Network Security: IP Spoofing and Firewall

Slides:



Advertisements
Similar presentations
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
Advertisements

Intrusion Detection and Hackers Exploits IP Spoofing Attack Yousef Yahya & Ahmed Alkhamaisa Prepared for Arab Academy for Banking and Financial Sciences.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
1 Pertemuan 05 Firewall Matakuliah: H0451/Praktikum Jaringan Komputer Tahun: 2006 Versi: 1/0.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Network Security (Firewall) Instructor: Professor Morteza Anvari Student: Xiuxian Chen ID: Term: Spring 2001.
Network Components 101 Travis Hill.
1 Guide to Network Defense and Countermeasures Chapter 2.
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
FIREWALLS Prepared By: Hilal TORGAY Uğurcan SOYLU.
Windows 7 Firewall.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Firewall Security.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Firewall Matthew Prestifilippo, Bill Kazmierski, Pat Sparrow.
AQA A2 COMP 3: Internet Security. Lesson Aim By the end of the lesson: By the end of the lesson: Describe different security issues and recommend tools/techniques.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Remote Authentication Dial-In User Service (RADIUS)
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
Presentation on ip spoofing BY
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Defining Network Infrastructure and Network Security Lesson 8.
S ECURITY APPLIANCES Module 2 Unit 2. S ECURE NETWORK TOPOLOGIES A topology is a description of how a computer network is physically or logically organized.
Security fundamentals
Firewall Techniques Matt Cupp.
Port Knocking Benjamin DiYanni.
All You Need to Know About Firewall
Instructor Materials Chapter 7 Network Security
Network Security Marshall Leitem 11/30/04
IT443 – Network Security Administration Instructor: Bo Sheng
Computer Data Security & Privacy
Prepared By : Pina Chhatrala
Domain 4 – Communication and Network Security
Click to edit Master subtitle style
Introduction to Networking
Firewalls.
Spoofing Basics Presentation developed by A.F.M Bakabillah Cyber Security and Networking Consultant MCSA: Messaging, MCSE RHCE ITIL CEH.
Security in Networking
Digital Pacman: Firewall Edition
* Essential Network Security Book Slides.
Firewalls Routers, Switches, Hubs VPNs
FIREWALL By Abhishar Baloni I.D
IP-Spoofing and Source Routing Connections
Firewalls Jiang Long Spring 2002.
دیواره ی آتش.
Fire-wall.
Firewall.
Firewalls Chapter 8.
AbbottLink™ - IP Address Overview
Introduction to Network Security
FIREWALL.
Intrusion Detection and Hackers Exploits IP Spoofing Attack
Computer Networks Topic 9: Firewalls NCC Education - Title Master.
Hosted Security.
Presentation transcript:

Network Security: IP Spoofing and Firewall By: Jeremy Taylor

Importance of network security in our generation IOT More devices connected to a network Cybercrime/Cyberterrorism General lack of safety precautions by users

Ip spoofing IP Spoofing is a technique used to gain unauthorized access to machines, whereby an attacker illicitly impersonates another machine by manipulating IP packets Involves modifying the packet header with a ‘spoofed’ source IP address, a checksum, and the order value IP spoofing involves solving the algorithm that is used to select the order sent values, and to modify them correctly

Man in the middle When hackers intercept data packets sent from one host to the next Hackers access information sent from one end and alter it before releasing the information to the intended recipient Recipient will receive information different than what was sent Generally used for individuals that are interested in knowing the information shared between the sender and receiver

blinding When a hacker sends an altered sequence of data packets to his target while not sure how data transmission within a network takes place In this attack, the hacker is not aware of how the transmissions takes place on this network so he needs to coax the machine into responding to his own requests so that he can analyze the sequence numbers Now the attacker can inject data into the stream of packets without having authenticated himself when the connection was first established

Non-blinding In this form of attack, the hacker resides in the same network as the target making it easy for him to notice or access transmissions This, as a result, makes it easy for the hacker to tell or understand data sequence After getting access to the data sequence, the cracker can disguise himself and end up hijacking processes that have been established

Service denial This attack is usually done on a large scale denying several systems ability to access services over a network When a DDoS attack is launched, the IP spoofing is used not to identify the exact machines from where the requests are coming This makes the DDoS attack more powerful because, it will be difficult to identify the senders and block them

How to prevent ip spoofing Change authentication procedure: IP spoofing can be prevented by ensuring that there is encryption between hosts or machines that exchange data. Introduce exchange of keys between two systems that will be exchanging information so as to reduce the risk of IP spoofing Introduce Filtering: This filtering should be introduced in a system that plans to prevent IP spoofing especially on outbound and inbound data traffic Switches and router configuration: If your routers allow configuration you should reset them to reject strange data packets that may originate from a source different from the network Deny Private addresses: Configure your system or network to ignore or disallow private IP addresses originating from outside Allow encryption sessions: This should be set in such a way that only authenticated and trusted networks can access and interact with your network. Your router should be set to only allow trusted sources

Firewall A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules Firewalls have been a first line of defense in network security for over 25 years They establish a barrier between secured and controlled internal networks that can be trusted and untrusted outside networks, such as the Internet Can be hardware, software, or both

Types of firewalls Proxy Stateful Inspection UTM NGFW Serves as the gateway from one network to another for a specific application Stateful Inspection Allows or blocks traffic based on state, port, and protocol UTM Typically combines, in a loosely coupled way, the functions of a stateful inspection firewall with intrusion prevention and antivirus NGFW Traditional Most companies are deploying next-generation firewalls to block modern threats such as advanced malware and application-layer attacks Threat-Focused Include all the capabilities of a Traditional NGFW and also provide advanced threat detection and remediation

Firewall configuration Filters IP Addresses If a certain IP address is found to be making too many connections to a server, the administrator may decide to block traffic from this IP using the firewall Domain Names By setting up a domain filter, a company may decide to block all access to certain domain names, or may provide access only to a list of selected domain names Ports/Protocols If the services are intended for the public, they are usually kept open. Otherwise they are blocked using the firewall so as to prevent intruders from using the open ports for making unauthorized connections Specific Words/Phrases You may set up a firewall rule to filter any packet that contains an offensive term or a phrase that you may decide to block from entering or leaving your network

references https://www.iplocation.net/ip-spoofing https://nakedsecurity.sophos.com/2015/06/11/49-busted-in-europe-for-man- in-the-middle-bank-attacks/ https://www.cisco.com/c/en/us/products/security/firewalls/what-is-a- firewall.html https://www.gohacking.com/how-firewalls-work/ https://www.interserver.net/tips/kb/ip-spoofing-types-ip-spoofing/