Chapter 20 Firewalls.

Slides:



Advertisements
Similar presentations
Network Security Essentials Chapter 11
Advertisements

Lecture slides for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 9 “Firewalls and Intrusion Prevention.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Computer Security: Principles and Practice Chapter 9 – Firewalls and Intrusion Prevention Systems.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 9 – Firewalls and.
Firewalls Uyanga Tserengombo
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
FIREWALLS – Chapter 20 network-based threats access to outside world Functionality, Design Security – trusted system.
Winter CMPE 155 Week 7. Winter Assignment 6: Firewalls What is a firewall? –Security at the network level. Wide-area network access makes.
Fall 2008CS 334: Computer Security1 Firewalls Special Thanks to our friends at The Blekinge Institute of Technology, Sweden for providing the basis for.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Lecture 14 Firewalls modified from slides of Lawrie Brown.
Security Firewall Firewall design principle. Firewall Characteristics.
—On War, Carl Von Clausewitz
Chapter 11 Firewalls.
Access Control for Networks Problems: –Enforce an access control policy Allow trust relationships among machines –Protect local internet from outsiders.
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
J. Wang. Computer Network Security Theory and Practice. Springer 2008 Chapter 7 Network Perimeter Security.
5/4/01EMTM 5531 EMTM 553: E-commerce Systems Lecture 7b: Firewalls Insup Lee Department of Computer and Information Science University of Pennsylvania.
Chapter 10 Firewalls. Introduction seen evolution of information systems now everyone want to be on the Internet and to interconnect networks has persistent.
EE579T/10 #1 Spring 2003 © , Richard A. Stanley WPI EE579T Network Security 10: Firewalls Prof. Richard A. Stanley.
Electronic Commerce 2. Definition Ecommerce is the process of buying and selling products and services via distributed electronic media, usually the World.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
Spring 2004 CMPE 151: Network Administration Lecture 6.
Cryptography and Network Security Chapter 20 Fourth Edition by William Stallings.
EE579T/6GD #1 Summer 2003 © , Richard A. Stanley EE579T Network Security 6: Firewalls and Trusted Networks Prof. Richard A. Stanley.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
Network Security (Firewall) Instructor: Professor Morteza Anvari Student: Xiuxian Chen ID: Term: Spring 2001.
A Brief Taxonomy of Firewalls
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
NW Security and Firewalls Network Security
Intranet, Extranet, Firewall. Intranet and Extranet.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Fall 2004CS 395: Computer Security1 Chapter 20: Firewalls Special Thanks to our friends at The Blekinge Institute of Technology, Sweden for providing the.
1 Pertemuan 13 IDS dan Firewall Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Växjö University, Sweden
Chapter 11 Firewalls.
8: Network Management1 Firewalls. 8: Network Management2 Firewalls Two firewall types: m packet filter m application gateways To prevent denial of service.
1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University R355.
Firewalls, etc.. Network Security2 Outline Intro Various firewall technologies: –Static Packet Filtering (or nonstateful packet filter) –Dynamic Packet.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
1 Chapter 20: Firewalls Fourth Edition by William Stallings Lecture slides by Lawrie Brown(modified by Prof. M. Singhal, U of Kentucky)
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
NS-H /11041 Intruder. NS-H /11042 Intruders Three classes of intruders (hackers or crackers): –Masquerader –Misfeasor –Clandestine user.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
1.1 1 Purpose of firewall : –Control access to or from a protected network; –Implements network access policy connections pass through firewall and are.
Karlstad University Firewall Ge Zhang. Karlstad University A typical network topology Threats example –Back door –Port scanning –…–…
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
1 Ola Flygt Växjö University, Sweden Firewalls.
Cryptography and Network Security
Computer Security Firewalls and Intrusion Prevention Systems.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Fall 2006CS 395: Computer Security1 Firewalls Special Thanks to our friends at The Blekinge Institute of Technology, Sweden for providing the basis for.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Why do we need Firewalls?
Firewall.
Computer Data Security & Privacy
Prepared By : Pina Chhatrala
Computer Data Security & Privacy
Firewalls.
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
* Essential Network Security Book Slides.
Firewalls Purpose of a Firewall Characteristic of a firewall
Firewalls Jiang Long Spring 2002.
Presentation transcript:

Chapter 20 Firewalls

Topics Firewall design principles Trusted systems Characteristics Types Configurations Trusted systems Common Criteria for Information Technology Security Evaluation

Firewalls Internet connectivity has become a necessity in corporations and organizations However, this allows outsiders to interact with network assets An organization may own thousands of computers Could install strong security software on every computer… A security patch is released Now thousands of computers need to be patched

Firewalls Easier solution? Place a firewall between the Internet and the organization’s network Protects a network from Internet-based attacks Impose security and auditing on one choke point Special hardware, a computer, or many computers can function as a firewall

Firewall characteristics Goals: All traffic is directed towards the firewall. There must be no way to access the network without going through the firewall first Only authorized traffic is allowed to pass through the firewall, as defined by local security policies The firewall is immune to penetration. Implies use of a trusted system and a secure operating system

Firewall characteristics Four techniques used to control access: Service control Determine what Internet services are allowed to be accessed May filter traffic based on IP address or port May act as proxy software (receive and interpret services before passing them on) May host service software itself Direction control Determine what direction service requests may be initiated or allowed to pass through

Firewall characteristics User control Control which services can be accessed by particular users (inside or outside the network) Behaviour control Control how services are used (e.g., spam firewall or website filter)

Firewall characteristics Other features: Monitoring of security-related events Non-security-related Internet functions Network address translation (NAT) Log Internet usage Platform for IPSec

Firewall characteristics Limitations: Cannot protect against attacks that bypass the firewall Cannot protect against internal threats For example, an angry employee deleting files Or, an employee cooperating with an outside attacker Cannot protect against the transfer of viruses Different operating systems and applications inside the network Need to scan all incoming data…impractical, perhaps impossible

Types of firewalls Packet-filtering router Application-level gateway Circuit-level gateway

Packet-filtering router Applies a set of rules to each incoming and outgoing packet Possible rules: Source or destination IP address Port number Transport protocol (TCP or UDP) Other information contained in a network packet Filters are a list of rules If a rule is matched, either forward or discard the packet Default action may be either forward or discard Happens when a packet is not filtered

Packet-filtering router

Packet-filtering router Advantages: Fast, simple, transparent Disadvantages: Cannot prevent attacks on specific application weaknesses Limiting logging capabilities Typically no support for user authentication Vulnerable to exploits that take advantage of problems in the TCP/IP specification Easy to make mistakes when creating rules

Application-level gateway Also called a proxy server Usage: User contacts gateway through an application (e.g., telnet or FTP) User must authenticate and provide name of remote host Gateway connects to remote host and relays data back to the user If code for an application is not implemented, gateway will not support that application May be configured to support only certain features of an application

Application-level gateway Advantages: Tend to be more secure than packet filters Whole applications can be allowed or blocked, rather than many possible combinations of packets Easy to log and audit traffic at the application level Disadvantage: Additional overhead due to splicing every connection

Circuit-level gateway Does not permit end-to-end connections Sets ups two TCP connection (inner host to gateway, gateway to outer host) Gateway relays segments from one connection to the other Does not examine contents of segments Security function is to determine what connections are allowed Could be a standalone system or function performed by application-level gateway for some applications

Circuit-level gateway Example implementation: SOCKS Consists of a server, client library, and client programs that have been linked with or are compatible with SOCKS A client wants to access an object beyond the firewall A TCP connection is opened on port 1080 on the SOCKS server Client is authenticated Client makes relay request SOCKS either accepts (and establishes connection) or rejects

Bastion host A system identified to be a critical strong point in a network’s security Typically used as platform for application-level or circuit-level gateways Characteristics: Runs a secure version of an operating system Only essential services are installed Requires user authentication to access proxy services Each proxy is a tiny software package that runs independently and requires little configuration Each proxy may only support a subset of application features, may only access specific hosts, and maintains detailed logs

Firewall configurations A single router or gateway are simple configurations More complex configurations are possible and are more common: Screened host firewall, single-homed bastion Screened host firewall, dual-homed bastion Screened subnet firewall

Screened host firewall, single-homed bastion A packet-filtering router with a bastion host Router’s configuration: Only packets destined for the bastion host may pass Only packets from the bastion host may leave Bastion host performs authentication and proxy functions Internal network is protected by two systems

Screened host firewall, single-homed bastion Allows for flexibility: For example, a web server does not need strong security; router can be configured to allow traffic directly to it Problem: A compromised router will allow traffic to flow directly through to the internal network, bypassing the bastion

Screened host firewall, dual-homed bastion All of the same features and functionality of a single-homed bastion setup However, physically prevents traffic from going anywhere but through the bastion first Solves problem with single-homed bastion setup

Screened subnet firewall Two packet-filtering routers and one bastion host One router between Internet and bastion Another between bastion and internal network Creates an isolated, screened sub-network Besides bastion, could also contain servers, modems, etc. Three levels of defense Internet only sees the screened sub-network Internal network cannot construct direct routes to the Internet

Trusted systems Trusted system technologies enhance the ability to defend against intruders and malicious programs

Data access control Need a way to state what sort of permissions a user may have in a system (e.g., file access, database access, etc.) Access matrix A general model of access control used by file or database management systems

Data access control Elements: Subject: An entity that can access objects. Usually a user or application is represented by a process, since a process gains access to an object Object: Anything to which access is controlled (e.g., files or memory) Access right: The way in which an object is accessed (e.g., read, write, or execute) One axis lists the subject, the other lists objects Each entry consists of access rights of a subject on an object

Data access control

Data access control Access matrix is usually implemented by decomposing it Access control list (ACL) Decomposition by column Lists subjects and their access rights for each object May include a default set of rights Capability tickets Decomposition by row Lists objects and associated access rights for each subject

Concept of trusted systems Multilevel security Multiple groups (or levels) of data are defined Idea is a high level subject cannot convey information to a lower level subject Two rules need to be enforced: No read up: A subject only reads objects less or equal to their security level No write down: A subject only writes into an object equal or greater than their security level

Concept of trusted systems Reference monitor Element of hardware or operating system Regulates the access of objects by subjects on the basis of security parameters A security kernel database stores all access privileges and object levels Properties: Complete mediation: Security rules are enforced on every single access to an object Isolation: No unauthorized modification to reference monitor and database Verifiability: The reference monitor’s correctness must be mathematically provable An audit file may be used to log security violations or changes to the kernel database

Concept of trusted systems A trusted system provides the amount of verification as seen in the reference monitor Trojan horse defense A trusted operating system can prevent Trojan horse attacks A user’s documents and programs are classified under a high security level A Trojan horse is planted by a user who has gained access, but under a low security level The Trojan horse can read the documents, but cannot copy them to a low security level file

Common Criteria for Information Technology Security Evaluation Defines a set of potential security requirements for use in evaluating part of a system Requirements: Functional: Defines desired security behaviour Assurance: Basis for gaining confidence that security measures are effective and implemented correctly Profiles that can be generated: Protection: Defines a set of security requirements and objectives of a category of systems Security: Contains security requirements and objectives of a target system and functional and assurance measures offered to meet those requirements