Home » Blog » What is the OSI security architecture?

What is the OSI security architecture?


The Open System Interconnection (OSI) security architecture is a recommendation of the International Telecommunication Union which defines a systematic approach to define security requirements for a certain organization, as well as approaches to meet the aforementioned requirements.

The OSI security architecture provides a general description of security services and mechanisms, as well as a description of security attacks.

Table of Contents

Definitions

Security attack: Any action that compromises the security of information owned by an organization.

• Security mechanism: A process (or a device incorporating such a process) that is designed to detect, prevent, or recover from a security attack.

• Security service: A processing or communication service that enhances the security of the data processing systems and the information transfers of an organization. The services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the service.

Threat: A potential for violation of security, which exists when there is a circumstance, capability, action, or event that could breach security and cause harm. That is, a threat is a possible danger that might exploit a vulnerability.

Attack: An assault on system security that derives from an intelligent threat; that is, an intelligent act that is a deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a system.

All the definitions are taken from the book Cryptography and Network Security by William Stallings.

Security Attacks

A security attack is an activity or act made upon a system with the goal to obtain unauthorized access to information or resources. It is usually carried out by evading security policies that are in place in organizations or individual devices.

Security attacks can be passive or active.

A passive security attack is one where the attacker just listens to or monitors a communication. In this case, the attacker will not impersonate any of the parts of the communication. See an example in the figure below.

Passive Security Attack
Passive Security Attack

Some of the passive attacks are:

  • Release of message contents. This happens when the attacker can intercept confidential information: bank statements/account documents, payslips, etc.
  • Traffic analysis. In this case, the attacker just listens to the traffic to gain knowledge that is not public. As an example, an attacker is listening to a communication between a famous actress and her manager. The communication shows where the actress will spend her holidays. She probably doesn’t want that information to be in hands of the paparazzi. One way of doing traffic analysis is using a Man-In-The-Middle (MITM) attack. In this post, I explain this attack in more detail and show that it can be active or passive.

The way to prevent this type of attack is by using encryption. If the communication is encrypted using secure mechanisms, then it does not matter if an attacker listens to the communication, because the attacker won’t be able to make any sense of it. I wrote a post for you to understand the general concepts to study cryptography.

On the other hand, is an active attack, the attacker will modify the information that is transmitted and try to impersonate one or both parties in the communication. Another type of attack is when the attacker creates a message and starts a communication pretending to be someone else in order to gain access to sensitive information, get someone to do something, or cause a denial of service.

See a general representation below.

Active Security Attack
Active Security Attack

Some examples of active attacks are:

  • Masquerade attack. When the attacker impersonates someone else. This type of attack is usually used together with another attack, like reply and modification attacks. You can find an article with an explanation and example here.
  • Reply attack. In this type of attack the attacker capture the data that is transmitted and re-sends it to produce an unauthorized action. A post with a deeper explanation is in this link.
  • Modification of messages. This type of attack happens when the attacker capture information, modifies it, and re-sends it to produce an unauthorized action. This type of attack can be carried on as a Man-In-The-Middle attack. You can learn more about MITM here.
  • Denial of service. This type of attack occurs when a service is prevented to work as expected. Usually, it also brings as consequence, other services or users are also prevented to do their duties. As an example, imagine that an e-mail is sent to a person with instructions to perform a time-sensitive task. At the same time, a Denial of Service (DoS) attack is performed on the email server. As a consequence, the person cannot read the email (the server is down) and cannot carry on the instructions (the person’s duty).

I wrote a post that answers the question what is a security attack? so you can have more information.

Security Services

According to the Internet Security Glossary Version 2 (RFC 4949), a security service is “A processing or communication service that is provided by a system to give a specific kind of protection to system resources”.

The OSI security architecture classifies security services as follows:

  • Authentication:
    • Peer entity authentication
    • Data origin authentication
  • Access Control Service
  • Data Confidentiality:
    • Connection confidentiality
    • Connectionless confidentiality
    • Selective field confidentiality
    • Traffic flow confidentiality
  • Data integrity
    • Connection integrity with recovery
    • Connection integrity without recovery
    • Selective field connection integrity
    • Connectionless integrity
    • Selective field connectionless integrity
  • Non-repudiation
    • Non-repudiation with proof of origin
    • Non-repudiation with proof of delivery

Security Mechanisms

According to the Internet Security Glossary Version 2 (RFC 4949), a security mechanism is “A method or process (or a device incorporating it) that can be used in a system to implement a security service that is provided by or within the system”.

Some examples are authentication exchange, checksum, digital signature, encryption, and traffic padding.

Fund below is a summary of the security mechanisms described in the OSI security architecture:

  • Specific Security Mechanisms
    • Encipherment
    • Digital Signature mechanisms
    • Access Control
    • Data Integrity
    • Authentication Exchange
    • Traffic Padding
    • Routing Control
    • Notarization
  • Pervasive Security Mechanisms
    • Trusted Functionality
    • Security Label
    • Event Detection
    • Security Audit Trail
    • Security Recovery

Security services and mechanisms and the OSI Reference Model

As you should know by now, the OSI Reference Model provides standardization for data networking. You can find a brief overview and the OSI layers in this post. The layers are important because they establish the way that communication is implemented in a network environment.

Find below a table that shows in which OSI layer (s) each service can be provided.

Security ServiceLayerMechanisms to provide the security service
Peer entity authentication3, 4 and 7authentication information transferred between application entities, protected by presentation or lower layer encipherment mechanisms
Data origin authentication3, 4 and 7supported by using signature mechanisms or lower layer encipherment mechanisms
Access control service3, 4 and 7the ability to communicate with specific systems or remote application entities may be provided by a combination of access control mechanisms in the application layer and lower layers
Connection Confidentiality1, 2, 3, 4, 6 and 7can be supported by using a lower layer encipherment mechanism
Connectionless Confidentiality2, 3, 4, 6 and 7can be supported by using a lower layer encipherment mechanism
Selective field confidentiality6 and 7can be supported by using an encipherment mechanism at the presentation layer
Traffic flow confidentiality1, 3 and 7can be supported by the use of a traffic padding mechanism at the application layer in conjunction with a confidentiality service at a lower layer
Connection integrity with recovery4 and 7can be supported using a lower layer data integrity mechanism (sometimes in conjunction with an encipherment mechanism)
Connection integrity without recovery3, 4 and 7can be supported using a lower layer data integrity mechanism (sometimes in conjunction with an encipherment mechanism)
Selective field connection integrity7can be supported using a data integrity mechanism (sometimes in conjunction with an encipherment mechanism) at the presentation layer
Connectionless integrity3, 4 and 7can be supported using a lower layer data integrity mechanism (sometimes in conjunction with an encipherment mechanism)
Selective field connectionless integrity7can be supported using a data integrity mechanism (sometimes in conjunction with an encipherment mechanism) at the presentation layer
Non-repudiation Origin7can be supported by an appropriate combination of signature and lower layer data integrity mechanisms possibly in conjunction with third-party notaries
Non-repudiation Delivery7can be supported by an appropriate combination of signature and lower layer data integrity mechanisms possibly in conjunction with third-party notaries
Relation between Security Services, Security Mechanisms and the layers of the OSI Reference Model.

Notice that the application process may provide all the security services using the same mechanisms as recommended by OSI Security Architecture.

The OSI Security Architecture is considered an efficient way to assess the security needs of an organization. These security needs can be specified by using the CIA Triad.

Related posts: