Network Protection

Protection Framework

Load Balancing

Traffic Scrubbing

  • 定义:提供数据清理服务,用于分析流量并过滤恶意的流量
  • 使用方式:一旦检测到攻击,将流量重定向到流量重定向到洗刷服务
  • 验证方式:自己构建攻击,以检验实用性

User Authentication

Password with salt

Token

Card Type Defining Teature Example
Embossed Raised characters only, on front Old credit card
Magnetic stripe Magnetic bar on back, characters on front Bank card
Memory Electronic memory inside Prepaid phone card
Smart Contact/Contactless Electronic memory and processor inside Biometric ID card

Biometric

Attack and Defense

Attacks Athenticators Examples Typical Defenses
Client Attack Password Guessing, exhaustive search Large entropy; limited attempts
Client Attack Token Exhaustive search Same as password; theft of object requires presence
Client Attack Biometric False match Same as password
Host Attack Password Plaintext theft, dictionary/exhaustive search Hashing; large entropy; protection of password database
Host Attack Token Passcode theft Same as password; 1-time passcode
Host Attack Biometric Template theft Capture device authentication; challenge response
Eavesdropping, theft, and copying Password Shoulder surfing User diligence to keep secret; administrator diligence to quickly revoke compromised passwords; multifactor authentication
Eavesdropping, theft, and copying Token Theft, counterfeiting hardware Multifactor authentication; tamper resistant/evident token
Eavesdropping, theft, and copying Biometric Copying biometric Copy detection at capture device and capture device authentication
Replay Password Replay stolen password response Challenge-response protocol
Replay Token Replay stolen passcode response Challenge-response protocol; 1-time passcode
Replay Biometric Replay stolen biometric template response Copy detection at capture device and capture device authentication via chanllenge-response protocol
Torjan horse Password, token, biometric Installation of rogue client or capture device Authentication of clinet or capture device within trusted security perimeter
Denial of service Password, token, biometric Lockout by multiple failed authentications Multifactor with token

Acccess Control

DAC - Discretionary Access Control

Access Matrix

ACL: Access Control List

RBAC - Role-Based Access Control

ABAC - Attribute-Based Access Control

Incident Response

Pasted image 20230418164934.png