An Isolated Network in Support of an Advanced Networks and Security Course LTC Curtis A. Carver Jr. LTC John M.D. Hill Dr. Udo W. Pooch.

Slides:



Advertisements
Similar presentations
1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Advertisements

Educating System Testers in Vulnerability Analysis: Laboratory Development and Deployment Leonardo A. Martucci, Hans Hedbom, Stefan Lindskog, and Simone.
Condor use in Department of Computing, Imperial College Stephen M c Gough, David McBride London e-Science Centre.
Citrix Secure Gateway v1.1 Technical Presentation August 2002 Technical Presentation August 2002.
High Availability in Hurricane Alley Multi-site multi-node CAS Deep in the Heart of Texas Srinivas Varadaraj & Bill Thompson Jasig Sakai Conference1.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Department of Electrical Engineering and Computer Science United States Military Academy, West Point, New York Department of Computer Science Texas A&M.
DARPA OASIS PI Meeting – Santa Fe – July 24-27, 2001Slide 1 Aegis Research Corporation Not for Public Release Survivability Validation Framework for Intrusion.
Computer Security II Lecturer – Lynn Ackler – Office – CSC 222 – Office Hours 9:00 – 10:00 M,W Course – CS 457 – CS 557.
Emerging Curriculum Issues in Digital Libraries MAJ(P) Curtis A. Carver Jr. LTC John M.D. Hill Udo W. Pooch.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
Supervision of Production Computers in ALICE Peter Chochula for the ALICE DCS team.
Rendezvous – a DIY VPN (profiting from mobile access to the enterprise) Rendezvous Server ET bjecvalu O.
Web Server Hardware and Software
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
Introduction to Network Administration. Objectives.
Security Issues on Distributed Systems 7 August, 1999 S 1 Prepared by : Lorrien K. Y. Lau Student I.D. : August 1999 The Chinese University.
Lesson 19: Configuring Windows Firewall
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
Tripwire Enterprise Server – Getting Started Doreen Meyer and Vincent Fox UC Davis, Information and Education Technology June 6, 2006.
Appliance Firewalls A Technology Review By: Brent Huston T h e B l a c k H a t B r i e f i n g s July 7-8, 1999 Las Vegas.
IT:Network:Microsoft Applications
Avanade: 10 tips for å sikring av dine SQL Server databaser Bernt Lervik Infrastructure Architect Avanade.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
LINUX Security, Firewalls & Proxies. Course Title Introduction to LINUX Security Models Objectives To understand the concept of system security To understand.
Copyright © 2002 ProsoftTraining. All rights reserved. Operating System Security.
1 Creating a Virtual Laboratory to Teach Information Assurance Courses Online Dr. Wayne Summers & Dr. Bhagyavati Columbus State University Columbus, Georgia.
Introduction to VMware Virtualization
CPMT 1451 IT Essentials: PC Hardware and Software ITCC 1301 Cisco Exploration 1: Network Fundamentals ITCC 1304 Cisco Exploration 2: Routing Protocols.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
The Open Source Virtual Lab: a Case Study Authors: E. Damiani, F. Frati, D. Rebeccani, M. Anisetti, V. Bellandi and U. Raimondi University of Milan Department.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.1 Module 6 Introduction to Network Administration.
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
Network Security Management Tools. MCNS—Network Security Management Tools—17-2 Copyright  1998, Cisco Systems, Inc. Objectives Describe security vulnerability.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
Firewall Security.
The Intranet.
Data Communications and Networks Chapter 10 – Network Hardware and Software ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
Defense in Depth. 1.A well-structured defense architecture treats security of the network like an onion. When you peel away the outermost layer, many.
Virtualization Technology and Microsoft Virtual PC 2007 YOU ARE WELCOME By : Osama Tamimi.
Speaker:Chiang Hong-Ren An Investigation and Implementation of Botnet Detection Schemes.
R. Krempaska, October, 2013 Wir schaffen Wissen – heute für morgen Controls Security at PSI Current Status R. Krempaska, A. Bertrand, C. Higgs, R. Kapeller,
TS workshop 2004U. Epting, M.C. Morodo Testa - TS department1 Improving Industrial Process Control Systems Security Uwe Epting (TS/CSE) Maria Carmen Morodo.
COSC513 Final Project Firewall in Internet Security Student Name: Jinqi Zhang Student ID: Instructor Name: Dr.Anvari.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Methods to overcome corporate firewall restrictions
(A CORPORATE NETWORK APPROACH)
OpenLabs Security Laboratory
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
Networks Software.
ISMS Information Security Management System
Using An Isolated Network to Teach Advanced Networks and Security
Curtis A. Carver Jr., John M.D. Hill, John R. Surdu, and Udo W. Pooch
{ Security Technologies}
Presentation transcript:

An Isolated Network in Support of an Advanced Networks and Security Course LTC Curtis A. Carver Jr. LTC John M.D. Hill Dr. Udo W. Pooch

Copyright © 2000 Curtis Arthur Carver, Jr., and John Mitchell Duval Hill. All Rights Reserved. This document may freely be reproduced provided that it is distributed intact and includes the copyright statement and this requirement. References to cited authors available upon request. Contact 3/16/00Presented to the 13th Annual Federal Information System Security Education Association (FISSEA) Conference2 Agenda Introduction Lab Architecture – Black Components (attacking computers) – Gold Components (attacked computers) – Grey Components (research systems) Issues in Building an Isolated Lab Questions and Conclusions

Copyright © 2000 Curtis Arthur Carver, Jr., and John Mitchell Duval Hill. All Rights Reserved. This document may freely be reproduced provided that it is distributed intact and includes the copyright statement and this requirement. References to cited authors available upon request. Contact 3/16/00Presented to the 13th Annual Federal Information System Security Education Association (FISSEA) Conference3 Introduction Texas A&M University has been teaching a graduate class in Computer Security since The class utilizes an isolated network security lab to prove a cooperative, active learning opportunity for the students. The purpose of the class is to teach students about network security in an active learning environment. The purpose the security lab is to isolate the effects of this active learning from the rest of the campus and departmental networks.

Copyright © 2000 Curtis Arthur Carver, Jr., and John Mitchell Duval Hill. All Rights Reserved. This document may freely be reproduced provided that it is distributed intact and includes the copyright statement and this requirement. References to cited authors available upon request. Contact 3/16/00Presented to the 13th Annual Federal Information System Security Education Association (FISSEA) Conference4 Introduction (continued) The lab is isolated by a combinations of hardware and software safeguards: – All components of the lab connect to a single router. – The routers gateway is through a proxy firewall server. Students can access the lab remotely only by logging into the firewall.

Lab Architecture Hell 1 Hell 2 Hell 3 Hell 4 Black Switch Gold Switch Router Firewall Gray Switch Heaven Arcadia Utopia Gabriel Limbo Grey 1 Hell 5 Boot Server Grey 2Grey 3 Grey 4 Grey 5

Copyright © 2000 Curtis Arthur Carver, Jr., and John Mitchell Duval Hill. All Rights Reserved. This document may freely be reproduced provided that it is distributed intact and includes the copyright statement and this requirement. References to cited authors available upon request. Contact 3/16/00Presented to the 13th Annual Federal Information System Security Education Association (FISSEA) Conference6 Black Components These are the student attack platforms. Each student team has access to a SPARC workstation and personal computer that is configured to run both Window NT and LINUX. This allows the students to attack using three different operating systems. Student teams have complete configuration control over their attack platform and may enable or disenable whatever services they desire.

Copyright © 2000 Curtis Arthur Carver, Jr., and John Mitchell Duval Hill. All Rights Reserved. This document may freely be reproduced provided that it is distributed intact and includes the copyright statement and this requirement. References to cited authors available upon request. Contact 3/16/00Presented to the 13th Annual Federal Information System Security Education Association (FISSEA) Conference7 Gold Components These components are generally the systems the students are attacking. There are some Gold component systems that are off-limits (St Peter, Boot Server). There are some components that can be attacked that the students do not know about (Gabriel).

Copyright © 2000 Curtis Arthur Carver, Jr., and John Mitchell Duval Hill. All Rights Reserved. This document may freely be reproduced provided that it is distributed intact and includes the copyright statement and this requirement. References to cited authors available upon request. Contact 3/16/00Presented to the 13th Annual Federal Information System Security Education Association (FISSEA) Conference8 Gold Components (continued) The remaining systems present a variety of operating systems with different levels of security: – Limbo SunOS 2.4 system with no security patches. – Utopia is Solaris 2.5 system with the latest security patches and standard services. – Xanadu is a hardened server with the latest security patches and limited access.

Copyright © 2000 Curtis Arthur Carver, Jr., and John Mitchell Duval Hill. All Rights Reserved. This document may freely be reproduced provided that it is distributed intact and includes the copyright statement and this requirement. References to cited authors available upon request. Contact 3/16/00Presented to the 13th Annual Federal Information System Security Education Association (FISSEA) Conference9 Gold Components (continued) Heaven is a Window NT and HTTP server with the latest patches applied. Arcadia is a Linux server. Gabriel is a remote logging station.

Copyright © 2000 Curtis Arthur Carver, Jr., and John Mitchell Duval Hill. All Rights Reserved. This document may freely be reproduced provided that it is distributed intact and includes the copyright statement and this requirement. References to cited authors available upon request. Contact 3/16/00Presented to the 13th Annual Federal Information System Security Education Association (FISSEA) Conference10 Grey Components These components are research systems that can be used to develop and analyze security systems in a hostile environment. As an example, they are currently being used to evaluate intrusion detection systems that feature active intrusion response mechanisms.

Copyright © 2000 Curtis Arthur Carver, Jr., and John Mitchell Duval Hill. All Rights Reserved. This document may freely be reproduced provided that it is distributed intact and includes the copyright statement and this requirement. References to cited authors available upon request. Contact 3/16/00Presented to the 13th Annual Federal Information System Security Education Association (FISSEA) Conference11 Additional Security Tools Employed Tiger – vulnerability scanner Tripwire – Integrity checker TCPWrapper – network protocol tool

Copyright © 2000 Curtis Arthur Carver, Jr., and John Mitchell Duval Hill. All Rights Reserved. This document may freely be reproduced provided that it is distributed intact and includes the copyright statement and this requirement. References to cited authors available upon request. Contact 3/16/00Presented to the 13th Annual Federal Information System Security Education Association (FISSEA) Conference12 Issues Delineation of lab and real world activities. Protection of the network lab so that it cannot be used to launch attacks outside of the lab. The high maintenance cost of providing a mix of operating systems at different levels of security.

Copyright © 2000 Curtis Arthur Carver, Jr., and John Mitchell Duval Hill. All Rights Reserved. This document may freely be reproduced provided that it is distributed intact and includes the copyright statement and this requirement. References to cited authors available upon request. Contact 3/16/00Presented to the 13th Annual Federal Information System Security Education Association (FISSEA) Conference13 Questions and Conclusions