5 Security
5 Security
Security Mechanisms
Security Techniques/ Access Control and Firewall
Firewalls and Trusted System Technologies:
As a means of protecting local system or network of
systems from security threats!
all
Fire
w
o l icy
fense P rol
De n t
cess C o
Ac
Security Techniques/Firewall
Firewall Overview
It is more feasible to secure a community of users by putting
some control at the entrance rather than trying to secure every
host
This is done in the real world
Countries protect themselves at their borders
Neighborhoods protect the whole neighborhood
The term firewall has been around for quite some time and
originally was used to define a barrier constructed to prevent the
spread of fire from one part of a building or structure to another.
Network firewalls provide a barrier between networks that
prevents or denies unwanted or unauthorized traffic.
A firewall may be implemented as a standalone hardware device
or in the form of a software
Security Techniques/Firewall
Firewall Overview …
The simplest kind of Firewall is a packet filter.
A packet filter is a router that is augmented with an
access control list, usually specified as a list of rules.
When any packet is received by the router, the security
rules are consulted to decide whether the packet should
be forwarded or dropped (Typical value is ALLOW or
DROP).
A rule can specify which packets it will apply to, based
on the header fields of the packets. For instance, the rule
might specify source and destination IP addresses and
port numbers and protocol names, or wild cards for
each of these.
Security Techniques/Firewall
Firewall Overview …
Packet Filtering
Stateful Packet Inspection
Application Gateways/Proxies
Circuit Level Gateway
Security Techniques/Firewall
Types of firewall/Packet Filtering Firewall
A packet filtering firewall does exactly what its name implies -- it filters
packets.
As each packet passes through the firewall, it is examined and information
contained in the header is compared to a pre-configured set of rules or filters.
An allow or deny decision is made based on the results of the comparison.
Each packet is examined individually without regard to other packets that are
part of the same connection.
Security Techniques/Firewall
Types of firewall/(cont…)
A packet filtering firewall is often called a network layer firewall because the
filtering is primarily done at the network layer (layer three) or the transport
layer (layer four) of the OSI reference model.
You use packet filters to instruct a firewall to drop traffic that meets certain
criteria.
For example, you could create a filter that would drop all ping requests.
You can also configure filters with more complex exceptions to a rule.
Packet filtering rules or filters can be configured to allow or deny traffic
based on one or more of the following variables:
Source IP address
Destination IP address
Protocol type (TCP/UDP)
Source port
Destination port
Security Techniques/Firewall
Types of firewall/Stateful Packet Inspection Firewall
This type of firewall operates at the application level of the OSI model.
For source and destination endpoints to be able to communicate with each
other, a proxy service must be implemented for each application protocol.
Security Techniques/Firewall
Types of firewall/(cont…)
When a client issues a request from the untrusted network, a connection is
established with the application gateway/proxy.
The proxy determines if the request is valid (by comparing it to any rules or
filters) and then sends a new request on behalf of the client to the destination.
By using this method, a direct connection is never made from the trusted
network to the untrusted network and the request appears to have originated
from the application gateway/proxy.
Security Techniques/Firewall
Types of firewall/Circuit-level Gateway
Once a session has been established, it leaves the port open to allow all
other packets belonging to that session to pass.
The port is closed when the session is terminated.
Finally, Types depending on whether the firewalls keeps track of the state of
network connections or treats each packet in isolation, two additional
categories of firewalls exist:
Stateful firewall
Stateless firewall
Stateful firewall
Keeps track of the state of network connections (such as TCP streams)
traveling across it.
Stateful firewall is able to hold in memory significant attributes of each
connection, from start to finish.
These attributes, which are collectively known as the state of the connection,
may include such details as the IP addresses and ports involved in the
connection and the sequence numbers of the packets traversing the
connection.
Security Techniques/Firewall
Types of firewall/ Based on communication state
Stateless firewall