Network Security: From Firewalls to Internet Critters Some Issues for Discussion



Similar documents
Security Technology: Firewalls and VPNs

CMPT 471 Networking II

Firewall Design Principles Firewall Characteristics Types of Firewalls

Lecture 23: Firewalls

Firewalls (IPTABLES)

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Chapter 20. Firewalls

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

12. Firewalls Content

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

Internet Security Firewalls

In today s world the Internet has become a valuable resource for many people.

Chapter 9 Firewalls and Intrusion Prevention Systems

Firewalls. Chapter 3

Proxy Server, Network Address Translator, Firewall. Proxy Server

Internet Security Firewalls

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

SE 4C03 Winter 2005 Firewall Design Principles. By: Kirk Crane

Cryptography and network security

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Cornerstones of Security

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

How To Protect Information At De Montfort University

Computer Security: Principles and Practice

CSCI Firewalls and Packet Filtering

What would you like to protect?

Basics of Internet Security

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Distributed Systems. Firewalls: Defending the Network. Paul Krzyzanowski

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

PART D NETWORK SERVICES

Internet Security Using Firewalls Vincent C. Jones

Firewall Design Principles

Special Issues for Penetration testing of Firewall

Overview. Firewall Security. Perimeter Security Devices. Routers

Computer Security DD2395

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Firewalls. Ahmad Almulhem March 10, 2012

Firewalls and System Protection

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Introduction of Intrusion Detection Systems

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

Firewalls, IDS and IPS

What is Firewall? A system designed to prevent unauthorized access to or from a private network.

SYSTEM ADMINISTRATION MTAT LECTURE 8 SECURITY

FIREWALLS & CBAC. philip.heimer@hh.se

Second-generation (GenII) honeypots

Locking down a Hitachi ID Suite server

Packet filtering and other firewall functions

Firewalls. Network Security. Firewalls Defined. Firewalls

This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How

Consensus Policy Resource Community. Lab Security Policy

Determine if the expectations/goals/strategies of the firewall have been identified and are sound.

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Network Defense Tools

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

Firewalls. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Firewalls. Characteristics.

Firewalls. Contents. ITS335: IT Security. Firewall Characteristics. Types of Firewalls. Firewall Locations. Summary

Cisco Secure PIX Firewall with Two Routers Configuration Example

Payment Card Industry (PCI) Data Security Standard

Chapter 5. Figure 5-1: Border Firewall. Firewalls. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

This chapter covers the following topics:

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

The Self-Hack Audit Stephen James Payoff

8. Firewall Design & Implementation

Firewall Architecture

Network Security and Firewall 1

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Network Security Policy

Firewalls, Tunnels, and Network Intrusion Detection

Norton Personal Firewall for Macintosh

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Intranet, Extranet, Firewall

PCI Security Scan Procedures. Version 1.0 December 2004

Chapter 8 Router and Network Management

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Enterprise K12 Network Security Policy

Using a Firewall General Configuration Guide

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

How To Protect Your Network From Attack From A Hacker On A University Server

Transcription:

Network Security: From Firewalls to Internet Critters Some Issues for Discussion Slide 1

Presentation Contents!Firewalls!Viruses!Worms and Trojan Horses!Securing Information Servers Slide 2

Section 1: Firewalls What they are and how to build them Slide 3

What is a Firewall?! A barrier between internal and external environments, designed to prevent outsiders from accessing your data.! Offer the greatest security by giving multiple levels of protection while allowing necessary services.! Not necessarily a single piece of hardware or software.! Audit or log Internet usage, keep statistics! Act as a central point of contact Slide 4

Firewalls! What are the threats! Curious crackers! Vandals System Downtime Network Outages Telephone line use! Accidental data disclosure Privacy issues Slide 5

Firewalls! Network Security Paradigms! That which is not expressly permitted is prohibited firewall blocks everything - services must be individually enabled on a case by case basis Administrator must take steps to support each service Users may see firewall as a hindrance! That which is not expressly prohibited is permitted Firewall blocks services that are known security risks Users can potentially introduce security holes in system Slide 6

Some Questions to Ask! If the firewall is breached, what kind of damage could be done to private net?! How big is the zone of risk?! How easy is it to detect that a break in or destruction has occurred?! How much audit information will be kept for diagnosis?! How inconvenient is the firewall to the users? Slide 7

Firewall Precautions! Do not run Network Information System (NIS) on the firewall (like having the Yellow Pages)! Ensure strong passwords and filesystem protection on the firewall! Eliminate all non-essential services! Do not mount remote NFS filesystems on the firewall machine! Enable extensive logging!don t allow user accounts on firewall machines Slide 8

Firewall Costs Firewall Costs! Obvious Costs! Hardware! Software! Hidden Costs! Maintenance! Administration! Loss of Services Due to Security! Violation Potential! Training Slide 9

Firewall Categories Screening Routers! Least secure method! Can be a commercial router or host that supports packet screening, eg Cisco, Proteon, 3Com! Block traffic between networks, hosts, IP ports, protocols or packet types! Some screening routers permit various levels and types of packet logging! May be the only component in a firewall! Design Philosophy - That which is not expressly prohibited is permitted Slide 10

Types of Firewalls Screening Router Placement Outgoing packets Incoming packets Incoming packets Outgoing packets Screening Router Internet Inside Port Outside Port Rejected from Ext. Network: Telnet, ftp, etc. Slide 11

Packet Filter Questions " Where is the filtering to be done? On input, output, or both? " What attributes (i.e. protocol, source, destination, etc) can be checked? " How are protocols other than TCP, UDP handled? " Can source routed packets be rejected? " How comprehensible is the filter language? Can you control the order of application of the rules? Slide 12

Firewall Categories Risks of Screening Routers! Very minimal logging information! Difficult to configure screening rules! Entire network can be unprotected if firewall is breached! Addition of new services may open holes! Can be bypassed by tunnelling, eg DNS.! Can be vulnerable to source routed traffic! Some protocols not suited to packet filtering, eg rcp, rlogin, rsh, rdist, NFS, NIS Slide 13

Firewall Categories Bastion Hosts! Only system visible to external network! Special systems identified as network strong points! Often act in capacity of E-mail relays, name servers, FTP servers, Usenet servers etc,.! Generally, a Bastion Host is one that is recognized as a potential point of attack and will have extra attention paid to its security, audits, software etc.! Should not be trusted Slide 14

Bastion Host Internet External Network Bastion Host is only node visible to external net Internal Network... Bastion Host Slide 15

Firewall Categories Dual Homed Gateway! Special case of Bastion Host! Reachable from both Internet and private network, with IP forwarding turned off (direct traffic between the networks is blocked)! All traffic relayed through application level filters, must pass security checks before being passed on! No user login accounts allowed on the system! All connections are logged so that a complete audit trail is available Slide 16

Dual Homed Gateway Firewall Packet forwarder Network Interface Network Interface Internet External Internal Slide 17

Dual Homed Gateway Disadvantages:! difficult to set up properly! turning off IP source routing! difficult to manage! large number of users! usually require a number of services! inconvenient to use! users first have to access the dual homed host and then access services (services can t be accessed directly from the desktop) Slide 18

Firewall Categories Screened Host Gateway! Most common and flexible form of Firewall! Screening Router blocks traffic between Internet and all hosts on private network except for a single Bastion Host! Screening Router can be configured to permit nodes on private network to directly access Internet via Telnet or FTP.! Screening router is usually configured to block traffic to the Bastion host on specific ports Slide 19

Screened Host Gateway BASTION HOST Internal Network Internet Screening Router External Network Slide 20

Screened Host Gateway! Advantages:! added security over a single bastion host! fairly easy to implement! Disadvantages:! requires a router and a bastion host! intruder detection depends on logging procedures Slide 21

Firewall Categories Screened Subnet! Creates isolated subnet between Internet and private network! Internet can only communicate with nodes on the Screened Subnet! Private network nodes can only communicate with nodes on the Screened Subnet! The private network becomes effectively invisible to the Internet Slide 22

Screened Subnet! Advantages:! sandbox or demilitarized zone between the protected network and the Internet! direct traffic across the screened subnet is blocked! Only the Bastion host is at risk! good for high volume and high speed traffic! Disadvantages:! complexity of configuring screening routers! entire network is reachable from the outside if screening routers fail Slide 23

Screened Subnet Bastion Host Screening Router Internet Screening Router External Network Internal Network Slide 24

Firewall Categories Proxy or Application Gateway! Handle store and forward traffic and some types of interactive traffic! Handle traffic at an application level! Can easily log/audit traffic! Can have extra security built in as needed! Examples: Sendmail Telnet FTP Web Server Slide 25

Telnet Application Gateway Internet Output of Applications Telnet Application Gateway Output of Applications forwarded Keystrokes forwarded User s Keystrokes Log of Connections Slide 26

Evaluating Application Gateways! What applications are supported? (mail, gopher, X11)! Are specialized client programs needed?! How are the difficult services, such as FTP and X11, handled?! Are the logging, access control, and filtering routines adequately documented?! What sorts of logs and authentication mechanisms are provided?! Are any traps or lures provided? Can you add your own? Slide 27

Application Gateways! Advantages:! allow users to access internet services directly! good logging procedures! provide some form of authentication! Disadvantages:! new services need to be provided! burden the firewall administrator! proxy services are not workable for some services! require two steps to connect inbound and outbound traffic Slide 28

Firewall Summary! Use Common Sense! Keep It Simple! Trial and Error! Use Help Resources! Rely on the tools you know and understand Slide 29

Section 2: Viruses and how to combat them Slide 30

Viruses! Infect computer executable programs by attaching themselves to these programs! May contain a trigger to perform some specific act when certain conditions are met! Once infected, a program will infect other programs when it executes, thus spreading the virus! Can be downloaded with programs off the Internet! Most are benign, but may cause erratic behavior! Cannot infect a computer via e-mail, or infect data! Various virus tools are available to counteract them Slide 31

Virus Examples! The WDEF Virus causes computer to beep, frequently crash or display fonts incorrectly! nvir Virus causes computer to beep every 8 to 16 times it is started! A newly discovered Mac Virus called HC 9507 infects the HyperCard application.! HC 9507 does not infect system files or other applications! May cause screen to fade in and out, type pickle automatically or a system shutdown or lockup. Slide 32

Virus Tools! Detect the presence of a virus on a system! Static Analysis can inspect diskettes before installation, or test system on a regular basis! Interception halt the execution of an infected program as the virus attempts to replicate! Modification search for the unexpected modification of programs! Identification identify which particular virus has infected a system! Removal attempt to remove all viruses Slide 33

Virus Tools Selection Factors! Accuracy Detection Tools false positives, false negatives Identification fails to correctly identify virus Removal hard failure and soft failure! Ease of use difficulty in using system, presentation of results! Administrative Overhead load on technical support team! System Overhead load on system Slide 34

Section 3: Internet Worms and Trojan Horses descriptions and some examples Slide 35

Internet Worms! Use Network services to propagate Network mail utility Remote execution capability Remote login capability! Do not require a host program to spread! Originally designed for useful purpose! Can spread to many systems very quickly Slide 36

Trojan Horse Trojan Horse:! A program that disguises itself by purporting to accomplish some useful function.! For example, a Trojan horse program could be advertised as a calculator, but it may actually perform some other function when executed, such as modifying files.! Cannot infect other machines unless it is run on them Slide 37

Trojan Horse Example PKZ300B:! Version 3.00G of PKWARE s shareware DOS data compression utility! Distributed as a self extracting archive, PKZ300B.EXE, which contains a Trojan Horse! If run, will destroy all data on a PC s hard drive! Will only affect the machine on which it is run! Latest actual release of PKZip is v2.04g Slide 38

Section 4: Securing Internet Information Servers Slide 39

General Guidelines! Information server should be a dedicated system! Server process should run with as little privilege as possible! Server software should be executed in a restricted file space! Administrators should closely monitor the integrity of the system and information Slide 40

Anonymous FTP Servers! No files or directories should be owned by user ftp! No encrypted passwords should be in the file ~ftp/etc/password! If possible, no files or directories should be writable by anonymous users Slide 41

Web Server Security! Run the server daemon as a nonprivileged user ( nobody ), rather than as root! Turn off Server Includes or Server Parsed options! Write CGI scripts (for user input) carefully! Run the server in a restricted portion of the file space (use chroot for Unix) Slide 42