TCP/IP Vulnerabilities. Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS.

Slides:



Advertisements
Similar presentations
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Advertisements

Guide to Network Defense and Countermeasures Second Edition
FIREWALLS Chapter 11.
NS-H /11041 Attacks. NS-H /11042 The Definition Security is a state of well-being of information and infrastructures in which the possibility.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
Security Part Two: Attacks and Countermeasures. Flashback: Internet design goals 1.Interconnection 2.Failure resilience 3.Multiple types of service 4.Variety.
Intrusion Detection and Hackers Exploits IP Spoofing Attack Yousef Yahya & Ahmed Alkhamaisa Prepared for Arab Academy for Banking and Financial Sciences.
Firewalls and Intrusion Detection Systems
Common IS Threat Mitigation Strategies An overview of common detection and protection technologies Max Caceres CORE Security Technologies
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Beyond the perimeter: the need for early detection of Denial of Service Attacks John Haggerty,Qi Shi,Madjid Merabti Presented by Abhijit Pandey.
Security Part One: Network Attacks and Countermeasures Xin Zhang.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
Introduction to Network Security
Firewalls: General Principles & Configuration (in Linux)
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
G53SEC 1 Network Security Hijacking, flooding, spoofing and some honey.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
1 Figure 5-4: Drivers of Performance Requirements: Traffic Volume and Complexity of Filtering Performance Requirements Traffic Volume (Packets per Second)
Attacks and Malicious Code Chapter 3. Learning Objectives Explain denial-of-service (DoS) attacks Explain and discuss ping-of-death attacks Identify major.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
FIREWALL Mạng máy tính nâng cao-V1.
Chapter 6: Packet Filtering
Network security Further protocols and issues. Protocols: recap There are a few main protocols that govern the internet: – Internet Protocol: IP – Transmission.
By Anonymous Student. Outline  Security vulnerabilities  Denial-of-Service (DoS) and Distributed-Denial-of- Service (D-DoS)  Firewalls  Intrusion.
CS 640: Introduction to Computer Networks Aditya Akella Lecture 25 – Network Security.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
FORESEC Academy FORESEC Academy Security Essentials (III)
Beginning Network Security Monitor and control flow into and out of the LAN Ingress Egress Only let in the good guys Only let out the corp. business.
CS 6401 Secure Shell & Denial of Service Attacks Outline Secure Shell Overview Authentication Practical issues Denial of Service Attacks Definition Examples.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Security Part One: Attacks and Countermeasures Dejian Ye, Liu Xin : F08 security1.
Network Security Technologies CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Security fundamentals Topic 10 Securing the network perimeter.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
DoS/DDoS attack and defense
Slammer Worm By : Varsha Gupta.P 08QR1A1216.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Network Security SUBMITTED BY:- HARENDRA KUMAR IT-3 RD YR. 1.
FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
Presentation on ip spoofing BY
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Security fundamentals
CompTIA Security+ Study Guide (SY0-401)
Firewalls.
Domain 4 – Communication and Network Security
Introduction to Network Security
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Configuring TMG as a Firewall
CompTIA Security+ Study Guide (SY0-401)
Firewalls (March 2, 2016) © Abdou Illia – Spring 2016.
Firewalls Purpose of a Firewall Characteristic of a firewall
CORE Security Technologies
POOJA Programmer, CSE Department
دیواره ی آتش.
Firewalls.
Intrusion Detection system
Intrusion Detection and Hackers Exploits IP Spoofing Attack
Secure Shell & Denial of Service Attacks
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

TCP/IP Vulnerabilities

Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

Internet design goals 1. Interconnection 2. Failure resilience 3. Multiple types of service 4. Variety of networks 5. Management of resources 6. Cost-effective 7. Low entry-cost 8. Accountability for resources Where is security issues?

Why did they leave it out? Designed for simple connectivity Network designed with implicit trust No “bad” guys Security may be provided at the edge Encryption Authentication

Security Vulnerabilities Unfortunately at every layer in the protocol stack! Network-layer attacks IP-level vulnerabilities Routing attacks Transport-layer attacks TCP vulnerabilities Application-layer attacks

Where do the problems come from? Protocol-level vulnerabilities Implicit trust assumptions in design Implementation vulnerabilities Both on routers and end-hosts Incomplete specifications Often left to the imagination of programmers

IP-level vulnerabilities IP addresses are provided by the source Spoofing attacks Use of IP address for authentication Remote command (rsh, rlogin) allows remote login without explicit password authentication Some known exploited IP ARP Spoofing Fragmentation Traffic amplification

Routing attacks Divert traffic to malicious nodes Black-hole attack Eavesdropping Routing attacks No authentications Announce lower cost route in Distance-Vector BGP vulnerabilities Prefix hijacking

TCP-level attacks SYN-Flooding Flood with incomplete connection to hold service resources Session hijack Sequence number guessing Pretend to be a trusted host Session Termination Forge packet to close a legitimate connection

Application Vulnerabilities Application Protocol Attack SPAM Phishing etc.

Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

Denial of Service Make a service unusable by overloading the server or network Disrupt service by taking down hosts e.g., ping-of-death Consume host-level resources e.g., SYN-floods Consume network resources e.g., UDP/ICMP floods

Outline Security Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

Worm Overview Self-propagate through network Typical Steps in Worm Propagation Probe host for vulnerable software Exploit the vulnerability Launches copy of itself on compromised host Very fast spreading with short windows to react

The Case of Code-Red 12 th July 2001 : Code-Red Worm (CRv1) began 12 th July 2001 : Code-Red Worm (CRv1) began 19 th July 2001 : Code-Red Worm (CRv2) began 19 th July 2001 : Code-Red Worm (CRv2) began 359,104 hosts were compromised in approximately 24 hours 359,104 hosts were compromised in approximately 24 hours The total number of inactive hosts over timeThe number of newly inactive hosts per minute Worm growth: Slow-start, Exponential phase, Slow decay

Code Red Spreads (I) July 19, Midnight – 159 hosts infected

Code Red Spreads (II) July 19, 11:40 am – 4,920 hosts infected

Code Red Spreads (III) July 20, Midnight – 341,015 hosts infected

Animation of Code Red Spreads

Animation SQL Slammer Spreads

Outline Security, Vulnerabilities Denial of Service Worms Countermeasures: Firewalls/IDS

Firewall A Firewall is a system or group of systems used to control access between two networks using pre-configured rules or filters A Firewall is a system or group of systems used to control access between two networks using pre-configured rules or filters

How to filter? What to filter based on? Packet Header Fields IP source and destination addresses Application port numbers ICMP message types/ Protocol options etc. Packet contents (payloads)

Some examples Block all packets from outside except for SMTP servers Block all traffic to/from a list of domains Ingress filtering Drop all packets from outside with addresses inside the network Egress filtering Drop all packets from inside with addresses outside the network

Typical Firewall Configuration Internal hosts can access DMZ and Internet External hosts can access DMZ only, not Intranet DMZ hosts can access Internet only Advantages? If a service gets compromised in DMZ it cannot affect internal hosts Internet Intranet DMZ X X

Sample Firewall Rule Dst Port Alow Allow Yes Any > TCP22 TCP> 1023 ExtIntOutSSH-2 IntExtInSSH-1 Dst Addr Proto Ack Set? Action Src Port Src Addr DirRule Allow SSH from external hosts to internal hosts Two rules Inbound and outbound How to know a packet is for SSH? Inbound: src-port>1023, dst-port=22 Outbound: src-port=22, dst-port>1023 Protocol=TCP Ack Set? SYN SYN/ACK ACK ClientServer

Intrusion Detection IDS is an automated system intended to detect computer intrusions IDS is an automated system intended to detect computer intrusions To identify, preferably in real-time, unauthorized use, misuse, and abuse of computer system To identify, preferably in real-time, unauthorized use, misuse, and abuse of computer system

Basic IDS Architecture

Detection Method Misuse Detection Misuse Detection Looking for the attempts to exploit known vulnerabilities or attack patterns Looking for the attempts to exploit known vulnerabilities or attack patterns Typically low false alarms Typically low false alarms Difficult to gather all attack signatures Difficult to gather all attack signatures Anomaly Detection Anomaly Detection Observing a deviation of normal behavior of system or user to detect intrusions Observing a deviation of normal behavior of system or user to detect intrusions Can detect a new or unseen vulnerabilities or attack patterns Can detect a new or unseen vulnerabilities or attack patterns Typically a lot of false alarms Typically a lot of false alarms

Audit Source Location Host/IDSHost Host IDSHost Host Host based IDS Network based IDS

Next Generation Firewall Layer 7 Content Inspection Layer 7 Content Inspection Integration of Firewall/IDS Integration of Firewall/IDS

Summary Security vulnerabilities are real! Protocol or implementation or bad specs Poor programming practices At all layers in protocol stack DoS/DDoS Resource utilization Worm Exponential spread Scanning strategies Firewall/IDS Counter-measures to protect hosts Fail-open vs. Fail-close?