Applying the OSI Seven Layer Network Model To Information Security

ثبت نشده
چکیده

Data networking is a critical area of focus in the study of information security. This paper focuses on reviewing a key area of data networking theory The Open Systems Interconnect (OSI) Seven Layer Network Model. This paper demonstrates the application of the model’s concepts into the context of information security. This paper overall presents the perspective that common information security problems map directly to the logical constructs presented in the OSI Seven Layer Network Model, and seeks to demonstrate the Seven Layer Model’s usefulness in evaluating information security problems and solutions. The OSI Model is presented by way of both formal definition and practical terms that affect information security on a layer-by-layer basis. For each layer, examples of common information security threats and controls are evaluated by how they fit into the OSI Seven Layer Model’s layers of classification, with notes on exceptions and special cases. Once the seven layers have been covered as a basis for the discussion, it is presented that the Seven Layer Model’s scheme for interaction between the layers gives insight to some of the problems faced by focused, “single-layer” security solutions. To answer these problems, a multi-layer “defense-indepth” approach is examined by example, taken from the viewpoint of network model layers rather than discrete solutions and logical or physical hardware layers. This paper concludes with some proposed extensions to the model that complete the model’s application to information security problems. Introduction to the OSI Seven Layer Model Networking is a prime concern for information security. The ubiquitous nature of network connectivity may let us access the world from our computer, but it also lets that same world gain access back to us in ways we may not desire. No matter how well we secure our own hosts, we are still vulnerable if the parts of the infrastructure between our distant destinations and ourselves fall victim to intentional exploitation or unwitting mishap. Information security and data networking are inextricably linked topics. Today’s network engineer has no choice but to be security-conscious, and the security engineer has no choice but to understand the network he is tasked to secure. [1] A great deal of formalized study has been devoted to the science and methodology of designing and maintaining networks. One formal system that network engineers discuss and apply frequently is the OSI Seven Layer Model for Networking, developed by the ISO (International Standards Organization) to define a standardized method for designing networks and the functions that support them. This model describes seven layers of interaction for an information system communicating over a network, presenting a stack of layers representing major function areas that are generally required or useful for data communication between nodes in a distributed environment. Starting from a high-level application perspective, data is sent down the stack layer by layer, each layer adding information around the originally presented data until that original data plus its layers of added content are represented at the bottommost layer as a physical medium such as bursts of colored light or voltage across a wire in order for that data to physically travel from one point to the other in the real world. © S A N S In st itu te 2 00 4, A ut ho r r et ai ns fu ll ri gh ts . © SANS Institute 2004, As part of the Information Security Reading Room Author retains full rights. Page 3 Applying the OSI seven-layer model to Information Security Once the data takes this real-world journey, the true power of the model comes into play, as the protocols at each layer are mandated by the design model to strip cleanly away the information and formatting added by their corresponding layer at the sending end of the conversation as the data rises back up through the seven layers at the receiving side, acting on the transmitted content at their layer and pushing back up the stack what was originally pushed down at the other end. What was presented to layer three at the sending side should be exactly what layer three on the receiving side passes back up to the layer above. This can be described as the layers “communicating” between one another on the sending and receiving side, all the way up to the application layer at the top, where pure data is sent from one side and received intact and unchanged on the other. There are exceptions to this concept such as application-aware NAT, where lower layer protocols may alter the data passed to them from above, but this is an exceptional case and a technical violation of the model. The isolation of layers also allows abstraction such that lower layers are not dependant on upper layers beyond what is needed to exchange data between the layers. This is especially important at the lower levels where the same data may have to travel across different media or link-layer protocols to get where it is going. This delivers a key goal of the model interchangeability of layers such that different environments can use the stack to standardize communications and interconnect on a common basis. [2,3,4,5,6] Like many ISO standards, much of its formal theory does not make it into the real world of actual implementation, but the powerful concepts that the OSI model present are a key element in most modern network system designs. Anyone who has worked with data networking or security has likely heard the terms “layer three” or “layer two” or “application layer.” This terminology stems directly from the ISO model and how it is applied to practical solutions. The model concepts are conventionally used to design and troubleshoot networks, and the seven-layer model is standard fare on any network engineering certification exam or interview. Careful study of the model can show us support for concepts we have learned from more conventional forms of information security theory, and understanding and applying the model to information security scenarios can also help us assess and address information security threats in a network environment, allowing us to organize efforts to make security assessments and perform forensic analysis of compromised systems and threats presented in theory and found in the wild. Take for example the bottom-most physical layer of the network. Reviewing the flow of information through the model, we see that all layers above depend upon the physical layer to deliver the data. We can draw a parallel between this and the concept that physical security is critical for all information security assets. From a networking perspective, if one can unplug a device from the network or otherwise physically alter it, communication stops. If there are errors at the physical layer, the layers above cannot typically recover, and must either retransmit or fail. If one can physically access a device, it is near impossible to prevent some amount of data loss or disclosure. All of the above layers depend upon the integrity of the physical layer. [7] © S A N S In st itu te 2 00 4, A ut ho r r et ai ns fu ll ri gh ts . © SANS Institute 2004, As part of the Information Security Reading Room Author retains full rights. Page 4 Applying the OSI seven-layer model to Information Security Another example would be application security at layer seven. Suppose that we apply good security through the underlying layers, with physical isolation (layer one), private VLANs (layer two), and firewalls with tight packet filter policies (layers three and four). But then we are deficient on our application layer security (layer seven, and often layers six and five), using unpatched server software and poorly written application and script code. Since the vulnerabilities lie within the application, in a pure seven-layer model we would be hard pressed to defend against this at the lower levels, as the controls at lower layers would only be able to address their respective layer of protocol, and not issues that occur above. This illustrates the conventional approach of defense in depth a firewall and DMZ are not sufficient to protect a host from outside attack if the ports that the firewall allows connect to vulnerable services (WWW, SMTP, Netbios, SQL). The services themselves need to be secure. [8] Using the model as an objective measure for security is closely related to this concept of defense-in-depth, and by way of deconstructing the layers and then examining how they interact, we can see supporting evidence and clear rationale for the need of that blended, defense-in-depth approach in securing networks, systems, applications, and data. The following sections will take each layer and examine them on the basis of their formal definition and their practical place in the network, show example security threats, and present possible controls of those risks that apply to the layer in question.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Applying the OSI Seven Layer Network Model To Information Security

Data networking is a critical area of focus in the study of information security. This paper focuses on reviewing a key area of data networking theory The Open Systems Interconnect (OSI) Seven Layer Network Model. This paper demonstrates the application of the model’s concepts into the context of information security. This paper overall presents the perspective that common information security ...

متن کامل

Applying the OSI Seven Layer Network Model To Information Security

Data networking is a critical area of focus in the study of information security. This paper focuses on reviewing a key area of data networking theory The Open Systems Interconnect (OSI) Seven Layer Network Model. This paper demonstrates the application of the model’s concepts into the context of information security. This paper overall presents the perspective that common information security ...

متن کامل

Applying the OSI Seven Layer Network Model To Information Security

Data networking is a critical area of focus in the study of information security. This paper focuses on reviewing a key area of data networking theory The Open Systems Interconnect (OSI) Seven Layer Network Model. This paper demonstrates the application of the model’s concepts into the context of information security. This paper overall presents the perspective that common information security ...

متن کامل

Applying the OSI Seven Layer Network Model To Information Security

Data networking is a critical area of focus in the study of information security. This paper focuses on reviewing a key area of data networking theory The Open Systems Interconnect (OSI) Seven Layer Network Model. This paper demonstrates the application of the model’s concepts into the context of information security. This paper overall presents the perspective that common information security ...

متن کامل

Applying the OSI Seven Layer Network Model To Information Security

Data networking is a critical area of focus in the study of information security. This paper focuses on reviewing a key area of data networking theory The Open Systems Interconnect (OSI) Seven Layer Network Model. This paper demonstrates the application of the model’s concepts into the context of information security. This paper overall presents the perspective that common information security ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2018