Network Security Management



Similar documents
Firewall. IPTables and its use in a realistic scenario. José Bateira ei10133 Pedro Cunha ei05064 Pedro Grilo ei09137 FEUP MIEIC SSIN

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

CS Computer and Network Security: Firewalls

CIT 480: Securing Computer Systems. Firewalls

CSC574 - Computer and Network Security Module: Firewalls

CSE543 - Computer and Network Security Module: Firewalls

CS Computer and Network Security: Firewalls

Module: Firewalls. Professor Patrick McDaniel Spring CMPSC443 - Introduction to Computer and Network Security

CIS 433/533 - Computer and Network Security Firewalls

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

FIREWALLS & CBAC. philip.heimer@hh.se

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Introduction of Intrusion Detection Systems

Chapter 7. Firewalls

IDS / IPS. James E. Thiel S.W.A.T.

Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT

Ulogd2, Advanced firewall logging

ipchains and iptables for Firewalling and Routing

A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS

8. Firewall Design & Implementation

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

FIREWALL AND NAT Lecture 7a

Firewalls, NAT and Intrusion Detection and Prevention Systems (IDS)

Firewalls. Pehr Söderman KTH-CSC

Firewalls. Chien-Chung Shen

Firewalls (IPTABLES)

How To Understand A Firewall

INTRUSION DETECTION SYSTEMS and Network Security

CIT 480: Securing Computer Systems. Firewalls

Classic IOS Firewall using CBACs Cisco and/or its affiliates. All rights reserved. 1

FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others

Main functions of Linux Netfilter

Netfilter. GNU/Linux Kernel version 2.4+ Setting up firewall to allow NIS and NFS traffic. January 2008

Network Defense Tools

+ iptables. packet filtering && firewall

Optimisacion del ancho de banda (Introduccion al Firewall de Linux)

Linux firewall. Need of firewall Single connection between network Allows restricted traffic between networks Denies un authorized users

Stateful Firewalls. Hank and Foo

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Linux: 20 Iptables Examples For New SysAdmins

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Assignment 3 Firewalls

Matthew Rossmiller 11/25/03

Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Innominate mguard Version 6

TECHNICAL NOTES. Security Firewall IP Tables

- Introduction to Firewalls -

Distributed Systems. Firewalls: Defending the Network. Paul Krzyzanowski

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

How to protect your home/office network?

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Packet filtering with Linux

CTS2134 Introduction to Networking. Module Network Security

CS2107 Introduction to Information and System Security (Slid. (Slide set 8)

From Network Security To Content Filtering

Course Title: Penetration Testing: Security Analysis

Linux Firewall Wizardry. By Nemus

What is Firewall? A system designed to prevent unauthorized access to or from a private network.

Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan

Linux Home Networking II Websites At Home

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Cisco PIX vs. Checkpoint Firewall

How To Protect Your Network From Attack

Firewall Firewall August, 2003

Firewalls N E T W O R K ( A N D D ATA ) S E C U R I T Y / P E D R O B R A N D Ã O M A N U E L E D U A R D O C O R R E I A

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

How To Set Up A Network Map In Linux On A Ubuntu 2.5 (Amd64) On A Raspberry Mobi) On An Ubuntu (Amd66) On Ubuntu 4.5 On A Windows Box

UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING AND NETWORK SECURITY SEMESTER TWO EXAMINATIONS 2014/2015 NETWORK SECURITY MODULE NO: CPU6004

Network Monitoring. By: Delbert Thompson Network & Network Security Supervisor Basin Electric Power Cooperative

Chapter 9 Firewalls and Intrusion Prevention Systems

Networking Basics and Network Security

CCNA Security 1.1 Instructional Resource

NETWORK SECURITY (W/LAB) Course Syllabus

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Lab Objectives & Turn In

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

Network Security. Routing and Firewalls. Radboud University Nijmegen, The Netherlands. Autumn 2014

Linux Firewalls (Ubuntu IPTables) II

What would you like to protect?

Cisco Secure PIX Firewall with Two Routers Configuration Example

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Intrusion Detection Systems

Definition of firewall

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

Linux Network Security

Chapter 15. Firewalls, IDS and IPS

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Snort Installation - Ubuntu FEUP. SSI - ProDEI Paulo Neto and Rui Chilro. December 7, 2010

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

Building a Home Gateway/Firewall with Linux (aka Firewalling and NAT with iptables )

Firewalls. Ahmad Almulhem March 10, 2012

Firewall implementation and testing

Firewalls and System Protection

12. Firewalls Content

Transcription:

Network Security Management TWNIC 2003 Objective Have an overview concept on network security management. Learn how to use NIDS and firewall technologies to secure our networks. 1

Outline Network Security Management NIDS Firewall Case Study: Firewall on Linux What is Information Security? In its most simple form, it is protecting data from unauthorized access. Three basic levels of security: The application level. The host level. The network level. Each level must be properly secured. The weakest link theory. 2

Why Network Security? The Internet, just like a traditional society, exists some unfriendly people which try to break into your network system for certain reason. Money Access to additional resources Competitive advantages Curiosity and Mischief Network Security Objectives Confidentiality Authenticity Integrity Availability Authorization 3

Network Security Utilities? There are two common network security utilities Network Intrusion Detection System (NIDS) Which is able to identify intrusion attempts. Firewall Which is able to do network access control. NIDS 4

NIDS NIDS stands for Network Intrusion Detection System Intrusion Someone tries to break into your network system. NIDS is a intelligent system which is able to monitor packets on the network wire, identify network intrusion attempts, then send alert to administrators, and make response. Attack Identification Stateless Pattern Matching Stateful Pattern Matching Protocol Decode-based Analysis Heuristic-based Analysis Anomaly-base Analysis 5

Stateless Pattern Matching Pattern matching is based on looking for a fixed sequence of bytes in a single packet. Pros Simplest method to detect intrusions Cons Any modification to the attack can lead to missed events (false negatives) limited to inspection of a single packet Stateful Pattern Matching Maintain state information on the TCP stream being monitored. Matches is made in context within the state of the stream. Pros Matching patterns across packet boundaries. Cons May lead to high false positive rates if the pattern is not as unique as the signature writer assumed. 6

Protocol Decode-based Analysis Decoding the various elements in the same manner as the client or server in the conversation would. When the elements of the protocol are identified, the IDS applies rules defined by the RFCs to look for violations. Pros Minimizes the chance for false positives if the protocol is well defined and enforced. Cons Can lead to high false positive rates if the RFC is ambiguous. However, these gray area protocol violations are very common. Heuristic-based Analysis Use some type of algorithmic logic on which to base their alarm decisions. These algorithms are often statistical evaluations of the type of traffic being presented. Pros Some types of suspicious/malicious activity cannot be detected through any other means. Cons Algorithms may require tuning or modification in order to better conform to network traffic and limit false positives. 7

Anomaly-base Analysis Geared to looking for network traffic that deviates from what is seen normally. A subcategory of this type of detection is the profile-based detection methods. Base their alerts on changes in the way that users or systems are interacting on the network. Pros Can detect unknown attacks if implemented properly. Cons Highly dependent on the environment in which the systems learn what normal is. NIDS Reaction Common actions Log suspicious attempts Log suspicious packets sent alert (email or short message) to administrator Make response Reset connection Change Firewall configuration accordingly 8

NIDS Limitation NIDS may not be able to identify intrusion attempts based on newly hacking or cracking technologies. NIDS monitors network traffic in a realtime manner; however, its reaction to intrusion attempts may not take effect in time. An IDS SNORT The Open Source Network Intrusion Detection System http://www.snort.org/ 9

Firewall Firewall An inter-network gateway that restricts data communication traffic to and from one of the connected networks (the one said to be "inside" the firewall) and thus protects that network's system resources against threats from the other network (the one that is said to be "outside" the firewall). (RFC 2828) 10

Firewall (cont.) A firewall typically protects a smaller, secure network (such as a corporate LAN, or even just one host) from a larger network (such as the Internet). The firewall is installed at the point where the networks connect, and the firewall applies security policy rules to control traffic that flows in and out of the protected network. Firewall Zones Un-trust (Internet, external) DMZ De-Militarized Zone: a portion of a network that separate a purely internal network from an external network. Trust (intranet, internal) 11

Firewall Zones (cont.) MAIL WEB Un-trust Outer Wall DMZ Inner Wall Trust Firewall Types Packet filtering Stateless (IP) Stateful (TCP) Application Gateway Hybrid 12

Stateless Firewall Application TCP IP Data Link Physical Filtering based on packet rules, IP address, port number, etc. Packets Packets Stateful Firewall Application TCP IP Data Link Filtering based on session rules, TCP flags, etc. Physical Packets Packets 13

Application Gateway Application TCP IP Data Link Filtering based on application rules, protocol, contents, etc. Physical Packets Packets Hybrid Firewall Application TCP IP Data Link Physical Filtering based on packet rules, session rules, and application rules. Packets Packets 14

Firewall Limitation Cannot protect against attacks inside networks. Cannot protect against attacks coming from trusted networks. Cannot protect against traffic with viral contents. (Anti-Virus Programs required) A Firewall netfilter firewalling, NAT and packet mangling for Linux 2.4 http://www.netfilter.org/ 15

Case Study Firewall on Linux iptables Linux 2.4 kernels Stateful IPV6 support Backwards compatibility modules for ipfwadm and ipchains Extensible tests and actions Fully modular design 16

iptables Syntax Example #domain/udp (O) /sbin/iptables A OUTPUT o lo p udp s localhost/32 - -sport 1024:65535 d localhost/32 - -dport domain j ACCEPT Initial Check firewall rules iptables L INPUT, OUTPUT, FORWARD chains IP Forwarding echo "1" > /proc/sys/net/ipv4/ip_forward 17

Rules Add rules iptables -A INPUT -p icmp -j DROP Delete rules iptables -D INPUT 1 Flush rules iptables -F INPUT Configuration Examples # 198.168.0.0 ssh (O) iptables -A INPUT -s 198.168.0.0 -p tcp -- destination-port ssh -j ACCEPT # Not from 198.168.0.0 (D) iptables -A INPUT -s! 198.168.0.0 -p tcp --destination-port ssh -j DROP 18

Configuration Examples (cont.) #198.168.0.0 telnet service iptables -A OUTPUT -p tcp --destinationport telnet -d 198.168.0.0 -j ACCEPT #Not from 192.168.0.0 telnet service iptables -A OUTPUT -p tcp --destinationport telnet -d! 198.168.0.0 -j REJECT iptables Log Format Apr 30 21:04:10 sparrow kernel: IN= OUT=lo SRC=127.0.0.1 DST=127.0.0.1 LEN=73 TOS=0x00 PREC=0x00 TTL=64 ID=11339 DF PROTO=UDP SPT=33272 DPT=53 LEN=53 19

Reference Cisco System, Inc., The Science of Intrusion Detection System Attack Identification. http://www.firewall-software.com/ firewall_white_paper.html http://www.netfilter.org/ Thank You! Q & A 20