CS2107 Introduction to Information and System Security (Slid. (Slide set 8)



Similar documents
Linux Network Security

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Firewall Firewall August, 2003

How to protect your home/office network?

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Firewall implementation and testing

Network Monitoring. By: Delbert Thompson Network & Network Security Supervisor Basin Electric Power Cooperative

Course Title: Penetration Testing: Security Analysis

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Lab Objectives & Turn In

Figure 41-1 IP Filter Rules

Network Attacks and Defenses

TCP/IP Protocol Suite. Marshal Miller Chris Chase

CS Computer and Network Security: Firewalls

Network Forensics: Log Analysis

Intrusion Detection Systems (IDS)

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Linux MDS Firewall Supplement

CS Computer and Network Security: Firewalls

CSCE 465 Computer & Network Security

CTS2134 Introduction to Networking. Module Network Security

Firewall Defaults and Some Basic Rules

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

Lab Organizing CCENT Objectives by OSI Layer

Networking Basics and Network Security

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

SSVP SIP School VoIP Professional Certification

CS5008: Internet Computing

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01

EXPLORER. TFT Filter CONFIGURATION

CSC574 - Computer and Network Security Module: Firewalls

General Network Security

Firewalls (IPTABLES)

Linux MPS Firewall Supplement

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Raritan Valley Community College Academic Course Outline. CISY Advanced Computer Networking

CSE543 - Computer and Network Security Module: Firewalls

Post-Class Quiz: Telecommunication & Network Security Domain

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

CIS 433/533 - Computer and Network Security Firewalls

Network Defense Tools

Multi-Homing Dual WAN Firewall Router

Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas

Looking for Trouble: ICMP and IP Statistics to Watch

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

CompTIA Network+ (Exam N10-005)

Introduction of Intrusion Detection Systems

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Technical Support Information Belkin internal use only

Network Security Management

allow all such packets? While outgoing communications request information from a

Computer Networks CS321

Firewall. IPTables and its use in a realistic scenario. José Bateira ei10133 Pedro Cunha ei05064 Pedro Grilo ei09137 FEUP MIEIC SSIN

Chapter 11 Cloud Application Development

Network Configuration Settings

Project 2: Firewall Design (Phase I)

Knowledgebase Solution

Assignment 3 Firewalls

Access control policy: Role-based access

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

Chapter 9 Firewalls and Intrusion Prevention Systems

Network Security. Network Packet Analysis

Module: Firewalls. Professor Patrick McDaniel Spring CMPSC443 - Introduction to Computer and Network Security

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan

Traffic Analyzer Based on Data Flow Patterns

8 steps to protect your Cisco router

Firewalls. Network Security. Firewalls Defined. Firewalls

Networking: EC Council Network Security Administrator NSA

COMPUTER NETWORK TECHNOLOGY (300)

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort

Firewalls. Ahmad Almulhem March 10, 2012

Network Security CS 192

Configure A VoIP Network

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

Cisco Secure PIX Firewall with Two Routers Configuration Example

Solution of Exercise Sheet 5

Firewalls. Pehr Söderman KTH-CSC

Evaluation guide. Vyatta Quick Evaluation Guide

ΕΠΛ 674: Εργαστήριο 5 Firewalls

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Firewall Testing. Cameron Kerr Telecommunications Programme University of Otago. May 16, 2005

Outline. Outline. Outline

Computer Security: Principles and Practice

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Secure Network Access System (SNAS) Indigenous Next Generation Network Security Solutions

Information Security Training. Assignment 1 Networking

Malicious Network Traffic Analysis

P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis

How To Protect Your Network From A Hacker Attack On Zcoo Ip Phx From A Pbx From An Ip Phone From A Cell Phone From An Uniden Ip Pho From A Sim Sims (For A Sims) From A

Definition of firewall

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

The Bro Network Intrusion Detection System

GregSowell.com. Mikrotik Basics

LESSON Networking Fundamentals. Understand TCP/IP

Transcription:

Networks, the Internet Tool support CS2107 Introduction to Information and System Security (Slide set 8) National University of Singapore School of Computing July, 2015 CS2107 Introduction to Information and System Security (Slid

Networking

Outline Networks, the Internet Tool support 1 Networks, the Internet The Internet Basic networking 2 Tool support For observing the environment IDS - Intrusion Detection Systems CS2107 Introduction to Information and System Security (Slid

Outline Networks, the Internet Tool support 1 Networks, the Internet The Internet Basic networking 2 Tool support For observing the environment IDS - Intrusion Detection Systems CS2107 Introduction to Information and System Security (Slid

Outline Networks, the Internet Tool support The Internet Basic networking 1 Networks, the Internet The Internet Basic networking 2 Tool support For observing the environment IDS - Intrusion Detection Systems CS2107 Introduction to Information and System Security (Slid

Internet history Moments in time...

Objects in space... Networks, the Internet Tool support The Internet Basic networking The first network, the first router, the first message... The original network diagramming tool was a pencil, and the first network had four routers (originally called IMPs), and four nodes (At UCSB, UCLA, SRI and University of Utah). The first successful transmission was from UCLA to SRI in September 1969, and was recorded in the UCLA logbook. CS2107 Introduction to Information and System Security (Slid

Structure of networks now... More in the tutorial... The "Internet" The "Internet" R R R DMZ R intranet R Laptop Web server The topology of the Internet, particularly nearer the edge of the Internet, appears more like a tree than a lattice, and we use the routers to control access to and from the smaller local networks.

Firewalls When a router is protecting you... Firewalls are brick walls often found in wooden buildings and are supposed to prevent the spread of fire. In networking we use the same idea - the firewall is a router, which limits access to and from the Internet. We normally imagine that the fire is on the Internet side :)

Outline Networks, the Internet Tool support The Internet Basic networking 1 Networks, the Internet The Internet Basic networking 2 Tool support For observing the environment IDS - Intrusion Detection Systems CS2107 Introduction to Information and System Security (Slid

Networks, the Internet Tool support The Internet Basic networking Basic basic basic networking... Internet traffic sent in packets... Routing info added (to and from addresses, size, type of message, sequence number) Little message Lots of opportunity to modify routing information, spoof etc CS2107 Introduction to Information and System Security (Slid

Networks, the Internet Tool support The Internet Basic networking Basic basic basic networking... The OSI reference model and the IP reference model... Application Presentation Session Transport Network Datalink Physical OSI Application Transport Network Network Link IP FTP HTTP DNS POP SSH TELNET RTP SIP NTP TLS/ SSL... TCP UDP... IP ICMP IGMP... PPP ARP... CS2107 Introduction to Information and System Security (Slid

Basic basic basic networking... Jargon, layers, names, addresses, services/ports... Connections Layered addresses Router (3 interfaces) 212.3.4.5 192.168.1.1 Application HTTP:dbs.com.sg 192.168.0.1 80 25 web mail Web and mail Server 192.168.0.123 Transport Network Link TCP:192.168.0.123:80 192.168.0.123 f8:1e:df:e2:b4:63 The router/gateway above has 3 interfaces, each with an IP address, and attached to a network. The web and mail server is a single machine with one interface, and two open ports - one for the web server, and the other for mail. Addresses like 192.168.* are not routable over the Internet.

Configuration of routers/firewalls... A router/firewall is a computer, with routing software The underlying principle for routers is to disallow every packet, and then only enable forwarding of those packets that are needed. An example of fail-safe defaults. Some firewalls base their decision to forward a packet by looking just at the content of each packet; others keep track of what you have done previously. In any case, firewall/routing software has rules to allow or disallow connections between interfaces. If we had a router with two attached networks (WAN and DMZ): iptables -A FORWARD -s 0/0 -i WAN -d 192.168.0.123 -o DMZ -p TCP \ --sport 1024:65535 -m multiport --dports 80 -j ACCEPT This tells the router software to accept packets from a WAN interface and forward them to a web server (port 80, address 192.168.0.123, on a DMZ interface). How complex is that?

Networks, the Internet Tool support The Internet Basic networking Configuration of routers/firewalls... Complex systems lead to security concerns Consider the following points: 1 The iptables command given in the previous slide is typical of many used to configure a router/gateway. 2 On my system at home, I have a total of 120 rules like that, as I provide various services including a SMS/SIP gateway. 3 The likelihood that my system with 120 rules is secure is very low. We must assume mistakes could have been made, and be cynical about the security of the network. CS2107 Introduction to Information and System Security (Slid

Outline Networks, the Internet Tool support For observing the environment IDS - Intrusion Detection Systems 1 Networks, the Internet The Internet Basic networking 2 Tool support For observing the environment IDS - Intrusion Detection Systems CS2107 Introduction to Information and System Security (Slid

Observing your network Command like ping, traceroute... The command ping sees if a remote host will respond to us - do we have a connection? ping www.govt.nz The command traceroute sends a series of small packets across a network, and attempts to display the route (or path) that the messages would take to get to a remote host. traceroute www.govt.nz traceroute -I/T www.govt.nz Other commands may also be useful - ifconfig, netstat, route and so on.

Observing wifi networks A Wifi scanner program...

Observing networks and mapping machines The nmap program mapping out my ipad...

Observing network traffic Wireshark displaying an ethernet frame...

Outline Networks, the Internet Tool support For observing the environment IDS - Intrusion Detection Systems 1 Networks, the Internet The Internet Basic networking 2 Tool support For observing the environment IDS - Intrusion Detection Systems CS2107 Introduction to Information and System Security (Slid

Intrusion Detection Systems From Wikipedia... An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a management station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system. Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, and reporting attempts

Sample IDS: snort From Wikipedia... Snort is a free and open source Network Intrusion prevention system (NIPS) and network intrusion detection (NIDS) capable of performing packet logging and real-time traffic analysis on IP networks. Snort performs protocol analysis, content searching/matching, and is commonly used to actively block or passively detect a variety of attacks and probes, such as buffer overflows, stealth port scans, web application attacks, SMB probes, and OS fingerprinting attempts, amongst other features. The software is mostly used for intrusion prevention purposes, by dropping attacks as they are taking place. Snort can be combined with other software such as SnortSnarf, sguil, OSSIM, and the Basic Analysis and Security Engine (BASE) to provide a visual representation of intrusion data...

Sample IDS interface Snort web-based interface showing alerts...

Summary... Networks, the Internet Tool support For observing the environment IDS - Intrusion Detection Systems This lecture was mostly about network issues Some basic networking information, and jargon A plea to use independent tools to check configurations CS2107 Introduction to Information and System Security (Slid