Agenda The Influence of the • General Background • Modems • Protocols • Web Hosting Internet • E-mail • Threats • Web Browsers • Security Eran Treister • Search Engines • Internet Opportunities Liron Pergament

2

General Background General Background

• 1969 – ARPA-Net, the • 1876 – Alexander Graham Bell invents the forerunner of the Internet, is telephone. established.

• 1962 – Bell Labs develops the first modem.

3 4

General Background General Background

• 1981 – Minitel (Teletel) is deployed across • 1983 - DCA and DARPA establish the France by French Telecom. TCP/IP protocol for ARPANET • 1990s – The term Internet appears.

5 6

1 Internet Protocols Internet Protocols

• The Internet is based on the 4-layer model. • This 4-layer model has: • Created in the 1970s by DARPA. – Layer 4: Application layer. • The structure of Internet protocols is still closely – Layer 3: Transport layer. reflected by the TCP/IP model. – Layer 2: Network layer. – Layer 1: Physical layer

7 8

World Wide Web E-Mail

• 1989 – Tim Berners-Lee • In late 1971, Tomlinson proposes the basic concept of developed the first ARPANET the Web. email application. • 1990 – Creates HTML, HTTP, • Until the 1980s FTP provided URL: email services for ARPANET. http://en.wikipedia.org/wiki/Url. • Historical addresses till 1982: • 1990 –Writes the prototype for utzoo!decvax!harpo!eagle!mhtsa! the . ihnss!ihuxp!grg

9 10

E-Mails Web Browsers

• Early 1980's: the SMTP • The first web browser- protocol was developed. WorldWideWeb. • 1984 – Creation of • Written in 1990 by Tim BITNET Berners-Lee. • 1997 – Hotmail released • Displayed HTML pages first free webmail. • Downloaded and opened most file types.

11 12

2 Web Browsers Browser

• Mosaic was the first • Images were popular World Wide embedded in the text. Web browser. • Added graphics to • Developed by Eric previous text-based Bina and Marc software Andreessen in 1992. • Released in 1993.

13 14

Netscape Navigator

• In 1994, Mosaic was • In 1995, Microsoft licensed Mosaic from renamed to Spyglass as the basis of Internet Explorer 1.0. Navigator. • Text and graphics appeared on the screen as the web page downloaded

1.0 2.0

3.0 15 16

The Browser Wars The Browser Wars

• The first browser war: Internet Explorer vs. • The second browser war: Internet Explorer vs. Mozilla

Vs. Vs.

• By the end of 2006, the usage share of • 2002-2003: Peak of 95%. Netscape browsers had fallen from over 85% in • Since Firefox's release, its market share has the mid 1990s, to less than 1% . grown to 15.1%.

17 18

3 Search Engines Search Engines

• The very first tool • In 1991 the protocol was created. used for searching on the Internet was • Allowed storing and searching large repositories of information.

• Implemented in 1990. • Could not search by file contents, only by file name. Select Fun & Games

19 20

Search Engines Search Engines

- Very Easy Rodent-Oriented • The first "full text" crawler-based Net-wide Index. was WebCrawler, which came out in 1994. • Jughead - Jonzy's Universal Gopher • Deactivated in 2001. Hierarchy Excavation And Display. • Searched files in Gopher index systems.

21 22

• In 1998, Larry Page and Sergey Brin • Google uses an algorithm called created a new kind of server environment PageRank. that used low-end PCs. • Google is currently the most popular • Around 2001, Google rose to prominence. search engine.

23 24

4 How Search Engines Work How Search Engines Work

• A crawler reads and stores information regarding web site pages.

Web Crawling • Data is indexed and Searching stored in data structures. • Searching – the engine provides a listing of best- Indexing matching web pages.

25 26

Modem Development Modem Development

• A device that converts between digital and • The first commercial analog signals. (dial-up) modem entered the • The first modems were developed in the communication 1950s. market only in 1962. • Invented by AT&T. • Enabled full-duplex transmission • Reached data rates of 300bps.

27 28

Modem Development Modem Development

• In 1980 data rates reached 14.4 Kbps. • In the late 1990s: “broadband” modems: Cable • Doubled in 1994. and ADSL. • Enable connection speed of 2Mbit/s up to 50 • In 1996: 56 Kbps Mbit/s.

29 30

5 Wireless Modem Web Servers and Hosting

• Wireless data modems are • Web servers are computers used in the WiFi and WiMax that host web pages. standards. • Web hosts are companies that • Give laptops and PCs access provide space on servers. points to a network. • Can also provide data center space called colocation.

31 32

Web Hosting types Google Servers Example

• Free – for personal users. • Provides: • Shared – shared by many – High bandwidth users. – Load balancing • Reseller – clients become web – Fault tolerance hosts. • Application specific – blog, image, video, wiki farms. • Clustered – websites are not limited to one server.

33 34

1978 - Zip Web Programming Tools

• Created by Abraham Lempel and • Microsoft FrontPage, Jacob Ziv. Adobe DreamWeaver • Basis for Winzip. • ASP.Net • Improved the ability to transmit large • XHTML amounts of data. • JavaScript • All WWW programming standards are defined by W3C

35 36

6 Flash Technology Internet Threats

Virus • Introduced in 1996. • Adds animation and interactivity to web Trojan- Horse pages. • swf extensions.

Worm

37 38

The First Viruses The Jerusalem Virus

• “Elk Cloner” (1982) by Richard Skrenta. • A DOS file virus first detected in Jerusalem, Israel, in October 1987.

39 40

Anti-Viruses – since 1987 Threats over the Network - Examples • 1987 - European Bernt Fix. • Today – McAfee VirusScan and Norton AntiVirus

IP Spoofing

Stealth of Data

Denial of Service

41 42

7 Firewalls Firewall’s activity

• Placed between networks of different security IP Level Creating level or trust. Access VPN Control

Application level Authentication filtering

43 44

IP Level Access Control - Creating VPN Packet Filtering Creating VPN

• Scanning of every packet according to a rules London New York table. Branch office HEAD QUARTERS

Firewall Firewall

Internet

User User

45 46

Internet Opportunities Software Customer Services

• Software customer services • Automatic Software Updates. • Instant messaging • Long term service & maintenance. • VoIP, Video. • File sharing applications • Mobility • Commercial Growth • Web 2.0

47 48

8 Instant Messaging Voice/Video Over IP • VoIP is routing of voice conversations over • Typed text communication over the Internet. an IP-based network.

Once upon a time... Today

49 50

File Sharing Applications Internet in mobile

• Napster – 1999. • Accessible in: • Today –eMule, Kaazaetc. – Cellular phones –PDAs, Palms – iPAQs

51 52

Commercial Growth Web 2.0

• Commercialism through the net. • Second generation of web-based communities • Automatic customer service. and services which facilitate collaboration and sharing between users. • People can upload as well as download. • Examples: – Wikipedia – Facebook

53 54

9 Second Life References

• 3-D Virtual world built by it’s residents. • http://en.wikipedia.org/wiki/ • http://www.warbaby.com/FG_test/Timeline.html • http://www.livinginternet.com/e/ei.htm • http://www.schoolnet.ca/aboriginal/lessons/archi e-e.html • http://www.google.com/corporate/history.html • http://searchenginewatch.com/showPage.html?p age=2156451 • http://searchwebservices.techtarget.com/sDefinit ion/0,,sid26_gci211854,00.html

55 56

References References

• http://www.usenix.org/events/usenix99/full • http://www.findmyhosting.com/bandwidth.h _papers/wilson/wilson_html/node4.html tm • http://www.pc-history.org/pc-virus.htm • http://inventors.about.com/library/inventors • http://www.bls.gov/oco/cg/cgs055.htm /bltelephone.htm • http://www2.rad.com/networks/2005/mode • http://www.liv.ac.uk/webteam/glossary/ ms/history.htm • http://www.computer.org/portal/cms_docs_ ieeecs/ieeecs/about/history/timeline.pdf

57 58

Backups..

Thank You!

59 60

10 Application Level Filtering - Security Technologies - Firewalls Statefull Firewall

Intranet External Web Web Server Server • Statefull inspection - Application level User filtering. Firewall Internal Network Internet • Dynamic changes in the rule table.

61 62

FTP Application Example FTP Application Example

User initiates a control channel

User initiates a Firewall initiates a control channel control channel

Internal Internal Network Network Firewall Internet Internet

By adding dynamicStatic ruletable – blocks Server initiates a the transmissioncommunication is allowed from transmission channel the outside Server initiates a transmission channel

63 64

Firewall Usage - NAT 212.143.162.158

10.0. 0.17 10.0. 0.13 10.0. 0.212

Public IPs 64.236.16.11 10.0.10.1

Firewall 10.0. 0.7 10.0. 0.9

212.143.162.158:80 10.0.0.17:X

212.143.162.158:80 64.236.16.11:Y 212.143.162.158:80 64.236.16.11:Y

212.143.162.158:80 10.0.0.17:X

65

11