Virus 18/11/2018.

Slides:



Advertisements
Similar presentations
Network Security Essentials Chapter 11
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
FIREWALLS Chapter 11.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Cosc 4765 Network Security: Routers, Firewall, filtering, NAT, and VPN.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Firewall Configuration Strategies
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
Guide to Computer Network Security
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
NW Security and Firewalls Network Security
Intranet, Extranet, Firewall. Intranet and Extranet.
IP Ports and Protocols used by H.323 Devices Liane Tarouco.
“DMZ In a Box”. What is a DMZ? As a military term As a computing term.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
October 15, 2002Serguei A. Mokhov, 1 Intro to Internet-services from Security Standpoint SOEN321-Information-Systems Security Revision.
CIS 450 – Network Security Chapter 3 – Information Gathering.
Network Firewall Technologies By: David W Chadwick Implementing a Distributed Firewall By: Sotiris Ioannidis Angelos D. Keromytis Steve M. Bellovin Jonathan.
_______________________________________________________________________________________________________________ E-Commerce: Fundamentals and Applications1.
Crossing firewalls Liane Tarouco Leandro Bertholdo RNP POP/RS.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 Firewalls G53ACC Chris Greenhalgh. 2 Contents l Attacks l Principles l Simple filters l Full firewall l Books: Comer ch
Firewall – Survey Purpose of a Firewall – To allow ‘proper’ traffic and discard all other traffic Characteristic of a firewall – All traffic must go through.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
The Intranet.
COEN 350 Network Defense in Depth Firewalls. Terms of the Trade Border Router First / last router under control of system administration. DMZ Demilitarized.
Firewalls and proxies Unit objectives
Security fundamentals Topic 10 Securing the network perimeter.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Firewall Matthew Prestifilippo, Bill Kazmierski, Pat Sparrow.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
1 CNLab/University of Ulsan Chapter 19 Firewalls  Packet Filtering Firewall  Application Gateway Firewall  Firewall Architecture.
Chapter 26: Network Security Dr. Wayne Summers Department of Computer Science Columbus State University
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Defining Network Infrastructure and Network Security Lesson 8.
Firewalls Definition: Device that interconnects two or more networks and manages the network traffic between those interfaces. Maybe used to: Protect a.
Security fundamentals
CompTIA Security+ Study Guide (SY0-401)
The Intranet.
NET 536 Network Security Firewalls and VPN
Why do we need Firewalls?
Internet and Intranet.
Firewalls.
Network Security Marshall Leitem 11/30/04
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Welcome To : Group 1 VC Presentation
CompTIA Security+ Study Guide (SY0-401)
Internet and Intranet.
6.6 Firewalls Packet Filter (=filtering router)
Guide to Computer Network Security
Chapter 26: Network Security
Firewalls Purpose of a Firewall Characteristic of a firewall
FIREWALL By Abhishar Baloni I.D
Firewalls Jiang Long Spring 2002.
Internet and Intranet.
AbbottLink™ - IP Address Overview
Introduction to Network Security
Internet and Intranet.
Implementing Firewalls
Presentation transcript:

Virus 18/11/2018

Memory-resident virus Runs whenever certain interrupts occur. 18/11/2018

Encrypted virus To conceal signature. 18/11/2018

Unix address space Low address Program Statically allocated data Stack High address 18/11/2018

Procedure call E.g., finger aabbcc aa bb cc Buffer area allocated by called fingerd (512 bytes) [PC] ret Return address para2 para1 Stack High address 18/11/2018

Buffer overflow E.g., finger aabb…zz zz aa bb cc … Malicious program (binary) [PC] zz Return address para2 para1 Stack 18/11/2018

Epidemic Worm Bootstrap proper Worm proper New victim Infested machine rsh attack Worm proper Bootstrap finger attack sendmail attack Upload request Worm proper New victim Infested machine 18/11/2018

Firewall location Internet Intranet Intranet Packet filter and/or - Application gateway 18/11/2018

Typical configurations DMZ 18/11/2018

(a) Filtering router Mail server (port=25) Filtering router Internet Intranet 18/11/2018

Filtering router implementation Action Our host Port Their host Block * SPIGOT Allow Our-MailServ 25 Our-WebServ 80 18/11/2018

(b) Filtering router and Bastion host Internet Protected Intranet Router only permits traffic to/from bastion host 18/11/2018

(c) Demilitarized Zone (DMZ) Modem access Bastion host Protected intranet inside router Internet outside router Web server DMZ 18/11/2018

HTTP proxy 18/11/2018

Local HTTP proxy Proxy Server Internet (B) HTTP (A) Proxy HTTP www.company.com:80 Client is configured to use proxy HTTP via (B). (B) Sends GET page.html to http://www.company.com/ on behalf of (A). 18/11/2018

RMI thru firewall HTTP server Internet RMI server client_stub port POST “data” to www.company.com:80/cgi-bin/ java-rmi.cgi?forward=<rmiServerPort> 18/11/2018

Private network 18/11/2018

Hybrid network 18/11/2018

Virtual private network 18/11/2018

Addressing in a VPN 18/11/2018

Tunneling 18/11/2018

Virtual Private Network (VPN) Internet Intranet B Intranet A Tunneling Router RA Router RB RB 200 Data Station 200 Station 100 encrypted 18/11/2018