Is Unit 5
Is Unit 5
Syllabus:
5.1 Firewall
“a network security device either hardware or
so ware-based which monitors all incoming and
outgoing traffic and based on a defined set of
security rules it accepts, rejects, or drops that
specific traffic”
o Need of firewall
o Before firewallsACL performed network
security can’t block packetscan’t keep
threats away
o Firewall can be –
hardware/so ware/combina on
o inspects network traffic
o Accepts or rejects messages- based on set of
rules
o It’s a par on between private(trusted)
n/w & public(un-trusted) n/w passing
through it
o A ributes of firewall: -
All traffic should pass through it
It should allow only authorized traffic
Firewall itself can stop a acks
o Protects system from threats & allows access
to outside world of internet
o Acts as network gateway- to protect internal
resources
o It can control outside resource that
employees are accessing
o It examines packet and forwards towards
des na on
o Firewall is installed on special computer
o separated from network – so incoming
request can’t enter directly into resources
o For mobile networks- firewall helps in secure
login
o Design goals
All traffic -must pass through
firewall(inside/outside)
Done by blocking access to local network
expect via firewall
If authorized traffic denied by local
security policy will be allowed to pass
through firewall
Different type of firewall<-> different
type of security policies
Firewall is immune to unauthorized entry
o
Types of firewalls
1. Packet Filter
o Router- part of firewall- performs packet
filtering
o Packet filtering router- applies rules on-
incoming packets- decides to forward or
discard
o Router is configured to filter
packets(incoming/outgoing)
o “Packet filtering firewall maintains a filtering
table that decides whether the packet will be
forwarded or discarded”
o
o filtra on rules are based on:
Source IP address: IP address of system
genera ng IP packet
Des na on IP address: IP address of
system where packet is trying to reach
Source and des na on transport-level
address: TCP or UDP define applica ons
such as – SNMP or TELNET
IP protocol field: it tells the transport
protocol
Interface: it is for router using 3 or more
ports interfacing incoming and outgoing
packet
o
o Advantages
Simplicity
Transparency to users
High speed
o Disadvantages
Difficulty of se ng up packet filtering
rules
Lack of authen ca on
2. Stateful Packet Filter
o it understands request and reply system
o rules for stateful packets are specified only for
first packet in one direc on
o new rules are created a er first outbound
packet
o then all packets proceed automa cally
o stateful packet filter supports wide range of
protocols – FTP, IRC, H323
o It keeps track of the state of networks
connec on travelling across it
o filtering decisions - based on packet’s history
in the state table.
o
3. Applica on Gateway
o Also known as – Proxy Server
o Because – it Acts like proxy and decides flow
of applica on-level traffic
o Internal user- contacts applica on-level
gateway using TCP/IP applica on e.g.
TELNET/FTP/HTTP
o Applica on-level gateway will ask user/host-
about remote host- with which he wants
connec on (for communica on)
o prevents the direct connec on between
either side of the firewall
o User provides info like ID and authen ca on
info gateway contacts applica on on
remote host and relays TCP segment
containing app data between 2 endpoints
o If gateway doesn’t implement proxy code for
an appservice is not supported and can’t be
forwarded across firewall
o Gateways are configured – to support specific
features
o These features are considered by network
administrator while denying other features
1. Advantages
i. High security than packet filtering
ii. Only needs to scru nize a few allowable
applica ons
iii. Easy to log and audit incoming traffic
2. Disadvantages
i. Addi onal overheadas 2 separate
connec ons between end users and
gateway
ii. Gateway should examine and forward all
traffic in both direc ons
4. Circuit Gateways
o It’s a specialized func on- performs
applica on-level gateway for certain app
o it will not allow end-to-end TCP connec on –
but will set up 2 TCP connec ons:
between TCP user on inner host and
gateway
between a gateway and TCP user on
outside host
o a er these 2 connec ons gateway
transmits TCP segments from one connec on
to another without examining contents
o security func on will check which connec on
is allowed
o here system administrator trusts the internal
users
o gateway can be configured – to support
applica on level or proxy service on inbound
connec ons and circuit-level func ons for
outbound connec ons
o Gateway can acquire processing overhead of
examining incoming app data for prohibited
func ons but does not acquire that overhead
on outgoing data
5.2 Firewall Policies, Configura on, Limita ons,
DMZ
Firewall Policies
o Allow all type of traffic but block some
services like– TELNET/SNMP and port number
used by an a acker
o Restric ve policy: - Block all traffic and allow
only useful traffic -HTTP, POP3, SMTP, SSH
o If network administrator forgets to block
something it is exploited for some me
without knowledge
o Most secure op on: block everything
suspicious (a er complaining by someone
allow the protocol)
Firewall ruleset:
Firewall allows – HTTP, FTP, SSH, DNS – to
communicate from internal network to
internet
Allows SMTP – to communicate to mail
server from anywhere
Allows SMTP and DNS – to communicate
from mail server to internet
Allows SMTP and POP3- to communicate
from inside to mail server
Firewall allows only reply packets
Firewall can block everything else
Configura on
o Firewall combina on of packet filter and
applica on-level gateway.
o 3 types of configura ons
o Advantages
Improves security- by checking both
levels packet and applica on
Provides flexibility to n/w administrator
to define more security policies
o Disadvantages
Internal users are connected to both –
applica on gateway and packet filter
router if packet filter is a acked –
whole internal network is exposed to
a acker
2. Screened Host Firewall, Dual-Homed Bas on
o Direct connec on between internal hosts and
packet filter is avoided
o Pkt filter only connects to applica on gateway
o Has separate connec on with internal host
o If packet filter is a acked – only applica on
gateway is visible to a acker
Advantages Disadvantages
It provides access to
Various vulnerabili es
external users by
can be found in DMZ
securing the internal
System’s services.
sensi ve network.
If an a acker
A DMZ can be used with
successfully cracks the
a combina on of a
DMZ system, they
firewall & router, which
may access your
as a result provide high
confiden al
security.
informa on.
By implemen ng DMZ,
only the data that is An a acker having are
intended to be visible authen cated data
publicly is displayed. the can access the system
rest is hidden and as an authorized user.
secured.
5.3 Intrusion Detec on System (IDS)
What is IDS?
“When the IDS no ces a possible malicious threat,
called an event”
“Process of monitoring events happening in
computer system / network” IDS
Analyzes system for possible incidents
threat of
viola on of computer security policies,
standard security prac ces
acceptable use policies
IDS <-> Burglar alarm
In case of intrusion IDS will provide warning or alert
Operator then tags the event to Incident Handling
Team for further inves ga on
IDS – observes surrounding ac vi es- tries to iden fy
undesirable ac vi es
Purpose-
to iden fy suspicious/ malicious ac vi es
devia ng normal behavior
Catalog and classify ac vity
Reply to the ac vity
2 types of IDS:
1. Host Based IDS
Examines ac vi es of individual system like
mail server, web server, individual PC
Concerned with only individual system
Has no visibility to network or systems around
it
2. Network Based IDS
Examines ac vi es on the network
Visibility only into traffic monitoring – crossing
network link
Has no idea of what is happening to individual
systems
Components of IDS
Traffic Collector
To collect the ac vity or event from IDS for
examina on
HIDS Event can be- log files, audit logs, incoming
or outgoing traffic
NIDS event can be- mechanism for copying
traffic of n/w link
Analysis Engine
This will examine collected n/w traffic
Compares it with known pa erns of
suspicious/malicious ac vi es
Malicious ac vi es -stored in signature
database
Analysis Enginebrain of IDS
Signature Database
Stores collec on of pa erns and defini ons of
known suspicious/malicious ac vity on
host/network
Disadvantages
Needs to be installed on every host spot
High-cost ownership and maintenance
Uses local system resources
Very focused view and cannot relate to ac vity
around it
Excluded from the network
Passive in nature, so it just informs about the
attack without doing anything about it.
Network Based IDS
Focuses on n/w traffic
Bits and bytes travelling along cables
interconnec ng system
Checks traffic according to – protocol, type,
amount, source, des na on, content, traffic
already seen
analysis occurs quickly at the speed network
operates to be effec ve
Examines traffic in/out- internet, remote offices,
partners etc.
NIDS looks for certain ac vi es like:
Denial of service a ack (DOS)
Port scans or sweeps
Malicious content in data in packet
Vulnerability scanning
Trojans, viruses, worms
Tunneling
Brute-force a acks
Layout of NIDS
Advantages
Provides coverage of fewer systems(not single
like HIDS)
Low cost – deployment, maintenance, upgrade
Visibility into all n/w traffic
Can corelate mul ple systems
Disadvantages
Ineffec ve for encrypted traffic
Can’t see traffic that does not pass through it
it might be slow as compared to the network
speed.
Categories HIDS NIDS
Response
Response me is slow Fast response me
Time
Honeypots
Honeypots: - innova on in IDS
uses a simulated a ack target to distract
a ackers away from authen c systems.
network-a ached system used as a trap
for cyber a ackers to detect and study the tricks
and types of a acks used by hackers
It’s a computer system- on the internet-setup to
a ract and trap a ackers
They are designed to:
Purposely divert hackers from accessing
cri cal system
Iden fy malicious ac vi es
Engage a acker for long me so that he
will stay on the system ll administrator
responds
Honeypot is designed with sensi ve monitors
and event loggers
Which detect the accesses and collect
informa on about a ackers
2 types of Honeypots (based on deployment
method)
1. Produc on Honeypot:
Used by companies and corpora ons –
for researching hackers aims- diver ng
and mi ga ng risks
2. Research Honeypot:
Used by non-profit organiza on and
educa onal ins tu ons – for researching
mo ve and tac cs of hacker community-
for targe ng different networks
Effec ve method to track hackers’ behavior
Increasing effec veness of computer security
tools
Advantages of Honeypot
Acts as a rich source of informa on and helps
collect real- me data.
Iden fies malicious ac vity even if encryp on is
used.
Wastes hackers’ me and resources.
Improves security.
Disadvantages of Honeypot
Being dis nguishable from produc on systems,
it can be easily iden fied by experienced
a ackers.
Having a narrow field of view, it can only iden fy
direct a acks.
A honeypot once a acked can be used to a ack
other systems.
Fingerprin ng (an a acker can iden fy the true
iden ty of a honeypot).
5.4 Email Security
Email- most widely used on internet
Used to send- text, pictures, videos, sounds- to
other internet users (keyword followed by colon)
Email security is extremely important issue
Text email message has 2 por ons:
Content
Header
Header lines are followed by message
Header keywords- From, To, Subject, Date
SMTP (Simple Mail Transfer Protocol)
It’s a TCP/IP protocol
Specifies how computer exchange e-mail
It works with POP (Post Office Protocol)
Request/response based
Email client s/w at sender’s end
Gives email message to SMTP server
SMTP server transfers message to receiver’s
SMTP server
SMTP’s duty – to carry email message between
sender and receiver
On same or different computer
It also supports:
Sending single message to one or more
recipients
Message can include- text, voice, video, or
graphics
It can send message on networks outside
internet
SMTP uses -TCP port no 25
Email delivery happens through TCP connec on
to port 25
PEM opera on
Step 1: Canonical Conversion
Internet works on computer having TCP/IP stack
regardless of architecture and OS
So same thing can be represented differently on
different computers
It transforms all messages into abstract canonical
representa on regardless of architecture and
OS of senders and receiver’s computer as well
Email messages will travel in uniform and
independent manner
Step 2: Digital Signature
Starts by crea ng message digest of email
message – using MD2 or MD5 algorithm
Step 3: Encryp on
Original email and digital signature are
encrypted with symmetric key
DES or DES3 algorithm in CBC (cipher Block
code) mode is used
Step 4: Base-64 Encoding
This transforms binary input to printable
character output
Here binary input processed in block of 3 octets
or 24 bits
24 bits are considered in 4 sets of 6 bits
6 bits then mapped into 8 bits characters
Pre y Good Privacy (PGP)
Used for encryp on and decryp on of email
Also uses digital signature to ensure integrity
of email
Freely available/low-cost commercial version
Widely used
Ensures privacy
Developed by– Philip R. Zimmermann in 1991
Has become a standard for email security
PGP encrypted files cannot be read by
unauthorized users or intruders
How it works?
Authen ca on
o Sender creates message
o SHA-1 is used to generate 10-bit hash
code of message
o Hash code encrypted -using sender’s
private key result is pretended
message
o Receiver uses- sender’s public key to
decrypt recovers the hash code
o Receiver generates new hash code and
compares
o If matches message accepted
Confiden ality
o PG provides confiden ality by encryp on
o Sender generates message – 128-bit
number
o This is used as session key of this message
only
o Message encrypted using 3DES using
session key
o Session key- encrypted using recipient’s
public key pretended to be the
message
o Receiver decrypts with his private key
o Receiver can only decrypt and recover
session key
o Session key is used for decryp on
o White Hat:
o Non-malicious purpose
o They are security experts
o Hired to test how vulnerable a
protec ve setup is
o Perform vulnerability assessment and
penetra on tests
o Also called as “Ethical Hackers”
o Black Hat:
o Known as crackers
o Has malicious purpose
o Breaks computer security system, n/w
system, telecommunica on
systemwithout authoriza on
o Malicious purpose:
piracy iden ty the , credit card
fraud, damage
o May use- worms, malicious sites
o Grey Hat:
o Combina on of white and black hats
o Not a penetra on tester but will go
ahead and surf internet for vulnerable
system he could exploit
o He will inform admin of website about
vulnerabili es – he found a er hacking
the site
o Will hack site freely- without any
promp ng or authorized from owners
o Will offer a repair to vulnerabili es he has
exposed for small fees
o Elite Hacker:
o Social status among hackers is
underground
o ELITE – hackers among hackers
o Masters of decep on
o Solid reputa on among their groups
o They are cream of hacker crop
o Script Kiddie:
o Part me /non expert hacker
o He breaks into people’s computer
o Does not have knowledge about IT
security
o Uses prepackaged automated script,
tools or s/w wri en by real hackers
Digital Forgery
Falsely altering or manipula ng documents
Intension is misleading others
May produce false documents
Big problems today’s era we create, process,
transmit, and store documents digitally
They can alter- pictures, images, documents,
music for economic gain
May involve electronic forgery or iden ty
the
Digitally forged pictures appeal to viewer’s
eyes
Using picture processing so ware one can
alter anything in the photo
Picture processing so ware- Adobe
Photoshop, Adobe Premier, Corel Draw, GIMP
Photos are changed pixel by pixel
These changes are hard to spot with human
eyes
Cyberstalking or Harassment
Following a person online anonymously
Stalker virtually follows vic m and his/her
ac vi es
Involves online harassment
Cyberstalker uses- social media, websites and
search engines to ins ll fear
Cyberstalker knows the vic m- makes the
person feel afraid or concerned for their
safety
Vic ms are mostly – women or children
Iden ty The and Fraud
Iden ty the :
It’s a kind of fraud
Cybercriminals steal personal data-
passwords, bank account details, credit cards,
debit cards, social security, other sensi ve
informa on
Through iden ty the criminal can steal
money
Fraud:
Cyber crime intends to deceive a person in
order to gain important data or informa on
Fraud can be done by altering, destroying,
stealing or suppressing informa on
Cyber Terrorism
Any planned, poli cally mo vated a ack
against informa on, computer system,
computer programs and data which results
in violence against non-combatant(non-
figh ng) targets by sub-na onal groups or
clandes ne (secret/non legal) agents
Cyber terrorist a acks- explicitly designed to-
cause physical harm to individuals
Targets- banking industry, military
installa ons, power plants, air traffic control
centers, water systems
Carried out on private servers
Hackers can-
o break into computer system, introduce
viruses to vulnerable networks, deface
websites, launch denial-of-service, make
terroris c threats electronically
Can endanger the public safety of millions of
people
Can cause massive panic or fatali es
Cyber Defama on
Injury caused to reputa on of a person in the
eyes of a third person
By word, oral or wri en, by signs or by visible
representa ons
Intension to lower the reputa on of a
person in the eyes of pubic
“Publishing a defamatory material against
another person with the help of computer or
internet”
Harm caused to the person is widespread,
irreparable as informa on is shared with
en re world
This affects welfare of community as a whole
Impacts economy of a country
Mediums of cyber defama on:
o World wide web
o Discussion groups
o Intranets
o Mailing list and bulle n boards
o E-mail
OS Fingerprin ng
Process of iden fying OS of target device or
system based on analysis of network packets
it sends and receives
OS detec on can be- ac ve or passive
Ac ve OS fingerprin ng tools: interacts with
target network
Passive OS fingerprin ng tools: does not
interact with target system
o Passive OS Fingerprin ng
o Gathers informa on about target system
o Without ac vely interac ng with OS
o Examines network packets- to iden fy
specific characteris cs IP address,
ac ve systems, open ports
o Passive Sniffing
o Act of observing and capturing network
packets without sending any data to the
target
o Uses collected informa on during
sniffingto analyses pa erns and
features revealing target system’s OS
o Commonly used items:
o IP TTL Value
o Different OS assign unique default IP TTL
( me-to-live) values to outbound packets
o TCP Window Size
o Ini al window size used by TCP varies
between OS
o IP DF Op on
o Opera ng systems handle Don’t Fragment
(DF) flag differentlyresul ng in
varia ons in fragmenta on behavior
o IP TOS Op on
o Type of service (TOS) field- which
priori zes certain packetsimplemented
differently by various OS vendors
Ac ve OS Fingerprin ng
More powerful than passive
Eliminates the need to wait for random
packets for analysis
Uses tools to inject packets into n/w
Analyses difference between how various
vendors implement TCP/IP stack
Observing these differences OS version can be
iden fied
Common methods used:
o FIN Probe-
o Sends packet with FIN(FINISH) flag set to
observe – how system handles such
requests
o Bogus Flag Probe-
o Uses packet with invalid/unexpected flag
combina on to elicit dis nc ve responses
o Ini al Sequence Number (ISN) Sampling-
o Analyzes pa ern of sequence numbers in
TCP connects to determine randomness
and predictability
o IPID Sampling-
o Observes behavior of ID field of IP header
to iden fy pa erns unique to specific OS
o TCP Ini al Window-
o Examines size of ini al TCP window
adver sed by the system
o ACK Value-
o Analyses how system responds to ACK
packets under certain condi ons
o Type of Service-
o Tests how target system handles the type
of service field in IP packet
o TCP Op on-
o Evaluates use and order of TCP op ons
(such as MSS maximum segment size,
window scaling)
o Fragmenta on Handling-
o Examines how system handles
fragmented IP packets
5.6 Cyber Law
o Introduc on and Need
o Describes legal issues related to use of
communica on technology
o Rules that control the conduct of cyber
ac vity and security under cyber space
o Law is related to computers, network,
so ware, data storage devices, internet,
websites, emails, electronic devices, cell
phones, mobiles, ATM machines etc
o Also includes intellectual property-
privacy, freedom of expression,
jurisdic on
o Cyber law is an a empt to apply laws
designed for physical world to human
ac vi es on internet
o IT Act 2000- has been made punishable
o Objec ve- create environment where
Informa on Technology can be used
safely
o IT Act 2000 is altered by IT Act 2008-
known as Cyber Law
o Has separate chapter en tled Offences
o Various cyber crimes have been declared
as penal offences punishable with
imprisonment and fine
o Categories
o 3 major categories
Crime Against Individual
Includes cyber harassment and
stalking
Distribu on of child pornography
Credit card fraud
Human trafficking
Spoofing
Iden ty the
Online libel or slander
Government
If cyber-crime commi ed against
government
Considered as a ack on na on’s
sovereignty
It includes- hacking, accessing
confiden al informa on, cyber
warfare, cyber terrorism, pirated
so ware
Property
Online crimes against property
Computer or server
DDOS A ack, hacking, virus
transmission, cyber and typo
squa ng, computer vandalism,
copyright infringement, IPR viola on