Firewalls and Intrusion Detection



Similar documents
Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Strategies to Protect Against Distributed Denial of Service (DD

Denial of Service. Tom Chen SMU

Distributed Denial of Service (DDoS)

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

CS 356 Lecture 16 Denial of Service. Spring 2013

Denial Of Service. Types of attacks

Secure Software Programming and Vulnerability Analysis

Denial of Service (DoS) Technical Primer

Gaurav Gupta CMSC 681

Federal Computer Incident Response Center (FedCIRC) Defense Tactics for Distributed Denial of Service Attacks

Distributed Denial of Service(DDoS) Attack Techniques and Prevention on Cloud Environment

Modern Denial of Service Protection

Security vulnerabilities in the Internet and possible solutions

Denial of Service (DoS)

SECURING APACHE : DOS & DDOS ATTACKS - II

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Botnets. Botnets and Spam. Joining the IRC Channel. Command and Control. Tadayoshi Kohno

CS5008: Internet Computing

Denial of Service Attacks. Notes derived from Michael R. Grimaila s originals

Implementing Secure Converged Wide Area Networks (ISCW)

Protecting Web Servers from DoS/DDoS Flooding Attacks A Technical Overview. Noureldien A. Noureldien College of Technological Sciences Omdurman, Sudan

2.2 Methods of Distributed Denial of Service Attacks. 2.1 Methods of Denial of Service Attacks

Yahoo Attack. Is DDoS a Real Problem?

Abstract. Introduction. Section I. What is Denial of Service Attack?

TECHNICAL NOTE 06/02 RESPONSE TO DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS

Linux Network Security

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Security Technology White Paper

DDoS Attack and Defense: Review of Some Traditional and Current Techniques

Firewalls, Tunnels, and Network Intrusion Detection

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks

CMPT 471 Networking II

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

A S B

Introduction of Intrusion Detection Systems

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Distributed Denial of Service Attack Tools

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

AN INFRASTRUCTURE TO DEFEND AGAINST DISTRIBUTED DENIAL OF SERVICE ATTACK. Wan, Kwok Kin Kalman

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Network- vs. Host-based Intrusion Detection

Network Security -- Defense Against the DoS/DDoS Attacks on Cisco Routers

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

CHAPETR 3. DISTRIBUTED DEPLOYMENT OF DDoS DEFENSE SYSTEM

Computer Security: Principles and Practice

PROFESSIONAL SECURITY SYSTEMS

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

Computer Security DD2395

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

DDoS Protection Technology White Paper

Firewall Firewall August, 2003

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

Cryptography and network security

Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA DDoS and IP Traceback. Overview

Queuing Algorithms Performance against Buffer Size and Attack Intensities

CSCI Firewalls and Packet Filtering

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Chapter 20. Firewalls

Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant

Network Security: A Practical Approach. Jan L. Harrington

Security of IPv6 and DNSSEC for penetration testers

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Distributed Denial of Service

Seminar Computer Security

DDos. Distributed Denial of Service Attacks. by Mark Schuchter

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

A COMPREHENSIVE STUDY OF DDOS ATTACKS AND DEFENSE MECHANISMS

Firewall Design Principles Firewall Characteristics Types of Firewalls

Network Security. Chapter 9. Attack prevention, detection and response. Attack Prevention. Part I: Attack Prevention

Overview. Firewall Security. Perimeter Security Devices. Routers

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

Classification of Firewalls and Proxies

Classification of Distributed Denial of Service Attacks Architecture, Taxonomy and Tools

How To Protect Your Firewall From Attack From A Malicious Computer Or Network Device

How To Protect Your Network From A Ddos Attack On A Network With Pip (Ipo) And Pipi (Ipnet) From A Network Attack On An Ip Address Or Ip Address (Ipa) On A Router Or Ipa

Denial of Service Attacks, What They are and How to Combat Them

Architecture Overview

Complete Protection against Evolving DDoS Threats

co Characterizing and Tracing Packet Floods Using Cisco R

Survey on DDoS Attack Detection and Prevention in Cloud

SECURING APACHE : DOS & DDOS ATTACKS - I

How To Stop A Ddos Attack On A Network From Tracing To Source From A Network To A Source Address

CIAC. Distributed Denial of Service Trin00, Tribe Flood Network, Tribe Flood Network 2000, And Stacheldraht CIAC Paul J.

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

Firewalls & Intrusion Detection

Chapter 15. Firewalls, IDS and IPS

Firewalls. Ahmad Almulhem March 10, 2012

Name. Description. Rationale

Transcription:

Firewalls and Intrusion Detection

What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall function Protect the internal network from Internet based attacks A single choke point to impose security and audit

Design Goals All traffic from inside to outside, or outside to inside, must pass through the firewall - Configuration Only authorized traffic allowed to pass Security policy The firewall itself is secure.

Types of Firewalls Packet filter Application level gateway Encrypted tunnel

Packet Filters Apply rules to each incoming IP packet and then forward or discard the packet Rules based on information contained in the packet Source IP address Destination IP address Source and destination transport level address IP protocol field Interface Default policy: discard/forward

Packet Filtering Examples

Stateful Packet Filter Problem: high-numbered port numbers are dynamic, could be exploited Solution: Remember the established connections

Application Level Gateway Bastion host, Proxy server Support specific applications, and specific features More secure, easy to log and audit Additional processing overhead

Encrypted Tunnels

What a Firewall can t do Cannot protect against internal threat Cannot protect against attacks that bypass the firewall Cannot protect against the transfer of virus-infected programs or files.

Why we need IDS? IDS: Intrusion Detection System Second line of defense: Prevention, Detection, Recovery Motivation: Detect an attack: the sooner an attack is detected, the less the amount of damage and the more quickly that recovery can be achieved. An effective IDS can serve as a deterrent, so acting to prevent intrusions. IDS collects information about intrusion techniques that can be used to strengthen the intrusion prevention facility.

Intrusion Detection Approaches Rule-based or misuse detection Attempt to define a set of rules that can be used to decide that a given behavior is that of an intruder Define improper behavior, or attack signature, for known attacks False negative rate is high Anomaly detection Collect data relating to the behavior of legitimate users over a period of time, then apply statistical tests to observed behavior to determine with a high level of confidence whether that behavior is not legitimate user behavior Define normal, or expected, behavior, use threshold or profile to detect abnormal behavior, could be used for unknown attacks False positive rate is high

Intrusion Examples Spam coming from a machine in your network Packets with forged source addresses A machine trying to contact a known bad service such as an IRC channel that s being used to control a botnet Multiple failed login attempts

Attacks on Rule-based IDS Insertion attack: to evade the detection by NIDS Approach: insert certain packet that will be seen by NIDS but not be seen by the destination host, such that the attack signature is garbled at NIDS.

Evasion Attack Goal: evade the detection by NIDS Approach: construct certain packet that will not be seen by NIDS but will be seen by the destination host, such that the attack signature is garbled at NIDS.

Denial-of-Service Attacks

DoS Attacks An explicit attempt by attackers to prevent legitimate users of a service from using that service. Overpowering the victim Small resource consumption at the attacker side; larger resource consumption at the victim side Brute-force: Flooding by a large number of attackers Concealing the attacker s identity Forge source addresses Examples: one-packet kill, land attack, TCP SYN flooding attack, smurf attack, WinFreeze, Loki, TFN, Trinoo, Stacheldraht Firewalls can help protect against DoS attacks by keeping nuisance traffic off your net but cannot eliminate IPspoofed packets.

One-Packet Kill Exploit the software vulnerability or bugs by sending a single packet that causes a system to crash For example, sending a packet to port 427 of a Windows 98 system running the Novell Intranet Client will cause the blue screen of death.

Land Attack Exploit the flaw of some IP stack implementation by sending a forged packet with the source address the same as the destination address, which causes the operation system to crash

Smurf Attack

WinFreeze Using a large number of ICMP redirect messages to keep the victim host busy in updating its route table, achieving DoS

Loki A Loki server is installed on a compromised machine, listening to ICMP traffic The attacker sends ICMP echo request to the Loki server, which transfers data by ICMP echo reply An implementation of tunneling, where data is transmitted secretly across a network by hiding it in traffic that normally does not contain payloads It is used as a backdoor into a Unix system after root access has been compromised

Distributed DoS Increase the resources available for offense Make it harder to trace the attacker A typical DDoS architecture The attacker operates from its console, communicating with a group of masters. Each master controls a group of daemons, which actually launch the attacks. Masters and daemons are compromised machines, on which the attack software is installed.

Trinoo Communication means: TCP and UDP Attacks: UDP floods to random ports of the victim

Why not TCP Flooding? UDP does not have flow control. The attacker can send at the highest rate that its network connection allows. If the attacker has a faster Internet link than the victim, the attacker can congest the victim s Internet connection.

Tribe Flood Network (TFN) Communication means: ICMP echo reply Attacks: UDP flood, TCP SYN flood, ICMP echo flood

TFN2k First DDoS program on Windows Communication means: encryption over TCP, UDP, or ICMP with no identifying ports Attacks: UDP flood, TCP SYN flood, ICMP echo flood

Stacheldraht Combination of Trinoo and TFN Communication means: encryption over TCP or ICMP echo reply Attacks: UDP flood, TCP SYN flood, ICMP echo flood

Defense

Client Puzzle The victim can exhaust the attacker s resources. Can prevent spams and DoS attacks.

Anti-Address Spoofing Ingress filtering An edge router filters packets with sources not belonging to the network. Require wide deployment to be effective.

Route-based Distributed Packet Filtering A router drops a packet if the packet is received from an adjacent link that is not on any routing path from the packet s source to the packet s destination.

IP Traceback in Flooding Attack

IP Traceback Fit traceback information (distance, edge fragment, path identifier) in the IP header

Path Identifier Encode the path information in the packet header and allow the victim to filter the attack packets.

Perimeter-Based Defense Rate-limit is pushed directly to the edge routers. Rate-limit AIMD. Rate limit with IP traceback.

Reading Assignment [Kaufman] Chapter 23