Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Security Firewalls and Intrusion Prevention Systems.

Similar presentations


Presentation on theme: "Computer Security Firewalls and Intrusion Prevention Systems."— Presentation transcript:

1 Computer Security Firewalls and Intrusion Prevention Systems

2  Firewalls can be an effective means of protecting a local system or network of systems an effective means of protecting a local system or network of systems from network-based security threats from network-based security threats  Internet connectivity is essential to the organization. Individual users within the organization want and need Internet access Individual users within the organization want and need Internet access

3 Firewalls and Intrusion Prevention Systems  However, while Internet access provides benefits to the organization, it enables the outside world to reach and interact with local network assets. This creates a threat to the organization. This creates a threat to the organization.  It is possible to equip each workstation and server on the premises network with strong security features but, this is not a practical or economical approach. but, this is not a practical or economical approach.

4 Firewalls and Intrusion Prevention Systems  The alternative, is the firewall, is the firewall, inserted between the premises network and the Internet inserted between the premises network and the Internet to establish a controlled link and to erect an outer security wall or perimeter. to establish a controlled link and to erect an outer security wall or perimeter.  The aim of this perimeter is to protect the premises network from Internet- based attacks and to protect the premises network from Internet- based attacks and to provide a single choke point where security and audit can be imposed. to provide a single choke point where security and audit can be imposed.

5 Firewall Capabilities & Limits  capabilities: defines a single choke point defines a single choke point provides a location for monitoring security events provides a location for monitoring security events  limitations: cannot protect against attacks bypassing firewall cannot protect against attacks bypassing firewall may not protect fully against internal threats may not protect fully against internal threats laptop, PDA, portable storage device infected outside then used inside laptop, PDA, portable storage device infected outside then used inside

6 Types of Firewalls

7 Packet Filtering Firewall  applies rules to packets in/out of firewall  based on information in packet header src/dest IP addr & port, IP protocol, interface src/dest IP addr & port, IP protocol, interface  typically a list of rules of matches on fields if match rule says if - forward or discard packet if match rule says if - forward or discard packet  two default policies: discard - prohibit unless expressly permitted discard - prohibit unless expressly permitted more conservative, controlled, visible to usersmore conservative, controlled, visible to users forward - permit unless expressly prohibited forward - permit unless expressly prohibited easier to manage/use but less secureeasier to manage/use but less secure

8 Packet Filter Rules

9 Packet Filter Weaknesses  weaknesses cannot prevent attack on application bugs because does not examine upper layer data cannot prevent attack on application bugs because does not examine upper layer data limited logging functionality because limited info is available limited logging functionality because limited info is available do no support advanced user authentication do no support advanced user authentication vulnerable to attacks on TCP/IP protocol bugs vulnerable to attacks on TCP/IP protocol bugs improper configuration can lead to breaches improper configuration can lead to breaches  attack IP address spoofing IP address spoofing

10 Stateful Inspection Firewall  reviews packet header information but also keeps info on TCP connections typically have low, “known” port no for server typically have low, “known” port no for server Less than 1024Less than 1024 and high, dynamically assigned client port no and high, dynamically assigned client port no 1024 - 655351024 - 65535 simple packet filter must allow all return high port numbered packets back in simple packet filter must allow all return high port numbered packets back in stateful inspection packet firewall tightens rules for TCP traffic using a directory of TCP connections stateful inspection packet firewall tightens rules for TCP traffic using a directory of TCP connections only allow incoming traffic to high-numbered ports for packets matching an entry in this directory only allow incoming traffic to high-numbered ports for packets matching an entry in this directory may also track TCP seq numbers as well may also track TCP seq numbers as well

11 Application-Level Gateway  acts as a relay of application-level traffic user contacts gateway with remote host name user contacts gateway with remote host name authenticates themselves authenticates themselves gateway contacts application on remote host and relays TCP segments between server and user gateway contacts application on remote host and relays TCP segments between server and user  must have proxy code for each application may restrict application features supported may restrict application features supported  more secure than packet filters Only allow approved/selected applications Only allow approved/selected applications  but have higher overheads

12 Circuit-Level Gateway  sets up two TCP connections, to an inside user and to an outside host  relays TCP segments from one connection to the other without examining contents hence independent of application logic hence independent of application logic just determines whether relay is permitted just determines whether relay is permitted  typically used when inside users trusted may use application-level gateway inbound and circuit-level gateway outbound may use application-level gateway inbound and circuit-level gateway outbound hence lower overheads hence lower overheads

13 SOCKS Circuit-Level Gateway  SOCKS v5 defined as RFC1928 to allow TCP/UDP applications to use firewall  components: SOCKS server on firewall SOCKS server on firewall SOCKS client library on all internal hosts SOCKS client library on all internal hosts SOCKS-ified client applications SOCKS-ified client applications  client app contacts SOCKS server, authenticates, sends relay request  server evaluates & establishes relay connection  UDP handled with parallel TCP control channel UDP forward data, TCP authenticate user UDP forward data, TCP authenticate user

14 Firewall Locations  several options for locating firewall: bastion host bastion host individual host-based firewall individual host-based firewall personal firewall personal firewall

15 Bastion Hosts  critical strongpoint in network  hosts or platform for application/circuit-level gateways  common characteristics: runs secure O/S, only essential services runs secure O/S, only essential services may require user auth to access proxy or host may require user auth to access proxy or host each proxy can restrict features, hosts accessed each proxy can restrict features, hosts accessed limited disk use, hence read-only code limited disk use, hence read-only code

16 Host-Based Firewalls  used to secure individual host  available in/add-on for many O/S  filter packet flows  often used on servers  advantages: taylored filter rules for specific host needs taylored filter rules for specific host needs protection from both internal / external attacks protection from both internal / external attacks additional layer of protection to org firewall additional layer of protection to org firewall

17 Personal Firewall  controls traffic flow to/from PC/workstation  for both home or corporate use  may be software module on PC  or in home cable/DSL router/gateway  typically much less complex  primary role to deny unauthorized access  may also monitor outgoing traffic to detect/block worm/malware activity

18 Firewall Locations

19 Virtual Private Networks

20  VPN consists of a set of computers that interconnect by means of a relatively unsecure network.  Use of a public network exposes corporate traffic to eavesdropping and eavesdropping and provides an entry point for unauthorized users. provides an entry point for unauthorized users.  To counter this problem, a VPN is needed.

21 Virtual Private Networks  In essence, a VPN uses encryption and authentication a VPN uses encryption and authentication in the lower protocol layers in the lower protocol layers to provide a secure connection to provide a secure connection through an otherwise insecure network, typically the Internet. through an otherwise insecure network, typically the Internet.

22 Virtual Private Networks  VPNs are generally cheaper than real private networks using private lines but rely on having the same encryption and authentication system at both ends.  The encryption may be performed by firewall software or possibly by routers.  The most common protocol mechanism used for this purpose is at the IP level and is known as IPSec.

23 Intrusion Prevention Systems (IPS)  recent addition to security products which inline net/host-based IDS that can block traffic inline net/host-based IDS that can block traffic functional addition to firewall that adds IDS capabilities functional addition to firewall that adds IDS capabilities  can block traffic like a firewall  using IDS algorithms  may be network or host based

24 Host-Based IPS  identifies attacks using both: signature techniques signature techniques malicious application packetsmalicious application packets anomaly detection techniques anomaly detection techniques behavior patterns that indicate malwarebehavior patterns that indicate malware  can be tailored to the specific platform e.g. general purpose, web/database server specific e.g. general purpose, web/database server specific  can also sandbox applets to monitor behavior Quarantine and run applet to monitor its behaviour Quarantine and run applet to monitor its behaviour If malicious then halt If malicious then halt

25 Network-Based IPS  inline NIDS that can discard packets or terminate TCP connections  uses signature and anomaly detection  may provide flow data protection monitoring full application flow content monitoring full application flow content  can identify malicious packets using: pattern matching, stateful matching, protocol anomaly, traffic anomaly, statistical anomaly pattern matching, stateful matching, protocol anomaly, traffic anomaly, statistical anomaly

26 Summary  introduced need for & purpose of firewalls  types of firewalls packet filter, stateful inspection, application and circuit gateways packet filter, stateful inspection, application and circuit gateways  firewall locations, topologies  VPN  intrusion prevention systems


Download ppt "Computer Security Firewalls and Intrusion Prevention Systems."

Similar presentations


Ads by Google