Download presentation
Presentation is loading. Please wait.
Published byJoleen Perry Modified over 9 years ago
2
Firewalls Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from the Internet Facilitates internal users’ access to the InternetFacilitates internal users’ access to the Internet OK No Firewall Access only if Authenticated
3
Firewalls Packet Filter Firewalls Examine each incoming IP packetExamine each incoming IP packet Examine IP and TCP header fieldsExamine IP and TCP header fields If bad behavior is detected, reject the packetIf bad behavior is detected, reject the packet No sense of previous communication: analyzes each packet in isolationNo sense of previous communication: analyzes each packet in isolation IP Firewall IP Packet
4
Firewalls Application (Proxy) Firewalls Filter based on application behaviorFilter based on application behavior Do not examine packets in isolation: use historyDo not examine packets in isolation: use history In HTTP, for example, do not accept a response unless an HTTP request has just gone out to that site Application
5
Firewalls Application (Proxy) Firewalls Hide internal internet addressesHide internal internet addresses Internal user sends an HTTP requestInternal user sends an HTTP request HTTP proxy program replaces user internet address with proxy server’s IP address, sends to the webserverHTTP proxy program replaces user internet address with proxy server’s IP address, sends to the webserver HTTP Request Request with Proxy Server’s IP Address
6
Firewalls Application (Proxy) Firewalls Webserver sends response to proxy server, to proxy server IP addressWebserver sends response to proxy server, to proxy server IP address HTTP proxy server sends the IP packet to the originating hostHTTP proxy server sends the IP packet to the originating host Overall, proxy program acts on behalf of the internal userOverall, proxy program acts on behalf of the internal user Response to Proxy Server’s IP Address HTTP Response
7
Firewalls Why Hide Internal IP Addresses? The first step in an attack usually is to find potential victim hostsThe first step in an attack usually is to find potential victim hosts Sniffer programs read IP packet streams for IP addresses of potential target hostsSniffer programs read IP packet streams for IP addresses of potential target hosts With proxy server, sniffers will not learn IP addresses of internal hostsWith proxy server, sniffers will not learn IP addresses of internal hosts False IP Address Host IP Address Sniffer
8
Firewalls Application Firewalls Need a separate program (proxy) for each applicationNeed a separate program (proxy) for each application Not all applications have rules that allow filteringNot all applications have rules that allow filtering
9
Intrusion Detection Intrusion detection software to detect and report intrusions as they are occurring Lets organization stop intruders so that intruders do not have unlimited time to probe for weaknessesLets organization stop intruders so that intruders do not have unlimited time to probe for weaknesses Helps organization assess security threatsHelps organization assess security threats Audit logs list where intruder has been: vital in legal prosecutionAudit logs list where intruder has been: vital in legal prosecution
10
Intrusion Detection Signature-based IDS – performs simple pattern-matching and report situtations that match a pattern corresponding to a known attack type Heuristic IDS (anomaly based) – build model of acceptable behavior and flag exceptions to that model
11
Intrusion Detection Network-based IDS – stand-alone device attached to the network to monitor traffic throughout network Host-based IDS – runs on a single workstation or client or host, to protect that one host
12
Default-Deny Posture Perimeter Settings: block all protocols except those expressly permitted [i.e. SMTP(25), DNS(53), HTTP(80), SSL(443),…] Internal Settings: block all unnecessary traffic between internal network segments, remote & VPN connections Security Configurations: harden servers & workstations to run only necessary services and applications Segment Networks Patch Management
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.