FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh.

Slides:



Advertisements
Similar presentations
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Advertisements

Guide to Network Defense and Countermeasures Second Edition
IUT– Network Security Course 1 Network Security Firewalls.
FIREWALLS Chapter 11.
Personal Info 1 Prepared by: Mr. NHEAN Sophan  Presenter: Mr. NHEAN Sophan  Position: Desktop Support  Company: Khalibre Co,. Ltd 
1 Topic 2 – Lesson 4 Packet Filtering Part I. 2 Basic Questions What is packet filtering? What is packet filtering? What elements are inside an IP header?
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
1 Comnet 2010 Communication Networks Recitation 11 Security.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Internet Protocol Security An Overview of IPSec. Outline:  What Security Problem?  Understanding TCP/IP.  Security at What Level?  IP Security. 
Firewalls and Intrusion Detection Systems
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
بسم الله الرحمن الرحيم NETWORK SECURITY Done By: Saad Al-Shahrani Saeed Al-Smazarkah May 2006.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Chapter 20 Firewalls.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Intranet, Extranet, Firewall. Intranet and Extranet.
FIREWALL Mạng máy tính nâng cao-V1.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Chapter 6: Packet Filtering
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
The Security Aspect of Social Engineering Justin Steele.
Chapter 11 Firewalls.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
8: Network Management1 Firewalls. 8: Network Management2 Firewalls Two firewall types: m packet filter m application gateways To prevent denial of service.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Firewall Technologies Prepared by: Dalia Al Dabbagh Manar Abd Al- Rhman University of Palestine
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
1 Firewalls G53ACC Chris Greenhalgh. 2 Contents l Attacks l Principles l Simple filters l Full firewall l Books: Comer ch
TCP/IP Protocols Contains Five Layers
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Firewall Tutorial Hyukjae Jang Nc lab, CS dept, Kaist.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Intro to Firewalls. A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing.
ACCESS CONTROL LIST.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
SECURITY REQUIREMENTS AND MANAGEMENT: Presentation By: Guillermo Dijk.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
I NTRODUCTION TO F IREWALLS. O VERVIEW OF F IREWALLS As the name implies, a firewall acts to provide secured access between two networks A firewall may.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Firewall Techniques Matt Cupp.
Firewalls.
Network Security Marshall Leitem 11/30/04
Computer Data Security & Privacy
Prepared By : Pina Chhatrala
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Firewalls.
Firewalls Purpose of a Firewall Characteristic of a firewall
دیواره ی آتش.
FIREWALL.
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

FIREWALLS An Important Component in Computer Systems Security By: Bao Ming Soh

What is a Firewall hardware, software, or a combination of both, that isolates an internal network from the Internet. hardware, software, or a combination of both, that isolates an internal network from the Internet. filters information, allowing some packets to pass and blocking others. filters information, allowing some packets to pass and blocking others.

LAN vs. Individual

Why Use a Firewall prevent denial of service attacks prevent denial of service attacks –SYN flooding prevent unauthorized access to internal network prevent unauthorized access to internal network block Trojans / Application backdoors block Trojans / Application backdoors –Sasser Worm

How Firewalls Work NAT (Network Address Translation) NAT (Network Address Translation) Packet Filtering Packet Filtering Stateful Packet Inspection (SPI) Stateful Packet Inspection (SPI) Application-based Application-based

NAT (1) Implemented in routers Implemented in routers Computers in the network have different internal IP addresses Computers in the network have different internal IP addresses Outside world only see one IP address Outside world only see one IP address

NAT (2)

Packet Filtering Allow/drop packets based on: Allow/drop packets based on: –source IP address, destination IP address –TCP/UDP source and destination port numbers –ICMP message type –TCP SYN and ACK bits

NAT & Packet Filtering Advantage: Advantage: –Naturally provided by routers Disadvantages: Disadvantages: –only allows connections originating from inside the network –Level of security decreases with # of ports open –No outbound connection protection

Stateful Packet Inspection (SPI) Does not analyze various components of an IP packet Does not analyze various components of an IP packet Compares certain key parts of the packet to a database of trusted information Compares certain key parts of the packet to a database of trusted information

SPI (2) Advantages: Advantages: –Overcomes inflexibility of NAT firewalls –Only one port needs to be opened for each service (e.g. FTP daemon) Disadvantage: Disadvantage: –Additional performance overhead

Application-based Firewalls (1) Offer a more fine-grained control over network traffic Offer a more fine-grained control over network traffic Filter packets based on: Filter packets based on: –Application –IP Filtering –Port numbers and protocols used –Direction of traffic (inbound/outbound)

Application-based Firewalls (2) Advantages: Advantages: –More flexible than NAT-based firewalls –Provides application-based outbound traffic protection, in addition to inbound traffic protection –May block Trojan viruses Disadvantage: Disadvantage: –Security depends heavily on user

Limitations of Firewalls IP Spoofing IP Spoofing Communication vs. Performance vs. Security Communication vs. Performance vs. Security Application spoofing Application spoofing Social Engineering Social Engineering Content Attack Content Attack –confidential data transported into the network through permitted connections

Leak Tests “proof of concept” programs to show the vulnerability of firewalls “proof of concept” programs to show the vulnerability of firewalls Application-Masquerading Application-Masquerading –Solution: Checksums, MD5 Signatures FireHole FireHole –Bypass outbound traffic protection through “dll injection”  Application hijack –Solution: Component Control

Conclusion Firewalls are not fool-proof! Firewalls are not fool-proof! Essential to have a multi-layered approach in any defense system Essential to have a multi-layered approach in any defense system