Georg-Christian Pranschke Supervisor: Barry Irwin Security and Networks Research Group Department of Computer Science Rhodes University AUTOMATED FIREWALL.

Slides:



Advertisements
Similar presentations
NETWORKS By : Nicolas Pottier. Electronic security Establishing techniques that allow users to prove and protect their Identity from unauthorised personnel.
Advertisements

Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Pie(s) in the Sky Mark Crovella Boston University Computer Science.
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.1 Firewalls.
Using TTCN-3 in Interoperability Testing for Real-time Communication Systems Zhiliang Wang, Jianping Wu, Xia Yin, Xingang Shi and Beihang Tian Department.
Internet Security CS457 Seminar Zhao Cheng. Security attacks interruption, interception, modification, fabrication passive attack, active attack.
Rhodes University - Department of Computer Science 1 Project Project: Re-establishing and improving the experimental VoIP link with the University of Namibia:
Some general principles in computer security Tomasz Bilski Chair of Control, Robotics and Computer Science Poznań University.
CS682 Session 6 Prof. Katz. Firewalls An intelligent router? Used as a traffic control mechanism Based on information in the Layer 3 and 4 headers Administrator.
Networking Components Manuel Palos. HUBS Hubs are inexpensive devices that connect multiple devices t0 a network. Hubs merely pass along network data.
Intrusion Prevention System Group 6 Mu-Hsin Wei Renaud Moussounda Group 6 Mu-Hsin Wei Renaud Moussounda.
1 Action Automated Security Breach Reporting and Corrections.
Firewalls and the Campus Grid: an Overview Bruce Beckles University of Cambridge Computing Service.
Detection and Resolution of Anomalies in Firewall Policy Rules
SharePoint Farm On Azure IAAS Prepared By : Prakhar Rastogi Premier Field engineer Microsoft India.
A Brief Taxonomy of Firewalls
Brad Baker CS526 May 7 th, /7/ Project goals 2. Test Environment 3. The Problem 4. Some Solutions 5. ModSecurity Overview 6. ModSecurity.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Pushing the Security Boundaries of Ubiquitous Computing ACSF 2006 —————— 13 th July 2006 —————— David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith.
1 Reasoning about Concurrency for Security Tunnels Alwyn E. Goodloe University of Pennsylvania Carl A. Gunter University of Illinois Urbana-Champaign.
Module 7: Firewalls and Port Forwarding 1. Overview Firewall configuration for Web Application Hosting Forwarding necessary ports for Web Application.
11 Automatic Discovery of Botnet Communities on Large-Scale Communication Networks Wei Lu, Mahbod Tavallaee and Ali A. Ghorbani - in ACM Symposium on InformAtion,
1 Overview of Microsoft ISA Server Introducing ISA Server Protects resourcesProtects resources Connects directly to the Internet and your private.
INTERNATIONAL NETWORKS At Indiana University Hans Addleman TransPAC Engineer, International Networks University Information Technology Services Indiana.
Timothy Whelan Supervisor: Mr Barry Irwin Security and Networks Research Group Department of Computer Science Rhodes University Hardware based packet filtering.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
1 Action Automated Security Breach Reporting and Corrections.
Firewalls Nicklas Nordenmark Fabian Alenius Peter Renström Nicklas Nordenmark Fabian Alenius Peter Renström.
G53SEC 1 Coursework Specification. G53SEC Coursework Option 1: Spam Detection and Categorisation 2.
By : Fiona Minear. What is a networks ? A network is a group of two or more computer systems linked together.
Networking Components Starla Wachsmann. COMPUTER NETWORKING COMPONETS Today’s wireless and enterprise networks are more complex than ever, delivering.
Module 5: Designing Security for Internal Networks.
HARDWARE BASED PACKET FILTERING USING FPGAs (or “How hardware is better than software at judging a book by its cover”) Timothy Whelan Supervisor: Mr Barry.
Module 7: Advanced Application and Web Filtering.
Intro to Firewalls. A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing.
Stephanie Mercury.  A firewall allows or blocks traffic into and out of a private network or the user's computer.
Polygraph: Automatically Generating Signatures for Polymorphic Worms James Newsome, Brad Karp, and Dawn Song Carnegie Mellon University Presented by Ryan.
Bradley Cowie Supervised by Barry Irwin Security and Networks Research Group Department of Computer Science Rhodes University DATA CLASSIFICATION FOR CLASSIFIER.
Using automation to enhance the process of Digital Forensic analysis Daniel Walton School of Computer and Information Science
Information Security Dashboard Senior Design Spring 2008 Brian Rappach.
A Next Generation OCS Obstacles to Overcome When Connecting via Ethernet Cscape EnvisionRV EnvisionFX Modbus TCP SRTP EGD Ethernet IP ICMP FTP HTTP.
Eurostat November 2015 Eurostat Unit B3 – IT and standards for data and metadata exchange SDMX IT Tools Test Client Jean-Francois LEBLANC Christian SEBASTIAN.
1 Internet Firewall Security Present by: Ying Fu Department of Computer Science South Eastern University February, 2001.
1 Self Similar Video Traffic Carey Williamson Department of Computer Science University of Calgary.
APNIC Feb., 2004 Copyright (c) 2004 Japan Network Information Center. All Rights Reserved.1 NIR System BoF report for NIR SIG Shin Yamasaki Engineering.
GOOD MORNING TO ONE AND ALL. OUR TEAM VENKATESH THARUN SADIK FROM AVANTHI ENGG. COLLEGE.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
Evaluation Snort Rules Default Snort rules – 305 unique rules (after removing string matching components) 10 days of packet data from MIT Lincoln Labs.
A MAIN PROJECT SEMINAR ON PACKET FILTERING FIREWALL USING NETFILTERS IN LINUX FOR ARM9 BY: R. SRINIVASULU (07N21A0446) CH. SHIVA RAM (07N21A0442) K. MALLIKARJUNA.
Cryptography and Network Security
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Ch 21. Computer Network Firewall. What is firewall? Hardware and Software Installed in a computer to protect only one computer.
Department of Electrical and Computer Engineering Abhishek Dwaraki 1 Srini Seetharaman 2, Sriram Natarajan 3, Tilman Wolf 1 1. Department of Electrical.
Could SP-NAT Save the Internet?
Chapter 7. Identifying Assets and Activities to Be Protected
By: Samuel Oswald Hunter Supervisor: Mr Barry Irwin
Lecture 5. Security Threats
Aaron Gember-Jacobson
Craig Koorn Supervisors: Barry Irwin Alan Herbert
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
How a Stateful Firewall Works
Anna Giannakou Christine Morin, Jean-Louis Pazat, Louis Rilling
HTML Level II (CyberAdvantage)
Using An Isolated Network to Teach Advanced Networks and Security
Providing QoS through Active Domain Management
Seminar summary and topics not to be considered
FIREWALL.
Presentation transcript:

Georg-Christian Pranschke Supervisor: Barry Irwin Security and Networks Research Group Department of Computer Science Rhodes University AUTOMATED FIREWALL RULE SET GENERATION THROUGH PASSIVE TRAFFIC INSPECTION

AUTOMATED FIREWALL RULE SET GENERATION Background WiresharkTcpdump / Windump ACM Classification System (1998) C.2.0. Security and Protection Introducing firewalls into existing networks is often problematic Production traffic cannot be interrupted Necessitates time consuming manual analysis of network traffic Ever increasing traffic volumes make manual analysis less feasible

AUTOMATED FIREWALL RULE SET GENERATION Traffic Analyser – Flow Creation

AUTOMATED FIREWALL RULE SET GENERATION High Level Design Overview – System Components

Pipeline: bpf -> sql -> scripts -> fwbuilder

Charybdis screencast Scylla screencast

AUTOMATED FIREWALL RULE SET GENERATION Results / Critical Evaluation Misconfigured firewall provides only the illusion of network security Imperfect information -> no proof of correctness “Dancing bears” HTTP universal firewall traversal protocol -> SQLi

AUTOMATED FIREWALL RULE SET GENERATION Questions ?