Defense Techniques Sepehr Sadra Tehran Co. Ltd. Ali Shayan November 2008.

Slides:



Advertisements
Similar presentations
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Advertisements

IUT– Network Security Course 1 Network Security Firewalls.
1 Firewalls. 2 References 1.Mark Stamp, Information Security: Principles and Practice, Wiley Interscience, Robert Zalenski, Firewall Technologies,
FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Winter CMPE 155 Week 7. Winter Assignment 6: Firewalls What is a firewall? –Security at the network level. Wide-area network access makes.
Fall 2008CS 334: Computer Security1 Firewalls Special Thanks to our friends at The Blekinge Institute of Technology, Sweden for providing the basis for.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Security Firewall Firewall design principle. Firewall Characteristics.
—On War, Carl Von Clausewitz
Chapter 11 Firewalls.
Access Control for Networks Problems: –Enforce an access control policy Allow trust relationships among machines –Protect local internet from outsiders.
Firewalls and Intrusion Detection Systems
5/4/01EMTM 5531 EMTM 553: E-commerce Systems Lecture 7b: Firewalls Insup Lee Department of Computer and Information Science University of Pennsylvania.
Firewall Security Chapter 8. Perimeter Security Devices Network devices that form the core of perimeter security include –Routers –Proxy servers –Firewalls.
Chapter 7 Firewalls. Firewall Definition  A network device that enforces network access control based upon a defined security policy.
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
Beth Johnson April 27, What is a Firewall Firewall mechanisms are used to control internet access An organization places a firewall at each external.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Chapter 8 PIX Firewall. Adaptive Security Algorithm (ASA)  Used by Cisco PIX Firewall  Keeps track of connections originating from the protected inside.
Firewalls CS432. Overview  What are firewalls?  Types of firewalls Packet filtering firewalls Packet filtering firewalls Sateful firewalls Sateful firewalls.
Network Security (Firewall) Instructor: Professor Morteza Anvari Student: Xiuxian Chen ID: Term: Spring 2001.
A Brief Taxonomy of Firewalls
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Why do we need Firewalls? Internet connectivity is a must for most people and organizations  especially for me But a convenient Internet connectivity.
Intranet, Extranet, Firewall. Intranet and Extranet.
FIREWALL Mạng máy tính nâng cao-V1.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.
Chapter 6: Packet Filtering
Chapter 11 Firewalls.
FIREWALLS Prepared By: Hilal TORGAY Uğurcan SOYLU.
1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University R355.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Fundamentals of Proxying. Proxy Server Fundamentals  Proxy simply means acting on someone other’s behalf  A Proxy acts on behalf of the client or user.
Firewall – Survey Purpose of a Firewall – To allow ‘proper’ traffic and discard all other traffic Characteristic of a firewall – All traffic must go through.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
1 Firewalls Types of Firewalls Inspection Methods  Static Packet Inspection  Stateful Packet Inspection  NAT  Application Firewalls Firewall Architecture.
Karlstad University Firewall Ge Zhang. Karlstad University A typical network topology Threats example –Back door –Port scanning –…–…
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Security fundamentals Topic 10 Securing the network perimeter.
Firewalls Group 11Group 12 Bryan Chapman Richard Dillard Rohan Bansal Huang Chen Peijie Shen.
Chapter 8 Network Security Thanks and enjoy! JFK/KWR All material copyright J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking:
Firewall – Survey  Purpose of a Firewall  To allow ‘proper’ traffic and discard all other traffic  Characteristic of a firewall  All traffic must go.
CSCE 201 Network Security Firewalls Fall CSCE Farkas2 Traffic Control – Firewall Brick wall placed between apartments to prevent the spread.
1 An Introduction to Internet Firewalls Dr. Rocky K. C. Chang 12 April 2007.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
1 CNLab/University of Ulsan Chapter 19 Firewalls  Packet Filtering Firewall  Application Gateway Firewall  Firewall Architecture.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Polytechnic University Firewall and Trusted Systems Presented by, Lekshmi. V. S cos
Security fundamentals
Computer Data Security & Privacy
Prepared By : Pina Chhatrala
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Introduction to Networking
Firewalls.
* Essential Network Security Book Slides.
Firewalls Purpose of a Firewall Characteristic of a firewall
Firewalls.
Session 20 INST 346 Technologies, Infrastructure and Architecture
Presentation transcript:

Defense Techniques Sepehr Sadra Tehran Co. Ltd. Ali Shayan November 2008

2 Overview FirewallsFirewalls –General Overview –Packet Filter, –Circuit-Level Gateway, Application Gateway –Stateful-Inspection –Firewalking

3 Firewall Local network is trusted „Outside“ is potentially malicious Unprotected network –security is implemented on each host –single vulnerable host would violate whole network security –administrative nightmare Protected network –place barrier at the borders of trusted, inside network –barrier provides access control –helps with system monitoring and simplifies management  such a barrier is called firewall

4 Firewall Not the ultimate solution –cannot deal satisfatorily with content –vulnerable to inside attacks and covert channels –potential performance bottlenecks –when compromised, network is unprotected Security Strategies –least privilege only permissions that are necessary should be granted –defense in depth additional security installations should be present –fail-safe a failing firewall may not reduce security

5 Packet Filter Packet filters route packets between internal and external hosts Do it selectively – perform filtering –allow or block certain types of packets Screening procedure is based on –Protocol (whether the packet is a TCP, UDP, or ICMP packet) –IP source/destination address –TCP or UDP source/destination port –TCP flags –ICMP message type Inbound and outbound interfaces may be used to specify rules

6 Packet Filter Filtering Rules - filtering is specified using a set of rules Each rules specifies –action (allow, deny) –source address/port pattern –destination address/port pattern –presence or absence of flags When a packet is received the rules are applied in an ordered sequence –if a rule matches the corresponding action is taken –if no rule matches, a default action is taken

7 Packet Filter Might be vulnerable to spoofing –only filter packets coming from outside Fragmented Datagrams –discarded when not enough information to apply filter –when first fragment contains enough information, remaining one are passed unchecked –potential vulnerability first fragment with innocent values other fragments with non-zero offset rewrite these values with malicious ones reassembled fragment is delivered to protected service

8 Packet Filter Advantages –easy to implement (relies on existing hardware) –good performance Limits –limited auditing –difficult to configure –not very flexible, extensible –can be bypassed by “tunneling information” FreeBSD - ipfw, ipf Linux –iptables, ipchains

9 Gateway A gateway is a host with two (or more) network interfaces –(usually) operating system is configured so that IP forwarding is disabled –Traffic can pass across the gateway only if there is an application that explicitly operates the transfer (proxy) Proxy Service –application that acts as an intermediary between client within the protected network and server in the outside world and vice versa –when a client requests a connection to the outside, it actually connects to the proxy –proxy examines the connection request with respect to security policy –and possibly opens the actual connection to the server on behalf of the client

10 Circuit-Level Gateway Not only checks packets, but sessions / connections - TCP handshaking Transparently exchange data Do not need to be aware of the protocol Can not perform application-level filtering

11 Application Gateway Application-level gateways interpret the particular application protocol being “proxied” –e.g. HTTP / FTP –need to know the application protocol details –need a different proxy for each protocol –can perform advanced filtering (e.g. on particular commands) Advantages –cheap –extensive logging possible –very secure – internal network invisible Limits –scalability, performance bottleneck

12 Stateful Inspection acts as a packet filter, circuite-level and application-level gateway but accesses higher-level protocol information –allows to track sessions (e.g. ftp) –virtual sessions for connection-less protocols (e.g. UDP) firewall stores ports used in a particular UDP transaction temporarily creates an exception to let the answer pass through Cisco PIX, Check Poin Firewall 1, Sepehr 4100,3400

13 De-Militarized Zone DMZ – de-militarized zone –network area between two packet filters external filter only allows traffic from outside internal filter only allows traffic from inside –separates external and internal network –contains hosts that provide external services (e.g. webserver, DNS) and application gateways for internal clients –when hosts are compromised internal traffic cannot be sniffed protection from internal packet filter

14 Firewalking Technique used to test the rules of a firewall without triggering inside IDS Tools available at Based on similar mechanism as used by traceroute –firewall at hop n –host at hop n+m –TTL set to n+1 –If a TTL expired message is received the firewall didn’t filter the packet Scan of firewall ACLs performed without triggering inside logging mechanisms

15 References [1]National Institute of Sdandards and Technology, Guidelines on Firewalls and Firewall Policy, NIST SP , [2] Sepehr S. T. Co. LTD, Sepehr Firewalls, October [3] D. Brent Chapman & Elizabeth D. Zwicky, Building Internet Firewalls, O.Reilly, 2nd Edition, 2000.