cs 356 lecture 19 and 20 firewalls and intrusion
play

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention - PowerPoint PPT Presentation

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control


  1. CS 356 – Lecture 19 and 20 Firewalls and Intrusion Prevention Spring 2013

  2. Review • Chapter 1: Basic Concepts and Terminology • Chapter 2: Basic Cryptographic Tools • Chapter 3 – User Authentication • Chapter 4 – Access Control Lists • Chapter 5 – Database Security (skipped) • Chapter 6 – Malicious Software • Networking Basics (not in book) • Chapter 7 – Denial of Service • Chapter 8 – Intrusion Detection • Chapter 9 – Firewalls and Intrusion Prevention

  3. Chapter 9 Firewalls and Intrusion Prevention Systems

  4. The Need For Firewalls l internet connectivity is essential l however it creates a threat l effective means of protecting LANs l inserted between the premises network and the Internet to establish a controlled link l can be a single computer system or a set of two or more systems working together l used as a perimeter defense l single choke point to impose security and auditing l insulates the internal systems from external networks

  5. Firewall Characteristics design goals techniques used by firewalls to control • all traffic from inside to access and enforce the outside must pass through the firewall site’s security policy are: • only authorized traffic as • service control defined by the local security • direction control policy will be allowed to pass • user control • the firewall itself is immune to • behavior control penetration

  6. capabilities: • defines a single choke point • provides a location for monitoring security events • convenient platform for several Internet functions that are not security related • can serve as the platform for IPSec limitations: • cannot protect against attacks bypassing firewall • may not protect fully against internal threats • improperly secured wireless LAN can be accessed from outside the organization • laptop, PDA, or portable storage device may be infected outside the corporate network then used internally

  7. Types of Firewalls

  8. Packet Filtering Firewall • applies rules to each incoming and outgoing IP packet – typically a list of rules based on matches in the IP or TCP header – forwards or discards the packet based on rules match filtering rules are based on information contained in a network packet • source IP address • destination IP address • source and destination transport-level address • IP protocol field • interface • two default policies: – discard - prohibit unless expressly permitted • more conservative, controlled, visible to users – forward - permit unless expressly prohibited • easier to manage and use but less secure

  9. Packet Filter Rules

  10. Packet Filter Advantages And Weaknesses • advantages – simplicity – typically transparent to users and are very fast • weaknesses – cannot prevent attacks that employ application specific vulnerabilities or functions – limited logging functionality – do not support advanced user authentication – vulnerable to attacks on TCP/IP protocol bugs – improper configuration can lead to breaches

  11. Stateful Inspection Firewall tightens rules for TCP reviews packet information traffic by creating a but also records directory of outbound TCP information about TCP connections connections • there is an entry for each • keeps track of TCP sequence currently established numbers to prevent attacks connection that depend on the sequence number • packet filter allows incoming traffic to high numbered ports • inspects data for protocols only for those packets that fit like FTP, IM and SIPS the profile of one of the commands entries in this directory

  12. Stateful Firewall Connection State Table

  13. Application-Level Gateway l also called an application proxy l acts as a relay of application-level traffic l user contacts gateway using a TCP/IP application l user is authenticated l gateway contacts application on remote host and relays TCP segments between server and user l must have proxy code for each application l may restrict application features supported l tend to be more secure than packet filters l disadvantage is the additional processing overhead on each connection

  14. Circuit-Level Gateway circuit level proxy • sets up two TCP connections, one between itself and a TCP user on an inner host and one on an outside host • relays TCP segments from one connection to the other without examining contents • security function consists of determining which connections will be allowed typically used when inside users are trusted • may use application-level gateway inbound and circuit- level gateway outbound • lower overheads

  15. SOCKS Circuit-Level Gateway components l SOCKS v5 defined in RFC1928 l designed to provide a framework for client-server applications in TCP/UDP SOCKS- SOCKS domains to conveniently and ified client server securely use the services of a applications network firewall l client application contacts SOCKS server, authenticates, SOCKS sends relay request client library • server evaluates and either establishes or denies the connection

  16. Types of Firewalls

  17. Bastion Hosts l system identified as a critical strong point in the network’s security l serves as a platform for an application-level or circuit-level gateway l common characteristics: l runs secure O/S, only essential services l may require user authentication to access proxy or host l each proxy can restrict features, hosts accessed l each proxy is small, simple, checked for security l each proxy is independent, non-privileged l limited disk use, hence read-only code

  18. Host-Based Firewalls • used to secure an individual host • available in operating systems or can be provided as an add-on package • filter and restrict packet flows • common location is a server advantages : • filtering rules can be tailored to the host environment • protection is provided independent of topology • provides an additional layer of protection

  19. Personal Firewall l controls traffic between a personal computer or workstation and the Internet or enterprise network l for both home or corporate use l typically is a software module on a personal computer l can be housed in a router that connects all of the home computers to a DSL, cable modem, or other Internet interface l typically much less complex than server-based or stand-alone firewalls l primary role is to deny unauthorized remote access l may also monitor outgoing traffic to detect and block worms and malware activity

  20. Personal Firewall Interface

  21. Firewall Configuration

  22. Virtual Private Networks (VPNs)

  23. Distributed Firewall Configuration

  24. Firewall Topologies • includes personal firewall software and firewall host-resident firewall software on servers • single router between internal and external networks screening router with stateless or full packet filtering • single firewall device between an internal and single bastion inline external router • has a third network interface on bastion to a DMZ single bastion T where externally visible servers are placed double bastion inline • DMZ is sandwiched between bastion firewalls • DMZ is on a separate network interface on the double bastion T bastion firewall distributed firewall • used by large businesses and government configuration organizations

  25. Intrusion Prevention Systems (IPS) l recent addition to security products l inline network-based IDS that can block traffic l functional addition to firewall that adds IDS capabilities l can block traffic like a firewall l makes use of algorithms developed for IDSs l may be network or host based

  26. Host-Based IPS (HIPS) l identifies attacks using both signature and anomaly detection techniques • signature: focus is on the specific content of application payloads in packets, looking for patterns that have been identified as malicious • anomaly: IPS is looking for behavior patterns that indicate malware l can be tailored to the specific platform l can also use a sandbox approach to monitor behavior advantages • the various tools work closely together • threat prevention is more comprehensive • management is easier

  27. Network-Based IPS (NIPS) l inline NIDS with the authority to discard packets and tear down TCP connections l uses signature and anomaly detection l may provide flow data protection l monitoring full application flow content l can identify malicious packets using: l pattern matching l stateful matching l protocol anomaly l traffic anomaly l statistical anomaly

  28. Snort Inline l enables Snort to function as an intrusion prevention capability drop reject Sdrop l includes a replace option which allows the Snort user to modify packets Snort packet is rejects a rather than drop them rejected packet and based on result is packet is l useful for a honeypot the logged rejected options implementation and an but not defined error logged in the l attackers see the message rule and is failure but can’t figure logs the returned result out why it occurred

  29. Unified Threat Management Products

  30. ¡ Sidewinder ¡G2 ¡ Security ¡ Appliance ¡ Attack ¡ Protections ¡ Summary ¡-­‑ ¡ Transport ¡Level ¡ Examples ¡ ¡

Recommend


More recommend