E43CS ITActCh4
E43CS ITActCh4
Page | 1
4. Network Security
4.1 Basic Concepts
4.2 Dimensions of Network Security
4.3 Network Attacks
4.4 Intrusion Detection System
4.5 Virtual Private Networks:
----------------------------------------------------------------------------------
Network security is any activity designed to protect the usability and integrity of your network
and data. It includes both hardware and software technologies. Effective network security manages
access to the network. It targets a variety of threats and stops them from entering or spreading on your
network.
Network security consists of the policies and practices adopted to prevent and monitor
unauthorized access, misuse, modification, or denial of a computer network and network-accessible
resources.
Network security is the security provided to a network from unauthorized access and risks. It is the duty
of network administrators to adopt preventive measures to protect their networks from potential security
threats.
Computer networks that are involved in regular transactions and communication within the
government, individuals, or business require security. The most common and simple way of protecting a
network resource is by assigning it a unique name and a corresponding password.
Types of Network Security Devices
Active Devices -These security devices block the surplus traffic. Firewalls, antivirus scanning
devices, and content filtering devices are the examples of such devices.
Passive Devices - These devices identify and report on unwanted traffic, for example, intrusion
detection appliances.
Preventative Devices - These devices scan the networks and identify potential security
problems. For example, penetration testing devices and vulnerability assessment appliances.
Unified Threat Management (UTM) - These devices serve as all-in-one security devices.
Examples include firewalls, content filtering, web caching, etc.
Firewalls
A firewall is a network security system that manages and regulates the network traffic based on some
protocols. A firewall establishes a barrier between a trusted internal network and the internet.
Firewalls exist both as software that run on a hardware and as hardware appliances. Firewalls that are
hardware-based also provide other functions like acting as a DHCP server for that network.
Most personal computers use software-based firewalls to secure data from threats from the internet.
Many routers that pass data between networks contain firewall components and conversely, many
firewalls can perform basic routing functions.
Firewalls are commonly used in private networks or intranets to prevent unauthorized access from the
internet. Every message entering or leaving the intranet goes through the firewall to be examined for
security measures.
An ideal firewall configuration consists of both hardware and software based devices. A firewall also
helps in providing remote access to a private network through secure authentication certificates and
logins.
Hardware and Software Firewalls
Hardware firewalls are standalone products. These are also found in broadband routers. Most
hardware firewalls provide a minimum of four network ports to connect other computers. For larger
networks − e.g., for business purpose − business networking firewall solutions are available.
Software firewalls are installed on your computers. A software firewall protects your computer from
internet threats.
Page | 2
Antivirus
An antivirus is a tool that is used to detect and remove malicious software. It was originally
designed to detect and remove viruses from computers.
Modern antivirus software provide protection not only from virus, but also from worms, Trojan-horses,
adwares, spywares, keyloggers, etc. Some products also provide protection from malicious URLs, spam,
phishing attacks, botnets, DDoS attacks, etc.
Content Filtering
Content filtering devices screen unpleasant and offensive emails or webpages. These are used as
a part of firewalls in corporations as well as in personal computers. These devices generate the message
"Access Denied" when someone tries to access any unauthorized web page or email.
Content is usually screened for pornographic content and also for violence- or hate-oriented content.
Organizations also exclude shopping and job related contents.
Content filtering can be divided into the following categories −
Web filtering
Screening of Web sites or pages
E-mail filtering
Screening of e-mail for spam
Other objectionable content
Intrusion Detection Systems
Intrusion Detection Systems, also known as Intrusion Detection and Prevention Systems, are the
appliances that monitor malicious activities in a network, log information about such activities, take
steps to stop them, and finally report them.
Intrusion detection systems help in sending an alarm against any malicious activity in the network,
drop the packets, and reset the connection to save the IP address from any blockage. Intrusion detection
systems can also perform the following actions −
Correct Cyclic Redundancy Check (CRC) errors
Prevent TCP sequencing issues
Clean up unwanted transport and network layer options
Use of big data : the much sophisticated tools not only extract data from your social media
networking websites they even let spiders to enter your system and look into your personal files
stored on your desktop, laptop or even mobile phones.
Phishing: this is not a new concept, cybercriminials use this for over a decade, they flood the IT
sector with useless information so as to backchannel the information they needed.
Politically sponsored attacks: government led intelligence agencies attack other governments
power projects, transportation and other facilities in order to create chaos.
Machine learning: artificial intelligence is the new way of society learning, this brings a tender
touch to explicitly programmed subsets creating data packets.
Mobile applications: organizations emphasis on use of applications give less time to developers
to check out bugs in their programmed apps which led to hackers in providing a safe way to
access your device without your knowledge.
Page | 3
Page | 4
Ten Dimensions of Cyber Security Performance
I am proposing a framework for managing cyber security performance. As a preview, here are the ten
dimensions:
1. Optimize Exposure: attack surface and vulnerabilities, including assets, people, processes, &
technologies
2. Effective Threat Intelligence: understanding the threat agents
3. Effective Design & Development: security & privacy by design
4. Quality of Protection & Controls
5. Effective/Efficient Execution & Operations
6. Effective Response, Recovery, & Resilience
7. Effective External Engagement: responsibilities and risk drivers
8. Effective Learning & Agility: OODA at an organization level
9. Optimize Total Cost of Risk: (loss distribution approach)
10. Responsibility & Accountability: including governance and compliance
Each of the ten dimensions are explored in subsequent posts (see links above). The interactions
among the first six dimensions are discussed in a post called "Operational Cyber Security & Single Loop
Learning". The interactions among the second four dimensions are discussed in "Agile Cyber Security
and Double Loop Learning".
External threats can be further categorized into either structured threats or unstructured threats:
Structured external threats: These threats originate from a malicious individual, a group of
malicious individual(s), or a malicious organization. Structured threats are usually initiated from
network attackers that have a premeditated thought on the actual damages and losses that they want
to cause. Possible motives for structured external threats include greed, politics, terrorism, racism,
and criminal payoffs. These attackers are highly skilled on network design, avoiding security
measures, Intrusion Detection Systems (IDSs), access procedures, and hacking tools. They have the
necessary skills to develop new network attack techniques and the ability to modify existing hacking
tools for their exploitations. In certain cases, an internal authorized individual may assist the
attacker.
Unstructured external threats: These threats originate from an inexperienced attacker, typically
from a script kiddie. Script kiddie refers to an inexperienced attacker who uses cracking tools or
scripted tools readily available on the Internet to perform a network attack. Script kiddies are usually
inadequately skilled to create the threats on their own. They can be considered bored individuals
seeking some form of fame by attempting to crash websites and other public targets on the Internet.
External attacks can also occur either remotely or locally:
Remote external attacks: These attacks are usually aimed at the services that an organization
offers to the public. The various forms that remote external attacks can take are:
o Remote attacks aimed at the services available for internal users. This remote attack
usually occurs when there is no firewall solution implemented to protect these internal
services.
o Remote attacks aimed at locating modems to access the corporate network.
o Denial of service (DoS) attacks to place an exceptional processing load on servers in an
attempt to prevent authorized user requests from being serviced.
o War dialing of the corporate private branch exchange (PBX).
o Attempts to brute force password authenticated systems.
Local external attacks: These attacks typically originate from situations where computing
facilities are shared and access to the system can be obtained.
2. Internal threats: Internal attacks originate from dissatisfied or unhappy inside employees or
contractors. Internal attackers have some form of access to the system and usually try to hide their
attack as a normal process. For instance, internal disgruntled employees have local access to some
resources on the internal network already. They could also have some administrative rights on the
network. One of the best means to protect against internal attacks is to implement an Intrusion
Detection System and to configure it to scan for both external and internal attacks. All forms of
attacks should be logged and the logs should be reviewed and followed up.
With respect to network attacks, the core components that should be included when users design
network security are:
Network attack prevention
Network attack detection
Network attack isolation
Network attack recovery
What are some of the more prevalent types of attacks today?
Page | 6
Malware – short for malicious software which is specifically designed to disrupt, damage, or gain
authorized access to a computer system. Much of the malware out there today is self-replicating:
once it infects one host, from that host it seeks entry into other hosts over the Internet, and from the
newly infected hosts, it seeks entry into yet more hosts. In this manner, self-replicating malware can
spread exponentially fast.
Virus , Worm and Botnet.
DoS (Denial of Service) – A DoS attack renders a network, host, or other pieces of infrastructure
unusable by legitimate users. Most Internet DoS attacks fall into one of three categories :
Vulnerability attack ; Bandwidth flooding ; Connection flooding.
DDoS (Distributed DoS) – DDoS is a type of DOS attack where multiple compromised systems, are
used to target a single system causing a Denial of Service (DoS) attack. DDoS attacks leveraging
botnets with thousands of comprised hosts are a common occurrence today. DDoS attacks are much
harder to detect and defend against than a DoS attack from a single host.
Packet sniffer – A passive receiver that records a copy of every packet that flies by is called a
packet sniffer. By placing a passive receiver in the vicinity of the wireless transmitter, that receiver
can obtain a copy of every packet that is transmitted! These packets can contain all kinds of sensitive
information, including passwords, social security numbers, trade secrets, and private personal
messages. some of the best defenses against packet sniffing involve cryptography.
IP Spoofing – The ability to inject packets into the Internet with a false source address is known as
IP spoofing, and is but one of many ways in which one user can masquerade as another user. To
solve this problem, we will need end-point authentication, that is, a mechanism that will allow us to
determine with certainty if a message originates from where we think it does.
Man-in-the-Middle Attack – As the name indicates, a man-in-the-middle attack occurs when
someone between you and the person with whom you are communicating is actively monitoring,
capturing, and controlling your communication transparently. For example, the attacker can re-route
a data exchange. When computers are communicating at low levels of the network layer, the
computers might not be able to determine with whom they are exchanging data.
Compromised-Key Attack – A key is a secret code or number necessary to interpret secured
information. Although obtaining a key is a difficult and resource-intensive process for an attacker, it
is possible. After an attacker obtains a key, that key is referred to as a compromised key. An attacker
uses the compromised key to gain access to a secured communication without the sender or receiver
being aware of the attack.
Phishing – The fraudulent practice of sending emails purporting to be from reputable companies in
order to induce individuals to reveal personal information, such as passwords and credit card
numbers.
DNS spoofing – Also referred to as DNS cache poisoning, is a form of computer security hacking in
which corrupt Domain Name System data is introduced into the DNS resolver’s cache, causing the
name server to return an incorrect IP address.
Page | 8
Whatever the type, an intrusion detection system raises an alarm when it finds a match. The alarm can
range from something modest, such as writing a note in an audit log, to something significant, such as
paging the system security administrator. Particular implementations allow the user to determine what
action the system should take on what events.
In general, responses fall into three major categories (any or all of which can be used in a single
response):
Monitor, collect data, perhaps increase amount of data collected
Protect, act to reduce exposure
Call a human
2. False Results:
Intrusion detection systems are not perfect, and mistakes are their biggest problem. Although an
IDS might detect an intruder correctly most of the time, it may stumble in two different ways: by raising
an alarm for something that is not really an attack (called a false positive, or type I error in the statistical
community) or not raising an alarm for a real attack (a false negative, or type II error). Too many false
positives means the administrator will be less confident of the IDS's warnings, perhaps leading to a real
alarm's being ignored. But false negatives mean that real attacks are passing the IDS without action. We
say that the degree of false positives and false negatives represents the sensitivity of the system. Most
IDS implementations allow the administrator to tune the system's sensitivity, to strike an acceptable
balance between false positives and negatives.
IDS strength and limitations:
On the upside, IDSs detect an ever-growing number of serious problems. And as we learn more
about problems, we can add their signatures to the IDS model. Thus, over time, IDSs continue to
improve. At the same time, they are becoming cheaper and easier to administer. On the downside,
avoiding an IDS is a first priority for successful attackers. An IDS that is not well defended is useless.
Fortunately, stealth mode IDSs are difficult even to find on an internal network, let alone to
compromise. IDSs look for known weaknesses, whether through patterns of known attacks or models of
normal behavior. Similar IDSs may have identical vulnerabilities, and their selection criteria may miss
similar attacks. Knowing how to evade a particular model of IDS is an important piece of intelligence
passed within the attacker community. Of course, once manufacturers become aware of a shortcoming in
their products, they try to fix it. Fortunately, commercial IDSs are pretty good at identifying attacks.
Another IDS limitation is its sensitivity, which is difficult to measure and adjust. IDSs will never be
perfect, so finding the proper balance is critical.
In general, IDSs are excellent additions to a network's security. Firewalls block traffic to
particular ports or addresses; they also constrain certain protocols to limit their impact. But by
definition, firewalls have to allow some traffic to enter a protected area. Watching what that traffic
actually does inside the protected area is an IDS's job, which it does quite well.
Examples of Intrusion
o remote root compromise
o web server defacement
o guessing / cracking passwords
o copying databases containing credit card numbers
o viewing sensitive data without authorization
o running a packet sniffer
o distributing pirated software
o using an unsecured modem to access internal network
o impersonating an executive to get information
o using an unattended workstation
Hackers
•motivated by thrill of access and/or status
–hacking community is a strong meritocracy
Page | 9
–status is determined by level of competence
•benign intruders consume resources and slow performance for legitimate users
•intrusion detection systems (IDSs) and intrusion prevention systems (IPSs) are designed to help counter
hacker threats
–can restrict remote logons to specific IP addresses
–can use virtual private network technology (VPN)
•intruder problem led to establishment of computer emergency response teams (CERTs)
Criminals
•organized groups of hackers now a threat
–corporation / government / loosely affiliated gangs
–meet in underground forums
–common target is credit card files on e-commerce servers
•criminal hackers usually have specific targets
–once penetrated act quickly and get out
•IDS / IPS can be used but less effective
•sensitive data should be encrypted
Insider Attacks
•among most difficult to detect and prevent
•employees have access and systems knowledge
•may be motivated by revenge/entitlement
–employment was terminated
–taking customer data when moving to a competitor
•IDS / IPS can be useful but also need:
–enforcement of least privilege, monitor logs, strong authentication, termination process
•Security Intrusion:
A security event, or a combination of multiple security events, that constitutes a security incident
in which an intruder gains, or attempts to gain, access to a system (or system resource) without
having authorization to do so.
•Intrusion Detection :
A security service that monitors and analyzes system events for the purpose of finding, and
providing real-time or near real-time warning of, attempts to access system resources in an unauthorized
manner
Page | 10