Ch06 NetworkSecurity2 Firewall Tunneling IDS
Ch06 NetworkSecurity2 Firewall Tunneling IDS
2
Firewalls
A firewall is an integrated collection of security
measures designed to prevent unauthorized electronic
access to a networked computer system.
A network firewall is similar to firewalls in building
construction, because in both cases they are intended to
isolate one "network" or "compartment" from another.
3
Firewall Policies
To protect private networks and individual machines
from the dangers of the greater Internet, a firewall can
be employed to filter incoming or outgoing traffic based
on a predefined set of rules called firewall policies.
Firewall policies
Untrusted
Internet
4
Policy Actions
Packets flowing through a firewall can have one of three outcomes:
Accepted: permitted through the firewall
Dropped: not allowed through with no indication of failure
Rejected: not allowed through, accompanied by an attempt to
inform the source that the packet was rejected
Policies used by the firewall to handle packets are based on several
properties of the packets being inspected, including the protocol
used, such as:
TCP or UDP
contains a virus).
5
Blacklists and White Lists
Two fundamental approaches to creating firewall policies (or
rulesets)
Blacklist approach (default-allow)
All packets are allowed through except those that fit the rules
6
Firewall Types
• packet filters (stateless)
– If a packet matches the packet filter's set of rules, the packet filter
will drop or accept it
• "stateful" filters
– it maintains records of all connections passing through it
7
Stateless Firewalls
A stateless firewall doesn’t maintain any remembered
context (or “state”) with respect to the packets it is
processing. Instead, it treats each packet attempting to
travel through it in isolation without considering packets
that it has processed previously.
SYN
Seq = x
Port=80
SYN-ACK
Client Seq = y
Ack = x + 1
ACK
Seq = x + 1
Ack = y + 1
Trusted internal Server
network
Firewall
SYN
Client (blocked) Seq = y Attacker
Port=80
10
Statefull Firewall Example
Allow only requested TCP connections:
76.120.54.101
SYN
Seq = x Server
128.34.78.55 Port=80
SYN-ACK
Client Seq = y
Ack = x + 1
ACK
Seq = x + 1
Ack = y + 1
Trusted internal SYN-ACK
network (blocked) Seq = y
Attacker
Port=80
12
Application-level Firewall gateway-to-remote
host session
host-to-gateway
Filters packets on application session
data as well as on IP/TCP/UDP
fields. application
gateway
router and filter
Example: allow select internal
users to telnet outside.
7-13
Network Security
Firewall on Windows and Linux
On Linux, Iptables is On Windows, use
used to provide “control panel”
firewall function “Windows Firewall”
http://en.wikipedia.org/wiki/I
ptables
14
Tunnels
The contents of TCP packets are not normally
encrypted, so if someone is eavesdropping on a TCP
connection, he can often see the complete contents of
the payloads in this session.
One way to prevent such eavesdropping without
changing the software performing the communication is
to use a tunneling protocol.
In such a protocol, the communication between a client
and server is automatically encrypted, so that useful
eavesdropping is infeasible.
15
Tunneling Prevents
Eavesdropping
Packets sent over the Internet are automatically
encrypted.
Client Server
Tunneling protocol
(does end-to-end encryption and decryption)
Untrusted
TCP/IP Internet TCP/IP
17
The server sends the client a list of acceptable forms of
authentication, which the client will try in sequence.
Password based authentication
Public-key authentication method
Client sends the server its public key
The server then checks if this key is stored in its list of authorized keys. If
so, the server encrypts a challenge using the client’s public key and sends it
to the client
The client decrypts the challenge with its private key and responds to the
server, proving its identity
18
IPSec
IPSec defines a set of protocols to provide
confidentiality and authenticity for IP packets
Authentication Header (AH)
provide connectionless integrity and data origin authentication
for IP datagrams
provides protection against replay attacks
No confidentiality (packets are still unencrypted)
19
Digital
signature
20
21
Virtual Private Networking (VPN)
Virtual private networking (VPN) is a technology
that allows private networks to be safely extended over
long physical distances by making use of a public
network, such as the Internet, as a means of transport.
22
Types of VPNs
Remote access VPNs allow authorized clients to access
a private network that is referred to as an intranet.
E.g., UCF VPN. Computer has internal IP when connected.
Set up a VPN endpoint, network access server (NAS)
Clients install VPN client software on their machines.
23
Intrusion Detection Systems
Intrusion
Actions aimed at compromising the security of the target
(confidentiality, integrity, availability of computing/networking
resources)
Intrusion detection
The identification through intrusion signatures and report of
intrusion activities
Intrusion prevention
The process of both detecting intrusion activities and managing
automatic responsive actions throughout the network
24
IDS Components
IDS manager compiles data from the IDS sensors to
determine if an intrusion has occurred.
If an IDS manager detects an intrusion, then it sounds
an alarm. IDS Manager
Untrusted
Internet
router
router router
25
Possible Alarm Outcomes
Alarms can be sounded (positive) or not (negative)
Intrusion Attack No Intrusion Attack
Bad
(reject normal)
Alarm
Sounded
27
Base-Rate Fallacy Example
Suppose an IDS has 1% chance of false positives, and
1% of false negatives. Suppose further…
An intrusion detection system generates 1,000,100 log entries.
Only 100 of the 1,000,100 entries correspond to actual malicious
events.
Among the 100 malicious events, 99 will be detected as
malicious, which means we have 1 false negative.
Among the 1,000,000 benign events, 10,000 will be
mistakenly identified as malicious. That is, we have
10,000 false positives!
Thus, there will be 10,099 alarms sounded, 10,000 of
which are false alarms. That means false alarm rate is
roughly 99%!
28
Types of Intrusion Detection Systems
Rule-Based Intrusion Detection
Rules and signatures identify the types of actions that match
certain known profiles for an intrusion attack
Alarm raised can indicate what attack triggers the alarm
Problem: Cannot deal with unknown attacks
Statistical Intrusion Detection
Statistical representation (profile) of the typical ways that a
user acts or a host is used
Determine when a user or host is acting in highly unusual,
anomalous ways.
Alarm when a user or host deviates significantly from the stored
profile for that person or machine
Problem: High false positive rate, cannot tell which attack
triggers the alarm
29
Port Scanning
Purpose: Attackers need to know where a potential
target is
TCP scan: use OS system call to check if TCP connection
can be set up on a target machine on any port
Example scanner: nmap
See how nmap works on department eustis machine!
SYN scan: low-level TCP program to send out SYN
packet without intent to finish the TCP connection setup
On receiving SYN/ACK, issues a RST packet to terminate
30
Port Scanning
Two port scanning mode:
Vertical scan: target numerous destination ports on a singular
host (e.g., nmap)
31