SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1316
INTERNAL SECURITY IN METROPOLITAN AREA NETWORK USING
KERBEROS
1Sushmitha M.S, 2 Dr.Mahesh Kaluti
1P.G Research Scholars, Department of CSE, P.E.S College of Engineering
2Associate Professor, Dept of CSE, P.E.S College of Engineering
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract— The main aim of current computer network
security systems is to secure the network from external
attackers; however, securing the network fromits ownusersis
still an unattended problem. In metropolitan area networks,
the risk of having internal attacks is high because of their
network topologies, due to high traffic and the amount of
network users. This work proposes a new approach to identify
whether a network useris having a normal behavior ornot,by
using Kerberos. Kerberos has a strong encrypted security
protocol that deals with establishing a secure connectionusing
more encryptions steps between the client(s) and the server.
Kerberos issues ticket to the client which is used to access the
services of a particular server along with a lifetime. There are
number ofencryption processes that take place before issuing
ticket. After obtaining mutual authentication, client can
communicate with the server by sending messages. These
messages are encrypted using AES algorithm. The document
presents an experiment how secure communication happens
between two organization; that is in metropolitan area
network.
Keywords—Metropolitan area network, Kerberos, AES
algorithm
I. INTRODUCTION
On currentcomputer networks, traditional securitymethods
like firewalls, access control systems and simple Intrusion
Detection Systems (IDS) are no longer enough to protect
computer systems; day after day, intruders find new ways to
attack computers and systems. Nowadays, attackers use
advanced techniques to go undetected by IDSs, including the
following: IP address spoof, encrypted payload,orevensocial
engineering techniques. A common symptom of an attack
using these techniques is that the host under attack is
experiencing unexpected network behavior. This is why the
use of profiles to determine whether the user is having the
expected behavior ornothas becomenecessary asanewway
to detect intrusions.
A major goalof current computernetworksecuritysystemsis
to protect the network from outside attackers; however,
protecting the network from its own users is still an
unattended problem. This paper focus on providing internal
network security to the systemsusing Kerberos.Kerberosisa
protocol for authenticating service requests betweentrusted
hosts across an untrusted network, such as the
internet. The Kerberos protocol defines how clients interact
with a network authentication service. Clients obtain tickets
from the Kerberos Key Distribution Centre (KDC), and they
present these tickets to servers when connections are
established. Kerberos tickets represent the client's network
credentials.
II. METHODOLOGY
Kerberosis a computer network authentication protocolthat
works on the basis of tickets. The Kerberos authentication
protocol provides a mechanism for mutual authentication
between a client and a serverbefore a network connection is
opened between them. The protocol assumes that initial
transactions between clients and servers take place on an
open network — an environment where most clients and
many serversare not physically secureandpacketstravelling
along the network can be monitored and modified at will. In
otherwords, the protocolis designed foranenvironmentthat
is much like today's Internet, where an attacker can easily
pose as either a client or a server and can readily eavesdrop
onortamper withcommunicationsbetweenlegitimateclients
and servers.
Fig : Working of Kerberos
A. User Client-based Logon
1. A user enters a username and password on the
client machine(s).
2. The client transformsthe password intothekeyof
a symmetric cipher. This either uses the built-in
key scheduling, or a one-way hash, depending on
the cipher-suite used.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1317
B. Client Authentication
1. The client sends a clear text message of the user
ID to the AS (Authentication Server) requesting
services on behalf of the user. (Note: Neither the
secret key nor the password is sent to the AS.)
2. The AS checks to see if the client is in its database.
If it is, the AS generates the secret key by hashing
the password of the user found at the
database (e.g., Active Directory in Windows
Server) and sends back the following two
messages to the client:
 Message A:Client/TGS Session Key
encrypted using the secret key of the
client/user.
 Message B: Ticket-Granting-Ticket (TGT,
which includes the client ID, client
network address, ticket validity
period, and the client/TGS session key)
encrypted using the secret key oftheTGS.
3. Once the client receives messages A and B, it
attempts to decrypt message A with the secret key
generated from the password entered by the user. If
the user entered password does not match the
password in the AS database, the client's secret key
will be different and thus unable to decrypt message
A. With a valid password and secret key the client
decrypts message A to obtain the Client/TGS Session
Key. This session key is used for further
communications with the TGS. (Note: The client
cannot decrypt Message B, as it is encrypted using
TGS's secret key.) At this point, the client has enough
information to authenticate itself to theTGS.
C. Client Service Authorization
1. When requesting services, the client sends the
following messages to the TGS:
 Message C: Composed of the TGT from
message B and the ID of the requested
service.
 Message D: Authenticator (which is
composed of the client ID and the
timestamp), encrypted using the
Client/TGS Session Key.
2. Upon receiving messages C and D, the TGS
retrieves message B out of message C. It decrypts
message B using the TGS secret key. This gives it
the "client/TGS session key". Using this key, the
TGS decrypts message D (Authenticator) and
compare client ID from message C and D, if they
match server sendsthe followingtwomessagesto
the client:
 Message E: Client-to-server ticket (which
includes the client ID, client network
address, validity period and
Client/Server Session Key) encrypted
using the service's secret key.
 Message F: Client/Server Session
Key encrypted with the Client/TGS
Session Key.
D. Client Service Request
1. Upon receiving messages E and F from TGS, the
client has enough information to authenticate
itself to the Service Server (SS). The client
connects to the SS and sends the following two
messages:
 Message E from the previous step
(the client-to-server ticket, encrypted
using service's secret key).
 Message G: a new Authenticator, which
includes the client ID, timestamp and is
encrypted using Client/Server Session
Key.
2. The SS decrypts the ticket (message E) using its
own secret key to retrieve the Client/Server
Session Key. Using the sessions key, SS decrypts
the Authenticator and compare client ID from
message E and G, if they match server sends the
followingmessage to the client to confirm itstrue
identity and willingness to serve the client:
 Message H: the timestamp found in
client'sAuthenticator (plus1inversion4,
but not necessary in version 5[3][4]),
encryptedusing the Client/ServerSession
Key.
3. The client decrypts the confirmation (message H)
using the Client/Server Session Key and checks
whether the timestamp is correct. If so, then the
client can trust the server and can start issuing
service requests to the server.
4. The server provides the requested services to the
client.
E. AES Algorithm
Once the user becomes authenticated and authorized,
secure connection is established with the server. Then the
user can send the messages (data) to the server in
encrypted form and decrypted at receiver side. Advanced
Encryption Standard (AES) algorithm is used for
encrypting and decryptingthemessages.Themorepopular
and widely adopted symmetric encryptionalgorithmlikely
to be encountered nowadays is the Advanced Encryption
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1318
Standard (AES). It is found at least six time faster than
triple DES.
A replacement for DES was needed as its key size was too
small. With increasing computingpower,itwasconsidered
vulnerable against exhaustivekeysearchattack.TripleDES
was designed to overcome this drawback but it was found
slow.
The features of AES are as follows −
 Symmetric key symmetric block cipher
 128-bit data, 128/192/256-bit keys
 Stronger and faster than Triple-DES
 Provide full specification and design details
 Software implementable in C and Java
Fig: AES Design
Working of AES algorithm
The schematic of AES structure is given in the following
illustration
Fig: Workflow of AES
AES is an iterative rather than Feistel cipher. It is based on
‘substitution–permutation network’. It comprises of a series
of linked operations, some of which involve replacing inputs
by specific outputs (substitutions) and others involve
shuffling bits around (permutations).
Interestingly, AES performs all its computations on bytes
rather than bits. Hence, AES treats the 128 bits of a plaintext
block as 16 bytes. These 16 bytes are arranged in four
columns and four rows for processing as a matrix −
Unlike DES, the number of rounds in AES is variable and
dependsonthelengthof the key. AES uses10roundsfor128-
bit keys, 12 rounds for 192-bit keys and 14 rounds for 256-
bit keys. Each of these rounds uses a different 128-bit round
key, which is calculated from the original AES key.
F. EncryptionProcess
Here, we restrict to description of a typical round of AES
encryption. Each round comprise of four sub-processes. The
first round process is depicted below.
Fig : Round 1
1. High-level description of the algorithm
1. Key Expansions—round keysare derivedfromthe
cipher key using Rijndael's key schedule. AES
requires a separate 128-bit round key block for
each round plus one more.
2. Initial Round
1. AddRoundKey—each byte of the state is
combined with a block of the round key
using bitwise xor.
3.Rounds
1. SubBytes—a non-linear substitution step
where each byte is replaced with another
according to a lookup table.
2. ShiftRows—a transposition step where the
last three rows of the state are shifted
cyclically a certain number of steps.
3. MixColumns—a mixing operation which
operates on the columns of the state,
combining the four bytes in each column.
4. AddRoundKey
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1319
4.Final Round (no MixColumns)
1. SubBytes
2. ShiftRows
3. AddRoundKey.
G. The SubBytes Step
Fig: In the SubBytes step, each byte in the state is replaced
with its entry in a fixed 8-bit lookup table, S; bij = S(aij).
In the SubBytes step, each byte in ai,j the state matrix is
replaced with aSubByte using an 8-bit substitution
box, the Rijndael S-box. This operation provides the non-
linearity in the cipher. The S-box used is derived from
the multiplicative inverse over GF(28), known to have good
non-linearity properties. To avoid attacks based on simple
algebraic properties, the S-box is constructed by combining
the inverse function withan invertible affine transformation.
The S-box is also chosen to avoid any fixed points (and so is
a derangement), i.e.,, and also anyopposite fixed points, i.e.
While performing the decryption, the InvSubBytes step (the
inverse of SubBytes) is used, which requires first taking the
inverse of the affine transformation and then finding the
multiplicativeinverse.
H. The ShiftRows Step
Fig : In the ShiftRows step, bytes in each row of the state
are shifted cyclically to the left. The number of places each
byte is shifted differs for each row.
The ShiftRows step operates on the rows of the state; it
cyclically shifts the bytes in each row by a certain offset. For
AES, the first row is left unchanged. Each byte of the second
row is shifted one to the left. Similarly, the third and fourth
rows are shifted by offsets of two and three respectively. For
blocks of sizes 128 bits and 192 bits, the shifting pattern is
the same. Row“n”is shiftedleft circular by ”n-1”bytes.Inthis
way, each column of the output state of the ShiftRows step is
composed of bytes from each column of the input state.
(Rijndael variants with a larger block size have slightly
different offsets). For a 256-bit block, the first row is
unchanged and the shifting for the second, third and fourth
row is 1 byte, 3 bytes and 4 bytes respectively—this change
only applies forthe Rijndael cipherwhenused with a 256-bit
block, as AES does not use 256-bit blocks. The importance of
this step is to avoid the columns being encrypted
independently, in which case AES degenerates into four
independent block ciphers.
I. The MixColumns Step
Fig : In the MixColumns step, each column of the state is
multiplied with a fixed polynomial
In theMixColumns step,the fourbytesof each columnofthe
state are combined using an invertible linear
transformation. The MixColumns function takes four bytes
as input and outputs four bytes, where each input byte
affects all four output bytes.
Togetherwith ShiftRows,MixColumnsprovidesdiffusionin
the cipher.
During this operation, each column is transformed using a
fixed matrix (matrix left-multiplied by column gives new
value of column in the state):
Matrix multiplication is composed of multiplication and
addition of the entries. Entries are 8 bit bytes treated as
coefficients of polynomial of order . Addition is
simplyXOR.Multiplication ismodulo irreduciblepolynomial
. If processed bit by bit then
after shifting a conditional XOR with 1B16 should be
performed if the shifted value is larger than FF16 (overflow
must be corrected by subtraction of generating polynomial).
These are special cases of the usual multiplication in
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1320
In moregeneral sense, each columnistreatedasapolynomial
over and is then multiplied modulo with a
fixed polynomial
The coefficients are displayed in their
hexadecimal equivalent ofthe binary representationof bit
polynomials from .The MixColumns step
can also be viewed as a multiplication by the shown
particular MDS matrix in the finite field . This
process is described further in the article Rijndael
MixColumns.
J. The AddRoundKey Step
Fig : In the AddRoundKey step, each byte of the state is
combined with a byte of the round subkey using the XOR
operation (⊕).
In the AddRoundKey step, the subkey is combined with the
state. For each round, a subkey is derived from the main key
using Rijndael's key schedule; each subkey isthesamesizeas
the state. The subkey is added by combining each byte of the
state with the corresponding byte of the subkey using
bitwise XOR.
III. CONCLUSION
This paper presents the concept of using the Kerberos to
improve the security in metropolitan areanetwork.Kerberos
provides secure authentication and authorization
functionality for the client. After the client is authenticated
and authorized, client can communicate and transfer the
messages to the server using AES algorithm. Thus AES
algorithm provides secure means of information
transformation to the server.
REFERENCES:
[1] Alvaro Parres-Peredo, Ivan Piza-Davila, Francisco
Cervantes “Towards a User Network Profiling for
Internal Security using Top-K Rankings Similarity
Measures”, Oct 23,2017.
[2] Jiangzhuo Chen, V. S. Anil Kumar, Madhav V. Marathe,
Ravi Sundaram, Mayur Thakur, Sunil Thulasidasan “A
study of the structure and vulnerabilities of
metropolitan area networks”, 2016 8th International
Conference on Communication SystemsandNetworks
(COMSNETS), Mar 24, 2016.
[3] Fadi Al-Ayed, Hang Liu “Synopsis of Security: Using
Kerberos Method to Secure File Transfer Sessions”,
2016 International Conference on Computational
Science and Computational Intelligence,Mar20,2017.
[4] Nan Zhangl, Xiaoyu Wul, Cheng Yangl, Yinghua Shenl,
Yingye Chengl “A lightweight authentication and
authorization solution based on Kerberos”,Advanced
Information Management, Communicates, Electronic
and Automation Control Conference(IMCEC), 2016
IEEE, Mar 02, 2017.
[5] Khaled Bakour, Gulesin Sena Das, H.Murat Unver “An
Intrusion Detection System Based on a Hybrid Tabu-
Genetic Algorithm”, (UBMK’17) 2nd International
Conference on Computer ScienceandEngineering,Nov
02, 2017.
[6] https://en.m.wikipedia.org/wiki/kerberos_(protocol).
[7] https://en.m.wikipedia.org/wiki/Advanced_Encryptio
n_Standard.

More Related Content

What's hot (20)

PDF
Improving the Secure Socket Layer by Modifying the RSA Algorithm
IJCSEA Journal
 
PDF
0011sas security whitepaper
CMR WORLD TECH
 
PDF
Enhanced Security Through Token
IRJET Journal
 
DOCX
4.authentication and key agreement based on anonymous identity for peer to-pe...
Venkat Projects
 
PDF
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
 
PDF
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET Journal
 
PDF
IRJET- Enhancing Network Security by Modified Secure Dynamic Path Identifiers
IRJET Journal
 
PDF
Employment Feedback by Securing Data using Anonymous Authentication
IRJET Journal
 
PDF
Computer security module 4
Deepak John
 
PDF
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
IJERA Editor
 
PDF
Trust Based Management with User Feedback Service in Cloud Environment
IRJET Journal
 
PDF
Improving Efficiency of Security in Multi-Cloud
IJTET Journal
 
PDF
Security Analysis and Improvement for IEEE 802.11i
inventionjournals
 
DOC
documentation for identity based secure distrbuted data storage schemes
Sahithi Naraparaju
 
PDF
Identity based cryptography for client side security in web applications (web...
eSAT Publishing House
 
PDF
Cued click point image based kerberos authentication protocol
IAEME Publication
 
PDF
Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
IRJET Journal
 
PDF
5.[40 44]enhancing security in cloud computing
Alexander Decker
 
PDF
IJSRED-V2I1P29
IJSRED
 
PDF
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET Journal
 
Improving the Secure Socket Layer by Modifying the RSA Algorithm
IJCSEA Journal
 
0011sas security whitepaper
CMR WORLD TECH
 
Enhanced Security Through Token
IRJET Journal
 
4.authentication and key agreement based on anonymous identity for peer to-pe...
Venkat Projects
 
Two Aspect Validation Control Frameworks for Online Distributed Services
IRJET Journal
 
IRJET- Authentic and Anonymous Data Sharing with Enhanced Key Security
IRJET Journal
 
IRJET- Enhancing Network Security by Modified Secure Dynamic Path Identifiers
IRJET Journal
 
Employment Feedback by Securing Data using Anonymous Authentication
IRJET Journal
 
Computer security module 4
Deepak John
 
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
IJERA Editor
 
Trust Based Management with User Feedback Service in Cloud Environment
IRJET Journal
 
Improving Efficiency of Security in Multi-Cloud
IJTET Journal
 
Security Analysis and Improvement for IEEE 802.11i
inventionjournals
 
documentation for identity based secure distrbuted data storage schemes
Sahithi Naraparaju
 
Identity based cryptography for client side security in web applications (web...
eSAT Publishing House
 
Cued click point image based kerberos authentication protocol
IAEME Publication
 
Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
IRJET Journal
 
5.[40 44]enhancing security in cloud computing
Alexander Decker
 
IJSRED-V2I1P29
IJSRED
 
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET Journal
 

Similar to IRJET- Internal Security in Metropolitan Area Network using Kerberos (20)

PDF
Active Directory Golden Ticket Attack Detection
IRJET Journal
 
PDF
Kerberos Security in Distributed Systems
IRJET Journal
 
PDF
IRJET- Multi sharing Data using OTP
IRJET Journal
 
PDF
IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
IRJET Journal
 
PDF
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET Journal
 
PDF
561 1530-1-pb (1)
Meetendra Singh
 
PDF
IRJET- Secure Kerberos System in Distributed Environment
IRJET Journal
 
PDF
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET Journal
 
PDF
IRJET- Decentralized Kyc System
IRJET Journal
 
PPTX
Kerberos
RafatSamreen
 
PDF
Kerberos Protocol
Netwax Lab
 
PDF
Technet.microsoft.com
Kurt Kort
 
PDF
Ijarcet vol-2-issue-7-2236-2240
Editor IJARCET
 
PDF
Ijarcet vol-2-issue-7-2236-2240
Editor IJARCET
 
RTF
Kerberos case study
Mayuri Patil
 
PDF
A Study of Location and Date-Time Encryption of Cloud using Android Application
IRJET Journal
 
PDF
Secure Data Storage on Cloud System for Privacy Preserving
IRJET Journal
 
PDF
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
IRJET Journal
 
PDF
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
IRJET Journal
 
PDF
IRJET- A Secure Erasure Code-Based Cloud Storage Framework with Secure Inform...
IRJET Journal
 
Active Directory Golden Ticket Attack Detection
IRJET Journal
 
Kerberos Security in Distributed Systems
IRJET Journal
 
IRJET- Multi sharing Data using OTP
IRJET Journal
 
IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
IRJET Journal
 
IRJET- Anchoring of Cloud Information under Key Presentation
IRJET Journal
 
561 1530-1-pb (1)
Meetendra Singh
 
IRJET- Secure Kerberos System in Distributed Environment
IRJET Journal
 
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET Journal
 
IRJET- Decentralized Kyc System
IRJET Journal
 
Kerberos
RafatSamreen
 
Kerberos Protocol
Netwax Lab
 
Technet.microsoft.com
Kurt Kort
 
Ijarcet vol-2-issue-7-2236-2240
Editor IJARCET
 
Ijarcet vol-2-issue-7-2236-2240
Editor IJARCET
 
Kerberos case study
Mayuri Patil
 
A Study of Location and Date-Time Encryption of Cloud using Android Application
IRJET Journal
 
Secure Data Storage on Cloud System for Privacy Preserving
IRJET Journal
 
SECURITY IN COULD DATA STORAGE USING SOFT COMPUTING TECHNIQUES AND ELGAMAL CR...
IRJET Journal
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
IRJET Journal
 
IRJET- A Secure Erasure Code-Based Cloud Storage Framework with Secure Inform...
IRJET Journal
 
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
PDF
Kiona – A Smart Society Automation Project
IRJET Journal
 
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
PDF
Breast Cancer Detection using Computer Vision
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
PDF
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
PDF
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
Kiona – A Smart Society Automation Project
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
Ad

Recently uploaded (20)

PDF
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
PPTX
Precedence and Associativity in C prog. language
Mahendra Dheer
 
PPTX
sunil mishra pptmmmmmmmmmmmmmmmmmmmmmmmmm
singhamit111
 
PDF
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
PDF
STUDY OF NOVEL CHANNEL MATERIALS USING III-V COMPOUNDS WITH VARIOUS GATE DIEL...
ijoejnl
 
PPTX
filteration _ pre.pptx 11111110001.pptx
awasthivaibhav825
 
PDF
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
PPTX
Ground improvement techniques-DEWATERING
DivakarSai4
 
PPTX
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
PPTX
cybersecurityandthe importance of the that
JayachanduHNJc
 
PDF
All chapters of Strength of materials.ppt
girmabiniyam1234
 
PDF
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
PDF
4 Tier Teamcenter Installation part1.pdf
VnyKumar1
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PDF
CAD-CAM U-1 Combined Notes_57761226_2025_04_22_14_40.pdf
shailendrapratap2002
 
PDF
Machine Learning All topics Covers In This Single Slides
AmritTiwari19
 
PPTX
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
PPTX
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
PDF
20ME702-Mechatronics-UNIT-1,UNIT-2,UNIT-3,UNIT-4,UNIT-5, 2025-2026
Mohanumar S
 
PPTX
ETP Presentation(1000m3 Small ETP For Power Plant and industry
MD Azharul Islam
 
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
Precedence and Associativity in C prog. language
Mahendra Dheer
 
sunil mishra pptmmmmmmmmmmmmmmmmmmmmmmmmm
singhamit111
 
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
STUDY OF NOVEL CHANNEL MATERIALS USING III-V COMPOUNDS WITH VARIOUS GATE DIEL...
ijoejnl
 
filteration _ pre.pptx 11111110001.pptx
awasthivaibhav825
 
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
Ground improvement techniques-DEWATERING
DivakarSai4
 
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
cybersecurityandthe importance of the that
JayachanduHNJc
 
All chapters of Strength of materials.ppt
girmabiniyam1234
 
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
4 Tier Teamcenter Installation part1.pdf
VnyKumar1
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
CAD-CAM U-1 Combined Notes_57761226_2025_04_22_14_40.pdf
shailendrapratap2002
 
Machine Learning All topics Covers In This Single Slides
AmritTiwari19
 
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
20ME702-Mechatronics-UNIT-1,UNIT-2,UNIT-3,UNIT-4,UNIT-5, 2025-2026
Mohanumar S
 
ETP Presentation(1000m3 Small ETP For Power Plant and industry
MD Azharul Islam
 

IRJET- Internal Security in Metropolitan Area Network using Kerberos

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1316 INTERNAL SECURITY IN METROPOLITAN AREA NETWORK USING KERBEROS 1Sushmitha M.S, 2 Dr.Mahesh Kaluti 1P.G Research Scholars, Department of CSE, P.E.S College of Engineering 2Associate Professor, Dept of CSE, P.E.S College of Engineering ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract— The main aim of current computer network security systems is to secure the network from external attackers; however, securing the network fromits ownusersis still an unattended problem. In metropolitan area networks, the risk of having internal attacks is high because of their network topologies, due to high traffic and the amount of network users. This work proposes a new approach to identify whether a network useris having a normal behavior ornot,by using Kerberos. Kerberos has a strong encrypted security protocol that deals with establishing a secure connectionusing more encryptions steps between the client(s) and the server. Kerberos issues ticket to the client which is used to access the services of a particular server along with a lifetime. There are number ofencryption processes that take place before issuing ticket. After obtaining mutual authentication, client can communicate with the server by sending messages. These messages are encrypted using AES algorithm. The document presents an experiment how secure communication happens between two organization; that is in metropolitan area network. Keywords—Metropolitan area network, Kerberos, AES algorithm I. INTRODUCTION On currentcomputer networks, traditional securitymethods like firewalls, access control systems and simple Intrusion Detection Systems (IDS) are no longer enough to protect computer systems; day after day, intruders find new ways to attack computers and systems. Nowadays, attackers use advanced techniques to go undetected by IDSs, including the following: IP address spoof, encrypted payload,orevensocial engineering techniques. A common symptom of an attack using these techniques is that the host under attack is experiencing unexpected network behavior. This is why the use of profiles to determine whether the user is having the expected behavior ornothas becomenecessary asanewway to detect intrusions. A major goalof current computernetworksecuritysystemsis to protect the network from outside attackers; however, protecting the network from its own users is still an unattended problem. This paper focus on providing internal network security to the systemsusing Kerberos.Kerberosisa protocol for authenticating service requests betweentrusted hosts across an untrusted network, such as the internet. The Kerberos protocol defines how clients interact with a network authentication service. Clients obtain tickets from the Kerberos Key Distribution Centre (KDC), and they present these tickets to servers when connections are established. Kerberos tickets represent the client's network credentials. II. METHODOLOGY Kerberosis a computer network authentication protocolthat works on the basis of tickets. The Kerberos authentication protocol provides a mechanism for mutual authentication between a client and a serverbefore a network connection is opened between them. The protocol assumes that initial transactions between clients and servers take place on an open network — an environment where most clients and many serversare not physically secureandpacketstravelling along the network can be monitored and modified at will. In otherwords, the protocolis designed foranenvironmentthat is much like today's Internet, where an attacker can easily pose as either a client or a server and can readily eavesdrop onortamper withcommunicationsbetweenlegitimateclients and servers. Fig : Working of Kerberos A. User Client-based Logon 1. A user enters a username and password on the client machine(s). 2. The client transformsthe password intothekeyof a symmetric cipher. This either uses the built-in key scheduling, or a one-way hash, depending on the cipher-suite used.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1317 B. Client Authentication 1. The client sends a clear text message of the user ID to the AS (Authentication Server) requesting services on behalf of the user. (Note: Neither the secret key nor the password is sent to the AS.) 2. The AS checks to see if the client is in its database. If it is, the AS generates the secret key by hashing the password of the user found at the database (e.g., Active Directory in Windows Server) and sends back the following two messages to the client:  Message A:Client/TGS Session Key encrypted using the secret key of the client/user.  Message B: Ticket-Granting-Ticket (TGT, which includes the client ID, client network address, ticket validity period, and the client/TGS session key) encrypted using the secret key oftheTGS. 3. Once the client receives messages A and B, it attempts to decrypt message A with the secret key generated from the password entered by the user. If the user entered password does not match the password in the AS database, the client's secret key will be different and thus unable to decrypt message A. With a valid password and secret key the client decrypts message A to obtain the Client/TGS Session Key. This session key is used for further communications with the TGS. (Note: The client cannot decrypt Message B, as it is encrypted using TGS's secret key.) At this point, the client has enough information to authenticate itself to theTGS. C. Client Service Authorization 1. When requesting services, the client sends the following messages to the TGS:  Message C: Composed of the TGT from message B and the ID of the requested service.  Message D: Authenticator (which is composed of the client ID and the timestamp), encrypted using the Client/TGS Session Key. 2. Upon receiving messages C and D, the TGS retrieves message B out of message C. It decrypts message B using the TGS secret key. This gives it the "client/TGS session key". Using this key, the TGS decrypts message D (Authenticator) and compare client ID from message C and D, if they match server sendsthe followingtwomessagesto the client:  Message E: Client-to-server ticket (which includes the client ID, client network address, validity period and Client/Server Session Key) encrypted using the service's secret key.  Message F: Client/Server Session Key encrypted with the Client/TGS Session Key. D. Client Service Request 1. Upon receiving messages E and F from TGS, the client has enough information to authenticate itself to the Service Server (SS). The client connects to the SS and sends the following two messages:  Message E from the previous step (the client-to-server ticket, encrypted using service's secret key).  Message G: a new Authenticator, which includes the client ID, timestamp and is encrypted using Client/Server Session Key. 2. The SS decrypts the ticket (message E) using its own secret key to retrieve the Client/Server Session Key. Using the sessions key, SS decrypts the Authenticator and compare client ID from message E and G, if they match server sends the followingmessage to the client to confirm itstrue identity and willingness to serve the client:  Message H: the timestamp found in client'sAuthenticator (plus1inversion4, but not necessary in version 5[3][4]), encryptedusing the Client/ServerSession Key. 3. The client decrypts the confirmation (message H) using the Client/Server Session Key and checks whether the timestamp is correct. If so, then the client can trust the server and can start issuing service requests to the server. 4. The server provides the requested services to the client. E. AES Algorithm Once the user becomes authenticated and authorized, secure connection is established with the server. Then the user can send the messages (data) to the server in encrypted form and decrypted at receiver side. Advanced Encryption Standard (AES) algorithm is used for encrypting and decryptingthemessages.Themorepopular and widely adopted symmetric encryptionalgorithmlikely to be encountered nowadays is the Advanced Encryption
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1318 Standard (AES). It is found at least six time faster than triple DES. A replacement for DES was needed as its key size was too small. With increasing computingpower,itwasconsidered vulnerable against exhaustivekeysearchattack.TripleDES was designed to overcome this drawback but it was found slow. The features of AES are as follows −  Symmetric key symmetric block cipher  128-bit data, 128/192/256-bit keys  Stronger and faster than Triple-DES  Provide full specification and design details  Software implementable in C and Java Fig: AES Design Working of AES algorithm The schematic of AES structure is given in the following illustration Fig: Workflow of AES AES is an iterative rather than Feistel cipher. It is based on ‘substitution–permutation network’. It comprises of a series of linked operations, some of which involve replacing inputs by specific outputs (substitutions) and others involve shuffling bits around (permutations). Interestingly, AES performs all its computations on bytes rather than bits. Hence, AES treats the 128 bits of a plaintext block as 16 bytes. These 16 bytes are arranged in four columns and four rows for processing as a matrix − Unlike DES, the number of rounds in AES is variable and dependsonthelengthof the key. AES uses10roundsfor128- bit keys, 12 rounds for 192-bit keys and 14 rounds for 256- bit keys. Each of these rounds uses a different 128-bit round key, which is calculated from the original AES key. F. EncryptionProcess Here, we restrict to description of a typical round of AES encryption. Each round comprise of four sub-processes. The first round process is depicted below. Fig : Round 1 1. High-level description of the algorithm 1. Key Expansions—round keysare derivedfromthe cipher key using Rijndael's key schedule. AES requires a separate 128-bit round key block for each round plus one more. 2. Initial Round 1. AddRoundKey—each byte of the state is combined with a block of the round key using bitwise xor. 3.Rounds 1. SubBytes—a non-linear substitution step where each byte is replaced with another according to a lookup table. 2. ShiftRows—a transposition step where the last three rows of the state are shifted cyclically a certain number of steps. 3. MixColumns—a mixing operation which operates on the columns of the state, combining the four bytes in each column. 4. AddRoundKey
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1319 4.Final Round (no MixColumns) 1. SubBytes 2. ShiftRows 3. AddRoundKey. G. The SubBytes Step Fig: In the SubBytes step, each byte in the state is replaced with its entry in a fixed 8-bit lookup table, S; bij = S(aij). In the SubBytes step, each byte in ai,j the state matrix is replaced with aSubByte using an 8-bit substitution box, the Rijndael S-box. This operation provides the non- linearity in the cipher. The S-box used is derived from the multiplicative inverse over GF(28), known to have good non-linearity properties. To avoid attacks based on simple algebraic properties, the S-box is constructed by combining the inverse function withan invertible affine transformation. The S-box is also chosen to avoid any fixed points (and so is a derangement), i.e.,, and also anyopposite fixed points, i.e. While performing the decryption, the InvSubBytes step (the inverse of SubBytes) is used, which requires first taking the inverse of the affine transformation and then finding the multiplicativeinverse. H. The ShiftRows Step Fig : In the ShiftRows step, bytes in each row of the state are shifted cyclically to the left. The number of places each byte is shifted differs for each row. The ShiftRows step operates on the rows of the state; it cyclically shifts the bytes in each row by a certain offset. For AES, the first row is left unchanged. Each byte of the second row is shifted one to the left. Similarly, the third and fourth rows are shifted by offsets of two and three respectively. For blocks of sizes 128 bits and 192 bits, the shifting pattern is the same. Row“n”is shiftedleft circular by ”n-1”bytes.Inthis way, each column of the output state of the ShiftRows step is composed of bytes from each column of the input state. (Rijndael variants with a larger block size have slightly different offsets). For a 256-bit block, the first row is unchanged and the shifting for the second, third and fourth row is 1 byte, 3 bytes and 4 bytes respectively—this change only applies forthe Rijndael cipherwhenused with a 256-bit block, as AES does not use 256-bit blocks. The importance of this step is to avoid the columns being encrypted independently, in which case AES degenerates into four independent block ciphers. I. The MixColumns Step Fig : In the MixColumns step, each column of the state is multiplied with a fixed polynomial In theMixColumns step,the fourbytesof each columnofthe state are combined using an invertible linear transformation. The MixColumns function takes four bytes as input and outputs four bytes, where each input byte affects all four output bytes. Togetherwith ShiftRows,MixColumnsprovidesdiffusionin the cipher. During this operation, each column is transformed using a fixed matrix (matrix left-multiplied by column gives new value of column in the state): Matrix multiplication is composed of multiplication and addition of the entries. Entries are 8 bit bytes treated as coefficients of polynomial of order . Addition is simplyXOR.Multiplication ismodulo irreduciblepolynomial . If processed bit by bit then after shifting a conditional XOR with 1B16 should be performed if the shifted value is larger than FF16 (overflow must be corrected by subtraction of generating polynomial). These are special cases of the usual multiplication in
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 03 | Mar-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1320 In moregeneral sense, each columnistreatedasapolynomial over and is then multiplied modulo with a fixed polynomial The coefficients are displayed in their hexadecimal equivalent ofthe binary representationof bit polynomials from .The MixColumns step can also be viewed as a multiplication by the shown particular MDS matrix in the finite field . This process is described further in the article Rijndael MixColumns. J. The AddRoundKey Step Fig : In the AddRoundKey step, each byte of the state is combined with a byte of the round subkey using the XOR operation (⊕). In the AddRoundKey step, the subkey is combined with the state. For each round, a subkey is derived from the main key using Rijndael's key schedule; each subkey isthesamesizeas the state. The subkey is added by combining each byte of the state with the corresponding byte of the subkey using bitwise XOR. III. CONCLUSION This paper presents the concept of using the Kerberos to improve the security in metropolitan areanetwork.Kerberos provides secure authentication and authorization functionality for the client. After the client is authenticated and authorized, client can communicate and transfer the messages to the server using AES algorithm. Thus AES algorithm provides secure means of information transformation to the server. REFERENCES: [1] Alvaro Parres-Peredo, Ivan Piza-Davila, Francisco Cervantes “Towards a User Network Profiling for Internal Security using Top-K Rankings Similarity Measures”, Oct 23,2017. [2] Jiangzhuo Chen, V. S. Anil Kumar, Madhav V. Marathe, Ravi Sundaram, Mayur Thakur, Sunil Thulasidasan “A study of the structure and vulnerabilities of metropolitan area networks”, 2016 8th International Conference on Communication SystemsandNetworks (COMSNETS), Mar 24, 2016. [3] Fadi Al-Ayed, Hang Liu “Synopsis of Security: Using Kerberos Method to Secure File Transfer Sessions”, 2016 International Conference on Computational Science and Computational Intelligence,Mar20,2017. [4] Nan Zhangl, Xiaoyu Wul, Cheng Yangl, Yinghua Shenl, Yingye Chengl “A lightweight authentication and authorization solution based on Kerberos”,Advanced Information Management, Communicates, Electronic and Automation Control Conference(IMCEC), 2016 IEEE, Mar 02, 2017. [5] Khaled Bakour, Gulesin Sena Das, H.Murat Unver “An Intrusion Detection System Based on a Hybrid Tabu- Genetic Algorithm”, (UBMK’17) 2nd International Conference on Computer ScienceandEngineering,Nov 02, 2017. [6] https://en.m.wikipedia.org/wiki/kerberos_(protocol). [7] https://en.m.wikipedia.org/wiki/Advanced_Encryptio n_Standard.