Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.

Slides:



Advertisements
Similar presentations
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Advertisements

IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Fall 2008CS 334: Computer Security1 Firewalls Special Thanks to our friends at The Blekinge Institute of Technology, Sweden for providing the basis for.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Security Firewall Firewall design principle. Firewall Characteristics.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
—On War, Carl Von Clausewitz
Chapter 11 Firewalls.
5/4/01EMTM 5531 EMTM 553: E-commerce Systems Lecture 7b: Firewalls Insup Lee Department of Computer and Information Science University of Pennsylvania.
Chapter 10 Firewalls. Introduction seen evolution of information systems now everyone want to be on the Internet and to interconnect networks has persistent.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Electronic Commerce 2. Definition Ecommerce is the process of buying and selling products and services via distributed electronic media, usually the World.
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
Firewalls CS591 Topics in Internet Security November Steve Miskovitz, Steve Peckham, Kan Hayashi.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Chapter 20 Firewalls.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Intranet, Extranet, Firewall. Intranet and Extranet.
FIREWALLS Prepared By: Hilal TORGAY Uğurcan SOYLU.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
1 Chapter 20: Firewalls Fourth Edition by William Stallings Lecture slides by Lawrie Brown(modified by Prof. M. Singhal, U of Kentucky)
Internet and Intranet Fundamentals Class 9 Session A.
Lecture 15 Page 1 Advanced Network Security Perimeter Defense in Networks: Firewalls Configuration and Management Advanced Network Security Peter Reiher.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
NS-H /11041 Intruder. NS-H /11042 Intruders Three classes of intruders (hackers or crackers): –Masquerader –Misfeasor –Clandestine user.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Lecture 9 Page 1 CS 136, Fall 2014 Network Security Computer Security Peter Reiher November 4, 2014.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
Firewall Security.
Lecture 12 Page 1 CS 236, Spring 2008 Virtual Private Networks VPNs What if your company has more than one office? And they’re far apart? –Like on opposite.
Lecture 20 Page 1 Advanced Network Security Basic Approaches to DDoS Defense Advanced Network Security Peter Reiher August, 2014.
Module 11: Designing Security for Network Perimeters.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
Security fundamentals Topic 10 Securing the network perimeter.
CSCE 201 Network Security Firewalls Fall CSCE Farkas2 Traffic Control – Firewall Brick wall placed between apartments to prevent the spread.
Lecture 12 Page 1 CS 236 Online Network Security: Firewalls, VPNs, and Honeypots CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Role Of Network IDS in Network Perimeter Defense.
Lecture 12 Page 1 CS 136, Fall 2011 Network Security, Continued CS 136 Computer Security Peter Reiher November 1, 2011.
Cryptography and Network Security
Lecture 9 Page 1 CS 136, Spring 2014 Network Security CS 136 Computer Security Peter Reiher May 6, 2014.
Lecture 12 Page 1 CS 236, Spring 2008 Network Security: Firewalls, VPNs, and Honeypots CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Lecture 9 Page 1 CS 136, Spring 2016 Network Security Computer Security Peter Reiher April 26, 2016.
Lecture 9 Page 1 CS 236 Online Firewalls What is a firewall? A machine to protect a network from malicious external attacks Typically a machine that sits.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Security fundamentals
Some Important Network Characteristics for Security
Outline What is a firewall? Types of firewalls
Computer Data Security & Privacy
Firewalls.
6.6 Firewalls Packet Filter (=filtering router)
Firewalls Jiang Long Spring 2002.
Firewalls.
FIREWALL.
Network Security: Firewalls, VPNs, and Honeypots CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Network Security: Firewalls, VPNs, and Honeypots CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Implementing Firewalls
Outline The concept of perimeter defense and networks Firewalls.
Presentation transcript:

Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009

Lecture 12 Page 2 CS 136, Spring 2009 Outline What is a firewall? Types of firewalls Characteristics of firewalls

Lecture 12 Page 3 CS 136, Spring 2009 Firewalls “A system or combination of systems that enforces a boundary between two or more networks” - NCSA Firewall Functional Summary Usually, a computer that keeps the bad guys out

Lecture 12 Page 4 CS 136, Spring 2009 Typical Use of a Firewall Local Network The Internet ??? Firewall ???

Lecture 12 Page 5 CS 136, Spring 2009 What Is a Firewall, Really? Typically a machine that sits between a LAN/WAN and the Internet Running special software That somehow regulates network traffic between the LAN/WAN and the Internet

Lecture 12 Page 6 CS 136, Spring 2009 Firewalls and Perimeter Defense Firewalls implement a form of security called perimeter defense Protect the inside of something by defending the outside strongly –The firewall machine is often called a bastion host Control the entry and exit points If nothing bad can get in, I’m safe, right?

Lecture 12 Page 7 CS 136, Spring 2009 Weaknesses of Perimeter Defense Models Breaching the perimeter compromises all security Windows passwords are a form of perimeter defense –If you get past the password, you can do anything Perimeter defense is part of the solution, not the entire solution

Lecture 12 Page 8 CS 136, Spring 2009 Weaknesses of Perimeter Defense

Lecture 12 Page 9 CS 136, Spring 2009 Defense in Depth An old principle in warfare Don’t rely on a single defensive mechanism or defense at a single point Combine different defenses Defeating one defense doesn’t defeat your entire plan

Lecture 12 Page 10 CS 136, Spring 2009 So What Should Happen?

Lecture 12 Page 11 CS 136, Spring 2009 Or, Better

Lecture 12 Page 12 CS 136, Spring 2009 Or, Even Better

Lecture 12 Page 13 CS 136, Spring 2009 So Are Firewalls Any Use? Definitely! They aren’t the full solution, but they are absolutely part of it Anyone who cares about security needs to run a decent firewall They just have to do other stuff, too 94% of respondents in 2008 CSI/FBI survey say they use firewalls

Lecture 12 Page 14 CS 136, Spring 2009 Types of Firewalls Filtering gateways –AKA screening routers Application level gateways –AKA proxy gateways Reverse firewalls

Lecture 12 Page 15 CS 136, Spring 2009 Filtering Gateways Based on packet routing information Look at information in the incoming packets’ headers Based on that information, either let the packet through or reject it

Lecture 12 Page 16 CS 136, Spring 2009 Example Use of Filtering Gateways Allow particular external machines to telnet into specific internal machines –Denying telnet to other machines Or allow full access to some external machines And none to others

Lecture 12 Page 17 CS 136, Spring 2009 A Fundamental Problem IP addresses can be spoofed If your filtering firewall trusts packet headers, it offers little protection Situation may be improved by IPsec –But hasn’t been yet Firewalls can perform the ingress/egress filtering discussed earlier

Lecture 12 Page 18 CS 136, Spring 2009 Filtering Based on Ports Most incoming traffic is destined for a particular machine and port –Which can be derived from the IP and TCP headers Only let through packets to select machines at specific ports Makes it impossible to externally exploit flaws in little-used ports –If you configure the firewall right...

Lecture 12 Page 19 CS 136, Spring 2009 Pros and Cons of Filtering Gateways +Fast +Cheap +Flexible +Transparent –Limited capabilities –Dependent on header authentication –Generally poor logging –May rely on router security

Lecture 12 Page 20 CS 136, Spring 2009 Application Level Gateways Also known as proxy gateways and stateful firewalls Firewalls that understand the application- level details of network traffic –To some degree Traffic is accepted or rejected based on the probable results of accepting it

Lecture 12 Page 21 CS 136, Spring 2009 How Application Level Gateways Work The firewall serves as a general framework Various proxies are plugged into the framework Incoming packets are examined –And handled by the appropriate proxy

Lecture 12 Page 22 CS 136, Spring 2009 Firewall Proxies Programs capable of understanding particular kinds of traffic –E.g., FTP, HTTP, videoconferencing Proxies are specialized A good proxy must have deep understanding of the network application

Lecture 12 Page 23 CS 136, Spring 2009 An Example Proxy A proxy to audit What might such a proxy do? –Only allow from particular users through –Or refuse from known spam sites –Or filter out with unsafe inclusions (like executables)

Lecture 12 Page 24 CS 136, Spring 2009 What Are the Limits of Proxies? Proxies can only test for threats they understand Either they must permit a very limited set of operations Or they must have deep understanding of the program they protect –If too deep, they may share the flaw Performance limits on how much work they can do on certain types of packets

Lecture 12 Page 25 CS 136, Spring 2009 Pros and Cons of Application Level Gateways +Highly flexible +Good logging +Content-based filtering +Potentially transparent –Slower –More complex and expensive –A good proxy is hard to find

Lecture 12 Page 26 CS 136, Spring 2009 Reverse Firewalls Normal firewalls keep stuff from the outside from getting inside Reverse firewalls keep stuff from the insider from getting outside What’s the point of that?

Lecture 12 Page 27 CS 136, Spring 2009 Possible Uses of Reverse Firewalls Concealing details of your network from attackers Preventing compromised machines from sending things out –E.g., intercepting bot communications or stopping DDoS

Lecture 12 Page 28 CS 136, Spring 2009 Basic Techniques for Reverse Firewalls Pretty similar to normal ones Intercept packets going from local network to outside world Use firewall techniques to allow/prevent communications Usually bundled in same box as normal firewall

Lecture 12 Page 29 CS 136, Spring 2009 Firewall Characteristics Statefulness Transparency Handling authentication Handling encryption Looking for viruses

Lecture 12 Page 30 CS 136, Spring 2009 Stateful Firewalls Much network traffic is connection- oriented –E.g., telnet and videoconferencing Proper handling of that traffic requires the firewall to maintain state But handling information about connections is more complex

Lecture 12 Page 31 CS 136, Spring 2009 Firewalls and Transparency Ideally, the firewall should be invisible –Except when it vetoes access Users inside should be able to communicate outside without knowing about the firewall External users should be able to invoke internal services transparently

Lecture 12 Page 32 CS 136, Spring 2009 Firewalls and Authentication Many systems want to allow specific sites or users special privileges Firewalls can only support that to the extent that strong authentication is available –At the granularity required For general use, may not be possible –In current systems

Lecture 12 Page 33 CS 136, Spring 2009 Firewalls and Encryption Firewalls provide no confidentiality Unless the data is encrypted But if the data is encrypted, the firewall can’t examine it So typically the firewall must be able to decrypt –Or only work on unencrypted parts of packets Can decrypt, analyze, and re-encrypt

Lecture 12 Page 34 CS 136, Spring 2009 Firewalls and Viruses Firewalls are an excellent place to check for viruses –Only one place needs to be updated Virus detection software can be run on incoming executables Requires that firewall knows when executables come in And must be reasonably fast Again, might be issues with encryption