Web Filtering and Deep Packet Inspection Artyom Churilin Tallinn University of Technology 2011.

Slides:



Advertisements
Similar presentations
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Advertisements

FIREWALLS Chapter 11.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Firewalls and Intrusion Detection Systems
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Kerim KORKMAZ A. Tolga KILINÇ H. Özgür BATUR Berkan KURTOĞLU.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
LittleOrange Internet Security an Endpoint Security Appliance.
DIYTP Computer Security – Virus Scanners  Works in two ways:  List of known ‘bad’ files  Suspicious activity  Terminate and Stay Resident (TSR)
Department Of Computer Engineering
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
1 Advanced Application and Web Filtering. 2 Common security attacks Finding a way into the network Exploiting software bugs, buffer overflows Denial of.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
Network Security (Firewall) Instructor: Professor Morteza Anvari Student: Xiuxian Chen ID: Term: Spring 2001.
A Brief Taxonomy of Firewalls
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
FIREWALL Mạng máy tính nâng cao-V1.
Market Analysis Decision Group.
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
Intrusion Prevention System. Module Objectives By the end of this module, participants will be able to: Use the FortiGate Intrusion Prevention System.
Deep Packet Inspection Matthew Carson. What is Deep Packet Inspection? A form of packet filtering which examines the data portion of an internet packet.
1 INTERNET AND WORLD WIDE WEB TECHNOLOGIES BUS Abdou Illia, Spring 2007 (Week 11, Thursday 3/22/2007)
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
FIREWALLS Prepared By: Hilal TORGAY Uğurcan SOYLU.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Network Security Technologies CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Internet Architecture and Governance
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Infrastructure Consolidation Cloud/SaaS Web 2.0 Converged Communications Virtualization Mobile Devices.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Moving from Reactive to Proactive – DeepNines and ESU 3 Nate Jackson, Territory Manager Greg Jackson, Vice President of Technical Services Martin Rosas,
A Network Security -Firewall Bruce Turin.
DECISION Group Inc.. Decision Group Monitoring Center Solution on Internet Access for LEA or Intelligence.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Decision Group April 2010 Market Analysis. Agenda  Market  DPI/DPC Market Size  Market Segments  Forensic Solution Market  Competitors  Decision.
By Steve Shenfield COSC 480.  Definition  Incidents  Damages  Defense Mechanisms Firewalls/Switches/Routers Routing Techniques (Blackholing/Sinkholing)
A presentation by John Rowley for IUP COSC 356 Dr. William Oblitey Faculty member in attendance.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356.
I NTRODUCTION TO F IREWALLS. O VERVIEW OF F IREWALLS As the name implies, a firewall acts to provide secured access between two networks A firewall may.
Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
TMG Client Protection 6NPS – Session 7.
1.
Securing the Network Perimeter with ISA 2004
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
How a Stateful Firewall Works
Introduction to Networking
Firewalls.
Firewalls Purpose of a Firewall Characteristic of a firewall
Firewalls Routers, Switches, Hubs VPNs
Firewall.
Firewall Installation
Session 20 INST 346 Technologies, Infrastructure and Architecture
Using Software Restriction Policies
Presentation transcript:

Web Filtering and Deep Packet Inspection Artyom Churilin Tallinn University of Technology 2011

Web filtering & DPI Web filtering (content control) is a way control what content is permitted to a user. Deep Packet Inspection (DPI) is a form of computer network packet filtering that examines the data part (and possibly also the header) of a packet as it passes an inspection point, searching for protocol non-compliance, viruses, spam, intrusions or predefined criteria to decide if the packet can pass or if it needs to be routed to a different destination, or for the purpose of collecting statistical information.

Web filtering types Client-side filters (Cyber-Nanny) Content-limited or filtered ISPs Server side-filters, proxies (Squid), traffic shapers Specialized hardware/software (commercial off the shelf solutions)

Specialized systems: Websense McAfee Smart Filter Netsweeper

Web filtering techniques IP URL Keyword File type Database (site categorization)

Websense categories

McAfee SmartFilter Categories

Web filtering use Parental control (block adult content from minors) Content control (i.e. ISP blocking child abuse) Corporate environment, public libraries Commercial solutions

Deep Packet Inspection

DPI DPI has functionality of Intrusion Detection System (IDS), Intrusion Prevention System (IPS) and stateful firewall Advanced defense from threats More effective than DPI, DPS and FW Policies on many layers 3 -7 OSI

Symantec describes DPI Deep Packet Inspection promises to enhance firewall capabilities by adding the ability to analyze and filter SOAP and other XML messages, dynamically open and close ports for VoIP application traffic, perform in-line AV and spam screening, dynamically proxy IM traffic, eliminate the bevy of attacks against NetBIOS-based services, traffic-shape or do away with the many flavors of P2P traffic (recently shown to account for ~35% of internet traffic), and perform SSL session inspection

Use of DPI Network management Network security “Lawful intercept” Statistical data for network planning

Misuse of DPI Commercial Propaganda Governments (Censorship) Communist regimes (Censorship, disinformation) Autocratic regimes (Censorship, disinformation) Finding political dissidents

JUNE 22, 2009 Wall street journal online: Iran's Web Spying Aided By Western Technology Nokia Siemens The monitoring center that Nokia Siemens Networks sold to Iran was described in a company brochure as allowing "the monitoring and interception of all types of voice and data communication on all networks."

NOVEMBER 15, 2010 FORBES.COM : Nokia Siemens Denies Lingering Ties To Iran Surveillance

FEBRUARY 11, 2010 BBC : MEPs condemn Nokia Siemens 'surveillance tech' in Iran Google says its Gmail traffic has dropped sharply in Iran Nokia Siemens told BBC News that it had provided "very basic surveillance" capabilities to Iran Telecom in The product is called Monitoring Centre and can be used to monitor local telephone calls.

OpenNet initiative The OpenNet Initiative has documented network filtering of the Internet by national governments in over forty countries worldwide. Filtering is particularly appealing to governments as it allows them to control content not published within their national borders.

Pros of DPI Deep Packet Inspection is a promising technology in that it may help to solve security and many other problems.

Cons of DPI DPI adds complexity to an already complicated solution - firewalls, IDSs, session border controllers, and honeypots/nets etc… DPI is a powerful technology and is currently insufficiently regulated by law. If unethically and illegally used can bring awful consequences.

otonokia

Treedriver.com in Iran, you could not access postimees bbc cnn facebook only Slõhtuleht