CITA 352 Chapter 13 Network Protection Systems. Understanding Routers Network protection systems –Routers –Firewalls –Intrusion detection and prevention.

Slides:



Advertisements
Similar presentations
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Advertisements

FIREWALLS Chapter 11.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Security+ Guide to Network Security Fundamentals, Third Edition
Guide to Network Defense and Countermeasures Second Edition
Firewall Configuration Strategies
Guide to Network Defense and Countermeasures Third Edition
Intrusion Detection Systems and Practices
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 5 Network Defenses.
By Edith Butler Fall Our Security Ways we protect our valuables: Locks Security Alarm Video Surveillance, etc.
Hands-On Ethical Hacking and Network Defense
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Computer Security Fundamentals by Chuck Easttom Chapter 9: Computer Security Software.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Chapter 13 Network Protection Systems. Objectives  After reading this chapter and completing the exercises, you will be able to:  Explain how routers.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
COEN 252 Computer Forensics
Hands-On Ethical Hacking and Network Defense Chapter 13 Protecting Networks with Security Devices.
Honeypot and Intrusion Detection System
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Chapter 5: Implementing Intrusion Prevention
Network Security Technologies CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
Firewall Security.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Hands-On Ethical Hacking and Network Defense 2 nd Edition Chapter 13 Protecting Networks with Security Devices Last modified
Firewall Matthew Prestifilippo, Bill Kazmierski, Pat Sparrow.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Role Of Network IDS in Network Perimeter Defense.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
CHAPTER 3 Router CLI Command Line Interface. Router User Interface User and privileged modes User mode --Typical tasks include those that check the router.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
CompTIA Security+ Study Guide (SY0-401)
Click to edit Master subtitle style
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Introduction to Networking
Firewalls.
CompTIA Security+ Study Guide (SY0-401)
Security+ Guide to Network Security Fundamentals, Third Edition
IS4680 Security Auditing for Compliance
CS580 Special Project: IOS Firewall Setup using CISCO 1600 router
Chapter 4: Protecting the Organization
Implementing Firewalls
Presentation transcript:

CITA 352 Chapter 13 Network Protection Systems

Understanding Routers Network protection systems –Routers –Firewalls –Intrusion detection and prevention systems –Web filtering –Honeypots Security appliance –Single device combining two or more protection functions

Understanding Routing Protocols Routers are hardware devices –Used to send packets to different network segments Operate at network layer of OSI model Routing protocols –Link-state routing protocol Router advertises link-state –Distance-vector routing protocol Router passes routing table to all participating routers –Path-vector routing protocol Uses dynamically updated paths or routing tables to transmit packets

Understanding Basic Hardware Routers Cisco routers –Widely used in networking community Millions used by companies around the world Vulnerabilities exist –As they do in any OS –Security professionals must consider the router type when conducting a security test

Cisco Router Components Random access memory (RAM) –Holds router’s running configuration, routing tables, and buffers If turned off, contents stored in RAM are erased Nonvolatile RAM (NVRAM) –Holds router’s configuration file Information is not lost if the router is turned off Flash memory –Holds IOS the router is using –Rewritable memory, so IOS can be upgraded

Cisco Router Components (cont’d.) Read-only memory (ROM) –Contains a minimal version of IOS Used to boot router if flash memory gets corrupted Interfaces –Hardware connectivity points for components of most concern Ethernet port is an interface that connects to a LAN

Cisco Router Configuration Configuration modes: –User mode Administrator can perform basic troubleshooting tests and list information stored on router Indicated by router name followed by > Default mode –Privileged mode Administrator can perform full router configuration tasks Indicated by router name followed by #

Cisco Router Configuration (cont’d.) Modes to configure the router (in privileged mode) –Global configuration mode Configure router settings affecting router operation –Interface configuration mode Administrator can configure an interface on the router

Table 13-1 Cisco commands

Understanding Access Control Lists Several types of access control lists –This section focuses on IP access lists Lists IP addresses, subnets, or networks allowed or denied access through a router’s interface Cisco router access lists –Standard IP access lists –Extended IP access lists

Standard IP Access Lists Can restrict IP traffic entering or leaving a router’s interface based on source IP address –To restrict traffic from Network 3 from entering Network 1, access list looks like: access-list 1 deny access-list permit any Figure 13-1 Applying access lists to router interfaces

Extended IP Access Lists Restricts IP traffic entering or leaving based on: –Source IP address –Destination IP address –Protocol type –Application port number Configuration –Similar to configuring a standard IP access list

Understanding Firewalls Hardware devices with embedded OSs –Controls access to all traffic entering internal network –Controls traffic leaving internal network Hardware firewall advantages: –Usually faster than software firewalls –Can handle larger throughput than software firewalls Hardware firewall disadvantage: –Locked into firewall’s hardware

Understanding Firewalls (cont’d.) Software firewalls advantage: –NICs are easily added to server running firewall software Software firewalls disadvantage: –Configuration problems –Rely on running OS

Understanding Firewall Technology Technologies include: –Network address translation –Access lists –Packet filtering –Stateful packet inspection –Application layer inspection

Network Address Translation Most basic security feature –Internal private IP addresses are mapped to public external IP addresses Hiding internal infrastructure Port Address Translation –Derived from NAT –Allows thousands of internal IP addresses to be mapped to one external IP address

Access Lists Used to filter traffic based on: –Source IP address –Destination IP address –Ports or services Firewalls also use this technology Creating access lists in a firewall –Similar to creating them in a router

Packet Filtering Packet filters –Screen packets based on information contained in packet header Protocol type IP address TCP/UDP port

Stateful Packet Inspection Record session-specific information about a network connection –Including state table Port scans relying on spoofing or sending packets after a three-way handshake are made ineffective Stateful packet filters –Recognize anomalies most routers ignore –Handle each packet on an individual basis Not resistant to spoofing or DoS attacks

Table 13-2 State table example

Application Layer Inspection Inspects network traffic at a higher level in OSI model –Makes sure network traffic’s application protocol is the type allowed by a rule Some application-aware firewalls act as a proxy for all connections –Safety net for servers or clients (or both) Depends on firewall

Implementing a Firewall Placing a firewall between a company’s internal network and the Internet is dangerous –Leaves company open to attack if a hacker compromises the firewall Use a demilitarized zone instead –Adds a layer of defense

Demilitarized Zone Small network –Contains resources a company wants available to Internet users Helps maintain security on internal network Sits between Internet and internal network –Sometimes referred to as a “perimeter network”

Figure 13-2 A DMZ protecting an internal network

Figure 13-3 An additional firewall used to protect the DMZ

Understanding the Cisco Adaptive Security Appliance Firewall Cisco Adaptive Security Appliance (ASA) firewall –One of the most widely used firewalls –Replaced PIX firewall –Added advanced modular features Intrusion detection and prevention More sophisticated application layer inspection

Configuring the ASA Firewall Similar logon prompt as Cisco router –Prompt: If you are not authorized to be in this XYZ Hawaii network device, log out immediately! Username: admin Password: ******** Serves a legal purpose –Prompt after successful log on: Type help or '?' for a list of available commands. ciscoasa>

Configuring the ASA Firewall (cont’d.) After entering correct password –You are in privileged mode To enter configuration mode –Use same command as on a Cisco router configure terminal or configure t Access lists –Used to filter traffic

Using Configuration and Risk Analysis Tools for Firewalls and Routers Center for Internet Security –One of the best Web sites for finding configuration benchmarks and configuration assessment tools Benchmark –Industry consensus of best configuration practices Cisco routers use CIS Cisco IOS Benchmark Cisco ASA firewalls use CIS Benchmark for Cisco Firewall Devices Router Audit Tool (RAT) –Faster and easier to use

Using Configuration and Risk Analysis Tools for Firewalls and Routers (cont’d.) RedSeal –Unique network risk analysis and mapping tool –Identifies configuration vulnerabilities in routers or firewalls –Generates professional-looking reports –Analyzes IPSs and OS vulnerability scans –Shows a graphical representation of vulnerabilities discovered

Figure 13-4 The RedSeal network risk map

Understanding Intrusion Detection and Prevention Systems Monitor network devices –Security administrators can identify attacks in progress and stop them Intrusion detection system (IDS) –Examines traffic and compares it with known exploits Similar to virus software using a signature file to identify viruses Intrusion prevention systems (IPSs) –Similar to IDSs –Also performs an action to prevent the intrusion

Network-Based and Host-Based IDSs and IPSs Network-based IDSs/IPSs –Monitor activity on network segments –Sniff traffic and alerts if something suspicious occurs Host-based IDSs/IPSs –Used to protect a critical network server or database server –Software is installed on server you’re attempting to protect

Network-Based and Host-Based IDSs and IPSs (cont’d.) IDSs are also categorized by how they react when they detect suspicious behavior –Passive systems Don’t take preventative action Send out an alert and log the activity –Active systems Log events and send out alerts Can also interoperate with routers and firewalls

Network-Based and Host-Based IDSs and IPSs (cont’d.) Vendors have started focusing on IPSs –True network-based IPS are installed inline to network infrastructure Traffic has to pass through IPS before going into or out of the network –More capable of stopping malicious traffic –Host-based IPSs operate at the OS (or kernel) level Intercept traffic not allowed by host policy

Network-Based and Host-Based IDSs and IPSs (cont’d.) Network-based IDSs and IPSs are further categorized by the way they detect attacks –Signature detectors Detect malicious activity by using a database of known attack signatures –Anomaly detectors Use a baseline of normal activity and send an alert if activity deviates significantly

Table 13-3 Intrusion detection and prevention systems

Web Filtering Statistically, firewalls and IPSs do a good job of protecting a network from Internet attacks –Hackers know statistics Now using least restricted pathway through a firewall –Target devices allowed access out of the network automatically: user workstations Get internal user to visit a bogus Web site or install malicious code from an attachment Don’t need to break through the firewall Firewall application layer inspection might not detect this kind of attack

Web Filtering (cont’d.) Web filtering is used to detect users’ attempts to access malicious Web sites and block tem –Some block malicious code Before it gets to a user’s workstation Before it connects to an attacker’s control system outside the network Mass compromises are used to initiate drive-by downloads –Web site visitors download malicious code without their knowledge

Security Incident Response Teams Large organizations with sensitive or critical data –Normal administrative expertise isn’t enough to do: Follow up and damage assessment Risk remediation and legal consultation Security incident response team (SIRT) –Permanent team –Responsible solely for security-response functions Ad hoc team –Members normally have other roles –Called in response to a specific incident

Understanding Honeypots Honeypot –Computer placed on network perimeter Contains information to lure and trap hackers Configured to have vulnerabilities –Keeps hackers connected long enough so they can be traced back –Serves as an excellent data collector and early warning system

How Honeypots Work Honeypot appears to have important data or sensitive information stored on it –Could store fake financial data –Hackers will spend time attacking the honeypot Stop looking for real vulnerabilities Enables security to collect data on attackers Available honeypots –Commercial and open-source Virtual honeypots –Created using programming language

Table 13-4 Commercial honeypots

Table 13-5 Open-source honeypots