). Later, the chapter suggests ways to ensure device security, as well as protocol security to mitigate pos- sible attacks. Chapter 2 Mitigating the Blended Threat: Protecting Data and Educating Users .................................................20 Christophe Veltsos, Minnesota State University, Mankato, USA This chapter discusses current trend and evolution in security threats, in which attackers use multiple, persistent approaches to attack a target. Traditional security technologies and practices such as anti- virus software, firewalls, intrusion detection systems, cryptosystems, and automated patch delivery and installation mechanisms are shown to have limitations to mitigate such risks and attacks, known as blended threats. Accordingly, the author presents new security controls and strategies to mitigate such evolving risks. In addition, the chapter underscores the need for security awareness education and pro- poses organized training programs for common users. Chapter 3 Security Issues for Multi-Domain Resource Reservation .....................................................................38 Christos Bouras, Research Academic Computer Technology Institute (CTI) & University of Patras, Greece Kostas Stamos, Research Academic Computer Technology Institute (CTI) & University of Patras, Greece This chapter addresses security issues of the components that are responsible for provisioning multi- domain network services, particularly for resource reservation and allocation of network services. The authors discuss the importance of inter-domain security during negotiation of resource reservations, as well as intra-domain security during initiation and realization of a resource reservation. Corresponding- ly, architectures and procedures to handle user authentication, trusted communications between mod- ules or components, and multi-domain user authorization are provided in the context of a case study. Particularly, the chapter presents security requirements and procedures for protecting against various types of attacks on a networked system that supports differentiated services and bandwidth on demand services over multiple domains. Section 2 Authentication and Data Privacy: Passwords and Keys Chapter 4 Healthcare Employees and Passwords: An Entry Point for Social Engineering Attacks .....................52 B. Dawn Medlin, Appalachian State University, USA Douglas May, Appalachian State University, USA Ken Corley, Appalachian State University, USA This chapter provides an account of security breaches in healthcare industry due to social engineering attacks and reported results of a simulated study of a social engineering attack on hospital employees to obtain authentication information such as passwords. The authors identify violations of HIPAA (Health Insurance Portability and Accountability Act) and HITECH (Health Information Technology and Clini- cal Health Act) regulations among healthcare employees who are supposed to protect the privacy and medical records of patients. The chapter also reports research results on the choice of passwords based on human psychology and memory, and exposes severe deficiencies in the choice of passwords by com- mon users that can be exploited easily using social engineering techniques. The findings in the chapter underscore the need for stringent control and aggressive policy. Chapter 5 Public Key Infrastructure ......................................................................................................................65 Reed Petty, University of Arkansas at Little Rock, USA Jiang Bian, University of Arkansas at Little Rock, USA Remzi Seker, University of Arkansas at Little Rock, USA Security of modern cryptography relies upon secrecy of keys. Public key infrastructure plays the cru- cial role in the storage management, distribution, and verification of such keys in cryptography. This chapter provides a comprehensive overview of popular public key algorithms, their applications in key exchange and digital signatures, and their vulnerabilities and weaknesses. The chapter identifies several management challenges based on the very basic foundation of trust upon which the public key infra- structure relies. In addition, the chapter highlights emerging technologies such as quantum computing that can make public key cryptographic techniques useless and accordingly discusses implications of quantum cryptography in cryptography in general. Chapter 6 Key Management ..................................................................................................................................88 Chuan-Kun Wu, Chinese Academy of Sciences, China This chapter describes key management schemes and issues under various application domains such as mobile ad hoc networks, wireless sensor networks, and mobile telecommunication systems. Topics on key management include key agreement, group-based key agreement and distribution, PKI (Public Key Infrastructure) mechanisms, secret sharing scheme based key management, key escrow, password associated key management, key management in PGP, and key management in UMTS (Universal Mo- bile Telecommunication System) systems. In addition, the chapter discusses limitations of different methods used in key management. Section 3 Network Security Auditing, Assessment, and Manageability Security Chapter 7 Security Assessment of Networks .......................................................................................................115 Aftab Ahmad, Norfolk State University, USA The sheer complexity of network systems warrants a need for a framework that can be used to assess security in such systems. Specifically, this chapter shows how the ITU-T Network Security Framework (X.805) can be utilized in a performance model for assessing a security system. As an example, the chapter uses a model to assess the security of the popular sensor network standard IEEE 802.15.4. The model can be applied to assess security using security metrics addressing various vulnerabilities and threats, such as destruction of information, corruption of information, loss of information, information disclosure, and service interruption. Chapter 8 Network Security Auditing .................................................................................................................131 Yin Pan, Rochester Institute of Technology, USA Bo Yuan, Rochester Institute of Technology, USA Sumita Mishra, Rochester Institute of Technology, USA
Description: