12-1 Last time Security in Networks Threats in Networks.

Slides:



Advertisements
Similar presentations
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Advertisements

Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
FIREWALLS Chapter 11.
Chapter 19: Computer and Network Security Techniques Business Data Communications, 6e.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Fall 2008CS 334: Computer Security1 Firewalls Special Thanks to our friends at The Blekinge Institute of Technology, Sweden for providing the basis for.
Intrusion Detection Systems By: William Pinkerton and Sean Burnside.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
System and Network Security Practices COEN 351 E-Commerce Security.
Firewalls and Intrusion Detection Systems
Intrusion Detection Systems and Practices
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
DIYTP Computer Security – Virus Scanners  Works in two ways:  List of known ‘bad’ files  Suspicious activity  Terminate and Stay Resident (TSR)
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Department Of Computer Engineering
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Computer Security Fundamentals by Chuck Easttom Chapter 9: Computer Security Software.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
FIREWALL Mạng máy tính nâng cao-V1.
COEN 252 Computer Forensics
Chapter 6: Packet Filtering
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
FIREWALLS Prepared By: Hilal TORGAY Uğurcan SOYLU.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
1 CHAPTER 2 LAWS OF SECURITY. 2 What Are the Laws of Security Client side security doesn’t work Client side security doesn’t work You can’t exchange encryption.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
Firewall Security.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Intrusion Detection Reuven, Dan A. Wei, Li Patel, Rinku H.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Network Security Terms. Perimeter is the fortified boundary of the network that might include the following aspects: 1.Border routers 2.Firewalls 3.IDSs.
Role Of Network IDS in Network Perimeter Defense.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Lecture 9 Page 1 CS 236 Online Firewalls What is a firewall? A machine to protect a network from malicious external attacks Typically a machine that sits.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
EN Lecture Notes Spring 2016
Click to edit Master subtitle style
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Introduction to Networking
Firewalls.
Firewalls Purpose of a Firewall Characteristic of a firewall
دیواره ی آتش.
Firewalls.
Firewalls Chapter 8.
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

12-1 Last time Security in Networks Threats in Networks

12-2 This time Security in Networks Network Security Controls Firewalls Honeypots Intrusion Detection Systems

12-3 Script Kiddies For all of the discussed attacks, exploit code and complete attack scripts are available on the Internet Script kiddies can download scripts and raise an attack with minimum effort There are even tools that allow easy building of individual attacks based on existing exploits

12-4 Network Security Controls Design and implementation Architecture Access controls Firewalls Honeypots Intrusion Detection Systems Cryptographic mechanisms (see later)‏

12-5 Design and Implementation Use controls against security flaws in programs that we talked about earlier Always check inputs, don’t ever trust input from a client Use a white list of allowed characters, not a black list of forbidden ones

12-6 Segmentation and Separation Don’t provide all a company’s servers on a single machine Deploy them on multiple machines, depending on their functional and access requirements If a machine gets broken into, only some services will be affected E.g., the web server of a company needs to be accessible from the outside and is more vulnerable Therefore, it shouldn’t be trusted by other servers of the company, and it should be deployed outside the company firewall (see later)‏

12-7 Redundancy Avoid single points of failure Even if you don’t have to worry about attackers Disk crash, power failure, earth quake,… (Important) servers should be deployed in a redundant way on multiple machines, ideally with different software to get diversity and at different locations Redundant servers should be kept in (close) sync so that backup servers can take over easily Test this! Keep backup copies at a safe place in case you get hit by Murphy’s law

12-8 Access Controls ACLs on routers All traffic to a company typically goes through a single (or a few) routers In case of flooding attack, define router ACL that drops packets with particular source and destination address ACLs are expensive for high-traffic routers Difficult to gather logs for forensics analysis Source addresses of packets in flood are typically spoofed and dynamic Firewalls Firewalls have been designed to filter traffic, maybe based on other criteria than just packet addresses

12-9 Firewalls

12-10 Firewalls Firewalls are the castles of the Internet age All traffic into/out of a company has to go through a small number of gates (choke points)‏ Modem pool should be outside of firewall Choke points carefully examine traffic, especially incoming, and might refuse it access Two strategies: “permit everything unless explicitly forbidden” or “forbid everything unless explicitly allowed” Company firewalls do not protect against attacks on company hosts that originate within the company Need multiple layers of defense / defense in depth

12-11 Types of Firewalls Packet filtering gateways / screening routers Stateful inspection firewalls Application proxies Personal firewalls Firewalls are attractive targets for attackers, they (except personal ones) are typically deployed on designated computers that have been stripped of all unnecessary functionality to limit attack surface

12-12 Packet Filtering Gateways Simplest type Make decision based on header of a packet Header contains source and destination addresses and port numbers, port numbers can be used to infer type of packet 80 -> Web, 22 -> SSH E.g., allow Web, but not SSH Ignore payload of packet Can drop spoofed traffic UW’s firewall could drop all packets originating from UW whose source address is not of the form x.y And traffic originating from outside of UW whose source address is of the form x.y Does this eliminate spoofed traffic completely?

12-13 Stateful Inspection Firewalls More expensive Keep state to identify packets that belong together When a client within the company opens a TCP connection to a server outside the company, firewall must recognize response packets from server and let (only) them through Some application-layer protocols (e.g., FTP) require additional (expensive) inspection of packet content to figure out what kind of traffic should be let through IP layer can fragment packets, so firewall might have to re-assemble packets for stateful inspection

12-14 Application Proxy Client talks to proxy, and proxy talks to actual server Specific for an application ( , Web,…)‏ Not as transparent as packet filtering or stateful inspection Intercepting proxy requires no explicit configuration by client (or knowledge of this filtering by client)‏ All other traffic is blocked For users within the company wanting to access a server outside the company and vice versa Proxy has full knowledge about communication and can do sophisticated processing Limit types of allowed database queries, filter URLs, log all s, scan for viruses Can also do strong user authentication

12-15 Personal Firewalls Firewall that runs on a (home) user’s computer Especially important for computers that are always online Typically “forbid everything unless explicitly allowed” Definitely for communication originating from other computers Maybe also for communication originating on the user’s computer Why? What’s the problem here? Protect against attacks on servers running on computer Servers that are running unnecessarily (e.g., Windows XP before SP 1 suffered from this)‏ Servers that are wrongly configured and that allow access from other computers (or that cannot be configured to disallow this)‏ Servers that have a remotely exploitable bug

12-16 Honeypots / Honeynets Set up an (unprotected) computer or an entire network as a trap for an attacker System has no production value, so any activity is suspicious Any received is considered spam Observe attacker to learn about new attacks, to identify and stop attacker, or to divert attacker from attacking real system Obviously, attacker should not be able to learn that attacked system is a honeypot/-net Cat-and-mouse game Also, attacker might be able to use honeypot/-net to break into real system

12-17 Intrusion Detection Systems (IDSs)‏ Firewalls do not protect against inside attackers or insiders making mistakes and can be subverted IDSs are next line of defense Monitor activity to identify malicious or suspicious events Receive events from sensors Store and analyze them Take action if necessary Host-based and network-based IDSs Signature-based and heuristic/anomaly-based IDSs

12-18 Host-Based and Network-Based IDSs Host-based IDSs Run on a host to protect this host Can exploit lots of information (packets, disk, memory,… )‏ Miss out on information available to other (attacked) hosts If host gets subverted, IDS likely gets subverted, too Network-based IDSs Run on dedicated node to protect all hosts attached to a network Have to rely on information available in monitored packets Typically more difficult to subvert Distributed IDSs combine the two of them

12-19 Signature-Based IDSs Each (known) attack has its signature E.g., many SYNs to ports that are not open could be part of a port scan Signature-based IDSs try to detect attack signatures Fail for new attacks or if attacker manages to modify attack such that its signature changes Polymorphic worms Might exploit statistical analysis

12-20 Heuristic/Anomaly-Based IDSs Look for behavior that is out of the ordinary By modeling good behavior and raising alert when system activity no longer resembles this model Or by modeling bad behavior and raising alert when system activity resembles this model All activity is classified as good/benign, suspicious, or unknown Over time, IDS learns to classify unknown events as good or suspicious Maybe with machine learning

12-21 Example: Tripwire Anomaly-based IDS, detects file modifications Initially, compute digital fingerprint of each file and store fingerprints at a safe place Periodically, re-compute fingerprints and compare them to stored ones (Malicious) file modifications will result in mismatches Why is not a good idea to perform the second step directly on the production system?

12-22 IDS Discussion Stealth mode Two network interfaces, one for monitoring traffic, another one for administration and for raising alarms First one has no published address, so it does not exist for routing purposes (passive wiretap)‏ Responding to alarms Type of response depends on impact of attack From writing a log entry to calling a human False positives/negatives Former might lead to real alarms being ignored IDS might be tunable to strike balance between the two In general, an IDS needs to be monitored to be useful

12-23 Recap Security in Networks Network Security Controls Firewalls Honeypots Intrusion Detection Systems

12-24 Next time Internet Application Security and Privacy Basics of cryptography Symmetric-key encryption