Copyright © 1995-2007 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.

Slides:



Advertisements
Similar presentations
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Advertisements

Guide to Network Defense and Countermeasures Second Edition
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Cosc 4765 Network Security: Routers, Firewall, filtering, NAT, and VPN.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Module 5: Configuring Access for Remote Clients and Networks.
Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Firewall Configuration Strategies
Firewalls and Intrusion Detection Systems
Chapter 12 Network Security.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Nine –
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Firewall Slides by John Rouda
Norman SecureSurf Protect your users when surfing the Internet.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
1 Guide to Network Defense and Countermeasures Chapter 2.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Internet Security facilities for secure communication.
Honeypot and Intrusion Detection System
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Security at NCAR David Mitchell February 20th, 2007.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Network Security Threats KAMI VANIEA 18 JANUARY KAMI VANIEA 1.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Chapter 5 Electronic Commerce | Security Threats - Solution
Instructor Materials Chapter 7 Network Security
Chapter 5 Electronic Commerce | Security Threats - Solution
Firewalls.
Chap 10 Malicious Software.
Firewalls Routers, Switches, Hubs VPNs
Lecture 3: Secure Network Architecture
Chap 10 Malicious Software.
Presentation transcript:

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture notes Fall 2007 Dr. Clifford Neuman University of Southern California Information Sciences Institute

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Announcements Mid-term Grading Complete –Grades posted –Papers available on Monday. ▪See TA’s in office hours for any issues with grading. Dr. Neuman’s Office hours –Back to Normal Friday 12:50-1:50

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Lecture 9 – 26 October 2007 Malicious Code Continued and Countermeasures Dr. Clifford Neuman University of Southern California Information Sciences Institute

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Zombies/Bots/Botnets Machines controlled remotely –Infected by virus, worm, or trojan –Can be contacted by master –May make calls out so control is possible even through firewall. –Often uses IRC for control. –Storm Worm

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Spyware Infected machine collect data –Keystroke monitoring –Screen scraping –History of URL’s visited –Scans disk for credit cards and password. –Allows remote access to data. –Sends data to third party.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Theory Can not detect a virus by determining whether a program might perform a particular activity. –Reduction from the Halting Problem But can apply heuristics

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Defenses to Malicious Code Detection –Signature based –Activity based Prevention –Prevent most instances of memory used as both data and code

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Defenses to Malicious Code Sandbox –Limits access of running program –So doesn’t have full access or even users access. Detection of modification –Signed executables –Tripwire or similar Statistical detection

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Root Kits Hide traces of infection or control –Intercept systems calls –Return false information that hides the malicious code. –Returns fall information to hide effect of malicious code. –Some root kits have countermeasures to attempts to detect the root kits. –Blue pill makes itself hyper-root

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Best Detection is from the Outside Platform that is not infected –Look at network packets using external device. –Mount disks on safe machine and run detection on the safe machine. –Trusted computing can help, but still requires outside perspective

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Attacks on Availability Denial of service attacks seek to block availability by overloading network, host, or service resources. –Mounted from a single powerful node –Utilizes consequences of protocol features to amplify attacks. –May be originated from many compromised nodes scattered across the network (Distributed Denial of Service) 16

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Difficulty Defending against DOS Identification/detection –How to distinguish against slash/dotting (i.e. flash crowds) Even once attack is identified, pushing back require help from other parts of the network. –Blocking at the end point can still leave your connection saturated. –May inadvertently block your legitimate traffic, which is the goal of the attack to begin with. Redundancy can help Best approach is to design protocols so that minimal resources can be consumed until legitimacy of request can be established. 16

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Some Spyware Local Might not ship data, but just uses it –To pop up targeted ads –Spyware writer gets revenue for referring victim to merchant. –Might rewrite URL’s to steal commissions.

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Economics of Malicious Code Controlled machines for sale “Protection” for sale Attack software for sale Stolen data for sale Intermediaries used to convert online balances to cash. –These are the pawns and the ones that are most easily caught

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Security Systems Lecture 9 – October 26, 2007 Countermeasures Dr. Clifford Neuman University of Southern California Information Sciences Institute

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Intrusion Everything Intrusion Prevention –Marketing buzzword –Good practices fall in this category ▪We will discuss network architectures ▪We will discuss Firewalls –Intrusion detection (next week) ▪Term used for networks ▪But applies to host as well –Tripwire –Virus checkers –Intrusion response (part now, part next week) ▪Evolving area –Anti-virus tools have a response component –Can be tied to policy tools 16

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Architecture: A first step Understand your application –What is to be protected –Against which threats –Who needs to access which apps –From where must the access it Do all this before you invest in the latest products that salespeople will say will solve your problems. 16

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE What is to be protected Is it the service or the data? –Data is protected by making it less available –Services are protected by making them more available (redundancy) –The hardest cases are when one needs both. 16

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Classes of Data Decide on multiple data classes –Public data –Customer data –Corporate data –Highly sensitive data (not total ordering) These will appear in different parts of the network 16

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Classes of Users Decide on classes of users –Based on the access needed to the different classes of data. You will architect your system and network to enforce policies at the boundaries of these classes. –You will place data to make the mapping as clean as possible. You will manage the flow of data 16

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Example Where will you place your companies public web server, so that you can be sure an attacker doesn’t hack your site and modify your front page? Where will you place your customer’s account records so that they can view them through the web? –How will you get updates to these servers? 16

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Other Practices Run Minimal Systems –Don’t run services you don’t need Patch Management –Keep your systems up to date on the current patches –But don’t blindly install all patches right away either. Account management –Strong passwords, delete accounts when employees leave, etc. Don’t rely on passwords alone 16

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE How to think of Firewalled Network Crunchy on the outside. Soft and chewy on the inside. –Bellovin and Merrit 16

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Firewalls Packet filters –Stateful packet filters ▪Common configuration Application level gateways or Proxies –Common for corporate intranets Host based software firewalls –Manage connection policy Virtual Private Networks –Tunnels between networks –Relationship to IPsec 16

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Packet Filter Most common form of firewall and what one normally thinks of Rules define what packets allowed through –Static rules allow packets on particular ports and to and from outside pairs of addresses. –Dynamic rules track destinations based on connections originating from inside. –Some just block inbound TCP SYN packets 16

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Network Address Translation Many home firewalls today are NAT boxes –Single address visible on the outside –Private address space (net 10, ) on the inside. Hides network structure, hosts on inside are not addressable. –Box maps external connections established from inside back to the private address space. Servers require persistent mapping and manual configuration. –Many protocols, including attacks, are designed to work through NAT boxes. 16

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Application FW or Proxies No direct flow of packets –Instead, connect to proxy with application protocol. –Proxy makes similar request to the server on the outsdide. Advantage –Can’t hide attacks by disguising as different protocol. –But can still encapsulate attack. Disadvantage –Can’t do end to end encryption or security since packets must be interpreted by the proxy and recreated. 16

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Host Based Firewalls Each host has its own firewall. –Closer to the data to be protected –Avoids the chewy on the inside problem in that you still have a boundary between each machine and even the local network. Problems –Harder to manage –Can be manipulated by malicious applications. 16

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Virtual Private Networks Extend perimeter of firewalled networks –Two networks connected –Encrypted channel between them –Packets in one zone tunneled to other and treated as originating within same perimeter. Extended network can be a single machine –VPN client tunnels packets –Gets address from VPN range –Packets encrypted in transit over open network 16

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE IPSec IP Security (IPsec) and the security features in IPv6 essentially move VPN support into the operating system and lower layers of the protocol stack. Security is host to host, or host to network, or network to network as with VPN’s –Actually, VPN’s are rarely used host to host, but if the network had a single host, then it is equivalent. 16

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Attack Paths Many attacks today are staged from compromised machines. –Consider what this means for network perimeters, firewalls, and VPN’s. A host connected to your network via a VPN is an unsecured perimeter –So, you must manage the endpoint even if it is your employees home machine. 16

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Defense in Depth One should apply multiple firewalls at different parts of a system. –These should be of different types. Consider also end to end approaches –Data architecture –Encryption –Authentication –Intrusion detection and response 16

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Protecting the Inside Firewalls are better at protecting inward threats. –But they can prevent connections to restricted outside locations. –Application proxies can do filtering for allowed outside destinations. –Still need to protect against malicious code. Standalone (i.e. not host based) firewalls provide stronger self protection. 16

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Virus Checking Signature based –Looks for known indicators in files –Real-time checking causes files to be scanned as they are brought over to computer (web pages, messages) or before execution. –On server and client Activity based –Related to firewalls, if look for communication –Alert before writing to boot sector, etc. Defenses beyond just checking –Don’t run as root or admin 16

Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Current Event ITIT: Storm Worm Strikes Back at Security ProsStorm Worm Strikes Back at Security Pros Posted by ScuttleMonkey on Wednesday October from the skynet-worm dept.ScuttleMonkey alphadogg writes "The Storm worm, which some say is the world's biggest botnet despite waning in recent months, is now fighting back against security researchers that seek to destroy it and has them running scared, conference attendees in NYC heard this week. The worm can figure out which users are trying to probe its command-and-control servers, and it retaliates by launching DDoS attacks against them, shutting down their Internet access for days, says an IBM architect."fighting back