Firewalls and Intrusion Detection Systems

Slides:



Advertisements
Similar presentations
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Advertisements

1 Firewalls. 2 References 1.Mark Stamp, Information Security: Principles and Practice, Wiley Interscience, Robert Zalenski, Firewall Technologies,
1 Topic 2 – Lesson 4 Packet Filtering Part I. 2 Basic Questions What is packet filtering? What is packet filtering? What elements are inside an IP header?
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Fall 2008CS 334: Computer Security1 Firewalls Special Thanks to our friends at The Blekinge Institute of Technology, Sweden for providing the basis for.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
Security Firewall Firewall design principle. Firewall Characteristics.
Security Presented by : Qing Ma. Introduction Security overview security threats password security, encryption and network security as specific.
Firewalls and Intrusion Detection Systems
Chapter 8 Deworming.
CS 483 – SD SECTION (8) AUTHORIZATION. INTRODUCTION The authorization (or access control) process is used to decide if person, program or device X is.
Intrusion Detection Systems and Practices
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Access Control 1 Access Control Access Control 2 Access Control  Two parts to access control  Authentication: Who goes there? o Determine whether access.
Intrusion Detection - Arun Hodigere. Intrusion and Intrusion Detection Intrusion : Attempting to break into or misuse your system. Intruders may be from.
Department Of Computer Engineering
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
FIREWALL Mạng máy tính nâng cao-V1.
January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.
Chapter 6: Packet Filtering
1 Computer Science 653 Lecture Inference Control Professor Wayne Patterson Howard University Fall 2009.
Part 2  Access Control 1 CAPTCHA Part 2  Access Control 2 Turing Test Proposed by Alan Turing in 1950 Human asks questions to another human and a computer,
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
Firewalls A note on the use of these ppt slides:
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
Signature Based and Anomaly Based Network Intrusion Detection
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
NS-H /11041 Intruder. NS-H /11042 Intruders Three classes of intruders (hackers or crackers): –Masquerader –Misfeasor –Clandestine user.
Beginning Network Security Monitor and control flow into and out of the LAN Ingress Egress Only let in the good guys Only let out the corp. business.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Firewalls  Firewall sits between the corporate network and the Internet Prevents unauthorized access from the InternetPrevents unauthorized access from.
Intrusion Detection (ID) Intrusion detection is the ART of detecting inappropriate, incorrect, or anomalous activity There are two methods of doing ID.
1 Figure 10-4: Intrusion Detection Systems (IDSs) HOST IDSs  Protocol Stack Monitor (like NIDS) Collects the same type of information as a NIDS Collects.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Chapter 8 Authorization Access control matrix Multilevel Security Multilateral security Covert channel Inference control CAPTCHA Firewalls IDS.
Intruders & Intrusion Detection Systems Intruders Three classes of intruders:Three classes of intruders: An individual who is not authorized to.
Firewalls 1.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Intrusion Detection System
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Chapter Seven: Authorization 2013Term 2 INTRODUCTION Additional forms of Access Control CAPTCHAs, which are designed to restrict access to humans Firewalls,
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
CompTIA Security+ Study Guide (SY0-401)
Managing Secure Network Systems
Computer Data Security & Privacy
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Principles of Computer Security
CompTIA Security+ Study Guide (SY0-401)
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
Firewalls.
Firewalls Purpose of a Firewall Characteristic of a firewall
Lecture 2: Overview of TCP/IP protocol
Lecture 3: Secure Network Architecture
Firewalls.
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

Firewalls and Intrusion Detection Systems Firewalls and IDS 1

Firewalls Firewalls and IDS 2

Firewalls Internal network Internet Firewall Firewall must determine what to let in to internal network and/or what to let out Access control for the network Firewalls and IDS 3

Firewall as Secretary A firewall is like a secretary To meet with an executive First contact the secretary Secretary decides if meeting is reasonable Secretary filters out many requests You want to meet chair of CS department? Secretary does some filtering You want to meet President of US? Secretary does lots of filtering! Firewalls and IDS 4

Firewall Terminology No standard terminology Types of firewalls Packet filter  works at network layer Stateful packet filter  transport layer Application proxy  application layer Personal firewall  for single user, home network, etc. Firewalls and IDS 5

Packet Filter Operates at network layer Can filters based on Source IP address Destination IP address Source Port Destination Port Flag bits (SYN, ACK, etc.) Egress or ingress application transport network link physical Firewalls and IDS 6

Packet Filter Advantage Disadvantages Speed No state Cannot see TCP connections Blind to application data application transport network link physical Firewalls and IDS 7

Packet Filter Configured via Access Control Lists (ACLs) Different meaning of ACL than previously Source IP Dest IP Source Port Dest Port Flag Bits Action Protocol Allow Inside Outside Any 80 HTTP > 1023 Deny All Any ACK All Intention is to restrict incoming packets to Web responses Firewalls and IDS 8

TCP ACK Scan Attacker sends packet with ACK bit set, without prior 3-way handshake Violates TCP/IP protocol ACK packet pass thru packet filter firewall Appears to be part of an ongoing connection RST sent by recipient of such packet Attacker scans for open ports thru firewall Firewalls and IDS 9

TCP ACK Scan Attacker knows port 1209 open thru firewall ACK dest port 1207 ACK dest port 1208 ACK dest port 1209 Trudy RST Internal Network Packet Filter Attacker knows port 1209 open thru firewall A stateful packet filter can prevent this (next) Since ACK scans not part of established connections Firewalls and IDS 10

Stateful Packet Filter Adds state to packet filter Operates at transport layer Remembers TCP connections and flag bits Can even remember UDP packets (e.g., DNS requests) application transport network link physical Firewalls and IDS 11

Stateful Packet Filter Advantages Can do everything a packet filter can do plus... Keep track of ongoing connections Disadvantages Cannot see application data Slower than packet filtering application transport network link physical Firewalls and IDS 12

Application Proxy A proxy is something that acts on your behalf Application proxy looks at incoming application data Verifies that data is safe before letting it in application transport network link physical Firewalls and IDS 13

Application Proxy Advantages Disadvantage Complete view of connections and applications data Filter bad data at application layer (viruses, Word macros) Disadvantage Speed application transport network link physical Firewalls and IDS 14

Application Proxy Creates a new packet before sending it thru to internal network Attacker must talk to proxy and convince it to forward message Proxy has complete view of connection Prevents some attacks stateful packet filter cannot  see next slides Firewalls and IDS 15

Firewalk Tool to scan for open ports thru firewall Known: IP address of firewall and IP address of one system inside firewall TTL set to 1 more than number of hops to firewall and set destination port to N If firewall does not let thru data on port N, no response If firewall allows data on port N thru firewall, get time exceeded error message Firewalls and IDS 16

Firewalk and Proxy Firewall Packet filter Router Router Router Trudy Dest port 12343, TTL=4 Dest port 12344, TTL=4 Dest port 12345, TTL=4 Time exceeded This will not work thru an application proxy The proxy creates a new packet, destroys old TTL Firewalls and IDS 17

Personal Firewall To protect one user or home network Can use any of the methods Packet filter Stateful packet filter Application proxy Firewalls and IDS 18

Firewalls and Defense in Depth Example security architecture DMZ FTP server WWW server DNS server Intranet with Personal Firewalls Packet Filter Application Proxy Internet Firewalls and IDS 19

Intrusion Detection Systems Firewalls and IDS 20

Intrusion Prevention Want to keep bad guys out Intrusion prevention is a traditional focus of computer security Authentication is to prevent intrusions Firewalls a form of intrusion prevention Virus defenses also intrusion prevention Comparable to locking the door on your car Firewalls and IDS 21

Intrusion Detection In spite of intrusion prevention, bad guys will sometime get into system Intrusion detection systems (IDS) Detect attacks Look for “unusual” activity IDS developed out of log file analysis IDS is currently a very hot research topic How to respond when intrusion detected? We don’t deal with this topic here Firewalls and IDS 22

Intrusion Detection Systems Who is likely intruder? May be outsider who got thru firewall May be evil insider What do intruders do? Launch well-known attacks Launch variations on well-known attacks Launch new or little-known attacks Use a system to attack other systems Etc. Firewalls and IDS 23

IDS Intrusion detection approaches Intrusion detection architectures Signature-based IDS Anomaly-based IDS Intrusion detection architectures Host-based IDS Network-based IDS Most systems can be classified as above In spite of marketing claims to the contrary Firewalls and IDS 24

Host-based IDS Monitor activities on hosts for Known attacks or Suspicious behavior Designed to detect attacks such as Buffer overflow Escalation of privilege Little or no view of network activities Firewalls and IDS 25

Network-based IDS Monitor activity on the network for Known attacks Suspicious network activity Designed to detect attacks such as Denial of service Network probes Malformed packets, etc. Can be some overlap with firewall Little or no view of host-base attacks Can have both host and network IDS Firewalls and IDS 26

Signature Detection Example Failed login attempts may indicate password cracking attack IDS could use the rule “N failed login attempts in M seconds” as signature If N or more failed login attempts in M seconds, IDS warns of attack Note that the warning is specific Admin knows what attack is suspected Admin can verify attack (or false alarm) Firewalls and IDS 27

Signature Detection Suppose IDS warns whenever N or more failed logins in M seconds Must set N and M so that false alarms not too common Can do this based on normal behavior But if attacker knows the signature, he can try N1 logins every M seconds In this case, signature detection slows the attacker, but might not stop him Firewalls and IDS 28

Signature Detection Many techniques used to make signature detection more robust Goal is usually to detect “almost signatures” For example, if “about” N login attempts in “about” M seconds Warn of possible password cracking attempt What are reasonable values for “about”? Can use statistical analysis, heuristics, etc. Must take care not to increase false alarm rate Firewalls and IDS 29

Signature Detection Advantages of signature detection Simple Detect known attacks Know which attack at time of detection Efficient (if reasonable number of signatures) Disadvantages of signature detection Signature files must be kept up to date Number of signatures may become large Can only detect known attacks Variation on known attack may not be detected Firewalls and IDS 30

Anomaly Detection Anomaly detection systems look for unusual or abnormal behavior There are (at least) two challenges What is normal for this system? How “far” from normal is abnormal? Statistics obviously required here The mean defines normal The variance indicates how far abnormal lives from normal Firewalls and IDS 31

What is Normal? Consider the scatterplot below White dot is “normal” Is red dot normal? Is green dot normal? How abnormal is the blue dot? Stats can be subtle y x Firewalls and IDS 32

How to Measure Normal? How to measure normal? Must measure during “representative” behavior Must not measure during an attack… …or else attack will seem normal Normal is statistical mean Must also know variance to have any reasonable chance of success Firewalls and IDS 33

How to Measure Abnormal? Abnormal is relative to some “normal” Abnormal indicates possible attack Statistical discrimination techniques: Bayesian statistics Linear discriminant analysis (LDA) Quadratic discriminant analysis (QDA) Neural nets, hidden Markov models, etc. Fancy modeling techniques also used Artificial intelligence Artificial immune system principles Many many others Firewalls and IDS 34

Anomaly Detection (1) Spse we monitor use of three commands: open, read, close Under normal use we observe Alice: open,read,close,open,open,read,close,… Of the six possible ordered pairs, four pairs are “normal” for Alice: (open,read), (read,close), (close,open), (open,open) Can we use this to identify unusual activity? Firewalls and IDS 35

Anomaly Detection (1) We monitor use of the three commands open, read, close If the ratio of abnormal to normal pairs is “too high”, warn of possible attack Could improve this approach by Also using expected frequency of each pair Use more than two consecutive commands Include more commands/behavior in the model More sophisticated statistical discrimination Firewalls and IDS 36

Anomaly Detection (2) Over time, Alice has accessed file Fn at rate Hn Recently, Alice has accessed file Fn at rate An H0 H1 H2 H3 .10 .40 A0 A1 A2 A3 .10 .40 .30 .20 Is this “normal” use? We compute S = (H0A0)2+(H1A1)2+…+(H3A3)2 = .02 And consider S < 0.1 to be normal, so this is normal Problem: How to account for use that varies over time? Firewalls and IDS 37

Anomaly Detection (2) To allow “normal” to adapt to new use, we update long-term averages as Hn = 0.2An + 0.8Hn Then H0 and H1 are unchanged, H2=.2.3+.8.4=.38 and H3=.2.2+.8.1=.12 And the long term averages are updated as H0 H1 H2 H3 .10 .40 .38 .12 Firewalls and IDS 38

Anomaly Detection (2) The updated long term average is New observed rates are… H0 H1 H2 H3 .10 .40 .38 .12 A0 A1 A2 A3 .10 .30 Is this normal use? Compute S = (H0A0)2+…+(H3A3)2 = .0488 Since S = .0488 < 0.1 we consider this normal And we again update the long term averages by Hn = 0.2An + 0.8Hn Firewalls and IDS 39

Anomaly Detection (2) The starting averages were After 2 iterations, the averages are H0 H1 H2 H3 .10 .40 H0 H1 H2 H3 .10 .38 .364 .156 The stats slowly evolve to match behavior This reduces false alarms and work for admin But also opens an avenue for attack… Suppose Trudy always wants to access F3 She can convince IDS this is normal for Alice! Firewalls and IDS 40

Anomaly Detection (2) To make this approach more robust, must also incorporate the variance Can also combine N stats as, for example, T = (S1 + S2 + S3 + … + SN) / N to obtain a more complete view of “normal” Similar (but more sophisticated) approach is used in IDS known as NIDES NIDES includes anomaly and signature IDS Firewalls and IDS 41

Anomaly Detection Issues System constantly evolves, so must IDS Static system would place huge burden on admin But evolving IDS makes it possible for attacker to (slowly) convince IDS that an attack is normal! Attacker may win simply by “going slow” What does “abnormal” really mean? Only that there is possibly an attack May not say anything specific about “attack” How to respond to such vague information? Signature detection tells exactly which attack Firewalls and IDS 42

Anomaly Detection Advantages Disadvantages Chance of detecting unknown attacks May be more efficient (no signatures) Disadvantages Must be used with signature detection Reliability is unclear May be subject to “go slow” attack Anomaly implies unusual activity Lack of specific info on possible attack Firewalls and IDS 43

Anomaly Detection: The Bottom Line Anomaly-based IDS is active research topic Many have high hopes for its ultimate success Often cited as key future security technology Hackers are not convinced… Title of a talk at Defcon 11: “Why Anomaly-based IDS is an Attacker’s Best Friend” Anomaly detection is difficult and tricky Is anomaly detection as hard as AI? Firewalls and IDS 44