Chapter 4
Chapter 4
A firewall is a network security device that monitors incoming and outgoing network traffic and
permits or blocks data packets based on a set of security rules.
Its purpose is to establish a barrier between your internal network and incoming traffic from
external sources (such as the internet) in order to block malicious traffic like viruses and hackers.
Firewalls can be an effective way of protecting a local system or network of systems from network-
based security threats while at the same time affording access to the outside world via wide area
networks and the Internet.
Types of firewall:
1. Packet Filter
2. Circuit level Gateway
3. Application Gateway
4. Software
5. Hardware
6. Hybrid
7. Stateful multilayer Inspection Firewall
{Write below Paragraph only if asked Packet Filtering Firewall for 6 Marks else Skip}
Advantage:
The Biggest Advantage of Packet Filtering Firewalls is Cost and Lower Resource Usage and best suited
for Smaller Networks.
Simplicity,
Transparency to the users,
High speed
Disadvantage:
Packet Filtering Firewalls can work only on the Network Layer and these Firewalls do not support
Complex rule based models
It is also Vulnerable to Spoofing in some Cases.
It is difficult to set up packet filtering rules
The circuit level gateway firewalls work at the session layer of the OSI model.
They monitor TCP handshaking between the packets to determine if a requested session is
legitimate.
If the initial handshake matches established security policies, the gateway permits the connection.
It creates a virtual circuit for the duration of the session, across which all traffic is allowed to flow
unimpeded.
The information passed through a circuit level gateway, to the internet, appears to have come from
the circuit level gateway.
So, there is no way for a remote computer or a host to determine the internal private ip addresses
of an organization, for example.
This technique is also called Network Address Translation where the private IP addresses
originating from the different clients inside the network are all mapped to the public IP address
and then sent to the outside world (Internet).
This way, the packets are tagged with only the Public IP address and the internal private IP addresses
are not exposed to potential intruders
Application level firewalls decide whether to drop a packet or send them through based on the
application information (available in the packet).
They do this by setting up various proxies on a single firewall for different applications.
A proxy server is a system or router that provides a gateway between users and the internet.
Both the client and the server connect to these proxies instead of connecting directly to each other.
So, any suspicious data or connections are dropped by these proxies.
Application-level gateways can provide additional security benefits over other types of firewalls
because they can inspect the contents of data packets at the application layer, where protocols such
as HTTP, FTP, and SMTP operate.
This enables the firewall to identify and filter out traffic to detect and prevent attacks that might
attempt to exploit vulnerabilities in specific applications.
Configuration of firewall
There are 3 common firewall configurations.
1. Screened host firewall, single-homed bastion configuration
2. Screened host firewall, dual homed bastion configuration
3. Screened subnet firewall configuration
Disadvantages :
Internal users are connected to the application gateway as well as packet filter router, So if any how
packet filter is attacked , then the whole internal network is exposed to the attacker.
Limitations:
1. Firewall do not protect against inside threats.
2. Packet filter firewall does not provide any content based filtering.
3. Protocol tunneling, i.e. sending data from one protocol to another
protocol which negates the purpose of firewall.
4. Encrypted traffic cannot be examine and filter.
DMZ (Demilitarized Zone): It is a computer host or small network inserted as a ―neutral zone in a
companys private network and the outside public network. It avoids outside users from getting direct
access to a companys data server. A DMZ is an optional but more secure approach to a firewall. It can
effectively acts as a proxy server.
The typical DMZ configuration has a separate computer or host in network which receives requests
from users within the private network to access a web sites or public network. Then DMZ host
initiates sessions for such requests on the public network but it is not able to initiate a session back into
the private network. It can only forward packets which have been requested by a host.
The public networks users who are outside the company can access only the DMZ host. It can store
the companys web pages which can be served to the outside users. Hence, the DMZ cant give access
to the other companys data. By any way, if an outsider penetrates the DMZs security the web pages
may get corrupted but other companys information can be safe.
Examples:
Web servers
It's possible for web servers communicating with internal database servers to be deployed in a DMZ.
This makes internal databases more secure as these are the repositories responsible for storing
sensitive information. Web servers can connect with the internal database server directly or through
application firewalls, even though the DMZ continues provide protection.
An Intrusion Detection System (IDS) monitors network traffic and monitors for suspicious activity and
alerts the system or network administrator.
In some cases the IDS may also respond to anomalous or malicious traffic by taking action such as
blocking the user or source IP address from accessing the network.
IDS are mainly divided into two categories, depending on monitoring activity:
Host intrusion detection systems (HIDS) run on independent hosts or devices on the network.
A HIDS monitors the incoming and outgoing packets from the device only and will alert the
administrator if suspicious or malicious activity is detected. It takes a snapshot of existing system files
and compares it with the previous snapshot. If the analytical system files were edited or deleted, an alert
is sent to the administrator to investigate.
Traffic collector:
Analysis Engine:
This component examines the collected network traffic & compares it to known patterns of suspicious or
malicious activity stored in the signature database. The analysis engine acts like a brain of the IDS.
Signature database:
This is the component that interfaces with the human element, providing alerts & giving the user a
means to interact with & operate the IDS.
1) Host-based IDS: Host based IDS looks for certain activities in the log files are:
1. Logins at odd hours
2. Login authentication failure
3. Adding new user account
4. Modification or access of critical systems files.
5. Modification or removal of binary files
6. Starting or stopping processes
7. Privilege escalation
8. Use of certain program
2) Network based IDS: Network based IDS looks for certain activities like:
1. Denial of service attacks.
2. Port scans or sweeps
3. Malicious contents in the data payload of packet(s)
4. Vulnerability of scanning
5. Trojans, Viruses or worms
6. Tunneling
7. Brute force attacks.
Honey Pots
Q] Explain honey pots. 4M
It encourages the attacker to stay on the system for some time, allowing the administrations to detect
this and act on this.
These systems are filled with fabricated information designed to appear valuable but that a legitimate
user of the system wouldn’t access.
Honeypots are designed for 2 important goals
1. Make them look-like full real-life systems.
2. Do not allow legitimate users to know about or access them.
State any four difference between Firewall and Intrusion Detection System 4M
DMZ (Demilitarized Zone): It is a computer host or small network inserted as a ―neutral zone in a
company,s private network and the outside public network. It avoids outside users from getting direct
access to a company’s data server. A DMZ is an optional but more secure approach to a firewall. It can
effectively acts as a proxy server.
The typical DMZ configuration has a separate computer or host in network which receives requests
from users within the private network to access a web sites or public network. Then DMZ host initiates
sessions for such requests on the public network but it is not able to initiate a session back into the
private network. It can only forward packets which have been requested by a host. The public network‟s
users who are outside the company can access only the DMZ host. It can store the company’s web pages
which can be served to the outside users. Hence, the DMZ can‟t give access to the other company’s data.
By any way, if an outsider penetrates the DMZ‟s security the web pages may get corrupted but other
company‟s information can be safe.